Static task
static1
Behavioral task
behavioral1
Sample
2023-08-25_a888f7fe645ce399bb1e2102d8f0b147_mafia_magniber_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-25_a888f7fe645ce399bb1e2102d8f0b147_mafia_magniber_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-25_a888f7fe645ce399bb1e2102d8f0b147_mafia_magniber_JC.exe
-
Size
2.2MB
-
MD5
a888f7fe645ce399bb1e2102d8f0b147
-
SHA1
eaa9ed9c85f6a17c77bbe1920b1240301bc7608c
-
SHA256
608729f7bfde46d9a00f72c9843fb5412e412e9a188eb8eba70c6bdd79e515ac
-
SHA512
e98a0a6452790c5e5923b0dd7c0d33dace9c12146151f47bef6d90ecfc14bc28fa7259b57f9c8e7b2f0fbd45c4fcb55860b7d4d92efbc8afc74d91ee888282d3
-
SSDEEP
24576:KHwgGOcLIQz53C9eg3nrpzirHtjb/DvVnSSjaH+/enKjTcSU+PxRvEfSzrrxMlfn:KQgGOuHorp2drfaR4TfUeRGoMlfpCszn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-25_a888f7fe645ce399bb1e2102d8f0b147_mafia_magniber_JC.exe
Files
-
2023-08-25_a888f7fe645ce399bb1e2102d8f0b147_mafia_magniber_JC.exe.exe windows:5 windows x86
2e62d8232fb24152c98355290f83ba24
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SizeofResource
FindResourceW
SetLastError
FreeResource
GetFullPathNameW
LoadLibraryA
GetModuleHandleA
MulDiv
LoadLibraryW
FreeLibrary
GetTickCount
GetVersionExA
HeapFree
FlushInstructionCache
HeapDestroy
GetFileAttributesW
SetCurrentDirectoryW
GetModuleFileNameW
GetCommandLineW
DuplicateHandle
GetFileType
GetCurrentDirectoryW
SetFileTime
CreateDirectoryW
GetCurrentProcess
SystemTimeToFileTime
DosDateTimeToFileTime
WinExec
GetDiskFreeSpaceExA
MoveFileA
WritePrivateProfileStringA
GetTempFileNameA
SetCurrentDirectoryA
ExitProcess
GetTempPathA
GetCurrentProcessId
CreateToolhelp32Snapshot
FindNextFileW
FindNextFileA
CreateEventW
Process32NextW
Process32FirstW
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenW
LocalFree
InterlockedCompareExchange
SetEnvironmentVariableA
CompareStringW
GetProcessHeap
SetEndOfFile
GetDriveTypeW
LoadResource
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
SetStdHandle
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameA
InterlockedExchange
SetConsoleCtrlHandler
GetTimeZoneInformation
LCMapStringW
FlushFileBuffers
FatalAppExitA
SetHandleCount
GetConsoleMode
GetConsoleCP
GetStringTypeW
InitializeCriticalSectionAndSpinCount
HeapSize
RaiseException
GetLocaleInfoW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsProcessorFeaturePresent
GetStdHandle
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
GetStartupInfoW
HeapSetInformation
ResumeThread
FindFirstFileExA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFileAttributesA
HeapReAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
CreateThread
GetCurrentThreadId
ExitThread
LockResource
HeapCreate
WriteConsoleW
CreateSemaphoreW
ResetEvent
ReleaseSemaphore
GetLocalTime
FindClose
RemoveDirectoryA
GetProcAddress
FindFirstFileA
GetTempPathW
TerminateProcess
OpenProcess
FindFirstFileW
DeleteFileA
SetFileAttributesW
GetModuleFileNameA
CreateFileMappingW
GetModuleHandleW
MapViewOfFile
Sleep
MultiByteToWideChar
FormatMessageW
WideCharToMultiByte
lstrcmpW
InterlockedDecrement
HeapAlloc
InitializeCriticalSection
SetEvent
WaitForSingleObject
DeleteCriticalSection
EnterCriticalSection
CreateFileA
LeaveCriticalSection
GetVersionExW
VirtualAlloc
VirtualFree
CloseHandle
GetLastError
CreateFileW
ReadFile
WriteFile
SetFilePointer
GetFileSize
InterlockedIncrement
lstrlenA
user32
IsWindowVisible
GetActiveWindow
SendMessageW
ShowWindow
FindWindowW
PostMessageW
GetWindow
GetMonitorInfoW
MapWindowPoints
GetParent
SetWindowPos
MonitorFromWindow
GetWindowLongW
GetClientRect
GetWindowRect
DestroyWindow
MessageBoxA
GetFocus
LoadCursorW
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
PtInRect
IsRectEmpty
IsWindow
DefWindowProcW
InvertRect
FillRect
MessageBoxW
wsprintfW
DrawIconEx
SetFocus
IsWindowEnabled
SetActiveWindow
UpdateLayeredWindow
CopyRect
SetRect
EqualRect
InflateRect
IntersectRect
UnionRect
SetCursor
SetTimer
KillTimer
DestroyIcon
UpdateWindow
SetWindowLongW
InvalidateRect
ScreenToClient
GetDC
ReleaseDC
SetCapture
SetWindowTextW
IsIconic
GetCursorPos
ReleaseCapture
GetCapture
HideCaret
CreateCaret
GetCaretBlinkTime
SetCaretPos
IsZoomed
GetDesktopWindow
EnableWindow
DestroyCursor
IsMenu
AppendMenuW
CreatePopupMenu
GetSubMenu
DestroyMenu
SetForegroundWindow
TrackPopupMenu
InsertMenuW
GetMenuItemCount
GetMenuItemInfoW
MapVirtualKeyA
CharLowerBuffW
DrawTextW
SystemParametersInfoA
GetWindowPlacement
GetSystemMetrics
LoadIconW
EnableMenuItem
GetKeyState
GetSysColor
ClientToScreen
CreateIconFromResource
LoadImageW
LoadBitmapW
GetIconInfo
CharNextW
OffsetRect
RegisterClassExW
CreateWindowExW
CallWindowProcW
GetDlgItem
UnregisterClassW
SetLayeredWindowAttributes
BeginPaint
EndPaint
PostQuitMessage
GetClassNameW
TrackMouseEvent
AnimateWindow
gdi32
PtInRegion
CreateCompatibleBitmap
SetViewportOrgEx
StretchBlt
CreateSolidBrush
Rectangle
SetBkMode
GetStockObject
GetObjectW
CreateFontIndirectW
GetClipBox
GetDCOrgEx
CreateRoundRectRgn
CreateBitmap
CreateCompatibleDC
SelectObject
DeleteDC
GetDeviceCaps
SetGraphicsMode
EnumFontsW
DeleteObject
BitBlt
CreateDIBSection
CombineRgn
RectInRegion
GetRgnBox
OffsetRgn
SetRectRgn
CreateEllipticRgnIndirect
SetTextColor
GetTextColor
ExtSelectClipRgn
SaveDC
CreateRectRgnIndirect
RestoreDC
ExcludeClipRect
IntersectClipRect
CreateRectRgn
GetTextExtentPoint32W
RoundRect
Ellipse
SetWorldTransform
GetWorldTransform
Polyline
Arc
Pie
CreatePen
CreatePatternBrush
GetClipRgn
GetViewportOrgEx
GetCurrentObject
advapi32
RegOpenKeyExW
RegDeleteKeyA
RegQueryInfoKeyW
RegQueryValueExA
RegSetValueExW
RegEnumKeyExW
RegDeleteValueW
RegSaveKeyW
RegDeleteKeyW
RegQueryValueExW
RegCreateKeyExW
RegRestoreKeyW
RegEnumKeyW
RegDeleteKeyExW
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegEnumKeyA
RegEnumKeyExA
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ShellExecuteA
SHBrowseForFolderW
ShellExecuteW
CommandLineToArgvW
ole32
CreateBindCtx
OleLockRunning
CLSIDFromString
CLSIDFromProgID
CreateStreamOnHGlobal
OleInitialize
StringFromGUID2
CoInitialize
CoUninitialize
CoCreateInstance
OleUninitialize
oleaut32
SysAllocStringLen
SysFreeString
SysStringByteLen
SysStringLen
CreateErrorInfo
SetErrorInfo
VariantInit
VariantClear
VariantChangeType
GetErrorInfo
SysAllocStringByteLen
SysAllocString
shlwapi
PathFileExistsA
StrToIntExW
netapi32
Netbios
wininet
HttpQueryInfoA
InternetConnectA
InternetCrackUrlA
InternetReadFile
InternetSetOptionA
HttpQueryInfoW
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetCloseHandle
InternetReadFileExA
DeleteUrlCacheEntryW
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
FindCloseUrlCache
ws2_32
send
gethostbyname
closesocket
socket
recv
WSACleanup
setsockopt
htons
WSAStartup
connect
psapi
GetProcessImageFileNameA
imagehlp
MakeSureDirectoryPathExists
imm32
ImmReleaseContext
ImmGetContext
gdiplus
GdipGetImageEncodersSize
GdiplusStartup
GdipFree
GdipAlloc
GdipDeleteGraphics
GdipDisposeImage
GdipSaveImageToFile
GdipGetImageWidth
GdipGetImageHeight
GdipImageGetFrameCount
GdipImageSelectActiveFrame
GdipGetPropertyItemSize
GdipGetPropertyItem
GdipCreateBitmapFromFile
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipGetImageEncoders
GdipGetImageGraphicsContext
GdipGraphicsClear
GdipDrawImageRectI
GdiplusShutdown
GdipCloneImage
msimg32
GradientFill
AlphaBlend
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 320KB - Virtual size: 319KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 332KB - Virtual size: 332KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ