Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-05_43d272a8037f28b69300788ca708bc6c_mafia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-05_43d272a8037f28b69300788ca708bc6c_mafia.exe
Resource
win10v2004-20240226-en
Target
2024-06-05_43d272a8037f28b69300788ca708bc6c_mafia
Size
183KB
MD5
43d272a8037f28b69300788ca708bc6c
SHA1
1293486866278b438e9e8be5b04d9fa03d441168
SHA256
de2fa3283a39fe7e133fbe315972decf54a8655a8f339bb5fc15ad0fc3e006c1
SHA512
1c4ec88d8f58081374f6628dc36b478eb44b5741c18fd1a3d05ee60d35375484c02c0702e9943f2832b6357c4d553b0712f0019d05233a2cf78d49bc70c4d76e
SSDEEP
3072:TpXUx6118v3LLbAyYp6gVXkpNfoBTHowg6tIcFCnaReDwR4JXkG4xhs:TFUYQ/3bAtpltYdmT5g6tfFCa8Q4JLks
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
G:\Code\Audit\InsideSrc\0801106204_proto_changed\target\release\symbols\server\BmpLoader.pdb
CreateToolhelp32Snapshot
GetCurrentProcess
WriteFile
CreateFileA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetCommandLineA
WideCharToMultiByte
HeapFree
HeapAlloc
GetProcessHeap
ReleaseMutex
OpenMutexA
CreateDirectoryA
RemoveDirectoryA
DeleteFileA
WritePrivateProfileStringA
GetVersionExA
SetFilePointer
SetEndOfFile
ReadFile
FlushFileBuffers
Process32First
OpenEventA
FreeLibrary
LoadLibraryA
GetTempPathA
GetDriveTypeA
GetWindowsDirectoryA
GetPrivateProfileStringA
SetUnhandledExceptionFilter
SetErrorMode
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CompareStringW
CreateFileW
GetDriveTypeW
LoadLibraryW
WriteConsoleW
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapReAlloc
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetTimeZoneInformation
SetEnvironmentVariableA
Process32Next
OpenProcess
CreateMutexA
GetCurrentThreadId
GetTickCount
GetLocalTime
GetModuleFileNameA
GetSystemDirectoryA
CreateEventA
SetEvent
MoveFileExA
GetFileAttributesA
SetFileAttributesA
Sleep
FindNextFileA
FindFirstFileA
FindClose
GetLastError
LocalFree
GetModuleHandleA
GetProcAddress
TerminateProcess
UnmapViewOfFile
CloseHandle
CreateFileMappingA
MapViewOfFile
GetCurrentProcessId
FlushViewOfFile
GetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapCreate
GetLocaleInfoW
GetModuleFileNameW
GetFileType
GetStdHandle
SetHandleCount
ExitProcess
HeapSize
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
RtlUnwind
GetSystemTimeAsFileTime
RaiseException
HeapSetInformation
GetStartupInfoW
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileExA
LCMapStringW
MultiByteToWideChar
GetCPInfo
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetMessageA
PostThreadMessageA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SetFileSecurityA
ConvertStringSecurityDescriptorToSecurityDescriptorA
SHGetFolderPathA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ