Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-11_ece86fa34feb955f71eac9f38b2dee36_floxif_mafia.exe
Resource
win7-20240903-en
Target
2024-12-11_ece86fa34feb955f71eac9f38b2dee36_floxif_mafia
Size
1.4MB
MD5
ece86fa34feb955f71eac9f38b2dee36
SHA1
e56dd0b6a3cf9320dec071b0249633310d4c1cf8
SHA256
06846342b95f31443367bd23680c2b76dde964a1d8abdbacf58a43b31f906e8e
SHA512
c6a21242e4872bfabac1314af94e27088c7f1dbec990d3b938c6d12606c4bc7ab4a091d99a315d96a8162e8904f27f58cf024c0e977718d72e930e8b739534e2
SSDEEP
24576:VKAd/monVAqRVzkBht46sARJGJ8Tr5wWTsrwrPsrf8NRbAraf2ezPrEH7I:UsnVAqR846sSc6T1wWTskbswNRkUDzV
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\ci\workspace\nbrowser_bdupdate_m12_branch\bdupdate\output\SparkUpdate.pdb
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
WSAGetLastError
getaddrinfo
getnameinfo
WSAStartup
gethostname
freeaddrinfo
CreateEnvironmentBlock
DestroyEnvironmentBlock
ImmDisableIME
WTSEnumerateSessionsW
WTSFreeMemory
WTSQueryUserToken
EnumProcesses
EnumProcessModules
GetModuleInformation
GetModuleFileNameExW
TerminateProcess
FlushInstructionCache
GetCurrentProcess
SetLastError
Sleep
TerminateThread
ResetEvent
SetEvent
SetThreadPriority
WaitForMultipleObjects
CreateEventW
GetPrivateProfileStringW
WritePrivateProfileStringW
GetVersionExW
MoveFileExW
FindClose
FindNextFileW
FindFirstFileW
GetTempPathW
ReleaseMutex
lstrcpyW
InitializeCriticalSection
GetFullPathNameW
SetCurrentDirectoryW
CreateMutexW
OutputDebugStringW
GetSystemTime
GetCommandLineW
FreeConsole
GetConsoleScreenBufferInfo
GetStdHandle
AllocConsole
WriteConsoleW
SetConsoleTextAttribute
GetCurrentProcessId
GetPrivateProfileIntW
SetProcessAffinityMask
lstrcmpiW
LoadLibraryExW
OpenFileMappingW
VirtualQuery
CreateProcessW
ExitProcess
OpenEventW
HeapAlloc
GetProcessHeap
HeapFree
OpenMutexW
GetExitCodeProcess
WTSGetActiveConsoleSessionId
DeviceIoControl
GetSystemInfo
WaitForSingleObject
GetVolumeInformationA
ExpandEnvironmentStringsW
LeaveCriticalSection
GetFileAttributesExW
GlobalFree
GlobalAlloc
GetShortPathNameW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
lstrlenA
VirtualProtect
HeapCreate
AddVectoredExceptionHandler
SetUnhandledExceptionFilter
RemoveVectoredExceptionHandler
ProcessIdToSessionId
InterlockedExchange
InterlockedCompareExchange
GetFileSizeEx
ReadProcessMemory
VirtualQueryEx
QueueUserWorkItem
InterlockedExchangeAdd
GetSystemTimeAsFileTime
InterlockedDecrement
QueryPerformanceCounter
SetFilePointerEx
SetFileValidData
GetModuleFileNameA
GetModuleHandleA
CreateFileA
GetPrivateProfileSectionW
GetPrivateProfileSectionNamesW
GetTempFileNameW
GetDiskFreeSpaceExW
GetVolumeInformationW
GetDriveTypeW
GetLogicalDrives
InterlockedPopEntrySList
EncodePointer
OpenProcess
GetModuleHandleW
CopyFileW
GetModuleFileNameW
EnterCriticalSection
lstrlenW
DecodePointer
RtlUnwind
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LocalFree
FormatMessageW
DeleteFileW
FreeLibrary
SetEndOfFile
GetLastError
TlsFree
DosDateTimeToFileTime
SetFileAttributesW
TlsSetValue
TlsGetValue
GetConsoleCP
GetConsoleMode
ExitThread
CreateThread
GetTimeFormatW
GetDateFormatW
ResumeThread
GetCommandLineA
HeapSetInformation
GetStartupInfoW
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetFileType
GetCurrentThreadId
TlsAlloc
GetTickCount
UnmapViewOfFile
GetLocalTime
CreateFileMappingW
MapViewOfFile
GetFileSize
WriteFile
SetFileTime
GetFileAttributesW
CreateDirectoryW
GetCurrentDirectoryW
WideCharToMultiByte
LocalFileTimeToFileTime
SystemTimeToFileTime
ReadFile
CloseHandle
CreateFileW
SetFilePointer
MultiByteToWideChar
LoadLibraryW
GetProcAddress
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
RaiseException
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedPushEntrySList
HeapSize
FlushFileBuffers
GetACP
GetOEMCP
QueryPerformanceFrequency
InterlockedIncrement
IsValidCodePage
SetStdHandle
GetLocaleInfoW
GetTimeZoneInformation
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
CompareStringW
SetEnvironmentVariableA
HeapReAlloc
RemoveDirectoryW
HeapDestroy
GetCursorPos
TrackPopupMenu
DestroyMenu
SetFocus
GetSystemMetrics
RegisterWindowMessageW
CreatePopupMenu
GetAsyncKeyState
LoadIconW
MessageBoxW
CallWindowProcW
GetWindowLongW
LoadCursorW
GetClassInfoExW
SetWindowLongW
AllowSetForegroundWindow
DialogBoxParamW
PostThreadMessageW
GetMessageW
TranslateMessage
RegisterClassExW
CreateWindowExW
ShowWindow
SetTimer
DestroyWindow
SetWindowTextW
LoadImageW
DefWindowProcW
KillTimer
GetForegroundWindow
GetWindowThreadProcessId
InsertMenuW
AttachThreadInput
BringWindowToTop
SetForegroundWindow
SetActiveWindow
IsIconic
SendMessageW
IsWindow
DestroyIcon
PostMessageW
GetDesktopWindow
wsprintfW
CharNextW
UnregisterClassA
DispatchMessageW
GetStockObject
GetExplicitEntriesFromAclW
LookupAccountSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegEnumKeyExW
RegSetValueExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
GetUserNameW
GetTokenInformation
RegQueryValueExA
RegOpenKeyExW
RegQueryValueExW
OpenProcessToken
RegCloseKey
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExA
RegEnumKeyExA
SetTokenInformation
SetSecurityInfo
SetEntriesInAclW
GetSecurityInfo
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
StartServiceW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
CreateProcessAsUserW
DuplicateTokenEx
RegEnumValueW
QueryServiceStatusEx
CryptReleaseContext
CryptDecrypt
CryptDeriveKey
CryptHashData
CryptCreateHash
CryptAcquireContextW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
SetServiceStatus
SetServiceObjectSecurity
BuildExplicitAccessWithNameW
GetSecurityDescriptorDacl
QueryServiceObjectSecurity
RegOpenKeyW
DeleteService
ControlService
ChangeServiceConfig2W
CreateServiceW
RegCreateKeyW
RegisterServiceCtrlHandlerExW
StartServiceCtrlDispatcherW
RevertToSelf
RegQueryInfoKeyW
ShellExecuteExW
SHGetFolderPathW
ShellExecuteW
SHCreateDirectoryExW
ord165
SHFileOperationW
CommandLineToArgvW
SHGetSpecialFolderPathW
Shell_NotifyIconW
CoInitialize
CoUninitialize
CoInitializeEx
CoCreateInstance
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
CoCreateGuid
CLSIDFromProgID
CoTaskMemRealloc
SysAllocStringLen
SysStringLen
LoadRegTypeLi
LoadTypeLi
SysAllocString
VariantClear
VarUI4FromStr
VarBstrCmp
VariantInit
SysFreeString
PathAppendW
PathFileExistsW
PathRemoveFileSpecW
SHSetValueW
SHGetValueW
PathIsDirectoryW
PathFindExtensionW
PathGetDriveNumberW
PathStripPathW
PathRemoveExtensionW
PathCombineW
PathFindFileNameW
GetIpForwardTable
GetAdaptersAddresses
GetAdaptersInfo
RpcStringFreeW
UuidToStringW
InternetErrorDlg
HttpEndRequestW
HttpQueryInfoW
InternetGetLastResponseInfoW
InternetReadFileExA
HttpAddRequestHeadersW
HttpOpenRequestW
InternetConnectW
InternetSetStatusCallbackW
InternetOpenW
InternetSetOptionW
InternetQueryOptionW
InternetOpenA
InternetSetOptionA
InternetCloseHandle
HttpEndRequestA
HttpSendRequestExA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
InternetWriteFile
?ClearService@Com@Util@@YGJXZ
?CreateObjectByIID@Com@Util@@YGJABU_GUID@@PAPAX@Z
?GetService@Com@Util@@YGJABU_GUID@@PAPAX@Z
?RegObject@Com@Util@@YGJABU_GUID@@0PA_W1@Z
?RegService@Com@Util@@YGJABU_GUID@@0PA_W1@Z
?ResetPath@Com@Util@@YGJPA_W@Z
?XNetDownloadFile@@YAPAXPAXPAVIXNetDownloadStatusCallback@@PB_W2W4XnetMethodType@@22@Z
?XNetHttpRequest@@YAPAXPAXP6AX0H0KPB_W@Z1W4XnetMethodType@@11K@Z
?XNetInit@@YAHXZ
?XNetStop@@YAHPAX@Z
?XNetUninit@@YAHXZ
GetLogController
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ