Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-26_a6f606c05af89c888e23dd0afff4a0c2_floxif_mafia.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-26_a6f606c05af89c888e23dd0afff4a0c2_floxif_mafia.exe
Resource
win10v2004-20240709-en
Target
2024-07-26_a6f606c05af89c888e23dd0afff4a0c2_floxif_mafia
Size
1.2MB
MD5
a6f606c05af89c888e23dd0afff4a0c2
SHA1
f72591c8c450adbc91aa89d2cca219bb5aa91d70
SHA256
2a59e9bfc3caa4aea06bd0e93414eb08bdcc236450ae204daf1d7b9326937013
SHA512
5adbba8eac351490b526e9df381c66f927f7515903a40ef7becce6ee2ba9f0a7b92e4d1a59943331835968f7cb6c23b555768603e4a9319ef959943676e38de8
SSDEEP
24576:96gyLbn4Jtz9LjFuV+OZK5dqwalxj1Rki6xpb+q0L6esrEH77:MbKtGV+hvqwqj1p6xtP0PH
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetStdHandle
GetDriveTypeW
SetEndOfFile
CompareStringW
lstrlenA
lstrlenW
GetCurrentProcess
GetProcessHeap
HeapAlloc
LocalFree
HeapFree
GetTempPathW
GetModuleFileNameW
MoveFileW
CreateEventW
WaitForSingleObject
GetSystemTimeAsFileTime
CreateDirectoryW
CreateFileW
WriteFile
DeleteFileW
QueueUserWorkItem
GetLastError
OpenEventW
SetEvent
CloseHandle
Sleep
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetEnvironmentVariableA
InitializeCriticalSection
WriteConsoleW
FreeLibrary
LoadLibraryW
SetConsoleCtrlHandler
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapReAlloc
HeapQueryInformation
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateFileA
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointer
GetConsoleMode
GetConsoleCP
FatalAppExitA
GetStartupInfoW
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
IsValidCodePage
SetUnhandledExceptionFilter
CopyFileA
GetCurrentThread
RtlCaptureContext
FormatMessageA
GetCurrentDirectoryA
GetModuleFileNameA
WTSGetActiveConsoleSessionId
OpenProcess
Process32NextW
ProcessIdToSessionId
Process32FirstW
CreateToolhelp32Snapshot
CreateProcessW
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
CreateNamedPipeW
LocalAlloc
DisconnectNamedPipe
FlushFileBuffers
TerminateThread
ConnectNamedPipe
CreateThread
GetFileAttributesW
IsWow64Process
GetVersionExW
GetLocaleInfoW
ReadFile
GetFileSize
WaitNamedPipeW
InterlockedIncrement
GetStringTypeW
InterlockedCompareExchange
InterlockedExchange
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetCommandLineW
HeapSetInformation
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
GetTimeFormatA
GetDateFormatA
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetTimeZoneInformation
GetStdHandle
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
HeapDestroy
HeapSize
ExitProcess
GetACP
GetOEMCP
wsprintfW
SHGetFolderPathW
CLSIDFromProgID
CoCreateGuid
CoUninitialize
CoInitialize
CoCreateInstance
CreateErrorInfo
SysAllocString
SetErrorInfo
VariantChangeType
GetErrorInfo
VariantInit
SysStringByteLen
SysAllocStringByteLen
SysStringLen
SysFreeString
VariantClear
CheckTokenMembership
FreeSid
OpenProcessToken
DuplicateTokenEx
ImpersonateLoggedOnUser
QueryServiceObjectSecurity
GetSecurityDescriptorDacl
BuildExplicitAccessWithNameW
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetServiceObjectSecurity
ControlService
DeleteService
CreateServiceW
ChangeServiceConfig2W
StartServiceW
QueryServiceStatus
OpenSCManagerW
OpenServiceW
ChangeServiceConfigW
CloseServiceHandle
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
RegisterEventSourceW
ReportEventW
DeregisterEventSource
SetServiceStatus
RegQueryValueExW
RevertToSelf
CreateProcessAsUserW
LookupPrivilegeValueW
AdjustTokenPrivileges
ConvertSidToStringSidW
GetTokenInformation
GetLengthSid
CopySid
AllocateAndInitializeSid
RegEnumKeyExW
RegCloseKey
RegOpenKeyExW
RpcStringFreeW
UuidToStringW
PathFindFileNameW
UrlEscapeW
PathFileExistsW
htonl
WinHttpCrackUrl
WinHttpReceiveResponse
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpQueryDataAvailable
WinHttpSendRequest
WinHttpConnect
WinHttpOpen
WinHttpReadData
SymInitialize
SymSetOptions
StackWalk
SymGetSymFromAddr64
UnDecorateSymbolName
SymFunctionTableAccess
SymCleanup
SymGetModuleBase
SymGetLineFromAddr
GetProcessMemoryInfo
CreateEnvironmentBlock
DestroyEnvironmentBlock
WTSQueryUserToken
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ