Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-05_c7f49a52da7ccca233f8751694db8b1c_mafia.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-09-05_c7f49a52da7ccca233f8751694db8b1c_mafia.exe
Resource
win10v2004-20240802-en
Target
2024-09-05_c7f49a52da7ccca233f8751694db8b1c_mafia
Size
523KB
MD5
c7f49a52da7ccca233f8751694db8b1c
SHA1
c9d0cbb8382a073543b3c436c443f646122680f0
SHA256
f17147677c61998c389df1221a4878e0005666f47a33c6c1f3455bec0296affd
SHA512
6fcbe268efa4b0f68c007075289262fce0129eda294127cd9429614a913c65c4fc95ebe3e0b1e8cc22684a23efdf2b0e916613486f39afea320ffa775e24f4b0
SSDEEP
12288:8X+18taRMVB6eoxAc3CtVzkZkouX0ABXJqGu+Y:O+1hyrzk1ukABXJqGu+Y
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Users\dsb\Documents\Jenkins\workspace\DetectUpdate-Client-Production\VS2010\Release\DetectUpdate.pdb
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
CopyFileW
MoveFileExW
FlushFileBuffers
SetFilePointer
ReadFile
GetFileSize
GetFileTime
SetFileTime
SetEndOfFile
GetSystemTimeAsFileTime
FileTimeToSystemTime
CompareFileTime
FindClose
SetFileAttributesW
WaitForSingleObjectEx
WaitForMultipleObjectsEx
GetExitCodeProcess
TerminateProcess
SetPriorityClass
AssignProcessToJobObject
CreateJobObjectW
ReadProcessMemory
GetShortPathNameW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetLongPathNameW
ProcessIdToSessionId
FormatMessageW
LoadLibraryW
SetErrorMode
GetProcessWorkingSetSize
GlobalMemoryStatusEx
SetProcessWorkingSetSize
GetSystemPowerStatus
GetPrivateProfileStringW
DeviceIoControl
GetDiskFreeSpaceExW
GetFileAttributesW
SleepEx
GetTimeZoneInformation
SetStdHandle
GetConsoleMode
GetConsoleCP
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetFileAttributesExW
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameW
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetLocaleInfoW
HeapCreate
GetStdHandle
ExitProcess
IsProcessorFeaturePresent
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
SetThreadPriority
TerminateThread
ResumeThread
SuspendThread
CreateProcessW
lstrcmpW
GlobalFree
GetSystemDirectoryW
GetWindowsDirectoryW
GetComputerNameW
VirtualQuery
GetThreadPriority
ResetEvent
InitializeCriticalSection
TryEnterCriticalSection
GetLogicalDriveStringsW
QueryDosDeviceW
SetLastError
GetCurrentProcessId
OpenProcess
LocalAlloc
LocalFree
VerSetConditionMask
VerifyVersionInfoW
GetCurrentProcess
FindFirstFileW
FindNextFileW
GetLocalTime
CreateFileW
WriteFile
CreateDirectoryW
GetCurrentDirectoryW
SetEnvironmentVariableA
DeleteFileW
MoveFileW
GetCurrentThread
WideCharToMultiByte
GetUserDefaultUILanguage
GetCommandLineW
LoadLibraryExW
FreeLibrary
InterlockedDecrement
CreateThread
GetCurrentThreadId
GetTickCount
WaitForSingleObject
GetModuleFileNameW
CreateEventW
CreateWaitableTimerW
SetWaitableTimer
Sleep
WaitForMultipleObjects
SetEvent
lstrcmpiW
CloseHandle
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
GetLastError
RaiseException
lstrlenW
GetModuleHandleW
GetProcAddress
GetVersionExW
GetTempPathW
MultiByteToWideChar
FindResourceExW
FindResourceW
GetSystemInfo
VirtualAlloc
VirtualProtect
FindFirstFileExW
GetDriveTypeW
FileTimeToLocalFileTime
GetStartupInfoW
HeapSetInformation
RtlUnwind
DecodePointer
EncodePointer
InterlockedExchange
InterlockedIncrement
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
LoadResource
LockResource
SizeofResource
WriteConsoleW
CompareStringW
GetUserDefaultLCID
TranslateMessage
DispatchMessageW
GetMessageW
GetProcessWindowStation
ExitWindowsEx
GetGuiResources
LoadStringW
PostThreadMessageW
GetWindowLongW
SetWindowPos
MapWindowPoints
MessageBoxW
GetMonitorInfoW
MonitorFromWindow
GetWindowRect
GetWindow
GetParent
CharLowerW
SetForegroundWindow
IsWindowVisible
DestroyWindow
GetWindowThreadProcessId
EnumWindows
AllowSetForegroundWindow
PeekMessageW
MsgWaitForMultipleObjects
FlashWindow
GetLastInputInfo
SystemParametersInfoW
CharUpperW
GetClientRect
CharNextW
OpenInputDesktop
CloseDesktop
GetUserObjectInformationW
CreateWindowExW
SetSecurityDescriptorOwner
GetSecurityDescriptorControl
MakeAbsoluteSD
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
IsTokenRestricted
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
AdjustTokenPrivileges
LookupPrivilegeValueW
PrivilegeCheck
DuplicateTokenEx
CreateProcessAsUserW
ConvertStringSecurityDescriptorToSecurityDescriptorA
SetNamedSecurityInfoW
LookupAccountSidW
ConvertSidToStringSidW
EqualSid
GetTokenInformation
GetSidIdentifierAuthority
GetSidSubAuthorityCount
OpenThreadToken
OpenProcessToken
RegFlushKey
RegRestoreKeyW
RegSaveKeyW
RegEnumValueW
RevertToSelf
ImpersonateLoggedOnUser
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
GetSidLengthRequired
InitializeSid
GetSidSubAuthority
ChangeServiceConfigW
ChangeServiceConfig2W
RegEnumKeyExW
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
GetAclInformation
InitializeAcl
AddAce
CopySid
IsValidSid
GetLengthSid
DeleteService
CreateServiceW
SetServiceStatus
RegisterEventSourceW
ReportEventW
DeregisterEventSource
ControlService
OpenSCManagerW
OpenServiceW
CloseServiceHandle
StartServiceW
RegQueryInfoKeyW
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
InitializeSecurityDescriptor
RegQueryValueExW
ord165
ShellExecuteExW
SHGetSpecialFolderPathW
CoInitializeSecurity
CoCreateInstance
CoResumeClassObjects
CoInitialize
CoAddRefServerProcess
CoReleaseServerProcess
CLSIDFromString
CoRevertToSelf
CoImpersonateClient
StringFromGUID2
CoInitializeEx
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
CoCreateGuid
VarUI4FromStr
SysFreeString
SysStringLen
RegisterTypeLi
SysAllocString
UnRegisterTypeLi
LoadTypeLi
PathRemoveFileSpecW
PathCanonicalizeW
PathStripPathW
PathFindFileNameW
PathAppendW
SHQueryValueExW
PathRemoveExtensionW
UnloadUserProfile
CreateEnvironmentBlock
DestroyEnvironmentBlock
CryptCATAdminAcquireContext
CryptCATAdminReleaseContext
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminEnumCatalogFromHash
CryptCATCatalogInfoFromContext
CryptCATAdminReleaseCatalogContext
WinVerifyTrust
CertCloseStore
CryptMsgClose
CryptMsgGetParam
CertFindCertificateInStore
CryptQueryObject
CertGetNameStringW
GetProcessMemoryInfo
EnumProcesses
EnumProcessModules
GetModuleFileNameExW
WTSFreeMemory
WTSEnumerateSessionsW
WTSQuerySessionInformationW
WinHttpQueryDataAvailable
WinHttpQueryAuthSchemes
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpSetCredentials
WinHttpAddRequestHeaders
WinHttpOpenRequest
WinHttpCrackUrl
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpOpen
WinHttpGetDefaultProxyConfiguration
WinHttpCloseHandle
WinHttpSetOption
WinHttpConnect
WinHttpReadData
NetApiBufferFree
NetWkstaUserGetInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ