Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_0c07945b89f9e162d869a4f244a35f97_magniber_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_0c07945b89f9e162d869a4f244a35f97_magniber_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_0c07945b89f9e162d869a4f244a35f97_magniber_JC.exe
-
Size
4.8MB
-
MD5
0c07945b89f9e162d869a4f244a35f97
-
SHA1
8c95f2d3e546926821ad8b174d53362e7a921bbc
-
SHA256
6cd66501a8689aa10a7b800c7ba5827f869333112e5086ccc95bf6c4485e9657
-
SHA512
06090678e639caabc5828e8098592d9d2416e4ac0a99a0038704c86e3ef1a03f59b1e91f0f28d789c4fc2d405df38e4c4d21a0c9460e7594bbdb3898e5bb4cfc
-
SSDEEP
98304:+fvN/UG0otjauFxTvGPjgoWlfa1jkSHFhyObRxXwEY:Oxh0yaIT+gj0F0OVxZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-26_0c07945b89f9e162d869a4f244a35f97_magniber_JC.exe
Files
-
2023-08-26_0c07945b89f9e162d869a4f244a35f97_magniber_JC.exe.exe windows:6 windows x86
1a8295f4e0e2dcc9199f0b1729ae2a3a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
_TrackMouseEvent
InitCommonControlsEx
gdiplus
GdipAlloc
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipDisposeImage
GdipFree
GdipCreateBitmapFromStream
GdipCreateHBITMAPFromBitmap
shell32
SHGetKnownFolderPath
Shell_NotifyIconW
SHGetFolderPathAndSubDirW
iphlpapi
GetAdaptersAddresses
ws2_32
WSACleanup
getsockname
ntohl
socket
bind
htons
getnameinfo
freeaddrinfo
getaddrinfo
WSAIoctl
WSAGetLastError
gethostname
getsockopt
getpeername
ioctlsocket
connect
__WSAFDIsSet
htonl
WSASetLastError
WSAStartup
shutdown
setsockopt
send
select
recv
ntohs
closesocket
crypt32
CertGetCertificateContextProperty
CertFreeCertificateContext
CertDuplicateCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
kernel32
GetLastError
SetLastError
HeapAlloc
HeapFree
GetProcessHeap
ReleaseSemaphore
ReleaseMutex
WaitForSingleObject
WaitForSingleObjectEx
OpenSemaphoreW
CreateMutexExW
CreateSemaphoreExW
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
FormatMessageW
VerSetConditionMask
GetDiskFreeSpaceExW
CreateFileMappingW
VerifyVersionInfoW
LocaleNameToLCID
GetUserDefaultLocaleName
MulDiv
Sleep
FindClose
FindFirstFileW
FindNextFileW
CreateEventW
CreateProcessW
GetSystemTime
CreateFileW
GetFileSize
MapViewOfFile
UnmapViewOfFile
DeleteFileW
TerminateProcess
OpenProcess
GetModuleFileNameW
SystemTimeToFileTime
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
K32GetModuleFileNameExW
WideCharToMultiByte
GetCurrentProcess
GetCurrentProcessorNumber
GlobalMemoryStatusEx
GetSystemInfo
GetSystemTimeAsFileTime
GetVersionExA
IsWow64Process
LoadLibraryA
K32GetProcessMemoryInfo
DecodePointer
RaiseException
InitializeCriticalSectionEx
DeleteCriticalSection
GetModuleHandleA
OutputDebugStringA
QueryPerformanceCounter
QueryPerformanceFrequency
SetEvent
ResetEvent
CreateEventA
SwitchToThread
MultiByteToWideChar
GetNativeSystemInfo
LoadLibraryExW
FileTimeToSystemTime
VirtualQuery
CreateSemaphoreA
LCMapStringEx
GetTickCount
WaitForMultipleObjectsEx
GetExitCodeProcess
LocalAlloc
LocalFree
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
LoadLibraryW
GlobalAlloc
GlobalFree
OutputDebugStringW
GlobalLock
CreateDirectoryW
GetFileAttributesW
GetFileSizeEx
ReadFile
RemoveDirectoryW
SetFileAttributesW
WriteFile
CopyFileW
CompareStringEx
FreeLibrary
GetEnvironmentVariableW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
GetEnvironmentVariableA
SleepEx
FormatMessageA
VerifyVersionInfoA
GetStdHandle
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SwitchToFiber
DeleteFiber
CreateFiber
GetFileType
ConvertFiberToThread
ConvertThreadToFiber
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
SetWaitableTimer
ResumeThread
CreateWaitableTimerA
GetCurrentDirectoryW
GetFileAttributesExW
GetFileInformationByHandle
GetFileTime
GetFullPathNameW
SetEndOfFile
SetFilePointerEx
SetFileTime
GetTempPathW
DeviceIoControl
MoveFileExW
AreFileApisANSI
EncodePointer
InitOnceComplete
InitOnceBeginInitialize
SleepConditionVariableSRW
SleepConditionVariableCS
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
TryEnterCriticalSection
InitializeSRWLock
GetExitCodeThread
GetCPInfo
GetLocaleInfoEx
GetStringTypeW
IsProcessorFeaturePresent
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
RtlUnwind
InterlockedPushEntrySList
GetCommandLineA
GetCommandLineW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetConsoleOutputCP
SetStdHandle
HeapSize
SetConsoleCtrlHandler
GetDriveTypeW
PeekNamedPipe
DebugBreak
IsDebuggerPresent
SystemTimeToTzSpecificLocalTime
CloseHandle
GlobalUnlock
ExitProcess
GetTimeZoneInformation
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
HeapReAlloc
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
DuplicateHandle
WriteConsoleW
user32
LoadBitmapW
EnumDisplayDevicesA
LoadStringW
TranslateAcceleratorW
GetProcessWindowStation
DispatchMessageW
GetUserObjectInformationW
GetMessageW
DestroyIcon
LoadIconW
SetWindowLongW
GetWindowLongW
FillRect
GetWindowRect
InvalidateRect
EndPaint
DefWindowProcW
CallWindowProcW
MessageBoxW
LoadAcceleratorsW
PostQuitMessage
RegisterClassW
CreateWindowExW
DestroyWindow
TranslateMessage
SendMessageW
ShowWindow
GetDlgItem
GetDlgCtrlID
SetTimer
KillTimer
EnableWindow
GetSystemMetrics
BeginPaint
GetDC
DrawTextW
gdi32
SetDCPenColor
SetBkMode
SetTextColor
CreatePen
SetDCBrushColor
SelectObject
RoundRect
Rectangle
GetStockObject
GetDeviceCaps
DeleteObject
DeleteDC
CreateSolidBrush
CreateFontW
ole32
CoTaskMemFree
CoCreateInstance
CoInitializeEx
CoInitialize
CoUninitialize
CoTaskMemAlloc
StringFromGUID2
CoCreateGuid
advapi32
RegSetValueExW
CryptEnumProvidersW
RegOpenKeyExW
RegDeleteValueW
RegCreateKeyExW
RegCloseKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
GetUserNameW
RegGetValueW
RegOpenKeyExA
RegQueryValueExA
CryptDestroyKey
OpenProcessToken
GetTokenInformation
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegDeleteTreeW
SystemFunction036
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptSignHashW
shlwapi
PathFindExtensionW
PathFindFileNameW
ord12
powrprof
CallNtPowerInformation
winmm
timeGetTime
timeGetDevCaps
timeBeginPeriod
timeSetEvent
bcrypt
BCryptGenRandom
Sections
.text Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 858KB - Virtual size: 858KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 59KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 352KB - Virtual size: 351KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 696KB - Virtual size: 700KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE