Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-07_e167158d9d54f6e0a36c2ffe2bfcf7e3_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-06-07_e167158d9d54f6e0a36c2ffe2bfcf7e3_mafia.exe
Resource
win10v2004-20240508-en
Target
2024-06-07_e167158d9d54f6e0a36c2ffe2bfcf7e3_mafia
Size
958KB
MD5
e167158d9d54f6e0a36c2ffe2bfcf7e3
SHA1
d57fdcadaceb9f17c44c9f29b59dccf91198fc96
SHA256
b922b3ed3deefbda3196e6b1207ff6c68863d130e3e248e3541c80ea264266ae
SHA512
1fda8f9ed357c6020605f79683fcff96bddd3d934c591e40a8c02e6a46bfeaa03d2586f928d3798c875115414f6a4051837a175cda08498e19862d06169f65e5
SSDEEP
24576:j/cOv35fgqgT5hzGyhSriaiA7lcvVEQT/thlyrdXTvhoAj:T5fdshzGywxyvVEQVyrhTv2Aj
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Build\source\rnmininst\rel32s\rnmininst_es.pdb
OleCreate
OleSetContainedObject
OleInitialize
OleUninitialize
CoInitializeSecurity
CoSetProxyBlanket
CoInitialize
CoCreateInstance
CoUninitialize
CoCreateGuid
UrlUnescapeA
SHDeleteValueA
PathFileExistsA
UrlEscapeA
SHDeleteKeyA
InternetOpenUrlA
InternetCloseHandle
InternetGetConnectedState
InternetOpenA
InternetCanonicalizeUrlA
InternetReadFile
InternetGetLastResponseInfoA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetSetOptionA
CharPrevA
CharNextA
CharLowerA
CharUpperA
CreateDialogParamA
PostMessageA
LoadStringA
SendDlgItemMessageA
PeekMessageA
GetSysColor
KillTimer
EnableWindow
RedrawWindow
GetClassInfoExA
LoadCursorA
GetWindowTextA
GetSystemMetrics
CreateWindowExA
UpdateWindow
SetTimer
GetMessageA
TranslateMessage
DispatchMessageA
DialogBoxParamA
SetWindowRgn
DestroyWindow
ClientToScreen
GetFocus
DefWindowProcA
GetForegroundWindow
GetClassNameA
IsWindowVisible
RegisterClassExA
EnumWindows
GetCursorPos
MessageBoxA
InvalidateRect
BeginPaint
EndPaint
SetWindowTextA
LoadIconA
SendMessageA
GetSystemMenu
EnableMenuItem
GetWindowThreadProcessId
GetShellWindow
GetAsyncKeyState
PtInRect
SetDlgItemTextA
GetDlgItem
SetForegroundWindow
SetActiveWindow
SetFocus
ShowWindow
GetWindowRect
ScreenToClient
SetWindowPos
EndDialog
GetDC
ReleaseDC
DrawTextW
SetWindowLongA
GetClientRect
GetWindowLongA
VariantClear
VariantInit
SysStringByteLen
SysStringLen
SysAllocString
SysFreeString
SysAllocStringLen
BitBlt
StretchBlt
SetBkMode
SetTextColor
GetObjectA
SelectObject
DeleteDC
GetTextExtentPointW
CreateFontW
CreateBitmap
GetDeviceCaps
CreatePatternBrush
CombineRgn
GetPixel
CreateRectRgn
SetPixel
CreateCompatibleDC
DeleteObject
CreateSolidBrush
LookupAccountSidW
ConvertSidToStringSidW
RegEnumValueA
RegEnumKeyExA
ConvertSidToStringSidA
InitializeAcl
IsValidSid
AddAccessDeniedAce
AddAccessAllowedAce
GetLengthSid
DuplicateTokenEx
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueA
InitializeSecurityDescriptor
RegQueryValueExA
OpenProcessToken
GetTokenInformation
EqualSid
RegEnumKeyA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
FreeSid
GetUserNameA
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
LookupAccountNameA
AllocateAndInitializeSid
ConvertStringSidToSidW
SHGetPathFromIDListA
SHGetFolderPathW
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderPathA
SHBrowseForFolderA
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
TransparentBlt
GetUserNameExW
ord8
ord71
ord141
ord87
ord168
ord136
ord93
HeapSize
HeapReAlloc
HeapDestroy
DecodePointer
EncodePointer
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetCurrentDirectoryA
InitializeCriticalSectionAndSpinCount
GetVersion
GetWindowsDirectoryA
MoveFileA
GetFileAttributesA
GetTempPathA
GetTempFileNameA
InterlockedDecrement
InterlockedIncrement
LoadLibraryW
GetModuleFileNameW
GetComputerNameExA
GetSystemInfo
AttachConsole
GetStdHandle
AllocConsole
GetConsoleScreenBufferInfo
SetConsoleWindowInfo
GetComputerNameW
lstrlenW
GetDriveTypeA
GetSystemTime
SetLastError
GetFileSizeEx
RtlUnwind
FileTimeToLocalFileTime
FindFirstFileExA
GetConsoleCP
GetConsoleMode
GetModuleHandleW
ExitProcess
GetLocalTime
WriteConsoleW
GetFileType
VirtualProtect
VirtualAlloc
VirtualQuery
SetStdHandle
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetACP
GetCPInfo
GetOEMCP
IsValidCodePage
SetEnvironmentVariableA
SetCurrentDirectoryA
GetDriveTypeW
GetFullPathNameA
GetCurrentDirectoryW
SetCurrentDirectoryW
SetEndOfFile
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetTimeZoneInformation
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
SetHandleCount
HeapCreate
GetLocaleInfoW
CreateFileW
FlushFileBuffers
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
CompareStringW
ReadConsoleInputA
SetConsoleMode
lstrlenA
GetFileInformationByHandle
SetFilePointer
GetLocaleInfoA
FindResourceA
FreeResource
WaitForSingleObject
GetExitCodeProcess
GetNamedPipeHandleStateA
GetCommandLineW
SetErrorMode
FileTimeToSystemTime
GetSystemTimeAsFileTime
CreateThread
GetProcessHeap
HeapAlloc
HeapFree
TerminateProcess
GetTimeFormatA
GetDateFormatA
LocalAlloc
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SetFileAttributesA
GetTickCount
RaiseException
GetLastError
lstrcpyA
CloseHandle
CreateMutexA
OpenMutexA
CreateProcessA
GetVersionExA
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
FreeLibrary
GetProcAddress
LoadLibraryA
WideCharToMultiByte
RemoveDirectoryA
FindClose
DeleteFileA
FindNextFileA
MoveFileExA
FindFirstFileA
GetModuleFileNameA
GetDiskFreeSpaceA
GetDiskFreeSpaceExA
GetCurrentProcess
GetModuleHandleA
LocalFree
FormatMessageA
ReadFile
Sleep
CreateFileA
ExpandEnvironmentStringsA
MultiByteToWideChar
CopyFileA
GetFileSize
WriteFile
PeekNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateDirectoryA
GlobalFree
GlobalAlloc
lstrcmpA
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
SystemTimeToFileTime
UuidToStringA
RpcStringFreeA
WinVerifyTrust
CertCloseStore
CertFreeCertificateContext
CertGetNameStringW
CertFindCertificateInStore
CryptMsgGetParam
CryptQueryObject
CryptDecodeObject
CryptMsgClose
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ