Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-25_96ee9bfa04a43be98f7c877c51a81393_mafia.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-25_96ee9bfa04a43be98f7c877c51a81393_mafia.exe
Resource
win10v2004-20240802-en
Target
2024-09-25_96ee9bfa04a43be98f7c877c51a81393_mafia
Size
1.2MB
MD5
96ee9bfa04a43be98f7c877c51a81393
SHA1
df144e6059b583dddd9fd274603735284b2609ee
SHA256
0f2ef7a23aca572a9a9ba8e846d72ade47d605603d6aafab832545ec60aef4c7
SHA512
0469cb36fe6a88dc55af44f77c103b3854c8b3ee4b7e86cca68edfe68095b9fda110acbf8427df1c7e970ff837567c4e5f69bbc29d4ccf4b536c17e97daf3512
SSDEEP
24576:EOzCkPAm9JPBa4BvShLtk3z9JpP/b+5jkp3chYgvsyqf6OXIkhup:EOzCkPNbartaz9rb+5Yp3chYgsH6chc
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
e:\Builds\6\Dev\DEV.usys.Metro.Installer\Binaries\MetroInstallerAPP.pdb
DeleteUrlCacheEntryW
WinHttpReadData
WinHttpSendRequest
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpSetOption
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpOpenRequest
WinHttpConnect
WinHttpOpen
GetSystemInfo
lstrlenA
SetFileAttributesW
GetFileAttributesExW
FindNextFileW
FindFirstFileW
FindClose
CopyFileW
MoveFileExW
GetTempPathW
lstrlenW
GetFileTime
SetFileTime
FileTimeToSystemTime
CompareFileTime
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
ProcessIdToSessionId
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
WaitForMultipleObjectsEx
OpenProcess
Thread32Next
Thread32First
TerminateProcess
SetProcessShutdownParameters
GetProcessShutdownParameters
WaitForSingleObject
CreateProcessW
CreateFileA
RemoveDirectoryW
GetTickCount
GetCurrentThread
GetCommandLineW
GetCurrentProcessId
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetSystemTimeAsFileTime
QueryPerformanceCounter
PeekNamedPipe
FlushFileBuffers
GetConsoleCP
GetFileAttributesW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLocaleInfoW
FatalAppExitA
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
HeapCreate
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CompareStringW
LCMapStringW
GetCPInfo
GetCurrentProcess
LocalFree
GetSystemDirectoryA
GetFullPathNameA
SetErrorMode
GetModuleHandleW
DeleteFileW
CreateThread
WaitForMultipleObjects
TerminateThread
GetExitCodeThread
LocalAlloc
PulseEvent
GetCurrentThreadId
ExitThread
GetStartupInfoW
HeapSetInformation
CreateEventW
CreateDirectoryW
LoadLibraryW
GetProcAddress
FreeLibrary
GetVersionExW
WTSGetActiveConsoleSessionId
Sleep
MultiByteToWideChar
GetCurrentDirectoryW
DeleteFileA
CreateFileW
SetFilePointer
WriteFile
CloseHandle
OutputDebugStringW
GetModuleFileNameW
GetLastError
WideCharToMultiByte
FindResourceExW
LoadResource
GetFullPathNameW
LockResource
SizeofResource
FindResourceW
InterlockedDecrement
VirtualQuery
SetStdHandle
SetEnvironmentVariableA
SetEnvironmentVariableW
GetExitCodeProcess
GetTimeZoneInformation
SearchPathW
GetTempFileNameW
GetProcessTimes
GlobalMemoryStatus
LoadLibraryExW
GetFileInformationByHandle
GetFileSize
FindFirstFileExW
GetDriveTypeW
GetFileType
WriteConsoleW
ExitProcess
RtlUnwind
DecodePointer
EncodePointer
InterlockedExchange
InterlockedCompareExchange
GetStringTypeW
InterlockedIncrement
RaiseException
GetShortPathNameW
MoveFileW
GetSystemDirectoryW
GetWindowsDirectoryW
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
SetConsoleMode
GetConsoleMode
SystemTimeToFileTime
GetSystemTime
FileTimeToDosDateTime
DosDateTimeToFileTime
GetStdHandle
SetEndOfFile
SetConsoleCtrlHandler
SetFileApisToOEM
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
OpenEventW
FormatMessageW
FileTimeToLocalFileTime
SetCurrentDirectoryW
VirtualFree
VirtualAlloc
SetEvent
InitializeCriticalSection
ReleaseSemaphore
ResetEvent
CreateSemaphoreW
FindCloseChangeNotification
FindFirstChangeNotificationW
GetLogicalDriveStringsW
ReadFile
CharToOemW
EndPaint
SendMessageW
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadIconW
FillRect
BeginPaint
CharUpperW
CharPrevExA
CharNextA
CharUpperA
EndDialog
GetClientRect
EnableMenuItem
GetSystemMenu
SetWindowPos
wsprintfW
PostThreadMessageW
PostMessageW
FlashWindow
GetWindowThreadProcessId
EnumWindows
CharLowerW
wsprintfA
SendNotifyMessageW
MessageBoxW
CheckDlgButton
IsDlgButtonChecked
LoadStringW
SetWindowTextW
LoadImageW
GetWindowLongW
AdjustWindowRect
SetBkMode
CreateCompatibleDC
SelectObject
CreateSolidBrush
BitBlt
DeleteDC
GetStockObject
SetTextColor
CreateFontIndirectW
TextOutW
DeleteObject
GetObjectW
WTSFreeMemory
WTSQueryUserToken
WTSQuerySessionInformationW
RegQueryInfoKeyW
OpenThreadToken
DuplicateToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
FreeSid
RegOpenKeyW
RegCreateKeyW
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegSetValueExW
RegFlushKey
RegRestoreKeyW
RegSaveKeyW
RegCreateKeyExW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenSCManagerW
OpenServiceW
QueryServiceStatus
CloseServiceHandle
RegOpenKeyExW
RegQueryValueExW
LookupAccountSidW
ConvertSidToStringSidW
GetTokenInformation
SHGetFolderPathW
SHGetSpecialFolderPathW
ShellExecuteExW
ShellExecuteW
CoInitializeEx
StringFromGUID2
CoUninitialize
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
CoInitialize
SysFreeString
SysAllocString
VariantClear
CreateErrorInfo
SysAllocStringByteLen
VariantCopy
GetErrorInfo
VariantChangeType
VariantInit
SetErrorInfo
SHQueryValueExW
PathStripPathW
PathIsRelativeA
PathFileExistsW
PathRemoveFileSpecW
URLDownloadToFileW
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
UuidCreate
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ