Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_86c68570420ccddacf13236ed52f42ea_hijackloader_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_86c68570420ccddacf13236ed52f42ea_hijackloader_mafia.exe
Resource
win10v2004-20240802-en
Target
2024-09-19_86c68570420ccddacf13236ed52f42ea_hijackloader_mafia
Size
2.1MB
MD5
86c68570420ccddacf13236ed52f42ea
SHA1
38943a8b80cf79ff339e7246a61b0cbbddf14109
SHA256
2021da099dbd24bbdb7aa5045b1418ea8a30a84d4fd5728578935fc7fc0020e1
SHA512
794ce03e70aee4552bb49734454ecaed7bd0a1035158adbd12cc05a84a2cd8cd6049853146437b18421e81f071579581d44cf4f829551852d6926cab372ca3be
SSDEEP
49152:Tc/V1GOGRvf0PNgfGW68OsKDf7M5V2nWyKTJy2gLW3pdjL:FOsvcF4OsKDTM5V2nWy3LE
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\Webhost\13-08-2024\WindowsBuilds\DC_NATIVE\8894969\desktopcentral\ONPREMISE\SA_SRC\native\agent\Release\dcinventory.pdb
SetupDiGetDeviceInterfaceDetailW
CM_Get_DevNode_Status
SetupDiGetClassDescriptionW
SetupDiBuildDriverInfoList
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsW
SetupDiEnumDriverInfoW
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceRegistryPropertyW
SetupDiDestroyDriverInfoList
SetupDiGetDriverInfoDetailW
SetupDiGetDeviceInstanceIdW
CreateEnvironmentBlock
LoadUserProfileA
DestroyEnvironmentBlock
UnloadUserProfile
ExpandEnvironmentStringsForUserW
CertCreateCertificateContext
CertAddCertificateContextToStore
PFXImportCertStore
PFXVerifyPassword
CertDeleteCertificateFromStore
CertNameToStrW
CertGetNameStringW
CertGetPublicKeyLength
CertGetCertificateContextProperty
CertNameToStrA
CertVerifyTimeValidity
CertOpenStore
CertOpenSystemStoreW
CryptStringToBinaryA
CertFreeCertificateContext
CertCloseStore
CertEnumCertificatesInStore
CryptFindOIDInfo
CertGetNameStringA
CertFindCertificateInStore
NetGetJoinInformation
DsRoleFreeMemory
DsGetDcNameA
NetWkstaUserGetInfo
NetShareEnum
NetLocalGroupGetMembers
NetApiBufferFree
DsRoleGetPrimaryDomainInformation
WSAGetLastError
WSACleanup
WSAStartup
EnumProcessModules
EnumProcesses
GetModuleBaseNameW
WTSQuerySessionInformationA
WTSEnumerateSessionsA
WTSQuerySessionInformationW
WTSFreeMemory
GetAdaptersInfo
WinHttpSetCredentials
WinHttpWriteData
WinHttpQueryOption
WinHttpQueryDataAvailable
WinHttpSetStatusCallback
WinHttpOpenRequest
WinHttpConnect
WinHttpOpen
WinHttpReadData
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSetOption
WinHttpSendRequest
WinHttpAddRequestHeaders
AgentSendRequestEx
xmlParseMemory
xmlTextReaderGetAttribute
xmlParseFile
xmlDocGetRootElement
xmlTextReaderValue
xmlTextReaderDepth
xmlTextReaderRead
xmlFreeTextReader
xmlStrcmp
xmlNewTextReaderFilename
xmlFree
xmlNodeListGetString
xmlCleanupParser
xmlTextReaderAttributeCount
xmlFreeDoc
xmlTextReaderName
RegisterEventSourceA
ReportEventA
DeregisterEventSource
LookupPrivilegeNameA
GetTokenInformation
LookupAccountSidA
LookupAccountNameA
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
LookupPrivilegeValueA
CreateProcessAsUserW
LogonUserA
CreateProcessAsUserA
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
RegEnumKeyA
RegDeleteKeyA
RegDeleteValueW
RegDeleteValueA
RegCreateKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegEnumValueA
ControlService
CryptAcquireContextA
CryptGetUserKey
CryptGenKey
CryptReleaseContext
CryptDestroyKey
AllocateAndInitializeSid
RegSetValueExA
QueryServiceStatus
OpenServiceW
OpenSCManagerW
CloseServiceHandle
ConvertSidToStringSidW
RegOpenKeyA
RevertToSelf
ImpersonateLoggedOnUser
RegEnumValueW
RegOpenKeyExA
RegQueryValueExA
RegUnLoadKeyW
RegSetValueExW
RegCloseKey
RegLoadKeyW
AdjustTokenPrivileges
RegEnumKeyExW
RegNotifyChangeKeyValue
RegOpenKeyExW
LookupPrivilegeValueW
SetNamedSecurityInfoW
RegDeleteKeyW
RegQueryInfoKeyW
RegQueryValueExW
RegCreateKeyExW
RegEnumKeyW
OpenProcessToken
GetLengthSid
IsValidSecurityDescriptor
IsValidSid
GetNamedSecurityInfoW
LookupAccountSidW
GetExplicitEntriesFromAclW
EnumPrintersW
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
FindFirstFileW
GetCommandLineW
HeapSize
HeapSetInformation
DeleteTimerQueue
GetLocaleInfoW
CreateTimerQueue
CreateTimerQueueTimer
RtlUnwind
PeekNamedPipe
RaiseException
GetDriveTypeA
FindFirstFileExA
ExitThread
LCMapStringW
CompareStringW
GetProcessHeap
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStartupInfoW
HeapCreate
GetConsoleCP
CreateDirectoryA
GetConsoleMode
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetStdHandle
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
DeleteFileW
SetEndOfFile
FlushFileBuffers
GetSystemTimeAsFileTime
CopyFileW
GetCPInfo
DuplicateHandle
FormatMessageA
GetFileType
GlobalFree
GetStdHandle
GlobalAlloc
DisconnectNamedPipe
lstrcmpW
GetDriveTypeW
VirtualQuery
QueryPerformanceCounter
GetModuleFileNameW
GetTimeFormatA
GetDateFormatA
InitializeCriticalSectionAndSpinCount
ExitProcess
UnhandledExceptionFilter
SetEnvironmentVariableA
GetFileAttributesExA
GetFullPathNameA
SuspendThread
ResumeThread
TerminateThread
GetVersion
lstrcmpiA
MoveFileExA
LocalLock
LocalUnlock
WriteConsoleW
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
InterlockedCompareExchange
InterlockedIncrement
GetSystemInfo
SetPriorityClass
GetPriorityClass
GetLocaleInfoA
FindResourceExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
GetLastError
LockResource
FreeLibrary
WaitForSingleObject
LoadLibraryW
CreateProcessA
TerminateProcess
ReadFile
GetProcAddress
CreatePipe
CloseHandle
GetWindowsDirectoryW
FileTimeToSystemTime
CreateFileW
GetBinaryTypeW
GetFileTime
FileTimeToLocalFileTime
WideCharToMultiByte
FormatMessageW
LocalFree
lstrlenA
GetFileSizeEx
CreateMutexW
MapViewOfFile
UnmapViewOfFile
GetCurrentProcess
SetEvent
GetModuleHandleW
GetTickCount
OpenProcess
GetFileAttributesA
Sleep
lstrlenW
GetLocalTime
CreateFileMappingW
CreateEventW
WaitForMultipleObjects
OpenFileMappingW
ReleaseMutex
CreateThread
SystemTimeToFileTime
InterlockedDecrement
CreateDirectoryW
WriteFile
LocalAlloc
GetSystemTime
CreateProcessW
SetHandleInformation
GetFirmwareEnvironmentVariableA
GetExitCodeProcess
GetCurrentProcessId
GetNativeSystemInfo
IsProcessorFeaturePresent
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
lstrcpyW
GetCurrentThreadId
GetModuleHandleA
LoadLibraryA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetVersionExA
GetFileSize
CreateFileA
RemoveDirectoryA
FindClose
DeleteFileA
FindNextFileA
FindFirstFileA
SetDllDirectoryA
GetComputerNameExW
CreateMutexA
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
GetFileInformationByHandle
GetModuleFileNameA
ConnectNamedPipe
CreateNamedPipeA
SetCurrentDirectoryA
GetCurrentDirectoryA
SetFilePointer
SetCurrentDirectoryW
ProcessIdToSessionId
SetLastError
GetCurrentDirectoryW
GetSystemDirectoryA
CopyFileA
GetEnvironmentVariableA
wsprintfA
GetSystemMetrics
wsprintfW
MessageBoxA
SHCreateDirectoryExA
SHCreateDirectoryExW
CoCreateInstance
CoSetProxyBlanket
CoUninitialize
CLSIDFromString
CoInitializeEx
CoInitializeSecurity
OleRun
CoInitialize
SysAllocStringByteLen
VariantInit
VariantClear
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayGetLBound
GetErrorInfo
VariantChangeType
SysFreeString
SysAllocString
SysStringLen
SafeArrayGetElement
ord2
ord20
ord31
ord41
ord9
ord39
ord1
ord12
ord19
ord3
ord49
ord48
ord72
ord26
ord13
ord4
ord8
ord18
ord11
ord43
ord36
ord29
ord16
StrTrimA
PathFindExtensionA
PathIsDirectoryW
StrStrIA
PathFileExistsW
StrStrIW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ