Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-13_bc87c93beee441717d81ffdbb9c0fcf4_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-13_bc87c93beee441717d81ffdbb9c0fcf4_mafia.exe
Resource
win10v2004-20240508-en
Target
2024-06-13_bc87c93beee441717d81ffdbb9c0fcf4_mafia
Size
1013KB
MD5
bc87c93beee441717d81ffdbb9c0fcf4
SHA1
7c8379f03d3740748445a1e9393b9b14099701b3
SHA256
b099e17cccad6be93ae01d457cd0c808c034d46b27aa069c8d5c3ab15b2d73eb
SHA512
a52f3e0c0249f81faf4d2c4a74698d7c61a4872a67c1b97eec478aa0c21ea4a791ded796d7e1c00f2c34f9b67419d27766f07e0ec47f06103abd752fa0901374
SSDEEP
24576:cKb2DhZzKSxdr2++0uf+Z56Jk8sCQTLJMj2DOZ:+Kh+if+Z5EkTldMj2DOZ
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
gethostname
inet_ntoa
getsockname
send
getpeername
WSAIoctl
select
WSAGetLastError
gethostbyname
shutdown
setsockopt
WSACleanup
bind
__WSAFDIsSet
getsockopt
listen
accept
connect
WSAStartup
inet_addr
htonl
htons
recv
socket
closesocket
timeSetEvent
PlaySoundA
timeGetTime
timeKillEvent
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
ExpandEnvironmentStringsForUserA
CreateEnvironmentBlock
DestroyEnvironmentBlock
GetSystemDirectoryW
LoadLibraryW
Sleep
CreateEventA
GetExitCodeProcess
ReadFile
CreateFileW
Process32Next
OpenEventA
WaitForMultipleObjects
lstrcatW
CreateToolhelp32Snapshot
OutputDebugStringA
GetVersionExA
GetCurrentProcessId
GetEnvironmentVariableA
SetCurrentDirectoryA
SetFileAttributesA
ResumeThread
CreateThread
ResetEvent
CreateFileA
GetFileSize
CompareFileTime
GetFileTime
SetFilePointer
MoveFileExA
SetEndOfFile
SetErrorMode
SystemTimeToFileTime
SetFileTime
GetDriveTypeA
GetFileAttributesA
FileTimeToSystemTime
FlushFileBuffers
CreateDirectoryA
GetLogicalDriveStringsA
MoveFileA
GetSystemTime
GetCurrentThread
VirtualFreeEx
ReadProcessMemory
CreateProcessA
TerminateProcess
SetThreadPriority
VirtualAllocEx
SetProcessShutdownParameters
TerminateThread
SetEvent
LoadResource
WriteFile
LockResource
AllocConsole
FormatMessageA
GetStdHandle
WriteConsoleA
GlobalDeleteAtom
GlobalGetAtomNameA
GlobalAddAtomA
RtlUnwind
GetCPInfo
GetTimeZoneInformation
HeapReAlloc
GetConsoleMode
GetConsoleCP
InterlockedIncrement
InterlockedDecrement
GetStartupInfoW
HeapSetInformation
GetCommandLineA
InitializeCriticalSectionAndSpinCount
SetStdHandle
ExitProcess
GetModuleHandleW
FindFirstFileExA
EncodePointer
DecodePointer
TlsFree
TlsAlloc
DuplicateHandle
ReleaseSemaphore
CreateSemaphoreA
TlsSetValue
TlsGetValue
GetFileType
lstrcatA
lstrcmpiA
InterlockedExchange
GetProcessHeap
HeapFree
HeapAlloc
lstrcpynA
LocalFileTimeToFileTime
FileTimeToLocalFileTime
GetLocalTime
GetVolumeInformationA
GetLocaleInfoA
SetVolumeLabelA
DosDateTimeToFileTime
GetFullPathNameA
lstrcpyA
SizeofResource
WaitNamedPipeW
PeekNamedPipe
ExitThread
RaiseException
UnhandledExceptionFilter
Process32First
SetLastError
OpenFileMappingA
ReleaseMutex
CreateMutexA
CreateFileMappingA
WaitForSingleObject
UnmapViewOfFile
MapViewOfFile
CloseHandle
GetPrivateProfileStructA
WritePrivateProfileStringA
GetFileInformationByHandle
GetPrivateProfileStringA
GetPrivateProfileIntA
OpenProcess
WritePrivateProfileSectionA
WritePrivateProfileStructA
WinExec
GetLastError
GetComputerNameA
GetVersion
GetSystemInfo
lstrlenA
DeleteFileA
GetTempPathA
FindNextFileA
FindClose
CopyFileA
FindFirstFileA
FreeLibrary
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetProcessTimes
InitializeCriticalSection
GetSystemTimeAsFileTime
GetTickCount
GetCurrentProcess
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GlobalFree
GlobalUnlock
MultiByteToWideChar
WideCharToMultiByte
GlobalAlloc
GlobalLock
GlobalSize
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetModuleFileNameW
GetLocaleInfoW
HeapSize
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetStringTypeW
HeapCreate
GetCurrentDirectoryW
SetHandleCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
SetEnvironmentVariableW
CompareStringW
SetEnvironmentVariableA
GetCurrentDirectoryA
GetDriveTypeW
FindResourceA
RemoveDirectoryA
TrackPopupMenu
GetMenuItemID
GetSubMenu
LoadMenuA
EnableMenuItem
RemoveMenu
SetMenuDefaultItem
DestroyMenu
EnableWindow
ToAscii
GetAsyncKeyState
MapVirtualKeyA
VkKeyScanA
IsIconic
DestroyWindow
PostThreadMessageA
SendNotifyMessageA
WaitMessage
PeekMessageA
ChangeClipboardChain
SetClipboardViewer
GetClipboardOwner
ClientToScreen
EnumDesktopWindows
GetClassNameA
OpenDesktopA
FillRect
DrawTextA
GetFocus
AttachThreadInput
WaitForInputIdle
FindWindowExA
WindowFromPoint
RegisterWindowMessageA
EnumWindows
GetIconInfo
IsDlgButtonChecked
SetRect
GetCaretPos
IsWindow
IsWindowVisible
EndPaint
DrawIconEx
BeginPaint
GetUpdateRect
IntersectRect
DestroyIcon
GetKeyboardState
mouse_event
SetActiveWindow
MessageBeep
FlashWindow
ChangeDisplaySettingsExA
keybd_event
GetKeyState
EnumDisplaySettingsA
ScreenToClient
GetWindowRect
SendDlgItemMessageA
SetForegroundWindow
GetClientRect
SetFocus
GetScrollInfo
InvalidateRect
ReleaseDC
GetDlgItem
EndDialog
GetCursorPos
PostMessageA
CheckDlgButton
SetDlgItemInt
GetDlgItemInt
GetProcessWindowStation
GetWindowTextA
SetWindowTextA
GetDlgItemTextA
DialogBoxParamA
SetDlgItemTextA
MoveWindow
ExitWindowsEx
GetDesktopWindow
wsprintfA
FindWindowA
GetWindowThreadProcessId
SystemParametersInfoA
GetForegroundWindow
MessageBoxA
SendMessageA
GetMessageA
GetUserObjectInformationA
SetTimer
RegisterClassExA
PostQuitMessage
GetThreadDesktop
KillTimer
LoadIconA
OpenInputDesktop
CloseDesktop
TranslateMessage
SetWindowLongA
GetWindowLongA
CreateWindowExA
DefWindowProcA
SetWindowPos
ShowWindow
SetThreadDesktop
DispatchMessageA
GetSystemMetrics
LoadImageA
AdjustWindowRect
LoadCursorA
IsRectEmpty
GetDC
CloseClipboard
IsClipboardFormatAvailable
RegisterClipboardFormatA
GetClipboardData
EmptyClipboard
OpenClipboard
SetClipboardData
OemToCharA
CharToOemA
wvsprintfA
LoadStringA
GetBitmapBits
SetTextColor
SetBkColor
GdiFlush
CreatePalette
RealizePalette
SelectPalette
CreateFontIndirectA
GetObjectA
ExtEscape
GetSystemPaletteEntries
GetRgnBox
GetRegionData
SetRectRgn
PtInRegion
CombineRgn
OffsetRgn
CreateRectRgn
PatBlt
StretchBlt
CreateDCA
SetBkMode
GetClipBox
GetStockObject
CreateSolidBrush
BitBlt
DeleteDC
CreateDIBSection
GetDeviceCaps
GetDIBits
DeleteObject
SelectObject
CreateCompatibleDC
SetDIBColorTable
GetPixel
CreateCompatibleBitmap
GetSecurityDescriptorLength
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
IsValidSecurityDescriptor
IsValidSid
GetSecurityDescriptorOwner
SetKernelObjectSecurity
GetSecurityDescriptorControl
GetKernelObjectSecurity
IsValidAcl
RegCreateKeyA
SetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorA
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetServiceStatus
RegDeleteValueA
QueryServiceStatus
RegCreateKeyExA
RegDeleteKeyA
CreateServiceA
RegisterServiceCtrlHandlerA
DeleteService
StartServiceCtrlDispatcherA
AdjustTokenPrivileges
DuplicateTokenEx
LookupPrivilegeValueA
SetTokenInformation
FreeSid
RevertToSelf
AllocateAndInitializeSid
ImpersonateLoggedOnUser
EqualSid
GetTokenInformation
OpenProcessToken
CreateProcessAsUserA
RegSetValueExA
QueryServiceConfigA
OpenSCManagerA
EnumServicesStatusA
CloseServiceHandle
LookupAccountSidA
OpenServiceA
GetUserNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
SHAppBarMessage
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
ShellExecuteExA
ShellExecuteA
Shell_NotifyIconA
CoUninitialize
CoInitialize
CoCreateInstance
ImmGetDefaultIMEWnd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ