Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_9a6adc8a31ed14256a4c5bf1193808e0_hijackloader_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_9a6adc8a31ed14256a4c5bf1193808e0_hijackloader_mafia.exe
Resource
win10v2004-20240802-en
Target
2024-09-19_9a6adc8a31ed14256a4c5bf1193808e0_hijackloader_mafia
Size
435KB
MD5
9a6adc8a31ed14256a4c5bf1193808e0
SHA1
4804f66efdb52518ea4cbf440576f2fb714b12d8
SHA256
bd37c1edc781abbc20ea54f03eb9e49cc351f2324d5d3cdb27115856990278d4
SHA512
c18390cbfba1c70a0a37937879c8611d9b885bc1dcd0351025c094c8b9b7431b54a3633d9b5473b91a63145e4882bf00ef581aa24868def4adcb8127fbb3f1e8
SSDEEP
12288:+QWpFOYvCV4Kc1B9dxL2AxovWRFhioevDivRF:O93DPxL2a2GgLiF
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\Webhost\13-08-2024\WindowsBuilds\DC_NATIVE\8894969\desktopcentral\ONPREMISE\SA_SRC\native\agent\Release\dcusb32.pdb
SetupDiGetDeviceRegistryPropertyW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailW
CM_Get_DevNode_Status
SetupDiCallClassInstaller
SetupDiGetDeviceInstanceIdW
SetupDiSetClassInstallParamsW
SetupDiGetClassDevsW
WTSQuerySessionInformationA
WTSFreeMemory
WTSEnumerateSessionsW
WTSQuerySessionInformationW
GetModuleBaseNameW
EnumProcessModules
MultiByteToWideChar
LockResource
SystemTimeToFileTime
GetModuleHandleW
WriteFile
OpenProcess
LoadLibraryW
GetVersionExW
FlushFileBuffers
GetLastError
lstrcmpiA
GetProcAddress
Process32FirstW
ProcessIdToSessionId
GetSystemInfo
Process32NextW
CreateToolhelp32Snapshot
CloseHandle
CreateDirectoryW
Sleep
ReadFile
CreateFileW
SizeofResource
GetFileSizeEx
DeleteFileW
LocalFree
CreateMutexW
FindFirstFileW
lstrlenA
GetCurrentProcess
WaitForSingleObject
WideCharToMultiByte
FormatMessageW
FindClose
GetLocalTime
DeviceIoControl
ReleaseMutex
GetWindowsDirectoryW
GetCurrentProcessId
GetSystemTime
DeleteFileA
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
LoadResource
FindResourceW
FindResourceExW
GetModuleFileNameW
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetLocaleInfoW
GetUserDefaultLCID
SetEnvironmentVariableA
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetStdHandle
WriteConsoleW
CreateFileA
SetEndOfFile
CompareStringW
lstrlenW
GetStringTypeW
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetConsoleMode
GetConsoleCP
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InterlockedExchange
RaiseException
InitializeCriticalSectionAndSpinCount
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetSystemTimeAsFileTime
GetCommandLineW
HeapSetInformation
RtlUnwind
LCMapStringW
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoW
IsProcessorFeaturePresent
HeapCreate
ExitProcess
SetFilePointer
RegQueryValueExW
ReportEventW
RegDeleteValueW
DeregisterEventSource
RegisterEventSourceW
RegSetValueExW
RegOpenKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExA
LookupAccountSidA
RegQueryValueExA
GetTokenInformation
OpenProcessToken
SHCreateDirectoryExW
CoUninitialize
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
VariantInit
SysFreeString
SysAllocString
SHDeleteKeyW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ