Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-09_13a7bd8bec6eea4c4ac09342918bc8df_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-09_13a7bd8bec6eea4c4ac09342918bc8df_mafia.exe
Resource
win10v2004-20240508-en
Target
2024-06-09_13a7bd8bec6eea4c4ac09342918bc8df_mafia
Size
400KB
MD5
13a7bd8bec6eea4c4ac09342918bc8df
SHA1
9f1144af5f0eb50328404766a4a3f85c36798676
SHA256
136c5531e6d66b2b3429bcd937b92c2706eb22343a5d4e00a7564e9d974ede5d
SHA512
7dd333c62a60947b771a75f7cd054c57bed179148e2acbdac3c6828eadb87a10918722dc8b7c519235e07946a20b58e9d92b278c9200ec5659a3a3d26c026409
SSDEEP
12288:WsGgDDItY2rml+YscQmOoaacgONMx2bR0Jr:kO+YsZmOoaacghx2d0Jr
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\Build\ecyber\trunk\sc\bin.32\DeskSvc.pdb
sqlite3_mprintf
sqlite3_step
sqlite3_finalize
sqlite3_busy_timeout
sqlite3_errmsg
sqlite3_column_text
sqlite3_column_count
sqlite3_open
sqlite3_close
sqlite3_column_name
sqlite3_column_type
sqlite3_prepare
sqlite3_reset
sqlite3_free
SizeofResource
FindResourceW
FindResourceExW
GetModuleFileNameW
GetLastError
CreateFileW
CreateThread
ReadFile
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CreateMutexW
ReleaseMutex
ConnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeW
WaitNamedPipeW
SetNamedPipeHandleState
WriteFile
GlobalMemoryStatusEx
OpenProcess
SetProcessWorkingSetSize
ExitThread
WaitForMultipleObjects
TerminateProcess
GetVersionExW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
SetPriorityClass
CreateEventW
TerminateThread
LocalFree
LoadLibraryW
GetProcAddress
GetModuleHandleW
lstrcmpiW
GetSystemInfo
GetSystemDefaultLangID
LockResource
QueryDosDeviceW
GetSystemDirectoryW
GetSystemWindowsDirectoryW
ProcessIdToSessionId
GetEnvironmentVariableW
GetFileSize
FreeLibrary
GetProcessTimes
WideCharToMultiByte
GetFileAttributesW
MultiByteToWideChar
GlobalFree
LocalAlloc
SetFileAttributesW
GlobalAlloc
DeviceIoControl
GetVolumeInformationW
GetQueuedCompletionStatus
InitializeCriticalSectionAndSpinCount
RaiseException
InterlockedExchange
ResetEvent
GetExitCodeThread
PostQueuedCompletionStatus
CreateIoCompletionPort
GetCurrentThreadId
DeleteFileW
OutputDebugStringW
GetTickCount
GetProcessHeap
SetThreadPriority
HeapAlloc
HeapFree
GetPrivateProfileStringW
CopyFileW
GetPrivateProfileIntW
InterlockedDecrement
HeapCreate
GetStdHandle
ExitProcess
LoadResource
CloseHandle
Sleep
SetEvent
WaitForSingleObject
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
SetFilePointer
DecodePointer
FlushFileBuffers
GetLocaleInfoW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
SetStdHandle
CreateFileA
SetEndOfFile
EncodePointer
GetStringTypeW
InterlockedCompareExchange
GetLogicalDriveStringsW
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringW
RtlUnwind
GetCPInfo
GetSystemTimeAsFileTime
GetStartupInfoW
HeapSetInformation
GetCommandLineW
lstrlenA
HeapDestroy
HeapReAlloc
HeapSize
InterlockedIncrement
GetSystemMetrics
wsprintfW
SetTokenInformation
RegEnumKeyW
ControlService
ReportEventW
QueryServiceStatusEx
SetServiceStatus
ChangeServiceConfigW
StartServiceW
ChangeServiceConfig2W
DeregisterEventSource
RegisterServiceCtrlHandlerExW
OpenServiceW
EnumDependentServicesW
StartServiceCtrlDispatcherW
OpenSCManagerW
DeleteService
CloseServiceHandle
RegisterEventSourceW
CreateServiceW
ConvertStringSidToSidW
DuplicateTokenEx
GetTokenInformation
CreateProcessAsUserW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegOpenCurrentUser
RegOpenUserClassesRoot
RevertToSelf
ImpersonateLoggedOnUser
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCreateKeyW
RegSetValueExW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
SHGetSpecialFolderPathW
SHGetFolderPathW
CoInitialize
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
CoUninitialize
VariantInit
VariantClear
SysAllocString
SysFreeString
SHGetValueW
PathRemoveFileSpecW
PathAppendW
PathFileExistsW
WinHttpCrackUrl
WinHttpAddRequestHeaders
WinHttpReadData
WinHttpGetProxyForUrl
WinHttpOpenRequest
WinHttpOpen
WinHttpQueryDataAvailable
WinHttpSetOption
WinHttpSetTimeouts
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpCloseHandle
WinHttpConnect
WinHttpWriteData
WinHttpSendRequest
WinHttpGetIEProxyConfigForCurrentUser
GetModuleFileNameExW
EnumProcessModules
GetProcessMemoryInfo
EmptyWorkingSet
EnumProcesses
DestroyEnvironmentBlock
CreateEnvironmentBlock
IsNetworkAlive
InternetCheckConnectionW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
UuidFromStringW
gethostbyname
WSACleanup
WSAStartup
inet_ntoa
gethostname
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ