Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-05_507ac00227b8291e08187a0cb3cbb698_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-05_507ac00227b8291e08187a0cb3cbb698_mafia.exe
Resource
win10v2004-20240508-en
Target
2024-06-05_507ac00227b8291e08187a0cb3cbb698_mafia
Size
1.8MB
MD5
507ac00227b8291e08187a0cb3cbb698
SHA1
30374fc34d913d42a5dd98175a8ab33133797c7c
SHA256
72e5076b98915b9c40708493346707f65de1fb648dd96840e6cbe63a0c99b843
SHA512
c9c613a0563b55df63c0e74be69c09ffdc07cf1a51b411cbdbcb5c1dc9e824cecf572457f01139c0e5eef9b12a4de7709d8e0b5e8b972cdf1c9f5d548adf2164
SSDEEP
49152:PntZlhsT+0llCB/uxAZyCXBz1Yf9RObX7zT6TJOwl+:PKllCBukBBY
resource | yara_rule |
---|---|
sample | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\code\b5m-clt-bang5tao\B5TClient\bin\Release\B5TPopup.pdb
InternetCloseHandle
InternetOpenW
InternetConnectW
HttpOpenRequestW
HttpSendRequestExW
InternetWriteFile
HttpEndRequestW
InternetOpenUrlA
InternetReadFile
CreateEnvironmentBlock
DestroyEnvironmentBlock
GetLocalTime
Sleep
GetTickCount
DeleteFileA
WTSGetActiveConsoleSessionId
CreateFileA
WideCharToMultiByte
OutputDebugStringA
GetNativeSystemInfo
GetVersionExW
GetSystemInfo
GetVersionExA
GetDiskFreeSpaceExW
GetDriveTypeW
OpenProcess
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
TerminateProcess
GetExitCodeProcess
CreateProcessW
GetModuleHandleExW
LocalFree
FormatMessageW
VirtualQueryEx
GetThreadContext
ResumeThread
SetThreadContext
VirtualAllocEx
VirtualProtectEx
GetCurrentProcessId
VirtualAlloc
ReadFile
GetFileSize
CreateFileW
CreateMutexW
SetLocalTime
FileTimeToSystemTime
SystemTimeToFileTime
WriteFile
SetFilePointer
GetSystemDirectoryW
GetTempPathW
GetEnvironmentVariableW
ExpandEnvironmentStringsA
EndUpdateResourceW
UpdateResourceW
BeginUpdateResourceW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
FindClose
FindFirstFileW
CreateDirectoryW
FindNextFileW
RemoveDirectoryW
SetFileAttributesW
GetFileAttributesW
DeleteFileW
CopyFileW
SetFileTime
GetCurrentProcess
GetFileTime
MoveFileExW
MoveFileW
InitializeCriticalSection
TryEnterCriticalSection
ReleaseMutex
SetEvent
CreateThread
TerminateThread
CreateEventW
InterlockedPushEntrySList
HeapFree
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
VirtualFree
InterlockedPopEntrySList
GetUserDefaultLCID
SetConsoleCtrlHandler
GetTimeZoneInformation
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
FatalAppExitA
SetHandleCount
ExitProcess
HeapSize
IsValidCodePage
GetOEMCP
GetACP
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetLocaleInfoW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapDestroy
HeapCreate
GetCPInfo
LCMapStringW
HeapReAlloc
GetStdHandle
GetFileType
WriteConsoleW
MoveFileA
GetSystemTimeAsFileTime
GetStartupInfoW
HeapSetInformation
GetFileAttributesA
ExitThread
RtlUnwind
DecodePointer
EncodePointer
InterlockedExchange
GetStringTypeW
WaitForSingleObject
CloseHandle
LockResource
GlobalHandle
LoadLibraryW
OutputDebugStringW
GetCommandLineW
GlobalFree
LoadLibraryExW
LoadResource
SizeofResource
MultiByteToWideChar
GlobalLock
GlobalUnlock
GetModuleFileNameW
MulDiv
lstrcmpW
SetLastError
lstrcmpiW
InterlockedIncrement
GetModuleHandleW
GetProcAddress
GetCurrentThreadId
lstrlenW
InterlockedDecrement
FindResourceW
FlushInstructionCache
FreeLibrary
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
lstrlenA
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetStdHandle
SetEndOfFile
CompareStringW
SetEnvironmentVariableA
CompareFileTime
DeviceIoControl
SetPriorityClass
InterlockedCompareExchange
GlobalAlloc
SystemTimeToTzSpecificLocalTime
MessageBoxA
LoadCursorW
IsWindow
CreateWindowExW
CreateAcceleratorTableW
IsWindowVisible
SetLayeredWindowAttributes
LoadBitmapW
PostMessageW
SetCursor
RegisterClassExW
GetClassInfoExW
GetSystemMetrics
SystemParametersInfoW
LoadImageW
GetWindowRect
MonitorFromWindow
GetMonitorInfoW
MapWindowPoints
SetWindowRgn
KillTimer
SetTimer
FindWindowW
IsIconic
ShowWindow
SetForegroundWindow
PostQuitMessage
EnableWindow
EndDialog
MapDialogRect
IsDialogMessageW
SetWindowContextHelpId
CreateDialogIndirectParamW
RegisterWindowMessageW
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
wsprintfW
UpdateLayeredWindow
UnregisterClassA
SendMessageW
SetFocus
GetFocus
SetWindowLongW
GetWindowLongW
DestroyWindow
LoadStringW
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
DefWindowProcW
CharNextW
CreateDialogParamW
GetSysColor
MoveWindow
SetWindowPos
GetClientRect
ClientToScreen
ScreenToClient
GetDC
ReleaseDC
InvalidateRect
InvalidateRgn
RedrawWindow
SetCapture
IsChild
GetParent
GetDlgItem
GetClassNameW
ReleaseCapture
FillRect
CallWindowProcW
EndPaint
BeginPaint
GetDesktopWindow
DestroyAcceleratorTable
GetWindow
AllocateAndInitializeSid
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
FreeSid
CheckTokenMembership
LookupAccountSidW
GetTokenInformation
OpenProcessToken
RegQueryValueExW
CreateProcessAsUserW
CoInitialize
CoUninitialize
OleUninitialize
OleInitialize
CoSetProxyBlanket
CoInitializeSecurity
CreateStreamOnHGlobal
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
SHGetPathFromIDListW
CommandLineToArgvW
ShellExecuteW
ord155
SHCreateDirectoryExW
SHGetFolderLocation
SHFileOperationW
ShellExecuteExW
OleCreateFontIndirect
SysFreeString
SysAllocStringLen
DispCallFunc
LoadTypeLi
LoadRegTypeLi
SysAllocString
VariantClear
VariantInit
VarUI4FromStr
CreateErrorInfo
SetErrorInfo
VariantChangeType
GetErrorInfo
VariantCopy
SysAllocStringByteLen
SysStringLen
SHCreateStreamOnFileEx
PathFileExistsW
InitCommonControlsEx
_TrackMouseEvent
GetStockObject
DeleteObject
SelectObject
DeleteDC
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
GetDeviceCaps
CreateSolidBrush
GetObjectW
CreateRectRgn
CombineRgn
ExtTextOutW
SetBkColor
CreateFontW
SetTextColor
TextOutW
GetTextExtentPoint32W
GetTextMetricsW
GetObjectA
GetTextExtentExPointW
CreatePolygonRgn
GdipDrawImageI
GdipDrawRectangle
GdipDrawLine
GdipDrawRectangleI
GdipCreateBitmapFromScan0
GdipDeleteCachedBitmap
GdipCreateCachedBitmap
GdipFillRectangleI
GdipFillRectangle
GdipSetClipHrgn
GdipSetSolidFillColor
GdipGetFontHeight
GdipDrawImagePointRectI
GdipMeasureString
GdipDrawLineI
GdipSetWorldTransform
GdipSetInterpolationMode
GdipGetImageGraphicsContext
GdipTransformPath
GdipAddPathRectangleI
GdipSetStringFormatAlign
GdipTranslateMatrix
GdipRotateMatrix
GdipCreateMatrix2
GdipCreateMatrix
GdipCreateBitmapFromGraphics
GdipDeletePath
GdipCreatePath
GdipDeleteStringFormat
GdipCreateStringFormat
GdipDeletePen
GdipCreatePen1
GdipDeleteMatrix
GdipDrawImageRectI
GdipSetSmoothingMode
GdipCreateBitmapFromHBITMAP
GdipCloneBrush
GdipCreateFontFromLogfontA
GdipCreateFontFromDC
GdipDrawString
GdipCreateSolidFill
GdipDeleteFont
GdipDeleteBrush
GdipDrawImageRectRectI
GdipReleaseDC
GdipCreateFromHDC
GdipGetImageHeight
GdipGetImageWidth
GdipLoadImageFromFileICM
GdipLoadImageFromFile
GdipDeleteGraphics
GdipCloneImage
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromFile
GdipDisposeImage
GdipAlloc
GdipFree
GdiplusStartup
GdiplusShutdown
GdipSetTextRenderingHint
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
GetModuleBaseNameA
GetModuleFileNameExW
WTSQueryUserToken
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpOpen
WinHttpCloseHandle
WinHttpCrackUrl
WinHttpConnect
WinHttpOpenRequest
WinHttpSetOption
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpGetIEProxyConfigForCurrentUser
WinHttpWriteData
WinHttpGetProxyForUrl
WinHttpReceiveResponse
WinHttpSetTimeouts
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE