Static task
static1
Behavioral task
behavioral1
Sample
2024-01-23_c32ed0952c3a36519f8443e28150b5a3_magniber.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-23_c32ed0952c3a36519f8443e28150b5a3_magniber.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-23_c32ed0952c3a36519f8443e28150b5a3_magniber
-
Size
5.1MB
-
MD5
c32ed0952c3a36519f8443e28150b5a3
-
SHA1
9c5fd62abfc73aaf36a987cc5b5d851950b04b4e
-
SHA256
fce63c919f5c07333b5bbb0b5cdc9627b4963c37c192d461af83ba93a8724824
-
SHA512
e0b099d7d120c1ade82605dac983b543b1ed7bedbd5e04877682f914690dc541c1ed4875e9ab14a698619322db376982637abd30af863eca2b4659f5e557a305
-
SSDEEP
98304:xmvn+iSkszLaY6ZZBrKv0Log5yGa06VuXJ+2npsbLfNz8rDNxdjM:4+iBsGZ7Kngt1+YK3fdQNx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-23_c32ed0952c3a36519f8443e28150b5a3_magniber
Files
-
2024-01-23_c32ed0952c3a36519f8443e28150b5a3_magniber.exe windows:6 windows x86 arch:x86
09584d0e75e6fc154c203ded44f9eb49
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
_TrackMouseEvent
InitCommonControlsEx
gdiplus
GdipCreateHBITMAPFromBitmap
GdipFree
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromStream
GdipAlloc
shell32
SHGetKnownFolderPath
SHGetFolderPathAndSubDirW
Shell_NotifyIconW
ws2_32
listen
ntohs
recv
select
send
setsockopt
ntohl
socket
closesocket
htons
getsockname
bind
accept
getnameinfo
inet_ntop
inet_pton
freeaddrinfo
getaddrinfo
WSAIoctl
WSACreateEvent
WSACloseEvent
WSAGetLastError
gethostname
getsockopt
getpeername
ioctlsocket
connect
__WSAFDIsSet
htonl
WSASetLastError
WSACleanup
WSAStartup
crypt32
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertFindCertificateInStore
CertOpenStore
CertOpenSystemStoreA
CertGetIntendedKeyUsage
CertCloseStore
CertEnumCertificatesInStore
CertFreeCertificateContext
CertGetEnhancedKeyUsage
iphlpapi
GetAdaptersAddresses
kernel32
IsDebuggerPresent
DebugBreak
OutputDebugStringW
CloseHandle
GetLastError
SetLastError
HeapAlloc
HeapFree
GetProcessHeap
ReleaseSemaphore
ReleaseMutex
WaitForSingleObject
WaitForSingleObjectEx
OpenSemaphoreW
CreateMutexExW
CreateSemaphoreExW
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
FormatMessageW
SetSearchPathMode
GetCommandLineW
VerSetConditionMask
GetDiskFreeSpaceExW
CreateFileMappingW
VerifyVersionInfoW
MulDiv
LocaleNameToLCID
GetUserDefaultLocaleName
Sleep
FindClose
FindFirstFileW
FindNextFileW
SetEvent
CreateEventW
OpenEventW
CreateProcessW
GetSystemTime
CreateFileW
GetFileSize
MapViewOfFile
UnmapViewOfFile
DeleteFileW
TerminateProcess
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
OpenProcess
GetModuleFileNameW
SystemTimeToFileTime
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
K32GetModuleFileNameExW
WideCharToMultiByte
GetCurrentProcess
GetCurrentProcessorNumber
GlobalMemoryStatusEx
GetSystemInfo
GetSystemTimeAsFileTime
GetVersionExA
IsWow64Process
LoadLibraryA
K32GetProcessMemoryInfo
DecodePointer
RaiseException
InitializeCriticalSectionEx
DeleteCriticalSection
GetModuleHandleA
OutputDebugStringA
QueryPerformanceCounter
QueryPerformanceFrequency
SwitchToThread
MultiByteToWideChar
GetNativeSystemInfo
LoadLibraryExW
FileTimeToSystemTime
VirtualQuery
CreateSemaphoreA
DuplicateHandle
GetTickCount
WaitForMultipleObjectsEx
GetExitCodeProcess
LocalAlloc
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
LoadLibraryW
GlobalAlloc
GlobalFree
GlobalUnlock
GlobalLock
GetFileAttributesW
GetFileSizeEx
ReadFile
RemoveDirectoryW
SetFileAttributesW
WriteFile
CopyFileW
CompareStringEx
FreeLibrary
GetEnvironmentVariableW
GetEnvironmentVariableA
CompareFileTime
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
SleepEx
GetSystemDirectoryA
MoveFileExA
VirtualAlloc
ReleaseSRWLockShared
AcquireSRWLockShared
GetStdHandle
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SwitchToFiber
DeleteFiber
CreateFiber
GetFileType
ConvertFiberToThread
ConvertThreadToFiber
InitializeCriticalSection
FormatMessageA
GetCurrentDirectoryW
GetFileAttributesExW
GetFileInformationByHandle
GetFileTime
GetFullPathNameW
SetEndOfFile
SetFilePointerEx
SetFileTime
GetTempPathW
DeviceIoControl
MoveFileExW
ResetEvent
SetWaitableTimer
ResumeThread
CreateWaitableTimerA
AreFileApisANSI
EncodePointer
InitOnceComplete
InitOnceBeginInitialize
SleepConditionVariableSRW
SleepConditionVariableCS
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
TryEnterCriticalSection
InitializeSRWLock
GetExitCodeThread
LCMapStringEx
GetCPInfo
GetLocaleInfoEx
GetStringTypeW
IsProcessorFeaturePresent
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
RtlUnwind
InterlockedPushEntrySList
GetCommandLineA
CreateThread
ExitThread
FreeLibraryAndExitThread
GetConsoleOutputCP
SetStdHandle
HeapSize
GetDriveTypeW
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
SetConsoleCtrlHandler
ExitProcess
GetTimeZoneInformation
GetDateFormatW
GetTimeFormatW
CompareStringW
CreateDirectoryW
LocalFree
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
HeapReAlloc
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
WriteConsoleW
GetFinalPathNameByHandleW
CreateEventA
user32
LoadBitmapW
EnumDisplayDevicesA
GetWindowThreadProcessId
GetShellWindow
TranslateAcceleratorW
LoadAcceleratorsW
DispatchMessageW
TranslateMessage
GetMessageW
DestroyIcon
LoadIconW
SetWindowLongW
GetProcessWindowStation
FillRect
GetWindowRect
InvalidateRect
EndPaint
BeginPaint
GetDC
DrawTextW
GetSystemMetrics
EnableWindow
KillTimer
SetTimer
GetDlgCtrlID
GetUserObjectInformationW
DefWindowProcW
SendMessageW
RegisterClassW
PostQuitMessage
CallWindowProcW
CreateWindowExW
DestroyWindow
MessageBoxW
GetWindowLongW
ShowWindow
GetDlgItem
gdi32
SetDCBrushColor
SetDCPenColor
SetBkMode
SetTextColor
SelectObject
RoundRect
Rectangle
GetStockObject
GetDeviceCaps
DeleteObject
DeleteDC
CreateSolidBrush
CreatePen
CreateFontW
ole32
StringFromGUID2
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoInitialize
CoInitializeEx
CoCreateGuid
advapi32
CryptCreateHash
SystemFunction036
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
GetUserNameW
CryptHashData
CryptDestroyHash
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegGetValueW
RegOpenKeyExA
RegQueryValueExA
CryptDestroyKey
OpenProcessToken
AllocateAndInitializeSid
CopySid
EqualSid
FreeSid
GetLengthSid
GetTokenInformation
IsValidSid
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegDeleteTreeW
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptSignHashW
CryptEnumProvidersW
shlwapi
PathFindFileNameW
PathFindExtensionW
ord12
powrprof
CallNtPowerInformation
winmm
timeBeginPeriod
timeGetTime
timeSetEvent
timeGetDevCaps
bcrypt
BCryptGenRandom
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 895KB - Virtual size: 895KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 7.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 359KB - Virtual size: 359KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 708KB - Virtual size: 712KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE