Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-07_3425fa7322eee74067df84f0a9868607_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-07_3425fa7322eee74067df84f0a9868607_mafia.exe
Resource
win10v2004-20240508-en
Target
2024-06-07_3425fa7322eee74067df84f0a9868607_mafia
Size
638KB
MD5
3425fa7322eee74067df84f0a9868607
SHA1
526a74dc5db158924e8a04db618c08b62513f3a9
SHA256
54ee396f4e0a938df777e3b002c529ee4fbbaa1f31d1422772e6483a93cade65
SHA512
9e6e48bb1792986187e2a433733b7b837a2d87146c4ff8b7b16b09b46c52b0db50008ab22ce84847e2559858550903569a49d69452eb3251460b0c1b69a2a300
SSDEEP
12288:Tkt9W3OWmLG99gd2LAexS1/tDP2IbzvoMJCiqn6JB:TktE3OWmL2WkA/5+S7JCi+6J
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ord139
ord75
ord140
ord21
ord19
ord11
ord135
ord23
ord17
CertEnumCertificatesInStore
CertSetEnhancedKeyUsage
CertAddEnhancedKeyUsageIdentifier
CertRemoveEnhancedKeyUsageIdentifier
CryptMemFree
CryptMemAlloc
CertGetEnhancedKeyUsage
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertCompareCertificateName
CertEnumCertificateContextProperties
CertSetCertificateContextProperty
CertGetNameStringW
CertGetCertificateContextProperty
CertFreeCertificateContext
CertCreateCertificateContext
CertAddEncodedCertificateToStore
CertCloseStore
CertAddCertificateContextToStore
CertFreeCertificateChain
CertGetCertificateChain
CertFindCertificateInStore
CertOpenStore
CertGetNameStringA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
InternetOpenA
HttpQueryInfoA
InternetCrackUrlA
InternetCloseHandle
InternetConnectA
InternetErrorDlg
GetCurrentThread
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
GetModuleFileNameA
FindFirstFileA
FindNextFileA
FindClose
GetFileAttributesA
CreateDirectoryA
Process32Next
Process32First
CreateToolhelp32Snapshot
DeleteFileA
CopyFileA
TerminateProcess
WaitForSingleObject
OpenProcess
InterlockedDecrement
MultiByteToWideChar
lstrlenA
WriteConsoleA
GetStdHandle
GetCurrentProcess
CreateProcessA
ReadFile
GetExitCodeProcess
DuplicateHandle
CreatePipe
LoadLibraryExA
LocalAlloc
FlushViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
QueryPerformanceCounter
GetProcessHeap
GetCurrentThreadId
GetThreadTimes
GetCurrentProcessId
GetProcessWorkingSetSize
GetProcessTimes
GetDiskFreeSpaceExA
GlobalMemoryStatus
GetTickCount
GetSystemTime
GetStartupInfoA
CreateMutexA
ReleaseMutex
IsProcessorFeaturePresent
GetStringTypeW
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateFileW
WriteConsoleW
GetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameA
GetTimeZoneInformation
HeapSize
GetLocaleInfoW
LoadLibraryW
SetFilePointer
FlushFileBuffers
GetConsoleCP
GetStartupInfoW
SetConsoleMode
LocalFree
CloseHandle
GetLastError
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetStdHandle
CompareStringW
SetEnvironmentVariableA
GetDriveTypeW
SetEndOfFile
UnmapViewOfFile
GetConsoleMode
GetCommandLineA
HeapSetInformation
LCMapStringW
GetCPInfo
HeapCreate
FormatMessageA
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetModuleFileNameW
WriteFile
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
WideCharToMultiByte
InterlockedIncrement
InterlockedExchange
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
RtlUnwind
RaiseException
HeapReAlloc
HeapAlloc
GetModuleHandleW
ExitProcess
GetSystemTimeAsFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
ReadConsoleInputA
GetACP
GetDesktopWindow
GetWindowThreadProcessId
GetCursorPos
GetCaretPos
GetActiveWindow
GetCapture
GetClipboardOwner
GetClipboardViewer
GetFocus
GetInputState
GetMessagePos
MessageBoxA
GetOpenClipboardWindow
GetProcessWindowStation
GetQueueStatus
wsprintfA
EnumWindows
GetMessageTime
PostMessageA
FreeSid
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
RegQueryInfoKeyA
RegEnumKeyExA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
OpenThreadToken
OpenProcessToken
DuplicateToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
ShellExecuteA
CoCreateInstance
CoUninitialize
OleRun
CLSIDFromProgID
CLSIDFromString
CoCreateGuid
CoInitialize
VariantClear
SysFreeString
SysStringByteLen
SysAllocStringByteLen
GetErrorInfo
SysAllocString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ