Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-24_2d6b564264eed95e4a0737f78de83ab9_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-06-24_2d6b564264eed95e4a0737f78de83ab9_mafia.exe
Resource
win10v2004-20240508-en
Target
2024-06-24_2d6b564264eed95e4a0737f78de83ab9_mafia
Size
1.3MB
MD5
2d6b564264eed95e4a0737f78de83ab9
SHA1
eb0e4a3fd9b54159ed8f890f1b00224912c66b23
SHA256
c967e8cbbb4ec6453ff357870feca82e3f3910ad2beec524e3cf48f24def910c
SHA512
5bab29f5bd7b138997289256a3ad59f69d4c9bd6ad204bb9b703713ef6e68e1859f479e5ce6dc94a75d084a5f7a245d7ae8dc4b93a6fb8d3584d541175705d0e
SSDEEP
24576:rnug3JB40SCaN3RcD2+B3OX8dsPxD6TTrbverMlBfdlBfelBf/lBfolBf4lBfs5x:j/ZSBCy3RUB3OX8ds5OTTPWrARjR6RN2
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\clientci\workspace\nbrowser_bdupdate_m2_branch\bdupdate\output\SparkUpdate.pdb
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
WSAGetLastError
getaddrinfo
getnameinfo
WSAStartup
gethostname
freeaddrinfo
CreateEnvironmentBlock
DestroyEnvironmentBlock
ImmDisableIME
WTSEnumerateSessionsW
WTSFreeMemory
WTSQueryUserToken
EnumProcesses
EnumProcessModules
GetModuleInformation
GetModuleFileNameExW
WaitForSingleObject
TerminateProcess
FlushInstructionCache
GetCurrentProcess
SetLastError
Sleep
TerminateThread
ResetEvent
SetEvent
SetThreadPriority
WaitForMultipleObjects
CreateEventW
GetPrivateProfileStringW
WritePrivateProfileStringW
GetVersionExW
MoveFileExW
FindClose
FindNextFileW
FindFirstFileW
GetTempPathW
lstrcpyW
InitializeCriticalSection
GetFullPathNameW
SetCurrentDirectoryW
CreateMutexW
OutputDebugStringW
GetSystemTime
GetCommandLineW
FreeConsole
GetConsoleScreenBufferInfo
GetStdHandle
AllocConsole
WriteConsoleW
SetConsoleTextAttribute
GetCurrentProcessId
GetPrivateProfileIntW
ReleaseMutex
SetProcessAffinityMask
lstrcmpiW
LoadLibraryExW
OpenFileMappingW
VirtualQuery
CreateProcessW
ExitProcess
OpenEventW
HeapAlloc
GetProcessHeap
HeapFree
OpenMutexW
GetExitCodeProcess
WTSGetActiveConsoleSessionId
DeviceIoControl
OpenProcess
GetVolumeInformationA
RemoveDirectoryW
EnterCriticalSection
GlobalFree
GlobalAlloc
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
lstrlenA
VirtualProtect
IsWow64Process
HeapCreate
AddVectoredExceptionHandler
SetUnhandledExceptionFilter
RemoveVectoredExceptionHandler
ProcessIdToSessionId
InterlockedExchange
InterlockedCompareExchange
GetFileSizeEx
ReadProcessMemory
VirtualQueryEx
QueueUserWorkItem
InterlockedExchangeAdd
GetSystemTimeAsFileTime
InterlockedIncrement
QueryPerformanceCounter
SetFilePointerEx
SetFileValidData
GetModuleFileNameA
GetModuleHandleA
ExpandEnvironmentStringsW
CreateFileA
GetPrivateProfileSectionW
GetPrivateProfileSectionNamesW
GetTempFileNameW
GetDiskFreeSpaceExW
GetVolumeInformationW
GetDriveTypeW
GetLogicalDrives
InterlockedPopEntrySList
EncodePointer
GetModuleHandleW
GetModuleFileNameW
CopyFileW
InterlockedDecrement
lstrlenW
DeleteCriticalSection
DecodePointer
RtlUnwind
InitializeCriticalSectionAndSpinCount
LocalFree
FormatMessageW
DeleteFileW
FreeLibrary
SetEndOfFile
GetLastError
TlsFree
DosDateTimeToFileTime
SetFileAttributesW
TlsSetValue
TlsGetValue
GetCurrentThreadId
GetConsoleCP
GetConsoleMode
ExitThread
CreateThread
GetTimeFormatW
GetDateFormatW
ResumeThread
GetCommandLineA
HeapSetInformation
GetStartupInfoW
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetFileType
TlsAlloc
GetTickCount
UnmapViewOfFile
GetLocalTime
CreateFileMappingW
MapViewOfFile
GetFileSize
WriteFile
SetFileTime
GetFileAttributesW
CreateDirectoryW
GetCurrentDirectoryW
WideCharToMultiByte
LocalFileTimeToFileTime
SystemTimeToFileTime
ReadFile
CloseHandle
CreateFileW
SetFilePointer
MultiByteToWideChar
LoadLibraryW
GetProcAddress
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
RaiseException
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedPushEntrySList
HeapSize
FlushFileBuffers
GetACP
GetOEMCP
QueryPerformanceFrequency
LeaveCriticalSection
IsValidCodePage
SetStdHandle
GetLocaleInfoW
GetTimeZoneInformation
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
CompareStringW
SetEnvironmentVariableA
HeapReAlloc
GetFileAttributesExW
HeapDestroy
InsertMenuW
GetCursorPos
TrackPopupMenu
DestroyMenu
SetFocus
RegisterWindowMessageW
GetAsyncKeyState
LoadIconW
MessageBoxW
CallWindowProcW
GetWindowLongW
LoadCursorW
GetClassInfoExW
SetWindowLongW
AllowSetForegroundWindow
DialogBoxParamW
PostThreadMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CreateWindowExW
ShowWindow
SetTimer
DestroyWindow
SetWindowTextW
LoadImageW
DefWindowProcW
KillTimer
GetForegroundWindow
GetWindowThreadProcessId
CreatePopupMenu
AttachThreadInput
BringWindowToTop
SetForegroundWindow
SetActiveWindow
IsIconic
SendMessageW
IsWindow
DestroyIcon
PostMessageW
GetDesktopWindow
wsprintfW
CharNextW
UnregisterClassA
RegisterClassExW
GetStockObject
GetExplicitEntriesFromAclW
LookupAccountSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegEnumKeyExW
RegSetValueExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
GetUserNameW
GetTokenInformation
RegQueryValueExA
RegOpenKeyExW
RegQueryValueExW
OpenProcessToken
RegCloseKey
LookupPrivilegeValueW
AdjustTokenPrivileges
RegEnumValueW
RegOpenKeyExA
RegEnumKeyExA
SetSecurityInfo
SetEntriesInAclW
GetSecurityInfo
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
StartServiceW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
CreateProcessAsUserW
DuplicateTokenEx
QueryServiceStatusEx
CryptReleaseContext
CryptDecrypt
CryptDeriveKey
CryptHashData
CryptCreateHash
CryptAcquireContextW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
SetServiceStatus
SetServiceObjectSecurity
BuildExplicitAccessWithNameW
GetSecurityDescriptorDacl
QueryServiceObjectSecurity
RegOpenKeyW
DeleteService
ControlService
ChangeServiceConfig2W
CreateServiceW
RegCreateKeyW
RegisterServiceCtrlHandlerExW
StartServiceCtrlDispatcherW
RevertToSelf
SetTokenInformation
RegQueryInfoKeyW
ShellExecuteExW
SHGetFolderPathW
ShellExecuteW
SHCreateDirectoryExW
ord165
SHFileOperationW
CommandLineToArgvW
SHGetSpecialFolderPathW
Shell_NotifyIconW
CoInitialize
CoUninitialize
CoInitializeEx
CoCreateInstance
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
CoCreateGuid
CLSIDFromProgID
CoTaskMemRealloc
SysAllocStringLen
SysStringLen
LoadRegTypeLi
LoadTypeLi
VariantClear
VarUI4FromStr
VarBstrCmp
SysAllocString
VariantInit
SysFreeString
PathFileExistsW
PathRemoveFileSpecW
SHSetValueW
SHGetValueW
PathIsDirectoryW
PathFindExtensionW
PathGetDriveNumberW
PathStripPathW
PathRemoveExtensionW
PathAppendW
PathFindFileNameW
GetIpForwardTable
GetAdaptersAddresses
GetAdaptersInfo
RpcStringFreeW
UuidToStringW
InternetErrorDlg
HttpEndRequestW
HttpQueryInfoW
InternetGetLastResponseInfoW
InternetReadFileExA
HttpAddRequestHeadersW
HttpOpenRequestW
InternetConnectW
InternetSetStatusCallbackW
InternetOpenW
InternetSetOptionW
InternetQueryOptionW
InternetOpenA
InternetSetOptionA
InternetCloseHandle
HttpEndRequestA
HttpSendRequestExA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
InternetWriteFile
?ClearService@Com@Util@@YGJXZ
?CreateObjectByIID@Com@Util@@YGJABU_GUID@@PAPAX@Z
?GetService@Com@Util@@YGJABU_GUID@@PAPAX@Z
?RegObject@Com@Util@@YGJABU_GUID@@0PA_W1@Z
?RegService@Com@Util@@YGJABU_GUID@@0PA_W1@Z
?ResetPath@Com@Util@@YGJPA_W@Z
?XNetDownloadFile@@YAPAXPAXPAVIXNetDownloadStatusCallback@@PB_W2W4XnetMethodType@@22@Z
?XNetHttpRequest@@YAPAXPAXP6AX0H0KPB_W@Z1W4XnetMethodType@@11K@Z
?XNetInit@@YAHXZ
?XNetStop@@YAHPAX@Z
?XNetUninit@@YAHXZ
GetLogController
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ