Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-09_93ee2bb9f16ea9745c93b2553943cb0e_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-09_93ee2bb9f16ea9745c93b2553943cb0e_mafia.exe
Resource
win10v2004-20240426-en
Target
2024-06-09_93ee2bb9f16ea9745c93b2553943cb0e_mafia
Size
402KB
MD5
93ee2bb9f16ea9745c93b2553943cb0e
SHA1
87fd080052ab66c461418d3120bb1ed172554e79
SHA256
eec005e858baca8ff41aff54991cb850c44a017a1d33f13baa6788c4bbdd0334
SHA512
2fe0ed4457d0c684b57e05a4195925ab1b78c7c57a8941fb467943f7e1e2e4ed7e465e67b103cebe9d9461cd6fd3babfabbe481854e4891684104f93b5560c23
SSDEEP
12288:r4W8RqMvO7f1grHs/RhT7Qz7kdcZxYPq54QWCwq:NruO7f2rMX06Puwq
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\code\5.2.2\B5TClient\bin\Release\B5TLoader.pdb
CreateThread
CreateDirectoryW
GetTempPathW
GetTempFileNameW
Sleep
GlobalFree
MultiByteToWideChar
WaitForMultipleObjects
WriteFile
ReadFile
SetFilePointerEx
SetEndOfFile
CreateFileW
GetVersionExW
GetCurrentProcessId
OutputDebugStringA
TerminateProcess
GetModuleHandleExW
DeleteFileA
FindClose
InterlockedExchange
InterlockedCompareExchange
InterlockedDecrement
LocalFree
lstrlenA
GetCurrentProcess
InterlockedIncrement
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
WideCharToMultiByte
lstrlenW
CreateFileA
GetLocalTime
WTSGetActiveConsoleSessionId
SetPriorityClass
DeviceIoControl
GetModuleHandleA
GetModuleFileNameA
SetEnvironmentVariableA
CompareStringW
GetProcessHeap
SetStdHandle
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
SetFilePointer
CloseHandle
CreateProcessW
MoveFileW
GetTickCount
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
OutputDebugStringW
CreateMutexW
GetCurrentThreadId
FreeLibrary
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
LoadLibraryW
GetStdHandle
GetLastError
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
GetLocaleInfoW
QueryPerformanceCounter
HeapCreate
GetStartupInfoW
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
ExitProcess
HeapSize
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringW
GetCPInfo
RtlUnwind
RaiseException
GetFileType
WriteConsoleW
FindFirstFileExW
HeapAlloc
GetSystemTimeAsFileTime
FindFirstFileExA
FileTimeToLocalFileTime
FileTimeToSystemTime
HeapFree
GetStringTypeW
DialogBoxParamW
DestroyWindow
DefWindowProcW
TranslateAcceleratorW
UpdateWindow
ShowWindow
CreateWindowExW
MessageBoxA
BeginPaint
RegisterClassExW
LoadCursorW
LoadAcceleratorsW
wsprintfW
EndPaint
PostQuitMessage
EndDialog
TranslateMessage
DispatchMessageW
GetMessageW
LoadStringW
LoadIconW
PostThreadMessageW
ord155
SHGetPathFromIDListW
SHGetFolderLocation
ShellExecuteW
ord680
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
CoInitialize
CoTaskMemFree
CoUninitialize
GetModuleBaseNameA
WTSQueryUserToken
SHRegGetValueW
UrlUnescapeW
WinHttpSetOption
WinHttpSetStatusCallback
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpCloseHandle
WinHttpOpen
WinHttpSetTimeouts
WinHttpCrackUrl
WinHttpConnect
WinHttpReceiveResponse
WinHttpWriteData
WinHttpGetProxyForUrl
WinHttpOpenRequest
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpGetIEProxyConfigForCurrentUser
SysAllocString
SysFreeString
VariantInit
VariantClear
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ