Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-20_8414911712054009cb51ec015493e6a7_floxif_hijackloader_mafia.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2024-12-20_8414911712054009cb51ec015493e6a7_floxif_hijackloader_mafia.exe
Resource
win10v2004-20241007-en
Target
2024-12-20_8414911712054009cb51ec015493e6a7_floxif_hijackloader_mafia
Size
562KB
MD5
8414911712054009cb51ec015493e6a7
SHA1
07fa7a1888d2c1b01a62825af34b009ec66798e5
SHA256
60b9718a4960573b3ca2f04c141145fdf86c6dd4ad3e372049c29fff7dd1f690
SHA512
49946fb7c2f5714f4e080ace367b0df674ec1ed87f8123a61e9951a894c22de078e6656ddc0cebbb446e7ad8106a779f1898cb3e97c24b39249f11824ce04fd3
SSDEEP
12288:YnR+T6jdSemajH7wEGP4/uSlvdG4BjvrEH7Z:YnR+T6BSeX77fGivd3rEH7Z
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
F:\devops_yanfa\agent\workspace\p-96bb3f2b49c74bc5aeaa662a22f5b07a\src\ModuleUpgrade\SharpUpgrade\Release\InstallAssistService.pdb
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameW
Sleep
WTSGetActiveConsoleSessionId
OpenProcess
GetCurrentThread
GetCurrentProcess
CloseHandle
QueueUserWorkItem
CreateEventW
GetLastError
SetEvent
WaitForSingleObject
CompareStringW
GetProcessHeap
SetEndOfFile
CreateFileW
CreateFileA
WriteConsoleW
SetStdHandle
LoadLibraryW
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
GetLocaleInfoW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
FlushFileBuffers
GetConsoleMode
GetConsoleCP
WriteFile
SetFilePointer
ReadFile
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
GetFileAttributesA
CreateDirectoryA
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
GetCommandLineW
HeapSetInformation
RaiseException
GetCPInfo
RtlUnwind
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetProcAddress
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
HeapCreate
ExitProcess
SetEnvironmentVariableA
GetTokenInformation
ControlService
QueryServiceStatus
StartServiceW
ChangeServiceConfig2W
OpenServiceW
OpenSCManagerW
DeleteService
CloseServiceHandle
CreateServiceW
ReportEventW
RegisterServiceCtrlHandlerW
SetServiceStatus
DeregisterEventSource
StartServiceCtrlDispatcherW
RegisterEventSourceW
FreeSid
AllocateAndInitializeSid
OpenProcessToken
OpenThreadToken
EqualSid
CreateProcessAsUserW
SetTokenInformation
DuplicateTokenEx
CoUninitialize
CoCreateInstance
CoInitialize
VariantClear
VariantInit
SysFreeString
SysAllocString
WTSEnumerateSessionsW
CreateEnvironmentBlock
DestroyEnvironmentBlock
sendto
bind
socket
closesocket
setsockopt
getsockname
ntohs
WSAStartup
recvfrom
htons
htonl
inet_addr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ