Static task
static1
Behavioral task
behavioral1
Sample
d37ad61fd754bb430cb7bd00d9cce617_mafia_magniber_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d37ad61fd754bb430cb7bd00d9cce617_mafia_magniber_JC.exe
Resource
win10v2004-20230824-en
General
-
Target
d37ad61fd754bb430cb7bd00d9cce617_mafia_magniber_JC.exe
-
Size
2.5MB
-
MD5
d37ad61fd754bb430cb7bd00d9cce617
-
SHA1
cb5fb5632e25469edc3c899c97cdeaed7267168c
-
SHA256
52c78c8e8b20d60abd97e4b9f757db2620111732efea60909b3c56c916bfb3aa
-
SHA512
e1f593e962f4f390f0587a7892e2b0b06ff5f258b869fd199d8c692434e8a6162cd5f7a236b30464e94a72851d607d6691bac8e2fddbfd897000e7d4a9c392eb
-
SSDEEP
49152:SN5zBW6Ykc4nzUawXlWLTJ+D8eH1pX37WeBMeg9S52FTr+KgsT6MX/svi340W06:1J4UvXLDB1pX3LmS8gJsxX/UiZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d37ad61fd754bb430cb7bd00d9cce617_mafia_magniber_JC.exe
Files
-
d37ad61fd754bb430cb7bd00d9cce617_mafia_magniber_JC.exe.exe windows x86
edc9b55f52f82420d7343892acf9168a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteExW
ExtractIconExW
SHGetFolderPathW
ShellExecuteW
wsock32
WSAStartup
ntohl
htonl
socket
htons
connect
send
recv
select
ioctlsocket
gethostbyname
gdiplus
GdipSetSmoothingMode
GdipDeleteGraphics
GdipCreateFromHDC
GdipDisposeImage
GdipCreateSolidFill
GdipCloneBrush
GdipDeleteBrush
GdipDrawImageRectI
GdipFree
GdiplusShutdown
GdiplusStartup
GdipLoadImageFromStream
GdipCloneImage
GdipGetImageBounds
GdipSetCompositingQuality
GdipAlloc
kernel32
GetConsoleMode
GetConsoleCP
IsValidCodePage
GetOEMCP
lstrlenW
Sleep
GetCurrentProcess
FlushInstructionCache
SetLastError
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
RaiseException
FreeLibrary
GetProcAddress
GetModuleHandleW
lstrcmpiW
GetLastError
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedDecrement
InterlockedIncrement
LoadLibraryW
MulDiv
OpenProcess
VirtualFreeEx
GetTempPathW
GetLongPathNameW
VirtualAllocEx
GetExitCodeThread
CloseHandle
LocalFree
WriteProcessMemory
CreateThread
WaitForSingleObject
CreateRemoteThread
GetVersionExW
CreateFileW
DeviceIoControl
GetVolumeInformationW
QueryPerformanceCounter
GetFileAttributesW
LockResource
FreeEnvironmentStringsW
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalFree
GetDateFormatW
SystemTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
TlsAlloc
TlsGetValue
TlsFree
GetSystemDirectoryW
GlobalReAlloc
GetSystemTime
WideCharToMultiByte
GetACP
TlsSetValue
GetLocaleInfoW
HeapReAlloc
HeapCreate
GetStdHandle
WriteFile
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LCMapStringW
GetCPInfo
RtlUnwind
GetTimeZoneInformation
FindClose
FindNextFileW
FindFirstFileExW
DeleteFileW
GetFullPathNameW
RemoveDirectoryW
GetStartupInfoW
HeapSetInformation
GetCommandLineW
CreateDirectoryW
SetCurrentDirectoryW
GetCurrentDirectoryW
SetEnvironmentVariableW
GetSystemTimeAsFileTime
ExitProcess
InitializeCriticalSection
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
GetEnvironmentStringsW
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
SetHandleCount
GetFileType
GetTickCount
GetCurrentProcessId
GetDriveTypeW
CompareStringW
ReadFile
SetFilePointer
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
SetStdHandle
FlushFileBuffers
SetEndOfFile
SetEnvironmentVariableA
GetWindowsDirectoryW
user32
MapWindowPoints
UnregisterClassA
SendMessageW
GetDC
GetClientRect
MoveWindow
SetWindowTextW
GetWindowRect
ScreenToClient
EndDialog
CreateWindowExW
GetDialogBaseUnits
SetTimer
HideCaret
EndPaint
BeginPaint
GetSystemMetrics
ClientToScreen
KillTimer
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
EnumWindows
PostMessageW
DialogBoxParamW
FindWindowW
PostThreadMessageW
DestroyIcon
GetWindowThreadProcessId
CallWindowProcW
LoadCursorW
GetClassInfoExW
RegisterClassExW
RedrawWindow
ReleaseDC
GetWindowDC
FillRect
GetMessageW
DialogBoxIndirectParamW
MessageBoxW
GetActiveWindow
CharNextW
GetWindowTextW
SetFocus
DestroyWindow
CreateDialogParamW
GetWindow
GetWindowLongW
SystemParametersInfoW
GetParent
GetClassNameW
SetWindowPos
DispatchMessageW
InvalidateRect
ShowWindow
PeekMessageW
UpdateWindow
IsWindow
SetWindowLongW
DefWindowProcW
gdi32
DeleteObject
DeleteDC
GetTextExtentPoint32W
CreateFontW
GetDeviceCaps
CreateSolidBrush
SelectObject
CreateFontIndirectW
SetBkColor
GetStockObject
advapi32
IsTextUnicode
RegOpenKeyExA
RegQueryValueExW
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
ole32
CoCreateInstance
CoTaskMemAlloc
CoUninitialize
CoInitialize
CLSIDFromProgID
CreateStreamOnHGlobal
CoSetProxyBlanket
CoInitializeSecurity
CoTaskMemFree
CoTaskMemRealloc
oleaut32
VarUI4FromStr
SysFreeString
SysStringByteLen
SysAllocStringByteLen
VariantInit
VariantCopy
SysAllocString
VariantChangeType
OleLoadPicture
CreateErrorInfo
VariantClear
Sections
.text Size: 500KB - Virtual size: 499KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ