Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-20_fff02eaf3124254ae8df6395534c4187_mafia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-20_fff02eaf3124254ae8df6395534c4187_mafia.exe
Resource
win10v2004-20240508-en
Target
2024-06-20_fff02eaf3124254ae8df6395534c4187_mafia
Size
1.1MB
MD5
fff02eaf3124254ae8df6395534c4187
SHA1
bef7c0b4a99563e5784134757b0eba86774859b1
SHA256
2ab2a238632e522f963148624cd6007ef35f45c0763ee4627ad2f7841468a81b
SHA512
34177ab35bf4ed1348c3ae659d9fdfa59c90392e915246108da0c4756dd7c44265db6064ca9e3ef29f888ca9b8b8024d5ace676b74caee8094e6654893a5e42e
SSDEEP
24576:9KOFKU1bh41Ddlg4/S0YQKlTkF3rkXO9A0hvCqVQu4vgUVWUl9M0PQ3:31bO15jSz83rkXOBCer4v1Dl9M0PQ3
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\jenkins\workspace\stub_7_5_rp16\rnmininst\rel32s\rnmininst.pdb
CoInitializeEx
StringFromGUID2
CLSIDFromString
OleCreate
OleSetContainedObject
OleInitialize
OleUninitialize
CoInitializeSecurity
CoSetProxyBlanket
CoInitialize
CoCreateInstance
CoUninitialize
CoCreateGuid
PathFileExistsA
UrlUnescapeA
UrlEscapeA
SHDeleteKeyA
InternetCloseHandle
InternetGetConnectedState
InternetReadFile
InternetGetLastResponseInfoA
InternetOpenUrlA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetSetOptionA
InternetOpenA
InternetCanonicalizeUrlA
SetWindowPos
CharPrevA
CharNextA
CharLowerA
CharUpperA
CreateDialogParamA
MoveWindow
PostMessageA
LoadStringA
SendDlgItemMessageA
PeekMessageA
GetSysColor
KillTimer
EnableWindow
RedrawWindow
GetClassInfoExA
GetShellWindow
RegisterClassExA
GetSystemMetrics
CreateWindowExA
UpdateWindow
SetTimer
GetMessageA
TranslateMessage
DispatchMessageA
DialogBoxParamA
SetWindowRgn
DestroyWindow
ClientToScreen
GetFocus
DefWindowProcA
GetForegroundWindow
GetCursorPos
GetWindowThreadProcessId
LoadCursorA
BeginPaint
GetWindowTextA
GetClassNameA
PtInRect
InvalidateRect
IsWindowVisible
EndPaint
SetWindowTextA
LoadIconA
SendMessageA
GetSystemMenu
EnableMenuItem
EnumWindows
MessageBoxA
SetForegroundWindow
SetDlgItemTextA
GetDlgItem
SetFocus
ShowWindow
GetWindowRect
ScreenToClient
EndDialog
GetDC
ReleaseDC
DrawTextW
SetWindowLongA
GetClientRect
GetWindowLongA
GetAsyncKeyState
SetActiveWindow
VariantClear
VariantInit
SysStringLen
SysAllocStringLen
SysFreeString
SysStringByteLen
SysAllocString
BitBlt
StretchBlt
SetBkMode
SetTextColor
CreateCompatibleDC
GetObjectA
DeleteDC
GetTextExtentPointW
CreateFontW
DeleteObject
CreateSolidBrush
CreateBitmap
GetDeviceCaps
CreatePatternBrush
CombineRgn
GetPixel
CreateRectRgn
SetPixel
SelectObject
LookupAccountSidW
ConvertSidToStringSidW
RegEnumValueA
RegOpenKeyExW
RegQueryValueExW
RegEnumKeyExA
RegOpenKeyA
ConvertSidToStringSidA
InitializeAcl
IsValidSid
AddAccessDeniedAce
AddAccessAllowedAce
GetLengthSid
DuplicateTokenEx
RegCreateKeyExA
RegSetValueExA
RegQueryValueA
InitializeSecurityDescriptor
RegQueryValueExA
OpenProcessToken
GetTokenInformation
EqualSid
RegEnumKeyA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
FreeSid
GetUserNameA
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
LookupAccountNameA
AllocateAndInitializeSid
ConvertStringSidToSidW
SHGetPathFromIDListA
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderPathA
SHGetFolderPathW
SHBrowseForFolderA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
TransparentBlt
GetUserNameExW
ord8
ord71
ord93
ord87
ord168
ord136
ord141
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
HeapSize
HeapReAlloc
HeapDestroy
GetCurrentDirectoryA
GetVersion
GetWindowsDirectoryA
MoveFileA
GetTempPathA
GetTempFileNameA
InterlockedDecrement
InterlockedIncrement
LoadLibraryW
GetModuleFileNameW
RaiseException
GetComputerNameExA
IsWow64Process
GetNativeSystemInfo
GetSystemInfo
GetSystemTime
SetLastError
AttachConsole
GetStdHandle
AllocConsole
GetConsoleScreenBufferInfo
SetConsoleWindowInfo
GetComputerNameW
GetDriveTypeA
GetFileSizeEx
GetFileInformationByHandle
SetFilePointer
FindResourceA
FreeResource
InitializeCriticalSection
EncodePointer
DecodePointer
RtlUnwind
FileTimeToLocalFileTime
FindFirstFileExA
GetConsoleCP
GetConsoleMode
GetModuleHandleW
ExitProcess
VirtualProtect
VirtualAlloc
VirtualQuery
SetStdHandle
GetFileType
GetLocalTime
GetCommandLineA
HeapSetInformation
GetCPInfo
GetStartupInfoW
GetACP
GetOEMCP
IsValidCodePage
SetEnvironmentVariableA
SetCurrentDirectoryA
GetDriveTypeW
GetFullPathNameA
GetCurrentDirectoryW
SetCurrentDirectoryW
SetEndOfFile
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetTimeZoneInformation
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
SetHandleCount
HeapCreate
CreateFileW
WriteConsoleW
FlushFileBuffers
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CompareStringW
ReadConsoleInputA
SetConsoleMode
GetFileAttributesA
GetLastError
GetNamedPipeHandleStateA
GetCommandLineW
SetErrorMode
FileTimeToSystemTime
GetSystemTimeAsFileTime
CreateThread
GetProcessHeap
HeapAlloc
HeapFree
WaitForSingleObject
GetExitCodeProcess
TerminateProcess
GetTimeFormatA
GetDateFormatA
LocalAlloc
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SetFileAttributesA
GetTickCount
SystemTimeToFileTime
lstrlenW
FindResourceExW
FindResourceW
lstrcpyA
lstrlenA
CloseHandle
CreateMutexA
OpenMutexA
CreateProcessA
GetVersionExA
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
FreeLibrary
GetProcAddress
LoadLibraryA
WideCharToMultiByte
RemoveDirectoryA
FindClose
DeleteFileA
FindNextFileA
MoveFileExA
FindFirstFileA
GetModuleFileNameA
GetDiskFreeSpaceA
GetDiskFreeSpaceExA
GetCurrentProcess
GetModuleHandleA
LocalFree
FormatMessageA
ReadFile
Sleep
CreateFileA
ExpandEnvironmentStringsA
MultiByteToWideChar
CopyFileA
GetFileSize
WriteFile
PeekNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetLocaleInfoW
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateDirectoryA
GlobalFree
GlobalAlloc
lstrcmpA
SizeofResource
LockResource
LoadResource
RpcStringFreeA
UuidToStringA
WinVerifyTrust
CertCloseStore
CertFreeCertificateContext
CertGetNameStringW
CertFindCertificateInStore
CryptMsgGetParam
CryptQueryObject
CryptDecodeObject
CryptMsgClose
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ