Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
2024-10-20_93809be4e500789f082a2ecd330bde8b_mafia.exe
Resource
win7-20240708-en
Target
2024-10-20_93809be4e500789f082a2ecd330bde8b_mafia
Size
672KB
MD5
93809be4e500789f082a2ecd330bde8b
SHA1
75e0aae3a939f29e862220b088646d10414d7e12
SHA256
1f7f2749b7b5c96734f5d6186c9be94a3a3cbc4472eaa1630e4e26932d0c0ba0
SHA512
d05dd4090b2a10e77ba3a1cf1c41754d10e297764c4289f8e4e89fccbe1b1e1f2215aacef861a1b632a2fb25e915984f5f96714a0e80ee2f35ff9cdd6c5dff42
SSDEEP
12288:FTNjEc3PR8R0ZdAscJ9AMUxGi3oUw/cnuXMx2JOVawyu6GPr96/zSb9R3/R9maTg:hNjE2PRhgx3AHf3odEuXMx2JOVKuJPrs
resource | yara_rule |
---|---|
sample | family_pandastealer |
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\work\ytg\agent\Release\Agent.pdb
OutputDebugStringW
GetCurrentThreadId
RemoveDirectoryW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
HeapFree
HeapAlloc
GetProcessHeap
WaitForSingleObject
SetLastError
CreateProcessW
GetVersionExW
GetTickCount
GetExitCodeProcess
GetCommandLineW
AreFileApisANSI
GetFileAttributesA
DeleteFileA
GetTempPathA
LockFile
LockFileEx
UnlockFile
GetFullPathNameA
GetFullPathNameW
LoadLibraryA
LoadLibraryW
FreeLibrary
GetSystemTime
TlsSetValue
TlsGetValue
TlsAlloc
CreateFileA
RaiseException
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GlobalAlloc
lstrlenW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
lstrcmpW
MulDiv
GetModuleFileNameW
InterlockedIncrement
GlobalUnlock
GlobalLock
GlobalFree
GlobalHandle
CreateMutexW
lstrlenA
SetEnvironmentVariableA
DeleteFileW
SetStdHandle
WriteConsoleW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetConsoleMode
GetConsoleCP
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
HeapCreate
TlsFree
GetLocaleInfoW
GetStdHandle
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
GetStartupInfoW
HeapSetInformation
CreateThread
ExitThread
GetTimeZoneInformation
ExitProcess
GetDateFormatW
GetTimeFormatW
GetLocalTime
MoveFileW
RtlUnwind
DecodePointer
EncodePointer
InitializeCriticalSection
InterlockedExchange
GetStringTypeW
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedCompareExchange
HeapSize
HeapReAlloc
HeapDestroy
Sleep
GetLastError
GetCurrentProcessId
OpenProcess
TerminateProcess
GetCurrentProcess
IsWow64Process
GetPrivateProfileStringW
GetPrivateProfileIntW
GetFileAttributesW
GetTempPathW
CopyFileW
InterlockedDecrement
GetSystemTimeAsFileTime
FindFirstFileW
FlushFileBuffers
FindNextFileW
FindClose
CreateDirectoryW
GetFileSize
SetEndOfFile
SetFilePointer
ReadFile
WideCharToMultiByte
GetModuleHandleW
GetProcAddress
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
FormatMessageW
LocalFree
CreateFileW
WriteFile
CloseHandle
MultiByteToWideChar
CompareStringW
UnregisterClassA
PostMessageW
GetWindow
DefWindowProcW
GetSysColor
CharNextW
GetClassNameW
GetTopWindow
GetClientRect
ClientToScreen
ScreenToClient
GetDC
ReleaseDC
InvalidateRect
InvalidateRgn
RedrawWindow
SetCapture
MoveWindow
GetWindowThreadProcessId
IsChild
EnumChildWindows
FindWindowExW
SetWindowLongW
SetWindowPos
GetWindowLongW
MessageBoxW
SetWindowContextHelpId
MapDialogRect
SendDlgItemMessageW
KillTimer
SetTimer
EndDialog
GetActiveWindow
DialogBoxIndirectParamW
RegisterWindowMessageW
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
CreateAcceleratorTableW
CreateWindowExW
RegisterClassExW
LoadCursorW
GetClassInfoExW
IsWindow
SendMessageW
GetFocus
SetFocus
DestroyAcceleratorTable
GetDesktopWindow
BeginPaint
EndPaint
CallWindowProcW
DestroyWindow
FillRect
ReleaseCapture
GetDlgItem
GetParent
CreateSolidBrush
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
GetStockObject
GetObjectW
DeleteDC
RegQueryValueExW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
OpenSCManagerW
OpenServiceW
CloseServiceHandle
QueryServiceStatus
RegQueryInfoKeyW
OpenProcessToken
GetTokenInformation
LookupAccountSidW
RegDeleteKeyW
RegCreateKeyExA
RegSetValueExA
RegCloseKey
SHFileOperationW
SHGetFolderPathW
CommandLineToArgvW
ShellExecuteExW
OleRun
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoTaskMemAlloc
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
CoCreateGuid
StringFromGUID2
CoInitializeEx
CoUninitialize
CoCreateInstance
GetErrorInfo
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
SysAllocStringLen
SysStringLen
VariantClear
VariantChangeType
VariantInit
SysFreeString
SysAllocString
SysAllocStringByteLen
SysStringByteLen
SHDeleteKeyW
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
InternetConnectW
HttpSendRequestW
InternetCloseHandle
InternetSetOptionW
InternetQueryDataAvailable
InternetReadFile
HttpQueryInfoW
InternetOpenW
HttpOpenRequestW
GetUserNameExW
CryptBinaryToStringW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ