Static task
static1
Behavioral task
behavioral1
Sample
aaa806e058276c833a5b9ea9926ac698_magniber_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
aaa806e058276c833a5b9ea9926ac698_magniber_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
aaa806e058276c833a5b9ea9926ac698_magniber_JC.exe
-
Size
1.6MB
-
MD5
aaa806e058276c833a5b9ea9926ac698
-
SHA1
10ca078617b2755622f16f29d6b835e9c2d81cff
-
SHA256
9b9a4f2a2abfa2b10ea35d8844e8ee65e283cc7e30bdbbf549e905dda1fe1c0a
-
SHA512
9382aa437b7aec654ec186294507aee5a0f16add315883e1616077b6d07e785bef77228e773d0a46e7488111e692d8d326b36dcfa3a16da6c97f9e503fc0665e
-
SSDEEP
49152:+fGmXqnSZjX+4YDXmOPR7PLNiXicJFFRGNzj3:+n6SZj9A2w7wRGpj3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aaa806e058276c833a5b9ea9926ac698_magniber_JC.exe
Files
-
aaa806e058276c833a5b9ea9926ac698_magniber_JC.exe.exe windows x86
172292261b08007883d073eeafce4d20
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
crclient
?CrashReporterInitialize@@YA_NPAXPBD1111P6AIAAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@ZP6AXXZ_NW4AdobeCrashReporterScalingFactor@@@Z
ws2_32
listen
getsockname
bind
WSASetLastError
WSAStartup
getservbyname
getservbyport
gethostbyname
gethostbyaddr
socket
send
select
recv
ntohs
inet_ntoa
inet_addr
htons
htonl
getsockopt
ioctlsocket
connect
closesocket
__WSAFDIsSet
WSAGetLastError
kernel32
DeleteCriticalSection
ReleaseSemaphore
InterlockedDecrement
WaitForSingleObject
CreateSemaphoreW
FindFirstFileW
FindNextFileW
InitializeCriticalSectionAndSpinCount
FindClose
RaiseException
DecodePointer
GetModuleFileNameW
ReleaseMutex
CreateMutexA
Sleep
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetVersionExA
GetModuleHandleA
GetModuleFileNameA
GetSystemDirectoryA
InitializeCriticalSection
EnterCriticalSection
GetLastError
CreateMutexW
GetCommandLineW
FreeLibrary
CreateProcessW
GetProcAddress
CloseHandle
LoadLibraryA
MultiByteToWideChar
GetStdHandle
LeaveCriticalSection
HeapSize
WriteConsoleW
GetProcessHeap
SetEnvironmentVariableA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
SwitchToThread
GetCurrentProcess
TerminateProcess
OpenProcess
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
FreeEnvironmentStringsW
GetEnvironmentVariableW
GetCurrentProcessId
GetLocalTime
GetEnvironmentStringsW
SetStdHandle
SetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateFileW
FlushFileBuffers
GetFileAttributesExW
GetFileSizeEx
GetFullPathNameW
ReadFile
SetEndOfFile
SetFilePointerEx
WriteFile
GetTempPathW
DuplicateHandle
ConnectNamedPipe
PeekNamedPipe
CreateNamedPipeW
GetOverlappedResult
SetEvent
ResetEvent
CreateEventW
SetThreadPriority
GetThreadPriority
VirtualAlloc
VirtualFree
GetModuleHandleExW
LoadLibraryExW
WaitForMultipleObjects
GetNamedPipeInfo
GetCurrentThread
GetTickCount
SetFilePointer
FormatMessageW
LocalReAlloc
LCMapStringW
RtlCaptureStackBackTrace
GetSystemTimeAsFileTime
WaitForSingleObjectEx
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
QueryPerformanceCounter
IsDebuggerPresent
GetStartupInfoW
WideCharToMultiByte
EncodePointer
SetLastError
CompareStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
OutputDebugStringW
RtlUnwind
InterlockedPushEntrySList
CreateThread
ExitThread
FreeLibraryAndExitThread
GetTimeZoneInformation
ExitProcess
GetDriveTypeW
GetFileType
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCommandLineA
GetACP
GetConsoleMode
ReadConsoleW
GetConsoleCP
GetFullPathNameA
HeapAlloc
HeapReAlloc
HeapFree
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
user32
TranslateMessage
DispatchMessageW
PeekMessageW
PostMessageW
PostQuitMessage
DestroyWindow
MsgWaitForMultipleObjectsEx
GetWindowLongW
KillTimer
SetTimer
GetWindowThreadProcessId
EnumWindows
GetShellWindow
RegisterClassW
DefWindowProcW
CreateWindowExW
SetWindowLongW
ole32
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
CoUninitialize
oleaut32
VariantClear
SysFreeString
SysAllocString
advapi32
OpenProcessToken
CreateProcessWithTokenW
GetUserNameW
AdjustTokenPrivileges
AllocateAndInitializeSid
DuplicateTokenEx
EqualSid
FreeSid
GetLengthSid
GetSidSubAuthority
GetTokenInformation
SetTokenInformation
LookupPrivilegeValueW
ConvertStringSidToSidW
shell32
ShellExecuteExW
CommandLineToArgvW
SHCreateDirectoryExW
Sections
.text Size: 752KB - Virtual size: 752KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 198KB - Virtual size: 198KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 596B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 612KB - Virtual size: 616KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE