Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-15_e323baecaadfe74af310bcd7cb4238f2_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-15_e323baecaadfe74af310bcd7cb4238f2_mafia.exe
Resource
win10v2004-20240802-en
Target
2024-09-15_e323baecaadfe74af310bcd7cb4238f2_mafia
Size
832KB
MD5
e323baecaadfe74af310bcd7cb4238f2
SHA1
8f943528a40c4175cf8584a6748dfd63abb212db
SHA256
7c3ade0015e57042c60892fd008a94aa30fcd8ec6f57763e618fb9ac8887e768
SHA512
e5167ef296184d4c831d511165404f761283a2a58fc9cc6d354b23ef4105593f6a8eced74f1cbeebd1318839b0b50115aca5135adaab49fa3940036590362967
SSDEEP
12288:dL2hI6bniRohx2gKDjjjxoqgGeuDL6DAD8guLbPOOFKcZPsiTK:dLh6bniRocxvgFAD8prOUKPiTK
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\src\ietabmoney\helper\Release\ietabhelper.pdb
SetLastError
lstrcmpW
lstrcmpiW
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
CreateThread
GetCurrentThread
WideCharToMultiByte
OpenProcess
CloseHandle
GetStdHandle
SetStdHandle
GetVersion
CreateFileW
GetFileSize
ReadFile
VirtualProtect
CreateEventW
WriteFile
FlushFileBuffers
SetEvent
PeekNamedPipe
WaitForSingleObject
GetVersionExW
GetThreadContext
VirtualQuery
InitializeCriticalSection
Sleep
SetThreadPriority
VirtualAlloc
OpenThread
GetSystemInfo
GetThreadPriority
GetCurrentProcessId
SuspendThread
ResumeThread
FormatMessageA
GetNativeSystemInfo
CopyFileW
FindFirstFileExW
FindNextFileW
FindClose
DeleteFileW
RemoveDirectoryW
LockResource
GetTempFileNameW
RaiseException
LCMapStringW
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetFileType
WriteConsoleW
HeapSize
HeapReAlloc
HeapDestroy
InterlockedPopEntrySList
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
DecodePointer
EncodePointer
InterlockedExchange
InterlockedCompareExchange
GetStringTypeW
CompareStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
HeapCreate
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetHandleCount
GetConsoleCP
GetConsoleMode
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetFilePointer
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCPInfo
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
GetTickCount
GetModuleFileNameW
GetFileAttributesW
GlobalFree
GetCurrentThreadId
GetModuleHandleW
FlushInstructionCache
GetCurrentProcess
GetLastError
GlobalUnlock
GlobalLock
GlobalAlloc
MulDiv
lstrlenW
MultiByteToWideChar
lstrlenA
FreeLibrary
GetProcAddress
LoadLibraryW
SetTimer
SetPropW
GetKeyState
IsWindowVisible
PostQuitMessage
GetAncestor
ShowWindow
DialogBoxParamW
AnimateWindow
LoadMenuW
RegisterWindowMessageW
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
GetWindow
GetDlgItem
GetClassNameW
GetSysColor
CharNextW
RedrawWindow
LoadCursorW
KillTimer
GetForegroundWindow
MessageBoxW
GetWindowThreadProcessId
FindWindowExW
UpdateWindow
MapVirtualKeyW
GetMessageExtraInfo
MessageBoxA
GetWindowPlacement
SetWindowLongA
SetParent
LoadStringW
LoadAcceleratorsW
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
EnumWindows
EndDialog
GetClassInfoExW
RegisterClassExW
CreateAcceleratorTableW
ScreenToClient
SetCapture
ReleaseCapture
FillRect
InvalidateRgn
GetDesktopWindow
DestroyAcceleratorTable
CreateWindowExW
SendMessageW
PostMessageW
MoveWindow
ClientToScreen
GetWindowRect
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
CallWindowProcW
DefWindowProcW
GetWindowLongW
SetWindowLongW
EndPaint
GetClientRect
BeginPaint
InvalidateRect
GetDC
ReleaseDC
SetWindowPos
EqualRect
IsWindow
SetFocus
GetParent
GetFocus
IsChild
DestroyWindow
GetPropW
UnregisterClassA
GetPixel
CreateFontIndirectW
GetTextExtentPoint32W
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
BitBlt
GetStockObject
GetObjectW
GetDeviceCaps
DeleteDC
RegEnumValueW
RegDeleteValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegCloseKey
RegEnumKeyW
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
SHCreateDirectoryExW
CoTaskMemFree
CoCreateInstance
CreateStreamOnHGlobal
StringFromCLSID
CoTaskMemRealloc
OleInitialize
OleUninitialize
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoTaskMemAlloc
LoadRegTypeLi
VariantChangeType
SysStringByteLen
SysAllocStringByteLen
VarUI4FromStr
DispCallFunc
SysAllocStringLen
OleCreateFontIndirect
LoadTypeLi
SysStringLen
VariantCopy
SysAllocString
SysFreeString
VariantClear
VariantInit
MiniDumpWriteDump
InternetSetCookieExW
InternetCrackUrlW
URLDownloadToCacheFileW
CoInternetSetFeatureEnabled
CreateURLMoniker
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ