Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_19bfe9248a872376ed7999176e53b49e_magniber.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-06_19bfe9248a872376ed7999176e53b49e_magniber.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-06_19bfe9248a872376ed7999176e53b49e_magniber
-
Size
13.4MB
-
MD5
19bfe9248a872376ed7999176e53b49e
-
SHA1
7d73a59c075c286ccc6a477cda71ca3223571e21
-
SHA256
0b8d895cf6595edc79adcfe85a7faa808b406acb75aea289252eaf6ca3160781
-
SHA512
4279b46bea98802e29c7b4725c4260f0a029dacc1075d65547df4cf72799b58bcad379fa6fbc115643b129cde39a3ad0b4413e10471dabbb7267208b885865b5
-
SSDEEP
196608:jrh8k/05rkn3J9Pa4n8BOy4X/AoZtctx/p13/AoZtctx/p1z+:j+mgWy48BOpIPtRMPtRP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-06_19bfe9248a872376ed7999176e53b49e_magniber
Files
-
2024-01-06_19bfe9248a872376ed7999176e53b49e_magniber.exe windows:6 windows x86 arch:x86
d0213b6efe438bf056decdb7315b4cae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
ReleaseMutex
WaitForSingleObject
CreateMutexW
CreateEventW
Sleep
GetCurrentProcess
ExitProcess
TerminateProcess
GetCurrentThread
GetCurrentThreadId
SetThreadPriority
TerminateThread
CreateProcessW
SetPriorityClass
IsProcessorFeaturePresent
GlobalMemoryStatusEx
SetLocalTime
GetNativeSystemInfo
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
FreeLibrary
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
SetThreadAffinityMask
WaitForMultipleObjects
FormatMessageW
LoadLibraryW
CopyFileW
MoveFileW
GetComputerNameW
VerifyVersionInfoW
CreateSymbolicLinkW
GetLocaleInfoW
GetCommandLineW
LocalFree
GlobalAlloc
GlobalSize
GlobalLock
GlobalUnlock
WideCharToMultiByte
RtlCaptureContext
ReleaseSemaphore
GetProcessId
CreateThread
CreateSemaphoreW
VirtualQueryEx
TransactNamedPipe
SetNamedPipeHandleState
HeapSize
InitializeCriticalSection
PeekNamedPipe
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetProcessHeap
SetStdHandle
GetFullPathNameW
MoveFileExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetACP
HeapReAlloc
HeapFree
HeapAlloc
WriteConsoleW
GetModuleFileNameA
GetStdHandle
SetFilePointerEx
FreeLibraryAndExitThread
ExitThread
GetTimeZoneInformation
GetFileType
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
FindFirstFileExW
GetModuleHandleExW
LoadLibraryExW
InterlockedPushEntrySList
RtlUnwind
RaiseException
GetStartupInfoW
InitializeSListHead
UnhandledExceptionFilter
WaitForSingleObjectEx
GetCPInfo
GetStringTypeW
LCMapStringW
CompareStringW
GetModuleHandleW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
DecodePointer
EncodePointer
MultiByteToWideChar
CancelIo
GetOverlappedResult
QueryPerformanceFrequency
QueryPerformanceCounter
CreateNamedPipeW
DisconnectNamedPipe
ConnectNamedPipe
CreatePipe
GetLastError
SetUnhandledExceptionFilter
SetHandleInformation
OutputDebugStringW
IsDebuggerPresent
GetTempPathW
WriteFile
SetFileTime
SetFilePointer
SetFileAttributesW
SetEndOfFile
RemoveDirectoryW
ReadFile
GetVolumeInformationW
GetLogicalDriveStringsW
GetFileAttributesExW
GetFileAttributesW
GetDriveTypeW
GetDiskFreeSpaceExW
FlushFileBuffers
FindNextFileW
FindFirstFileW
FindClose
DeleteFileW
CreateFileW
CloseHandle
CreateDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetEnvironmentVariableW
VerSetConditionMask
RtlCaptureStackBackTrace
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
QueryFullProcessImageNameW
OpenProcess
GetCurrentProcessId
SetEnvironmentVariableA
WaitNamedPipeW
user32
GetMessagePos
GetMessageTime
SendMessageW
IsChild
ShowWindow
SetLayeredWindowAttributes
SetWindowPos
GetWindowPlacement
IsWindowVisible
OpenClipboard
CloseClipboard
SetClipboardData
GetClipboardData
SendMessageTimeoutW
GetActiveWindow
TrackMouseEvent
SendInput
MapVirtualKeyW
GetCapture
SetCapture
ReleaseCapture
GetSystemMetrics
GetSystemMenu
EnableMenuItem
GetForegroundWindow
SetForegroundWindow
BeginPaint
GetDC
GetUpdateRgn
InvalidateRect
RedrawWindow
SetWindowTextW
GetAsyncKeyState
ReleaseDC
GetClientRect
GetWindowRect
MessageBeep
SetCursorPos
SetCursor
GetCursorPos
CreateCaret
DestroyCaret
ShowCaret
SetCaretPos
GetIconInfo
CreateIconIndirect
DestroyIcon
DestroyCursor
LoadCursorW
EnumChildWindows
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
GetWindowThreadProcessId
AttachThreadInput
MessageBoxW
EnumWindows
GetWindowLongW
GetWindowTextW
GetFocus
SetFocus
DestroyWindow
CreateWindowExW
RegisterClassExW
PostMessageW
DefWindowProcW
EndPaint
UnregisterClassW
SystemParametersInfoW
EnumDisplayMonitors
GetWindowInfo
GetAncestor
RegisterWindowMessageW
CallWindowProcW
MoveWindow
EmptyClipboard
GetParent
GetDesktopWindow
SetWindowLongW
WindowFromPoint
ScreenToClient
gdi32
RestoreDC
GetPixel
ExcludeClipRect
CreateRectRgnIndirect
CreateRectRgn
CreateBitmap
CombineRgn
GetKerningPairsW
GetObjectW
SetMapMode
SetMapperFlags
SelectObject
SaveDC
GetOutlineTextMetricsW
GetGlyphOutlineW
GetDeviceCaps
EnumFontFamiliesExW
DeleteObject
DeleteDC
CreateFontIndirectW
CreateCompatibleDC
ChoosePixelFormat
SetPixelFormat
SwapBuffers
StretchDIBits
GetGlyphIndicesW
CreateDIBSection
GetTextMetricsW
GetRegionData
comdlg32
GetOpenFileNameW
GetSaveFileNameW
advapi32
GetUserNameW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
shell32
SHGetFolderPathW
ShellExecuteW
SHFileOperationW
SHGetSpecialFolderPathW
CommandLineToArgvW
ExtractAssociatedIconW
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
Shell_NotifyIconW
SHGetFolderPathA
ole32
OleSetContainedObject
OleCreate
DoDragDrop
RegisterDragDrop
CoTaskMemAlloc
OleUninitialize
OleInitialize
CoInitialize
CoCreateInstance
RevokeDragDrop
oleaut32
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayDestroy
SysAllocString
VariantInit
VariantClear
SafeArrayCreateVector
wininet
InternetSetFilePointer
InternetWriteFile
InternetReadFile
FtpOpenFileW
HttpOpenRequestW
InternetCloseHandle
InternetOpenW
InternetCrackUrlW
InternetSetOptionW
HttpSendRequestExW
HttpEndRequestW
HttpQueryInfoW
InternetConnectW
ws2_32
WSAStartup
ntohs
listen
inet_ntoa
inet_addr
htons
htonl
getsockopt
recvfrom
connect
closesocket
bind
accept
__WSAFDIsSet
WSAGetLastError
getaddrinfo
freeaddrinfo
select
send
sendto
setsockopt
ioctlsocket
socket
recv
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
shlwapi
PathStripToRootW
winmm
timeGetDevCaps
timeGetTime
timeKillEvent
timeSetEvent
timeBeginPeriod
dbghelp
SymGetModuleInfo64
SymInitialize
SymFromAddr
imm32
ImmGetContext
ImmGetCompositionStringW
ImmNotifyIME
ImmSetCandidateWindow
ImmReleaseContext
opengl32
glGetIntegerv
glGetError
glGenTextures
glEnable
glDrawElements
glDrawArrays
glDisable
glDeleteTextures
glClearColor
glGetString
glBlendFunc
glBindTexture
wglShareLists
wglMakeCurrent
wglGetProcAddress
wglGetCurrentContext
wglDeleteContext
wglCreateContext
glPixelStorei
glReadPixels
glScissor
glTexImage2D
glTexParameterf
glTexParameteri
glViewport
glClear
Sections
.text Size: 3.7MB - Virtual size: 3.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9.0MB - Virtual size: 9.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 354KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 17B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 325KB - Virtual size: 328KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 218KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ