Static task
static1
Behavioral task
behavioral1
Sample
2024-01-23_185fe873ba4e248aaf55a40cc83f273f_magniber.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-23_185fe873ba4e248aaf55a40cc83f273f_magniber.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-23_185fe873ba4e248aaf55a40cc83f273f_magniber
-
Size
5.0MB
-
MD5
185fe873ba4e248aaf55a40cc83f273f
-
SHA1
b0a89498209a899b3a8feedd0af479b1f253555c
-
SHA256
cc5b4ba93d43280ec34ae3980f1b7872b2eed8cbf8ccc108ab7d766deeaf9160
-
SHA512
6ae31106f5fd2d71e59fd08bdea10886abe0f37929d4a15e01792f18220817b135998d6649e126043a680045352fc59580f0bcc037a004c4f8a0d0f6b2cfd676
-
SSDEEP
98304:oMvXL33J+JC+pl9J67bcKAoA0Wgw0hIIbSJjgV6efbMTxwFrDNxdjM:3XLJPUl9Jvvg1KgV9fgANx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-23_185fe873ba4e248aaf55a40cc83f273f_magniber
Files
-
2024-01-23_185fe873ba4e248aaf55a40cc83f273f_magniber.exe windows:6 windows x86 arch:x86
8b529d3184d19da351e70e730a93157c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
_TrackMouseEvent
InitCommonControlsEx
gdiplus
GdipAlloc
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipDisposeImage
GdipFree
GdipCreateBitmapFromStream
GdipCreateHBITMAPFromBitmap
shell32
SHGetKnownFolderPath
Shell_NotifyIconW
SHGetFolderPathAndSubDirW
ws2_32
getsockname
htons
closesocket
ntohs
recv
select
socket
getsockopt
ntohl
setsockopt
bind
shutdown
getnameinfo
freeaddrinfo
getaddrinfo
WSAIoctl
WSAGetLastError
gethostname
WSAStartup
getpeername
ioctlsocket
connect
__WSAFDIsSet
htonl
WSASetLastError
WSACleanup
send
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertGetCertificateContextProperty
CertOpenStore
iphlpapi
GetAdaptersAddresses
kernel32
GetLastError
SetLastError
HeapAlloc
HeapFree
GetProcessHeap
ReleaseSemaphore
ReleaseMutex
WaitForSingleObject
WaitForSingleObjectEx
OpenSemaphoreW
CreateMutexExW
CreateSemaphoreExW
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
FormatMessageW
SetSearchPathMode
GetCommandLineW
VerSetConditionMask
GetDiskFreeSpaceExW
CreateFileMappingW
VerifyVersionInfoW
MulDiv
LocaleNameToLCID
GetUserDefaultLocaleName
Sleep
FindClose
FindFirstFileW
FindNextFileW
SetEvent
CreateEventW
OpenEventW
CreateProcessW
GetSystemTime
CreateFileW
GetFileSize
MapViewOfFile
UnmapViewOfFile
DeleteFileW
TerminateProcess
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
OpenProcess
GetModuleFileNameW
SystemTimeToFileTime
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
K32GetModuleFileNameExW
WideCharToMultiByte
GetCurrentProcess
GetCurrentProcessorNumber
GlobalMemoryStatusEx
GetSystemInfo
GetSystemTimeAsFileTime
GetVersionExA
IsWow64Process
LoadLibraryA
K32GetProcessMemoryInfo
DecodePointer
RaiseException
InitializeCriticalSectionEx
DeleteCriticalSection
GetModuleHandleA
OutputDebugStringA
QueryPerformanceCounter
QueryPerformanceFrequency
CreateEventA
SwitchToThread
MultiByteToWideChar
GetNativeSystemInfo
LoadLibraryExW
FileTimeToSystemTime
VirtualQuery
DuplicateHandle
GetTickCount
WaitForMultipleObjectsEx
GetExitCodeProcess
LocalAlloc
LocalFree
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
LoadLibraryW
GlobalAlloc
GlobalFree
GlobalUnlock
DebugBreak
CreateDirectoryW
GetFileAttributesW
GetFileSizeEx
ReadFile
CloseHandle
SetFileAttributesW
WriteFile
CopyFileW
LCMapStringEx
CompareStringEx
FreeLibrary
GetEnvironmentVariableW
GetEnvironmentVariableA
EnterCriticalSection
LeaveCriticalSection
SleepEx
FormatMessageA
VerifyVersionInfoA
VirtualAlloc
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
InitializeCriticalSection
GetStdHandle
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SwitchToFiber
DeleteFiber
CreateFiber
GetFileType
ConvertFiberToThread
ConvertThreadToFiber
GetCurrentDirectoryW
GetFileAttributesExW
GetFileInformationByHandle
GetFileTime
GetFullPathNameW
SetEndOfFile
SetFilePointerEx
SetFileTime
GetTempPathW
DeviceIoControl
MoveFileExW
ResetEvent
SetWaitableTimer
ResumeThread
CreateWaitableTimerA
AreFileApisANSI
EncodePointer
InitOnceComplete
InitOnceBeginInitialize
SleepConditionVariableSRW
SleepConditionVariableCS
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
TryEnterCriticalSection
InitializeSRWLock
GetExitCodeThread
IsDebuggerPresent
GetCPInfo
GetLocaleInfoEx
GetStringTypeW
IsProcessorFeaturePresent
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
RtlUnwind
InterlockedPushEntrySList
GetCommandLineA
CreateThread
ExitThread
FreeLibraryAndExitThread
GetConsoleOutputCP
SetStdHandle
HeapSize
GetDriveTypeW
RemoveDirectoryW
OutputDebugStringW
GlobalLock
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
SetConsoleCtrlHandler
ExitProcess
GetTimeZoneInformation
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
HeapReAlloc
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
WriteConsoleW
GetFinalPathNameByHandleW
CreateSemaphoreA
user32
LoadBitmapW
EnumDisplayDevicesA
GetWindowThreadProcessId
GetShellWindow
TranslateAcceleratorW
GetProcessWindowStation
DispatchMessageW
GetUserObjectInformationW
GetMessageW
DestroyIcon
LoadIconW
SetWindowLongW
GetWindowLongW
FillRect
GetWindowRect
InvalidateRect
DefWindowProcW
SendMessageW
CallWindowProcW
LoadAcceleratorsW
PostQuitMessage
RegisterClassW
CreateWindowExW
DestroyWindow
TranslateMessage
MessageBoxW
ShowWindow
GetDlgItem
GetDlgCtrlID
SetTimer
KillTimer
EnableWindow
GetSystemMetrics
EndPaint
BeginPaint
GetDC
DrawTextW
gdi32
SetBkMode
SetDCPenColor
SetDCBrushColor
SelectObject
RoundRect
Rectangle
GetStockObject
GetDeviceCaps
DeleteObject
DeleteDC
CreateSolidBrush
CreatePen
CreateFontW
SetTextColor
ole32
CoTaskMemFree
CoCreateInstance
CoInitializeEx
CoInitialize
CoUninitialize
CoTaskMemAlloc
StringFromGUID2
CoCreateGuid
advapi32
CryptEnumProvidersW
RegGetValueW
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
RegCreateKeyExW
RegCloseKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
GetUserNameW
RegOpenKeyExA
RegQueryValueExA
CryptDestroyKey
OpenProcessToken
AllocateAndInitializeSid
CopySid
EqualSid
FreeSid
GetLengthSid
GetTokenInformation
IsValidSid
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegDeleteTreeW
SystemFunction036
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptSignHashW
shlwapi
PathFindExtensionW
PathFindFileNameW
ord12
powrprof
CallNtPowerInformation
winmm
timeGetDevCaps
timeSetEvent
timeGetTime
timeBeginPeriod
bcrypt
BCryptGenRandom
Sections
.text Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 872KB - Virtual size: 872KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 59KB - Virtual size: 7.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 359KB - Virtual size: 359KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 704KB - Virtual size: 708KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE