Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-05_07c5f956d627ebc0d60d9642f63c218f_mafia.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-07-05_07c5f956d627ebc0d60d9642f63c218f_mafia.exe
Resource
win10v2004-20240508-en
Target
2024-07-05_07c5f956d627ebc0d60d9642f63c218f_mafia
Size
1.2MB
MD5
07c5f956d627ebc0d60d9642f63c218f
SHA1
67d85ae3a45707ed1e28d5aed55f401365f870d2
SHA256
231e9ec980c48f47452b489be5fbb65a73a3ba0719a4fe92872857a72ee65d3e
SHA512
5d579d86e749ec1d2b9190779161ecd5ed14810570f0d78f6c5a8e3323cfb59af5baef3a39dba26da09b952dc902d5e852e0a71be36351743f597086fa2bfdab
SSDEEP
24576:2qB7RVNh2B1MHc9dyvvuDq3hkZTnh6j3oeTn:2qB7l0u0yvv3hOTnhgtn
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
G:\TFS\PCMaster\bin\Release\pcmastertray.pdb
GetExitCodeThread
WaitForSingleObject
CreateThread
InterlockedDecrement
GetComputerNameW
MoveFileW
DeleteCriticalSection
LeaveCriticalSection
UnmapViewOfFile
CreateEventW
MapViewOfFile
CreateFileMappingW
OpenEventW
SetFileAttributesW
FreeResource
GlobalUnlock
GlobalLock
GlobalAlloc
SetEvent
CancelIo
GetOverlappedResult
FindNextVolumeA
QueryDosDeviceA
FindFirstVolumeA
GetVolumePathNamesForVolumeNameA
OpenMutexW
RaiseException
GetTempPathW
GetWindowsDirectoryW
GetFullPathNameW
GetLongPathNameW
ExpandEnvironmentStringsW
SetLastError
FindFirstFileW
FindNextFileW
FindClose
GlobalFree
FlushInstructionCache
InitializeCriticalSection
GetStartupInfoW
SetProcessWorkingSetSize
TerminateProcess
OpenProcess
lstrcmpW
HeapFree
HeapAlloc
GetProcessHeap
CreateMutexW
WaitNamedPipeW
CreateFileA
DeleteFileA
MoveFileA
GetTempFileNameW
MoveFileExW
WinExec
EnterCriticalSection
GetSystemPowerStatus
GetCurrentDirectoryW
lstrcmpiA
WritePrivateProfileStringW
GetPrivateProfileStringW
MulDiv
InterlockedIncrement
lstrlenA
GetSystemDirectoryW
GetFileSize
InitializeCriticalSectionAndSpinCount
Sleep
lstrcmpiW
lstrcpyA
GetTickCount
CopyFileW
LoadLibraryW
VirtualProtect
WriteProcessMemory
IsBadReadPtr
IsBadCodePtr
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
Module32FirstW
Module32NextW
FileTimeToSystemTime
GetVersionExW
GetFileAttributesW
GetFileTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
GetFileSizeEx
ReadFile
DeviceIoControl
SetUnhandledExceptionFilter
CreateDirectoryW
GetLocalTime
lstrlenW
GetCurrentThreadId
GetCurrentProcessId
GetCommandLineW
DeleteFileW
CreateProcessW
GetModuleHandleW
GetProcAddress
GetCurrentProcess
CreateFileW
WriteFile
CloseHandle
lstrcpynW
lstrcmpA
LocalAlloc
lstrcpyW
LocalFree
GetModuleFileNameW
UpdateResourceW
BeginUpdateResourceW
BeginUpdateResourceA
GetLastError
EndUpdateResourceW
LoadLibraryExW
FindResourceW
SizeofResource
LockResource
LoadResource
SetEnvironmentVariableA
CompareStringW
SetEndOfFile
GetFullPathNameA
GetDriveTypeW
SetCurrentDirectoryW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
WriteConsoleW
SetConsoleCtrlHandler
FlushFileBuffers
SetStdHandle
FatalAppExitA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
GetTimeZoneInformation
FindResourceExW
InterlockedExchange
LoadLibraryA
HeapDestroy
HeapReAlloc
HeapSize
InterlockedCompareExchange
InterlockedPushEntrySList
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
InterlockedPopEntrySList
ExitProcess
HeapCreate
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
LoadLibraryExA
FreeLibrary
WideCharToMultiByte
GetCPInfo
GetConsoleMode
GetConsoleCP
SetFilePointer
GetFileType
SetHandleCount
GetLocaleInfoW
GetStdHandle
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapSetInformation
ResumeThread
GetSystemTimeAsFileTime
ExitThread
EncodePointer
DecodePointer
RtlUnwind
MultiByteToWideChar
GetStockObject
GetDeviceCaps
CreateCompatibleBitmap
SetTextColor
CreateSolidBrush
SetBkMode
BitBlt
CreateDIBSection
CreateCompatibleDC
SelectObject
GetObjectW
CreateFontIndirectW
DeleteObject
DeleteDC
OpenProcessToken
RegCloseKey
RegSetValueW
RegCreateKeyW
RegOpenKeyW
RegQueryValueExW
RegOpenKeyExW
RegFlushKey
RegCreateKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegEnumKeyExW
ControlService
CloseServiceHandle
ChangeServiceConfigW
StartServiceW
RegEnumValueW
InitiateSystemShutdownW
AllocateAndInitializeSid
FreeSid
GetTokenInformation
RegSetValueExW
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenSCManagerW
OpenServiceW
QueryServiceStatus
QueryServiceConfigW
GetNamedSecurityInfoW
BuildExplicitAccessWithNameW
DeleteAce
SetEntriesInAclW
SetNamedSecurityInfoW
RegDeleteValueW
GetUserNameW
SHGetFolderPathW
Shell_NotifyIconW
ShellExecuteExW
ShellExecuteW
CommandLineToArgvW
CoUninitialize
CoInitialize
CoTaskMemFree
CoTaskMemRealloc
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
StringFromCLSID
OleInitialize
OleUninitialize
CreateStreamOnHGlobal
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
SysStringLen
SysAllocStringLen
DispCallFunc
VariantClear
VariantInit
SysAllocString
SysFreeString
CreateErrorInfo
GetErrorInfo
VariantChangeType
SetErrorInfo
PathFindFileNameW
PathAppendW
PathFileExistsA
PathFindExtensionW
PathFileExistsW
_TrackMouseEvent
InitCommonControlsEx
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
SetSuspendState
InternetCloseHandle
InternetReadFile
InternetOpenUrlW
InternetSetOptionW
InternetOpenW
HttpEndRequestW
InternetWriteFile
HttpSendRequestExW
HttpOpenRequestW
InternetConnectW
InternetCheckConnectionW
GdipCreateHICONFromBitmap
GdipCreateHBITMAPFromBitmap
GdiplusStartup
GdipSetTextRenderingHint
GdipSetStringFormatTrimming
GdipDeleteStringFormat
GdipCreateStringFormat
GdipAlloc
GdipDrawString
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipDrawImagePointRectI
GdipGetImageHeight
GdipGetImageWidth
GdipDrawImageRectRectI
GdipReleaseDC
GdipDeleteGraphics
GdipCreateFromHDC
GdipCreateFontFromDC
GdipCreateFontFromLogfontW
GdipDeleteFont
GdipLoadImageFromStream
GdipGetImageGraphicsContext
GdipSetInterpolationMode
GdipSetSmoothingMode
GdipDrawImageRectI
GdipGetImagePixelFormat
GdipCreateBitmapFromScan0
GdipLoadImageFromFile
GdiplusShutdown
GdipCloneImage
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipSaveImageToStream
GdipFree
GdipDisposeImage
GdipLoadImageFromFileICM
GdipLoadImageFromStreamICM
PdhOpenQueryW
PdhCloseQuery
PdhAddCounterW
PdhCollectQueryData
PdhGetFormattedCounterValue
PdhRemoveCounter
CryptQueryObject
CryptMsgGetParam
CryptDecodeObject
CertFindCertificateInStore
CertGetNameStringW
WinVerifyTrust
URLDownloadToFileW
MiniDumpWriteDump
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ