Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_65b4222689d3b5aa00e7266cd0a81b03_magniber_JC.exe
Resource
win7-20230831-en
General
-
Target
2023-08-26_65b4222689d3b5aa00e7266cd0a81b03_magniber_JC.exe
-
Size
556KB
-
MD5
65b4222689d3b5aa00e7266cd0a81b03
-
SHA1
cdfd8da984798f8c5a4e7c4e9127b667dc93473b
-
SHA256
b373e5056a429dc3054251657d24a3f5545b941bafb40011dfff95250c6b2353
-
SHA512
506a69c5e5616cb423eb3de4b7e6f4069341a45a77a416b30ae92b97a7dbdab48ce153cc9731960484576be814565a6d2f7a11c9a4ebc582634edc4084938e72
-
SSDEEP
12288:DCdRO7PgSzT0wMBK2QZi9CtMahD7s8qv02Lp20iNjVo:DUO7PgSzT0wM1QZigmah002N2zjVo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-26_65b4222689d3b5aa00e7266cd0a81b03_magniber_JC.exe
Files
-
2023-08-26_65b4222689d3b5aa00e7266cd0a81b03_magniber_JC.exe.exe windows:6 windows x86
6f564761df064162c86e525ae267fcb7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
K32EnumProcessModules
CloseHandle
MultiByteToWideChar
GetTickCount
CreateSemaphoreW
lstrcmpiW
lstrlenW
lstrcmpW
WriteProcessMemory
WaitForSingleObject
CreateEventW
GetModuleHandleW
GetProcAddress
lstrcmpA
GetSystemDirectoryW
CreateProcessW
CreateProcessA
ExpandEnvironmentStringsA
ReadConsoleW
ReadFile
SetEndOfFile
WriteConsoleW
SetStdHandle
CreateFileW
SetFilePointerEx
GetStringTypeW
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetModuleFileNameA
GetFileType
GetFullPathNameW
ExpandEnvironmentStringsW
K32GetModuleBaseNameW
VerSetConditionMask
ReadProcessMemory
VirtualFreeEx
VirtualAllocEx
OpenProcess
Sleep
WinExec
GetProcessHeap
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
LoadLibraryExW
SetConsoleCtrlHandler
WriteFile
GetStdHandle
RaiseException
GetLastError
FreeLibrary
LoadLibraryExA
GetFileAttributesW
GetVersionExW
LocalFree
FindClose
FindFirstFileW
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
GetCurrentProcessId
GetCurrentThreadId
GetWindowsDirectoryW
LoadResource
LockResource
SizeofResource
MulDiv
LoadLibraryW
FindResourceW
GetUserDefaultUILanguage
GetTempPathW
OutputDebugStringW
CreateMutexW
GetModuleFileNameW
FormatMessageW
lstrcpyW
GetCurrentProcess
IsWow64Process
LocalAlloc
ReleaseMutex
GetCurrentThread
EncodePointer
DecodePointer
RtlUnwind
ExitProcess
GetModuleHandleExW
AreFileApisANSI
WideCharToMultiByte
GetCommandLineA
GetLocalTime
EnterCriticalSection
LeaveCriticalSection
IsProcessorFeaturePresent
HeapAlloc
HeapFree
HeapSize
IsDebuggerPresent
SetLastError
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
VerifyVersionInfoW
user32
GetAncestor
MoveWindow
SetWindowPos
GetClientRect
RedrawWindow
InflateRect
FillRect
EnumWindows
GetWindowPlacement
GetMonitorInfoW
CopyIcon
GetClassLongW
IntersectRect
GetWindow
IsIconic
MonitorFromPoint
EnumDisplayDevicesW
EnumDisplaySettingsW
DeregisterShellHookWindow
RegisterShellHookWindow
EqualRect
UnregisterClassW
PostQuitMessage
PostMessageW
DispatchMessageW
TranslateMessage
GetMessageW
RegisterWindowMessageW
GetSysColor
IsHungAppWindow
IsRectEmpty
GetClassNameW
LoadStringW
DialogBoxParamW
EndDialog
GetDlgItem
SetDlgItemTextW
GetDlgCtrlID
SetFocus
GetSystemMetrics
LoadMenuIndirectW
DrawTextW
BeginPaint
EndPaint
SetWindowTextW
SetTimer
SystemParametersInfoW
MonitorFromWindow
LoadBitmapW
wsprintfW
InvalidateRect
UpdateWindow
IsWindowVisible
ScreenToClient
SetMenuItemInfoW
GetMenuItemInfoW
InsertMenuItemW
GetWindowThreadProcessId
FindWindowExW
GetParent
ReleaseDC
GetDC
CreatePopupMenu
LoadImageW
DestroyIcon
LoadIconW
LoadCursorW
PtInRect
GetSysColorBrush
ClientToScreen
GetWindowTextW
SetForegroundWindow
GetForegroundWindow
KillTimer
GetClassInfoExW
RegisterClassExW
RegisterClassW
DefWindowProcW
CascadeWindows
TileWindows
FindWindowW
SetWindowLongW
GetWindowLongW
GetCursorPos
TrackPopupMenu
GetSubMenu
CheckMenuItem
DestroyMenu
LoadMenuW
ShowWindow
DestroyWindow
CreateWindowExW
SendMessageW
GetWindowRect
gdi32
CreateSolidBrush
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateFontIndirectW
DeleteDC
GetStockObject
SelectObject
SetBkMode
StretchBlt
GetObjectW
DeleteObject
advapi32
ReportEventW
RegNotifyChangeKeyValue
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
RegCreateKeyExW
DeregisterEventSource
RegisterEventSourceW
AllocateAndInitializeSid
FreeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenCurrentUser
SetEntriesInAclW
OpenProcessToken
OpenThreadToken
AccessCheck
AddAccessAllowedAce
CheckTokenMembership
CreateWellKnownSid
GetLengthSid
GetTokenInformation
ImpersonateSelf
RegQueryValueExA
RegOpenKeyExA
RegSetKeySecurity
RegEnumKeyExW
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
RevertToSelf
IsValidSecurityDescriptor
InitializeAcl
shell32
ShellExecuteW
SHAppBarMessage
ole32
CoInitialize
CoCreateInstance
CoUninitialize
shlwapi
SHDeleteKeyW
Sections
.text Size: 298KB - Virtual size: 298KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 79KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE