Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-25_f6b188709e35d3436bfeb170d3cdfcfc_mafia.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-25_f6b188709e35d3436bfeb170d3cdfcfc_mafia.exe
Resource
win10v2004-20240802-en
Target
2024-08-25_f6b188709e35d3436bfeb170d3cdfcfc_mafia
Size
1.3MB
MD5
f6b188709e35d3436bfeb170d3cdfcfc
SHA1
37bf2bdb8d24579f87fa178de04e8a4fa0c701e0
SHA256
b4529917f40b0fc6c16dabe6f0dfc91824f84734bc5adba195e317b7aa6388b2
SHA512
3302efe78e87a8c303a5ce59469c0e804b00de9f698c8360c1e563e1c856d33aa7b71aa166892522f73bc488b90fc31345a59022d2a36325bb6fee514feba8d6
SSDEEP
24576:x+yhXAolpvAo26oFRRRNESFE4SHF15VVTHMkfyjR:Uaw2KbXSHRVVTskKV
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\Work\Torch\17.0.963.66\Client\src\build\Release\setup.pdb
GetFileInformationByHandle
ExpandEnvironmentStringsW
CreateProcessW
VirtualAllocEx
WriteProcessMemory
GetModuleHandleW
QueueUserAPC
ResumeThread
TerminateProcess
GetModuleFileNameW
GetCurrentProcess
OpenProcess
WaitForSingleObject
CloseHandle
LoadLibraryW
GetProcAddress
FreeLibrary
GetLastError
SetEnvironmentVariableA
CompareStringW
GetExitCodeProcess
CreateFileW
GetDateFormatW
InterlockedCompareExchange
MoveFileExW
GetFileAttributesExW
GetFileAttributesW
GetShortPathNameW
SizeofResource
LockResource
LoadResource
FindResourceW
RemoveDirectoryW
GetCurrentThreadId
ReadFile
SetFilePointer
SetFileTime
WriteFile
LoadLibraryExW
GetCurrentProcessId
GetTickCount
ReleaseMutex
SetLastError
DeleteFileW
CreateMutexW
OutputDebugStringA
FormatMessageA
GetModuleHandleA
LocalFree
GetCommandLineW
FileTimeToSystemTime
FileTimeToLocalFileTime
UnmapViewOfFile
CopyFileW
GetLongPathNameW
GetTempFileNameW
CreateDirectoryW
FindClose
FindNextFileW
FindFirstFileW
GetTempPathW
GetCurrentDirectoryW
lstrlenW
MapViewOfFile
CreateFileMappingW
GetFileSize
GetNativeSystemInfo
GetVersionExW
QueryPerformanceCounter
GetSystemTimeAsFileTime
CreateToolhelp32Snapshot
HeapSetInformation
GetStdHandle
Process32NextW
Process32FirstW
SetUnhandledExceptionFilter
AssignProcessToJobObject
GetUserDefaultLangID
SetEndOfFile
SetFilePointerEx
FlushFileBuffers
SetEnvironmentVariableW
GetEnvironmentVariableW
InterlockedExchange
RtlCaptureStackBackTrace
GetLocaleInfoW
GetUserDefaultUILanguage
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
IsDebuggerPresent
RaiseException
CreateThread
Sleep
GetSystemDirectoryW
GetWindowsDirectoryW
InterlockedExchangeAdd
TlsGetValue
TlsFree
TlsSetValue
TlsAlloc
InterlockedIncrement
ResetEvent
SetEvent
WaitForMultipleObjects
ReleaseSemaphore
VirtualQuery
InterlockedDecrement
CreateSemaphoreW
InitializeCriticalSection
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
GetThreadLocale
GetACP
CreateFileA
GetTimeZoneInformation
WideCharToMultiByte
MultiByteToWideChar
EncodePointer
DecodePointer
UnhandledExceptionFilter
HeapFree
GetStartupInfoW
GetConsoleCP
GetConsoleMode
HeapAlloc
GetProcessHeap
ExitProcess
SetStdHandle
GetFileType
HeapReAlloc
PeekNamedPipe
LCMapStringW
GetCPInfo
RtlUnwind
IsProcessorFeaturePresent
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetOEMCP
IsValidCodePage
HeapSize
WriteConsoleW
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetForegroundWindow
MoveWindow
GetMonitorInfoW
MonitorFromWindow
CreateWindowExW
DestroyWindow
CallNextHookEx
GetWindowLongW
SendMessageW
LoadIconW
SetWindowLongW
UnhookWindowsHookEx
SetWindowsHookExW
CharUpperW
SendMessageTimeoutW
FindWindowExW
GetWindowThreadProcessId
IsWindow
FindWindowW
MessageBoxW
SetSecurityInfo
GetUserNameW
RegQueryValueExW
RegEnumKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegCloseKey
RegOpenKeyExW
RegCreateKeyExW
RegDeleteValueW
CreateProcessAsUserW
GetSidSubAuthority
GetSidSubAuthorityCount
GetTokenInformation
ConvertSidToStringSidW
GetTraceEnableLevel
GetTraceEnableFlags
GetTraceLoggerHandle
InitializeSecurityDescriptor
LookupAccountSidW
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
RegSetValueExW
SetSecurityDescriptorDacl
RegisterTraceGuidsW
TraceEvent
UnregisterTraceGuids
CommandLineToArgvW
SHChangeNotify
ShellExecuteExW
SHGetFolderPathW
ord680
ord59
SHFileOperationW
StringFromGUID2
PropVariantClear
CoCreateInstance
CoUninitialize
CoInitializeEx
CreateURLMonikerEx
CreateEnvironmentBlock
DestroyEnvironmentBlock
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
ntohl
timeGetTime
SHStrDupW
SHDeleteEmptyKeyW
SHDeleteKeyW
UrlCanonicalizeW
SHCopyKeyW
VariantInit
SysAllocString
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ