Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-10_13ab0239aee9b754798c0cc700f56f89_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-10_13ab0239aee9b754798c0cc700f56f89_mafia.exe
Resource
win10v2004-20240802-en
Target
2024-09-10_13ab0239aee9b754798c0cc700f56f89_mafia
Size
423KB
MD5
13ab0239aee9b754798c0cc700f56f89
SHA1
0d22d19be6dddbc9a52e11fe899d7f5698298639
SHA256
0c8e2398abbb048cdf0f3e7dc4840c7ad98ff6b1e8e6c219c3d13a0c2cd9004b
SHA512
bfc8808578197a3ea47b5b86e67f289f65e63422ad28b153d9e13ad51dfd1b019c3e84fb4c129fcad8d2b9ef0a10c884cadcaa12f42279cb2e09187e011f5eb3
SSDEEP
3072:hS9ySFmtDLPgRYtqwVZSVir1XgpIhbAoI4Vcu874FCdWw+Zne3tM4XxPUTHMaqMs:o9yNXqKcVI7AoIYciZ0tyYaOHbIf8J
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\git\windows\aqup\src\global\bin\udisk-std\Win32\Release\secureHDiskShell.pdb
LoadLibraryExA
VirtualQuery
Process32First
GetStartupInfoW
GetLastError
GetLocalTime
Process32Next
GetModuleFileNameA
CreateToolhelp32Snapshot
CreateFileA
SetUnhandledExceptionFilter
GetCurrentProcess
CloseHandle
GetFileAttributesA
GetSystemDirectoryA
CreateDirectoryA
FindFirstFileA
CopyFileA
SetFileAttributesA
FindClose
FindNextFileA
CreateMutexA
IsDebuggerPresent
GetCurrentThreadId
GetCurrentProcessId
DeleteFileA
InitializeCriticalSection
SetEnvironmentVariableA
CompareStringW
GetVersionExA
OutputDebugStringA
GetModuleHandleA
LoadLibraryA
GetProcAddress
Sleep
FreeLibrary
MultiByteToWideChar
GetTickCount
WideCharToMultiByte
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CreateFileW
GetStringTypeW
LCMapStringW
HeapFree
EnterCriticalSection
LeaveCriticalSection
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
RemoveDirectoryA
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
TerminateProcess
UnhandledExceptionFilter
HeapAlloc
IsProcessorFeaturePresent
EncodePointer
DecodePointer
RaiseException
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
GetModuleHandleW
ExitProcess
ReadFile
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetTimeZoneInformation
GetFullPathNameA
GetFileInformationByHandle
PeekNamedPipe
GetCurrentDirectoryW
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
HeapSize
HeapReAlloc
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
SetStdHandle
WriteConsoleW
GetDriveTypeW
SetEndOfFile
GetProcessHeap
FreeSid
AllocateAndInitializeSid
EqualSid
GetTokenInformation
OpenProcessToken
ShellExecuteA
ShellExecuteExA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ