Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-21_e5448208688b7fd33163ddbad9320f90_mafia.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-21_e5448208688b7fd33163ddbad9320f90_mafia.exe
Resource
win10v2004-20240802-en
Target
2024-08-21_e5448208688b7fd33163ddbad9320f90_mafia
Size
5.1MB
MD5
e5448208688b7fd33163ddbad9320f90
SHA1
aed471d76b1121df840750f9b3308bfd8c100715
SHA256
1cd3de8583ba69733862174ccef3885669005905b984b4173ee376b04fd3e5c0
SHA512
829c34b6e05a222b8deb7bb080fd7c8fc67ae8ea4d5632cf7e11fd4f8a79e1bc8ee84f518b41b53e81caa8de5180d4a7b740e471e962be3eae211c0dd7477e84
SSDEEP
98304:L7m9xU1PYsqigLBOxtCagafBahPaWWPCXRLPR0Lapp:L7m9oM85caWWPCXjcc
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ebsetup.pdb
InitCommonControlsEx
PropertySheetA
InternetGetConnectedState
InternetAttemptConnect
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetGetLastResponseInfoA
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCloseHandle
GetTimeZoneInformation
MulDiv
ResumeThread
GetCommandLineA
GetCurrentThreadId
SetFileAttributesA
GetFileAttributesA
ReleaseSemaphore
CreateSemaphoreA
OpenSemaphoreA
FileTimeToDosDateTime
FlushFileBuffers
InterlockedCompareExchange
InterlockedIncrement
OutputDebugStringA
HeapAlloc
HeapFree
HeapCreate
HeapDestroy
GetCurrentProcessId
ResetEvent
GetDiskFreeSpaceA
SetLastError
FormatMessageA
GetNumberFormatA
GetLocaleInfoA
IsBadWritePtr
IsBadReadPtr
IsBadStringPtrA
FindNextFileW
FindFirstFileW
ExpandEnvironmentStringsW
GetComputerNameW
LocalFree
GetSystemInfo
LocalAlloc
GetFullPathNameA
GetProcessHeap
GetThreadPriority
GetShortPathNameA
GetExitCodeProcess
VirtualProtect
GlobalFree
LocalFileTimeToFileTime
SystemTimeToTzSpecificLocalTime
RaiseException
InitializeCriticalSectionAndSpinCount
Process32Next
Process32First
CreateToolhelp32Snapshot
GlobalSize
CreateEventW
lstrlenW
lstrcmpiA
IsDBCSLeadByte
FlushInstructionCache
lstrcmpA
LoadLibraryExA
GetUserDefaultLCID
HeapReAlloc
SetCurrentDirectoryW
SetErrorMode
PeekNamedPipe
GetFileInformationByHandle
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
LoadLibraryW
InterlockedExchange
SetConsoleCtrlHandler
FatalAppExitA
GetConsoleMode
GetConsoleCP
GetFileType
SetHandleCount
HeapSize
GetStringTypeW
LCMapStringW
GetLocaleInfoW
IsValidCodePage
GetOEMCP
GetCPInfo
GetModuleFileNameW
GetStdHandle
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
FindFirstFileExA
GetDateFormatA
GetTimeFormatA
GetStartupInfoW
HeapSetInformation
ExitProcess
CreateThread
ExitThread
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
VirtualQuery
GetModuleHandleW
RtlUnwind
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedPushEntrySList
RemoveDirectoryA
ExpandEnvironmentStringsA
SetEnvironmentVariableA
CompareStringW
CreateFileW
GetDriveTypeW
SetStdHandle
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
MultiByteToWideChar
lstrlenA
LockResource
SizeofResource
LoadResource
CreateMutexA
OpenMutexA
ReleaseMutex
GetLocalTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentProcess
TerminateThread
CreateDirectoryA
SetEndOfFile
GetFileTime
LeaveCriticalSection
EnterCriticalSection
MoveFileA
GetTickCount
GetWindowsDirectoryA
FindFirstFileA
FindNextFileA
FindClose
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GetComputerNameA
GetACP
DeleteCriticalSection
CreateEventA
WaitForMultipleObjects
SetEvent
WaitForSingleObject
DeviceIoControl
InitializeCriticalSection
WideCharToMultiByte
GetPrivateProfileStringA
GlobalAlloc
GlobalLock
GlobalUnlock
CreateProcessA
GetDiskFreeSpaceExA
GetSystemDirectoryA
SetFilePointer
CopyFileA
BeginUpdateResourceA
UpdateResourceA
EndUpdateResourceA
GetVersion
GetCurrentDirectoryA
SetCurrentDirectoryA
GetDriveTypeA
FindResourceA
GetVersionExA
GetTempFileNameA
GetSystemTime
SystemTimeToFileTime
SetFileTime
CreateFileA
ReadFile
GetModuleFileNameA
GetFileSize
WriteFile
GetTempPathA
DeleteFileA
GetModuleHandleA
Sleep
OpenProcess
CloseHandle
TerminateProcess
GetLastError
LoadLibraryA
GetProcAddress
FreeLibrary
InterlockedDecrement
GetCurrentDirectoryW
SetProcessWindowStation
CloseWindowStation
SetCapture
GetCapture
ReleaseCapture
RedrawWindow
DeferWindowPos
LoadBitmapA
RegisterClassExA
GetFocus
BeginDeferWindowPos
EndDeferWindowPos
LoadMenuA
GetSubMenu
RemoveMenu
TrackPopupMenuEx
CreateDesktopA
CloseDesktop
ExitWindowsEx
CharPrevA
CharNextA
MapVirtualKeyExA
GetWindow
CreateWindowExW
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMenu
EnableMenuItem
ClientToScreen
CloseWindow
PeekMessageA
LoadStringA
CharToOemA
UnregisterClassA
SetWindowsHookExA
GetMessageA
TranslateMessage
DispatchMessageA
IsDialogMessageA
UnhookWindowsHookEx
LoadIconA
RegisterClassA
PostQuitMessage
DefWindowProcA
EnumThreadWindows
CallNextHookEx
GetDlgCtrlID
DrawFrameControl
DrawFocusRect
UpdateWindow
PtInRect
SetScrollRange
GetScrollPos
GetScrollInfo
SetScrollPos
SetThreadDesktop
ShowCursor
AdjustWindowRectEx
ActivateKeyboardLayout
CharLowerA
EnumChildWindows
CreateWindowExA
SendMessageW
InvalidateRect
GetWindowTextLengthA
FrameRect
InflateRect
DrawEdge
GetSysColor
SetRect
IsWindow
BeginPaint
EndPaint
CreateDialogParamA
SetParent
GetSystemMetrics
LoadCursorA
SetCursor
RemovePropA
GetSysColorBrush
GetUserObjectInformationA
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
OpenInputDesktop
OpenDesktopA
WinHelpA
SendMessageA
GetWindowThreadProcessId
GetClassNameA
OemToCharA
FindWindowA
EnumWindows
MessageBoxA
GetForegroundWindow
OffsetRect
DrawTextA
GetClientRect
CheckDlgButton
IsDlgButtonChecked
EnableWindow
GetDlgItem
SetDlgItemTextA
GetDlgItemTextA
ShowWindow
GetAsyncKeyState
DestroyMenu
DestroyWindow
FillRect
ReleaseDC
LoadImageA
GetParent
GetClipboardData
MessageBeep
SetPropA
SetTimer
GetPropA
GetKeyState
GetDC
MoveWindow
EndDialog
RegisterWindowMessageA
GetClassLongA
CreateAcceleratorTableA
GetClassInfoExA
GetDesktopWindow
DestroyAcceleratorTable
IsChild
SetWindowTextW
InvalidateRgn
CloseClipboard
RegisterClipboardFormatA
GetWindowTextA
LoadKeyboardLayoutA
GetTopWindow
SetClipboardData
EmptyClipboard
SetForegroundWindow
KillTimer
IsWindowVisible
SetDlgItemInt
IsWindowEnabled
GetDlgItemInt
GetWindowRect
ScreenToClient
SetWindowPos
DialogBoxParamA
SendDlgItemMessageA
GetKeyboardLayout
ToAsciiEx
MapVirtualKeyA
EnumDisplaySettingsA
GetKeyNameTextA
wsprintfW
wsprintfA
CheckRadioButton
SetFocus
PostMessageA
GetWindowLongA
SetWindowLongA
SetWindowTextA
CallWindowProcA
CreatePopupMenu
AppendMenuA
GetCursorPos
TrackPopupMenu
OpenClipboard
GetTextMetricsA
GetClipBox
GetDCOrgEx
TranslateCharsetInfo
CreateBitmap
StartDocA
StartPage
SetWindowExtEx
SetViewportExtEx
EndPage
EndDoc
CreateFontA
PatBlt
Ellipse
Pie
GetTextExtentPointA
TextOutA
CreateDCA
CreateDIBSection
CreatePen
MoveToEx
LineTo
CreateCompatibleBitmap
GetStockObject
BitBlt
CreateBrushIndirect
GetDeviceCaps
CreatePatternBrush
CreateCompatibleDC
DPtoLP
GetMapMode
SetMapMode
StretchBlt
DeleteDC
GetObjectA
CreateSolidBrush
GetTextExtentPoint32A
CreateFontIndirectA
SelectObject
SetBkColor
SetBkMode
SetTextColor
DeleteObject
GetSaveFileNameA
PrintDlgA
GetOpenFileNameA
InitiateSystemShutdownA
RegSetValueExA
RegQueryInfoKeyW
RegSetKeySecurity
RegGetKeySecurity
RevertToSelf
CreateProcessAsUserA
GetSidLengthRequired
LookupAccountSidA
ImpersonateLoggedOnUser
DuplicateToken
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
GetSecurityInfo
SetEntriesInAclA
RegConnectRegistryA
RegDeleteKeyA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCloseKey
OpenProcessToken
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenServiceA
DeleteService
GetUserNameA
OpenSCManagerA
EnumServicesStatusW
CloseServiceHandle
RegEnumKeyExA
RegCreateKeyExA
RegQueryInfoKeyA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
RegOpenKeyExA
RegEnumValueA
RegQueryValueExA
RegDeleteValueA
SHGetMalloc
ShellExecuteExA
SHBrowseForFolderA
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteW
CoTaskMemRealloc
CoTaskMemAlloc
StringFromGUID2
StringFromCLSID
CoCreateGuid
CoInitializeEx
CoInitialize
CoUninitialize
CoCreateInstance
OleLockRunning
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
CoInitializeSecurity
CoSetProxyBlanket
CoTaskMemFree
VariantClear
SysAllocString
SysFreeString
VariantInit
SysAllocStringLen
SysStringLen
VarUI4FromStr
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
GetErrorInfo
VariantChangeType
SetErrorInfo
CreateErrorInfo
PathFileExistsA
RpcMgmtStopServerListening
RpcServerUnregisterIf
RpcServerUseProtseqEpA
RpcServerRegisterIf
RpcServerListen
NdrServerCall2
ExpandEnvironmentStringsForUserW
GetModuleFileNameExA
URLDownloadToFileA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ