Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-09_9e17e7d93ffcf4f4db0cb43a1454fbff_karagany_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-06-09_9e17e7d93ffcf4f4db0cb43a1454fbff_karagany_mafia.exe
Resource
win10v2004-20240508-en
Target
2024-06-09_9e17e7d93ffcf4f4db0cb43a1454fbff_karagany_mafia
Size
1.2MB
MD5
9e17e7d93ffcf4f4db0cb43a1454fbff
SHA1
8d9c708ba8134bbd40b1a3c4bf43c09327623d34
SHA256
e74e61ff18d34e17d60cacc39f29763ba9c89623eccc0dfde9ac7c8243da179d
SHA512
e646fa84e061deb3479c9ba087e473bd653ffba66003b62e12a58a70af582974e5eca6d3185b99b03688bf2d079c96ffce7466abcb47f371dc3ae8fedcf68b35
SSDEEP
24576:40guViOSSJKU0sPP0DNoEsR3ZxMUXwGnlofrPeHR7Z99vwOUL2yWc+:ZMmKHMPEgxMUXwrPMp9vgL2yWc+
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\jenkins\workspace\stub_6_9_rp16\rnmininst\rel32s\extractor.pdb
PathFileExistsA
GetSystemMetrics
CharNextA
wsprintfA
VariantClear
ShellExecuteExA
EnterCriticalSection
LeaveCriticalSection
LCMapStringW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapCreate
HeapDestroy
HeapSize
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeW
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetProcessHeap
WriteConsoleW
CreateFileW
IsProcessorFeaturePresent
GetCurrentThreadId
SetLastError
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
MoveFileExA
DeleteFileA
Sleep
WaitForSingleObject
WriteFile
GetTempPathA
CloseHandle
SetFilePointer
ReadFile
GetFileSize
CreateFileA
GetModuleFileNameA
GetLastError
CreateProcessA
GetProcAddress
WideCharToMultiByte
CreateRemoteThread
OutputDebugStringA
WriteProcessMemory
DuplicateHandle
GetCurrentProcess
GetModuleHandleA
VirtualAllocEx
LocalFree
MultiByteToWideChar
RaiseException
GetTickCount
GetModuleFileNameW
LoadLibraryW
RtlUnwind
GetSystemTimeAsFileTime
HeapFree
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapAlloc
HeapReAlloc
GetFileType
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ