Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-17_d4516cca3725e2e585de3f906e475661_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-17_d4516cca3725e2e585de3f906e475661_mafia.exe
Resource
win10v2004-20240611-en
Target
2024-06-17_d4516cca3725e2e585de3f906e475661_mafia
Size
328KB
MD5
d4516cca3725e2e585de3f906e475661
SHA1
3131fc16f1b12e91f0ca93ab7e31ac8bb6b60581
SHA256
d021c3b45da6fa41bc71a923bc9d0163e3a08d77b18b945822b38ed82c7475b4
SHA512
f397c244b49b89b9ba7f8cf47e484d529649aff2f8381d68f6d23f7aea65f92840315a667969d9910ac2f4c027f13587b51c5245c7abf08709f49affea46a1b5
SSDEEP
6144:Mzr72/aJbXIwSSA/yv5nAZVZuuq/CFFNO:Ce/aJbXIwJA/yvpATZuuUmNO
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_BIND
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WideCharToMultiByte
CopyFileW
GetLocaleInfoW
SetStdHandle
SetFilePointer
WriteConsoleW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
LCMapStringW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapReAlloc
GetStringTypeW
MultiByteToWideChar
GetOEMCP
GetACP
GetCPInfo
HeapSize
LoadLibraryW
InterlockedExchange
Sleep
SetConsoleCtrlHandler
FatalAppExitA
HeapFree
HeapAlloc
IsProcessorFeaturePresent
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
LeaveCriticalSection
EnterCriticalSection
IsValidCodePage
GlobalAlloc
GetCurrentDirectoryW
OpenProcess
CloseHandle
SetCurrentDirectoryW
GetVersionExW
GetModuleHandleW
GetProcAddress
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapDestroy
HeapCreate
GetCurrentThread
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
LocalFree
GetCurrentProcess
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcmpA
lstrcpyW
GetLastError
LocalAlloc
FreeLibrary
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
GetSystemTimeAsFileTime
RtlUnwind
ExitProcess
DecodePointer
InterlockedDecrement
EncodePointer
SetUnhandledExceptionFilter
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
CreateFileW
SendMessageW
GetKeyboardLayout
LoadKeyboardLayoutW
GetKeyboardLayoutList
GetKeyboardLayoutNameW
GetSysColorBrush
LoadImageW
LoadCursorW
RegisterClassW
GetDesktopWindow
GetWindowRect
CreateWindowExW
PostQuitMessage
DefWindowProcW
FindWindowW
GetWindowTextW
SetWindowTextW
MessageBeep
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
PeekMessageW
TranslateMessage
DispatchMessageW
SetForegroundWindow
SetFocus
GetAsyncKeyState
SendInput
MessageBoxW
CreateFontW
GetOpenFileNameW
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
SHGetPathFromIDListW
SHGetMalloc
SHBrowseForFolderW
ShellExecuteExW
CoInitializeEx
EnumProcesses
EnumProcessModules
GetModuleBaseNameW
WinVerifyTrust
CryptMsgClose
CertCloseStore
CertFindCertificateInStore
CryptMsgGetParam
CryptQueryObject
CryptDecodeObject
CertFreeCertificateContext
CertGetNameStringW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ