Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-10_9a07ac05c6675d3b04c40c6d853c6877_mafia_magniber.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-10_9a07ac05c6675d3b04c40c6d853c6877_mafia_magniber.exe
Resource
win10v2004-20240709-en
Target
2024-07-10_9a07ac05c6675d3b04c40c6d853c6877_mafia_magniber
Size
987KB
MD5
9a07ac05c6675d3b04c40c6d853c6877
SHA1
e438796eedd054504cd1b0ef6c1953f686a197f8
SHA256
5cbaea0b5fd7e70c6e135aedc0ae46628174995ee3443472d3a291357617a453
SHA512
61ca7ef9ed81083c6278a3ebf71b9e043d1332197486143d4d436b1205ff35f9b6c214f3a95aeb40e45505368198082643cc5272be750affdb15e0c0deca97ba
SSDEEP
24576:w+OvBWmpNRxNNcDJ8cxF97PP1q0Yw0phFMIXIX1xLeHu/p:QWmFU8aP1qVZMIXIFxL2Ap
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Build\source\rnmininst\rel32s\rnmininst.pdb
OleCreate
OleSetContainedObject
OleInitialize
OleUninitialize
CoInitializeSecurity
CoSetProxyBlanket
CoInitialize
CoCreateInstance
CoUninitialize
CoCreateGuid
SHDeleteValueA
PathFileExistsA
UrlUnescapeA
UrlEscapeA
SHDeleteKeyA
InternetGetConnectedState
InternetCloseHandle
InternetCanonicalizeUrlA
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetGetLastResponseInfoA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetSetOptionA
CharPrevA
CharNextA
CharLowerA
CharUpperA
CreateDialogParamA
PostMessageA
LoadStringA
SendDlgItemMessageA
PeekMessageA
GetSysColor
KillTimer
EnableWindow
RedrawWindow
GetClassInfoExA
LoadCursorA
GetWindowTextA
GetSystemMetrics
CreateWindowExA
UpdateWindow
SetTimer
GetMessageA
TranslateMessage
DispatchMessageA
DialogBoxParamA
SetWindowRgn
DestroyWindow
ClientToScreen
GetFocus
DefWindowProcA
GetForegroundWindow
GetClassNameA
IsWindowVisible
RegisterClassExA
EnumWindows
GetCursorPos
MessageBoxA
InvalidateRect
BeginPaint
EndPaint
SetWindowTextA
LoadIconA
SendMessageA
GetSystemMenu
EnableMenuItem
GetWindowThreadProcessId
GetShellWindow
GetAsyncKeyState
PtInRect
SetDlgItemTextA
GetDlgItem
SetForegroundWindow
SetActiveWindow
SetFocus
ShowWindow
GetWindowRect
ScreenToClient
SetWindowPos
EndDialog
GetDC
ReleaseDC
DrawTextW
SetWindowLongA
GetClientRect
GetWindowLongA
VariantClear
VariantInit
SysStringByteLen
SysStringLen
SysAllocString
SysFreeString
SysAllocStringLen
BitBlt
StretchBlt
SetBkMode
SetTextColor
GetObjectA
SelectObject
DeleteDC
GetTextExtentPointW
CreateFontW
CreateBitmap
GetDeviceCaps
CreatePatternBrush
CombineRgn
GetPixel
CreateRectRgn
SetPixel
CreateCompatibleDC
DeleteObject
CreateSolidBrush
LookupAccountSidW
ConvertSidToStringSidW
RegEnumValueA
RegEnumKeyExA
ConvertSidToStringSidA
InitializeAcl
IsValidSid
AddAccessDeniedAce
AddAccessAllowedAce
GetLengthSid
DuplicateTokenEx
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueA
InitializeSecurityDescriptor
RegQueryValueExA
OpenProcessToken
GetTokenInformation
EqualSid
RegEnumKeyA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
FreeSid
GetUserNameA
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
LookupAccountNameA
AllocateAndInitializeSid
ConvertStringSidToSidW
SHGetPathFromIDListA
SHGetFolderPathW
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderPathA
SHBrowseForFolderA
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
TransparentBlt
GetUserNameExW
ord8
ord71
ord141
ord87
ord168
ord136
ord93
HeapSize
HeapReAlloc
HeapDestroy
DecodePointer
EncodePointer
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetCurrentDirectoryA
InitializeCriticalSectionAndSpinCount
GetVersion
GetWindowsDirectoryA
MoveFileA
GetFileAttributesA
GetTempPathA
GetTempFileNameA
InterlockedDecrement
InterlockedIncrement
LoadLibraryW
GetModuleFileNameW
GetComputerNameExA
GetSystemInfo
GetSystemTime
SetLastError
AttachConsole
GetStdHandle
AllocConsole
GetConsoleScreenBufferInfo
SetConsoleWindowInfo
GetComputerNameW
lstrlenW
GetDriveTypeA
GetFileSizeEx
RtlUnwind
FileTimeToLocalFileTime
FindFirstFileExA
GetConsoleCP
GetConsoleMode
GetModuleHandleW
ExitProcess
WriteConsoleW
GetFileType
VirtualProtect
VirtualAlloc
VirtualQuery
SetStdHandle
GetLocalTime
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetACP
GetCPInfo
GetOEMCP
IsValidCodePage
SetEnvironmentVariableA
SetCurrentDirectoryA
GetDriveTypeW
GetFullPathNameA
GetCurrentDirectoryW
SetCurrentDirectoryW
SetEndOfFile
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetTimeZoneInformation
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
SetHandleCount
HeapCreate
GetLocaleInfoW
CreateFileW
FlushFileBuffers
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
CompareStringW
ReadConsoleInputA
SetConsoleMode
lstrlenA
GetFileInformationByHandle
SetFilePointer
GetLocaleInfoA
FindResourceA
FreeResource
WaitForSingleObject
GetExitCodeProcess
GetNamedPipeHandleStateA
GetCommandLineW
SetErrorMode
FileTimeToSystemTime
GetSystemTimeAsFileTime
CreateThread
GetProcessHeap
HeapAlloc
HeapFree
TerminateProcess
GetTimeFormatA
GetDateFormatA
LocalAlloc
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SetFileAttributesA
GetTickCount
RaiseException
GetLastError
lstrcpyA
CloseHandle
CreateMutexA
OpenMutexA
CreateProcessA
GetVersionExA
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
FreeLibrary
GetProcAddress
LoadLibraryA
WideCharToMultiByte
RemoveDirectoryA
FindClose
DeleteFileA
FindNextFileA
MoveFileExA
FindFirstFileA
GetModuleFileNameA
GetDiskFreeSpaceA
GetDiskFreeSpaceExA
GetCurrentProcess
GetModuleHandleA
LocalFree
FormatMessageA
ReadFile
Sleep
CreateFileA
ExpandEnvironmentStringsA
MultiByteToWideChar
CopyFileA
GetFileSize
WriteFile
PeekNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateDirectoryA
GlobalFree
GlobalAlloc
lstrcmpA
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
SystemTimeToFileTime
UuidToStringA
RpcStringFreeA
WinVerifyTrust
CertCloseStore
CertFreeCertificateContext
CertGetNameStringW
CertFindCertificateInStore
CryptMsgGetParam
CryptQueryObject
CryptDecodeObject
CryptMsgClose
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ