E:\pc\i4tools70\updater\bin\updater_bin\updater.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_57efba00151601d2175a2a1278e622b2_mafia_magniber.exe
Resource
win7-20231215-en
General
-
Target
2024-01-27_57efba00151601d2175a2a1278e622b2_mafia_magniber
-
Size
1.7MB
-
MD5
57efba00151601d2175a2a1278e622b2
-
SHA1
a920e60d5f0aea817042f89b90cce4cf71a1e613
-
SHA256
a6a7712f6bbf376171ac62b7d65c20ebef7d0943e98134704ab6da9b9befcbe6
-
SHA512
941757fc0e1bd4a06686595f3554feed7d4730e5b478c2efd9d7fe7e9d0c94710b8dbf36f71fa1dce2c35789629a57a2a78e600a69bf76ca11a96bd61b1c5425
-
SSDEEP
24576:IBao/MqXpJeIkPqq47XLdHZm/4oZfSerQrcRSmjzWDwCmTPPk/z5Zf5hz0dNUX:AMqCi7dk/4oZfSYRgDwCmTPc/lZfuN4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-27_57efba00151601d2175a2a1278e622b2_mafia_magniber
Files
-
2024-01-27_57efba00151601d2175a2a1278e622b2_mafia_magniber.exe windows:5 windows x86 arch:x86
0df44e2f1b96db7b42d70c5a153da61d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
TerminateProcess
Process32NextW
OpenProcess
Process32FirstW
CreateToolhelp32Snapshot
CreateProcessW
MoveFileExW
GetTickCount
GetLastError
FindClose
FindNextFileW
RemoveDirectoryW
FindFirstFileW
WriteFile
ReadFile
GetVersionExW
GetFileSize
CreateFileW
MultiByteToWideChar
WideCharToMultiByte
CreateDirectoryW
FreeLibrary
GetProcAddress
LoadLibraryA
GetModuleFileNameW
DeleteFileW
Sleep
GetCommandLineW
FreeResource
LockResource
LoadResource
SizeofResource
GetModuleHandleW
GetCurrentProcess
CloseHandle
FindResourceW
GetProcessHeap
SetEndOfFile
CreateFileA
WriteConsoleW
FlushFileBuffers
SetStdHandle
SetConsoleCtrlHandler
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
FatalAppExitA
GetStringTypeW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
SetHandleCount
GetCurrentDirectoryW
SetCurrentDirectoryW
LoadLibraryW
GetACP
ExitProcess
SetFilePointer
GetFileType
DuplicateHandle
SystemTimeToFileTime
DosDateTimeToFileTime
SetFileTime
GetFileAttributesW
MulDiv
InterlockedIncrement
InterlockedDecrement
GetLocalTime
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
InterlockedCompareExchange
LocalFree
lstrlenW
HeapAlloc
HeapFree
ExitThread
GetCurrentThreadId
CreateThread
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RtlUnwind
HeapReAlloc
RaiseException
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapSize
InitializeCriticalSectionAndSpinCount
GetStdHandle
GetLocaleInfoW
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
HeapCreate
HeapDestroy
GetConsoleCP
GetConsoleMode
user32
SetWindowLongW
IsWindow
DispatchMessageW
TranslateMessage
SetFocus
GetMessageW
EnableWindow
GetWindow
SetWindowPos
GetMonitorInfoW
MonitorFromWindow
GetParent
GetWindowRect
SendMessageW
LoadImageW
CallWindowProcW
GetWindowLongW
GetPropW
SetPropW
AdjustWindowRectEx
GetMenu
RegisterClassW
LoadCursorW
RegisterClassExW
GetClassInfoExW
CreateWindowExW
GetKeyState
InvalidateRect
SetTimer
KillTimer
SetCapture
ReleaseCapture
PtInRect
DefWindowProcW
GetFocus
MapWindowPoints
FindWindowW
IsRectEmpty
EndPaint
BeginPaint
GetUpdateRect
GetCursorPos
OffsetRect
InflateRect
UnionRect
SetCursor
IsIconic
IsZoomed
SetWindowRgn
MessageBoxW
PostMessageW
CharNextW
DrawTextW
FillRect
CharPrevW
IntersectRect
CreateCaret
SetCaretPos
ClientToScreen
GetSysColor
GetCaretPos
HideCaret
ShowCaret
MoveWindow
DrawIconEx
InvalidateRgn
CreateAcceleratorTableW
GetWindowTextW
GetWindowTextLengthW
SetWindowTextW
DestroyWindow
PostQuitMessage
ScreenToClient
GetClientRect
RegisterDeviceNotificationW
wsprintfW
GetSystemMetrics
GetDC
ReleaseDC
ShowWindow
UpdateLayeredWindow
SetRect
gdi32
SetWindowOrgEx
Rectangle
RestoreDC
BitBlt
SaveDC
DeleteDC
CreateCompatibleDC
CreateRoundRectRgn
GetObjectW
SelectClipRgn
ExtSelectClipRgn
CreateRectRgnIndirect
CreatePen
CreateCompatibleBitmap
GetStockObject
GetClipBox
CombineRgn
StretchBlt
CreateDIBSection
SetBkMode
SetBkColor
CreateFontIndirectW
DeleteObject
SelectObject
GetObjectA
LineTo
GetTextExtentPoint32W
SetTextColor
GetDeviceCaps
GdiFlush
GetCharABCWidthsW
TextOutW
RoundRect
CreatePenIndirect
MoveToEx
GetTextMetricsW
CreateSolidBrush
ExtTextOutW
SetStretchBltMode
advapi32
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegQueryValueExW
shell32
CommandLineToArgvW
ShellExecuteW
ole32
CLSIDFromString
CLSIDFromProgID
CoUninitialize
CoInitialize
OleLockRunning
CoCreateInstance
comctl32
ord17
_TrackMouseEvent
gdiplus
GdipCreateLineBrushI
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdiplusStartup
GdipSetTextRenderingHint
GdipDrawString
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipCloneBrush
GdipDeleteFont
GdiplusShutdown
GdipDeleteBrush
GdipFree
GdipAlloc
GdipCreateStringFormat
GdipDeleteStringFormat
GdipCreateFromHDC
GdipDeleteGraphics
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
shlwapi
PathRemoveFileSpecW
PathFindExtensionW
PathFindFileNameW
PathFileExistsW
wininet
InternetOpenUrlW
InternetConnectW
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestW
InternetCloseHandle
InternetSetOptionW
InternetOpenW
HttpQueryInfoW
InternetReadFile
InternetCrackUrlW
psapi
GetModuleFileNameExW
msimg32
AlphaBlend
oleaut32
CreateErrorInfo
SetErrorInfo
VariantChangeType
GetErrorInfo
SysFreeString
VariantClear
VariantInit
SysAllocString
Sections
.text Size: 720KB - Virtual size: 719KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 244KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 608KB - Virtual size: 612KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE