Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
2024-10-28_7b888b68c62a28789fcf2db37e45543c_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-28_7b888b68c62a28789fcf2db37e45543c_mafia.exe
Resource
win10v2004-20241007-en
Target
2024-10-28_7b888b68c62a28789fcf2db37e45543c_mafia
Size
4.6MB
MD5
7b888b68c62a28789fcf2db37e45543c
SHA1
2af49d607cd1bd6f475b76daa3fa1eea17ff8167
SHA256
3bca6bace9e41d163055a42e2006b83b911e501bebf0ba0c45768796040bf269
SHA512
70865bde5c10657362b92abfb64ee9414564385d6cd2c0b48862a46dc4822afecd7612b9c905d051b676a61206ba823bd478451c33a0cba0d6e43b5c4112bb70
SSDEEP
49152:3Rh538ZWomYWfblvl4GOo0sHFsFsCXJvFASC5sSCPIKnzeVpXUKiIKL5+L5jcmTl:h4mYeblvnOdo2bBSCPI1yKij+L2ONJ
resource | yara_rule |
---|---|
sample | family_pandastealer |
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
I:\build3.0.3\Funshion\Rel\bin\Release\Funshion.pdb
MiniDumpWriteDump
PathFileExistsW
PathRemoveFileSpecW
SHDeleteValueW
SHGetValueW
SHDeleteKeyW
SHSetValueW
StrStrIW
PathFindFileNameW
PathRemoveExtensionW
PathAddExtensionW
StrCpyW
PathFindExtensionW
StrCmpIW
PathAppendW
PathIsRootW
StrFormatByteSizeW
gethostbyname
inet_ntoa
gethostname
ntohs
send
closesocket
ntohl
socket
recv
htons
select
connect
__WSAFDIsSet
getservbyname
WSAGetLastError
freeaddrinfo
getaddrinfo
getnameinfo
WSAStartup
WSACleanup
accept
bind
listen
shutdown
sendto
recvfrom
getsockname
getpeername
setsockopt
getsockopt
ioctlsocket
inet_addr
FindCloseUrlCache
FindFirstUrlCacheEntryW
InternetGetCookieExW
InternetOpenA
InternetGetConnectedState
HttpQueryInfoW
InternetSetOptionA
InternetReadFile
InternetOpenUrlW
HttpQueryInfoA
FindNextUrlCacheEntryW
DeleteUrlCacheEntryW
InternetSetCookieW
InternetCloseHandle
GetIfEntry
GetBestInterface
GetAdaptersInfo
GetModuleFileNameExW
waveOutSetVolume
timeGetTime
mixerGetLineControlsW
mixerOpen
mixerGetLineInfoW
mixerClose
waveOutGetVolume
mixerGetControlDetailsW
UuidCreate
UuidToStringW
ord3
ExitProcess
FindResourceExW
FindResourceW
FreeLibrary
LoadResource
LoadLibraryExW
InterlockedIncrement
InterlockedDecrement
GetCurrentProcess
CreateDirectoryW
GlobalLock
GetModuleHandleW
GlobalAlloc
InitializeCriticalSectionAndSpinCount
SizeofResource
LeaveCriticalSection
MulDiv
GetModuleFileNameW
lstrcmpW
MultiByteToWideChar
lstrlenW
GlobalUnlock
FlushInstructionCache
RaiseException
GetLastError
SetLastError
GetProcAddress
EnterCriticalSection
LockResource
CreateEventW
lstrcmpiW
DeleteCriticalSection
GetCurrentThreadId
CloseHandle
SetFileAttributesW
GetFileSize
InterlockedCompareExchange
ReadFile
CreateFileW
GlobalFree
lstrlenA
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileIntW
GetCurrentDirectoryW
LoadLibraryW
OutputDebugStringA
FindFirstFileW
GetDriveTypeA
GetSystemDirectoryW
GetVersionExW
GetLogicalDriveStringsA
FindClose
Process32FirstW
GlobalMemoryStatusEx
RemoveDirectoryW
GetDiskFreeSpaceA
GetSystemInfo
Process32NextW
GetModuleHandleA
FindNextFileW
CreateToolhelp32Snapshot
GetDiskFreeSpaceExW
DeleteFileW
OutputDebugStringW
WideCharToMultiByte
CreateProcessW
SetUnhandledExceptionFilter
GetCurrentProcessId
CreateThread
WriteFile
GetFileAttributesW
TryEnterCriticalSection
InitializeCriticalSection
SetInformationJobObject
CreateJobObjectW
GetTickCount
AssignProcessToJobObject
OpenJobObjectW
ConnectNamedPipe
GetOverlappedResult
GetLocalTime
WaitForSingleObject
SetEvent
TerminateThread
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrcpyW
InterlockedExchange
SetThreadExecutionState
CopyFileW
CreateFileA
HeapAlloc
HeapFree
GetProcessHeap
DeviceIoControl
OpenProcess
TerminateProcess
ResetEvent
WaitForMultipleObjects
IsBadReadPtr
GetDriveTypeW
GetLogicalDrives
GlobalHandle
MoveFileW
lstrcpynW
CreateEventA
VirtualProtect
GetSystemTimeAsFileTime
LoadLibraryA
ExpandEnvironmentStringsW
FlushFileBuffers
SetHandleInformation
GetStartupInfoW
GetStdHandle
CreatePipe
GlobalReAlloc
GetFileAttributesA
GetFileAttributesExW
DeleteFileA
GetFullPathNameW
GetFullPathNameA
SetFilePointer
SetEndOfFile
QueryPerformanceCounter
UnlockFile
LockFile
FormatMessageA
GetTempPathW
LockFileEx
GetTempPathA
GetSystemTime
AreFileApisANSI
CompareStringW
HeapCreate
GetTimeZoneInformation
IsValidLocale
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
LCMapStringW
GetCPInfo
CreateNamedPipeW
SetStdHandle
WriteConsoleW
SetEnvironmentVariableA
OpenEventA
ResumeThread
SystemTimeToFileTime
SetWaitableTimer
CreateWaitableTimerA
InterlockedPushEntrySList
LocalFileTimeToFileTime
IsDebuggerPresent
UnhandledExceptionFilter
ExitThread
GetDateFormatW
GetTimeFormatW
GetDateFormatA
GetTimeFormatA
RtlUnwind
HeapSetInformation
GetCommandLineW
GetComputerNameW
GetVersionExA
SetEnvironmentVariableW
GetEnvironmentVariableW
GetLogicalDriveStringsW
GetLongPathNameW
SetFileTime
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateFileMappingW
ReleaseMutex
CreateMutexW
LocalFree
GetLocaleInfoW
DecodePointer
EncodePointer
GetStringTypeW
HeapSize
HeapReAlloc
HeapDestroy
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
Sleep
EnableWindow
PostThreadMessageW
GetWindowRect
ShowCursor
GetSystemMetrics
wsprintfW
SetTimer
KillTimer
SetRect
IsWindowVisible
DrawTextW
ShowWindow
EndPaint
ClientToScreen
DestroyWindow
GetWindowTextLengthW
DestroyAcceleratorTable
ScreenToClient
GetMessageW
CharNextW
RegisterWindowMessageW
FillRect
IsChild
GetFocus
GetParent
InvalidateRgn
LoadCursorW
FindWindowW
GetClientRect
CreateAcceleratorTableW
SetFocus
BeginPaint
GetClassInfoExW
GetDC
MapDialogRect
EnableMenuItem
SetWindowContextHelpId
SendDlgItemMessageW
CreateDialogIndirectParamW
DialogBoxParamW
EndDialog
GetMenuItemID
GetMenuItemCount
CloseClipboard
EmptyClipboard
GetSysColorBrush
OpenClipboard
SetClipboardData
IntersectRect
DisableProcessWindowsGhosting
EqualRect
AppendMenuW
SetRectEmpty
RegisterClassW
TranslateMessage
RegisterClassExW
InvalidateRect
GetWindowLongW
GetCursorPos
PeekMessageW
GetClassNameW
ReleaseDC
GetDlgItem
SetWindowLongW
RedrawWindow
GetDesktopWindow
GetSysColor
SetWindowPos
IsWindow
CreateWindowExW
MessageBoxW
ReleaseCapture
SendMessageW
IsRectEmpty
SetCursor
GetCapture
BringWindowToTop
GetKeyState
UnregisterHotKey
RegisterHotKey
UpdateLayeredWindow
GetWindowDC
UpdateWindow
EnumDisplayMonitors
GetMonitorInfoW
CopyRect
MonitorFromRect
OffsetRect
SetWindowTextW
CallWindowProcW
DefWindowProcW
GetWindow
MapWindowPoints
LoadImageW
RegisterDeviceNotificationW
MoveWindow
DispatchMessageW
GetWindowThreadProcessId
SetWindowRgn
PtInRect
InflateRect
SystemParametersInfoW
UnregisterClassA
DestroyIcon
GetDlgCtrlID
GetActiveWindow
MonitorFromWindow
ExitWindowsEx
TrackPopupMenu
GetSubMenu
ModifyMenuW
CheckMenuRadioItem
LoadMenuW
IsWindowEnabled
SetForegroundWindow
IsZoomed
PostMessageW
IsIconic
SetActiveWindow
PostQuitMessage
CreateDialogParamW
SetLayeredWindowAttributes
SendMessageA
CheckMenuItem
DestroyMenu
RemoveMenu
wsprintfA
wvsprintfA
CreateDesktopW
GetTopWindow
WindowFromPoint
GetWindowTextW
GetForegroundWindow
SetCapture
SelectClipRgn
CreateRectRgn
GetClipBox
ExtSelectClipRgn
GetTextColor
CreateFontW
CombineRgn
SetPixel
Rectangle
DPtoLP
RoundRect
SaveDC
RestoreDC
MoveToEx
LineTo
CreatePen
CreateFontIndirectW
ExtTextOutW
CreateRoundRectRgn
GetTextExtentPoint32W
SetTextColor
CreateDIBSection
SetBkColor
SetBkMode
BitBlt
DeleteDC
GetDeviceCaps
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectW
CreateSolidBrush
GetStockObject
CreateRectRgnIndirect
RegQueryValueExW
RegCreateKeyExW
RegQueryInfoKeyW
InitializeSecurityDescriptor
RegDeleteKeyW
SetSecurityDescriptorDacl
RegDeleteValueW
IsTextUnicode
RegOpenKeyExA
RegOpenKeyW
RegQueryValueExA
RegEnumKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegOpenKeyExW
RegSetValueExW
RegCloseKey
RegEnumKeyExW
SHGetSpecialFolderPathW
SHGetMalloc
SHBrowseForFolderW
ord2
ord4
SHGetPathFromIDListW
SHGetDesktopFolder
DragQueryFileW
Shell_NotifyIconW
SHChangeNotify
ShellExecuteExW
ord165
SHCreateDirectoryExW
ShellExecuteW
SHFileOperationW
CoTaskMemFree
CoGetClassObject
CoSetProxyBlanket
CoUninitialize
OleUninitialize
CreateStreamOnHGlobal
StgCreateDocfile
OleCreate
OleInitialize
CoInitialize
StringFromGUID2
CLSIDFromString
OleSetContainedObject
OleDraw
CLSIDFromProgID
CoTaskMemRealloc
OleLockRunning
CoCreateGuid
CoCreateInstance
CoTaskMemAlloc
GetErrorInfo
VariantClear
LoadTypeLi
VariantInit
SysAllocStringLen
SysStringLen
SysAllocString
DispCallFunc
SysStringByteLen
SysAllocStringByteLen
OleLoadPicture
LoadRegTypeLi
SysFreeString
VarUI4FromStr
OleCreateFontIndirect
_TrackMouseEvent
ImageList_Create
InitCommonControlsEx
AlphaBlend
GradientFill
TransparentBlt
UrlMkGetSessionOption
CoInternetSetFeatureEnabled
GdipDrawLineI
GdipCreateFromHDC
GdipDeleteGraphics
GdipDeletePen
GdipCreatePen1
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpReceiveResponse
WinHttpConnect
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpCrackUrl
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpSetStatusCallback
WinHttpQueryHeaders
WinHttpOpen
ImageGetCertificateData
ImageGetCertificateHeader
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
GetSaveFileNameW
GetOpenFileNameW
WinVerifyTrust
CryptVerifyMessageSignature
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ