Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-24_da84bc3b0ed106549a5cbeeab0d9d106_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-24_da84bc3b0ed106549a5cbeeab0d9d106_mafia.exe
Resource
win10v2004-20240611-en
Target
2024-06-24_da84bc3b0ed106549a5cbeeab0d9d106_mafia
Size
908KB
MD5
da84bc3b0ed106549a5cbeeab0d9d106
SHA1
ed2a493356a7560ddb048f1596cd75aa5002b2cb
SHA256
8f06e31a83e1ff756cf1048b8343002dd9789719abd4441caa8dc0ce5b7c7767
SHA512
85aa7e352cf094be5c39160d7fbec4423c38b084bfca3025b41131d99ca6a4e6be01bdf81cf494d1f73413daacd3740d6615d654c8c25f4a4c3adc4b7d580fbf
SSDEEP
12288:mFNWBIAhrSoyFxIPY1VEiWEAyhrRQ7JD/POwv+yyWINjXR697rQOX+TqfY+cjAgl:mF7rQ7BOwv+yyWI5KsbTMcck15T
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\buildChrome\V27\src\build\Release\2345chrome.exe.pdb
PathRemoveFileSpecW
GetModuleHandleW
GetTempPathW
GetLastError
CreateProcessW
CloseHandle
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
LocalAlloc
FreeLibrary
InterlockedExchange
LoadLibraryA
RaiseException
DuplicateHandle
GetExitCodeProcess
WaitForSingleObject
SizeofResource
LockResource
LoadResource
FindResourceW
VirtualFree
SetFilePointer
ReadFile
VirtualAlloc
CreateFileW
GetUserDefaultLangID
CreateMutexW
GetTickCount
WriteFile
SetLastError
ReleaseMutex
GetCurrentProcessId
CreateEventW
ExpandEnvironmentStringsW
SetEnvironmentVariableW
QueryPerformanceCounter
GetSystemTimeAsFileTime
QueryPerformanceFrequency
lstrlenW
IsDebuggerPresent
GetNativeSystemInfo
GetVersionExW
SetInformationJobObject
SetHandleInformation
VirtualQueryEx
OpenProcess
AssignProcessToJobObject
GetStdHandle
GetProcessId
HeapSetInformation
ResumeThread
MapViewOfFile
CreateRemoteThread
GetFileAttributesW
GetCurrentDirectoryW
GetLongPathNameW
CreateFileMappingW
QueryDosDeviceW
GetLocaleInfoW
GetUserDefaultUILanguage
GetCurrentThreadId
CreateThread
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InterlockedExchangeAdd
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
SetEvent
ResetEvent
WaitForMultipleObjects
RtlCaptureStackBackTrace
GetSystemInfo
GetWindowsDirectoryW
SetEndOfFile
FlushFileBuffers
RegisterWaitForSingleObject
UnregisterWaitEx
GetModuleHandleExW
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
InterlockedIncrement
ReleaseSemaphore
InterlockedDecrement
RtlCaptureContext
CreateSemaphoreW
InitializeCriticalSection
GetThreadContext
SuspendThread
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
TerminateJobObject
SignalObjectAndWait
GetProcessHandleCount
GetFileType
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
OpenEventW
SearchPathW
DebugBreak
ReadProcessMemory
WideCharToMultiByte
GetStringTypeW
MultiByteToWideChar
EncodePointer
DecodePointer
UnhandledExceptionFilter
HeapFree
ExitProcess
GetStartupInfoW
GetConsoleCP
GetConsoleMode
HeapReAlloc
GetFullPathNameW
HeapAlloc
GetProcessHeap
SetStdHandle
RtlUnwind
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
WriteConsoleW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetDriveTypeW
CompareStringW
VirtualQuery
GetModuleHandleA
FormatMessageW
LocalFree
GetModuleFileNameW
GetEnvironmentVariableW
SetCurrentDirectoryW
LoadLibraryExW
GetEnvironmentVariableA
GetCommandLineW
SetEnvironmentVariableA
GetPrivateProfileStringW
LoadLibraryW
GetProcAddress
GetSystemDirectoryW
GetThreadDesktop
SetProcessWindowStation
CreateDesktopW
GetProcessWindowStation
CreateWindowStationW
CloseDesktop
CloseWindowStation
wsprintfW
MessageBoxW
CharUpperW
GetUserObjectInformationW
GetProfileType
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
timeGetTime
GetLengthSid
SetTokenInformation
RevertToSelf
ConvertSidToStringSidW
GetTokenInformation
OpenProcessToken
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegCreateKeyExW
CreateProcessAsUserW
GetTraceEnableFlags
GetTraceLoggerHandle
TraceEvent
ConvertStringSidToSidW
UnregisterTraceGuids
GetTraceEnableLevel
RegisterTraceGuidsW
RegDisablePredefinedCache
SetEntriesInAclW
GetSecurityInfo
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
EqualSid
DuplicateToken
DuplicateTokenEx
CreateRestrictedToken
SetThreadToken
CrashForException
DumpProcess
DumpProcessWithoutCrash
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
SetActiveURL
SetClientId
SetCommandLine2
SetExperimentList3
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
SetPrinterInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE