Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-04_dca58b3711eb492620c5f711f8881b45_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-07-04_dca58b3711eb492620c5f711f8881b45_mafia.exe
Resource
win10v2004-20240508-en
Target
2024-07-04_dca58b3711eb492620c5f711f8881b45_mafia
Size
653KB
MD5
dca58b3711eb492620c5f711f8881b45
SHA1
61969946cd288efdb4156b8e7f7ce7e3d8872da6
SHA256
0e2657d7f55e9bf8256c846432b2d18fcb8360866dfcfc798e29f40919121f3f
SHA512
856d420493824400318217e210920da6480cb2eaff34324f59bcc8a157572296567c5b4fd4baaa3f28540040e88d1de16c03d9beb7c32031ee9e07c9f6921437
SSDEEP
12288:4ij0isJD+m3srW+5tEZG1QRw7rZ0n9sLXxGkgXYhfu0tF:FIiG+m8rWwHfR0yXkkxVtF
resource | yara_rule |
---|---|
sample | nsis_installer_2 |
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\codes\VS2010\SogouDownLoad-NewUI\Src\MiniDownLoad\Release\MiniDownLoad.pdb
CloseHandle
GetCommandLineW
GetTempPathW
CompareStringW
GetTimeZoneInformation
GetProcessHeap
SetEndOfFile
lstrlenW
GetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameW
FindFirstFileExW
GetDriveTypeW
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateFileW
SizeofResource
WriteFile
GetModuleHandleW
InterlockedDecrement
InterlockedIncrement
LoadResource
FindResourceW
GetEnvironmentVariableW
CreateFileA
RaiseException
EnterCriticalSection
LeaveCriticalSection
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapSetInformation
GetStartupInfoW
HeapFree
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetProcAddress
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
HeapReAlloc
HeapSize
Sleep
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
RtlUnwind
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
SetStdHandle
WriteConsoleW
LCMapStringW
GetStringTypeW
FlushFileBuffers
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CreateDirectoryW
CreateProcessW
WaitForSingleObject
CreateMutexW
ReleaseMutex
DebugBreak
OutputDebugStringW
lstrlenA
InitializeCriticalSection
GetVersionExW
lstrcpynW
lstrcpyW
GetFileSize
FindFirstFileW
CopyFileW
ReadFile
FindClose
DeleteFileW
DeviceIoControl
GetSystemDirectoryW
GetPrivateProfileStringW
lstrcmpW
SetEnvironmentVariableA
FindWindowW
LoadStringW
wvsprintfW
CharNextW
SendMessageTimeoutW
wsprintfW
ShellExecuteW
SHGetSpecialFolderPathW
ShellExecuteExW
InternetConnectW
HttpSendRequestW
InternetSetOptionW
InternetOpenW
InternetReadFile
InternetQueryDataAvailable
InternetCrackUrlW
HttpOpenRequestW
HttpQueryInfoW
InternetCloseHandle
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Netbios
NetWkstaTransportEnum
NetApiBufferFree
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
CoInitialize
CoUninitialize
CoCreateGuid
SHGetValueW
PathAppendW
PathIsDirectoryW
PathFileExistsW
SHSetValueW
StrCpyW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ