Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-01_147c2884571a8e80803d79cec71fc207_mafia_saber.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-01_147c2884571a8e80803d79cec71fc207_mafia_saber.exe
Resource
win10v2004-20240802-en
Target
2024-09-01_147c2884571a8e80803d79cec71fc207_mafia_saber
Size
290KB
MD5
147c2884571a8e80803d79cec71fc207
SHA1
2e5277955ea9c7405b3390132093dc8e8440ec95
SHA256
1b90d048c3ec4aa3cd2198342f73904e35f4abf8022dc043238933d562b5e503
SHA512
01c78f5d16b653d650f5a0bd93230fe734d5addc617a59240e29df3f8b08d38ebf02f49fb6a79c797f72003cc7ee9b166c5e39faadde27e4783b651717d6544f
SSDEEP
6144:1TQTddkbhVL/NwmZF0AMnKOgXRrIrwWeBFusaPhOL:1mkbjJZFNMKjlIr8FuxE
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\Build\ecyber\trunk\sc\bin.32\deskdl.pdb
InternetCloseHandle
InternetReadFile
HttpQueryInfoW
HttpSendRequestW
HttpOpenRequestW
InternetConnectW
InternetOpenW
InternetCrackUrlW
PathAppendW
PathFileExistsW
ResetEvent
OpenEventA
WaitForSingleObject
WriteConsoleW
CreateEventA
CloseHandle
HeapAlloc
GetProcessHeap
HeapFree
SetEvent
CreateFileW
MoveFileExW
DeleteFileW
LoadLibraryW
GetProcAddress
Sleep
CreateMutexW
CreateDirectoryW
GetLastError
GetFileSize
ReadFile
ResumeThread
WriteFile
CopyFileW
WaitNamedPipeW
SetNamedPipeHandleState
SetFilePointer
SystemTimeToFileTime
GetCurrentDirectoryW
MultiByteToWideChar
LocalFileTimeToFileTime
WideCharToMultiByte
GetFileAttributesW
SetFileTime
FileTimeToSystemTime
GetFileInformationByHandle
UnmapViewOfFile
GetTickCount
SetEnvironmentVariableW
SetEnvironmentVariableA
CompareStringW
WaitForMultipleObjects
SetWaitableTimer
CreateWaitableTimerA
ExitThread
FileTimeToLocalFileTime
GetTimeZoneInformation
SetEndOfFile
SetStdHandle
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FindClose
CreateThread
GetDriveTypeW
FindFirstFileExW
GetSystemTimeAsFileTime
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetFullPathNameW
PeekNamedPipe
GetFileType
HeapSize
GetModuleHandleW
ExitProcess
GetStdHandle
GetModuleFileNameW
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
SetHandleCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetCurrentProcessId
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
wsprintfW
RegQueryValueExW
RegOpenKeyExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
SHGetFolderPathW
CommandLineToArgvW
ShellExecuteExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ