D:\jenkins_win\workspace\cpp-webuff\cpp\src\webuff\bin\Release\WeBuffCore.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_44fdc72fc0a97509e50301ad509c1786_magniber.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_44fdc72fc0a97509e50301ad509c1786_magniber.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-13_44fdc72fc0a97509e50301ad509c1786_magniber
-
Size
2.5MB
-
MD5
44fdc72fc0a97509e50301ad509c1786
-
SHA1
62de1d7a2e7162f51bb98fd9e6a6612e069289be
-
SHA256
928c91009a9d27f985827e2abcd2b356590194fbd12a97ad30d86dcd93e98b8f
-
SHA512
57be294479c986843e3d98958bc0847f33f92f7cde7c71770703fc1aef6abe26c46cc9e3d325f6ebe9857e3bb47aafe2675a9415e5045981cf2c7b85684122cf
-
SSDEEP
49152:+IFgjjd14XA9zAWpTumCFCYQkzfSplLE83kH3/Iw7pk:+IFkkw9smKap+LHPI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-13_44fdc72fc0a97509e50301ad509c1786_magniber
Files
-
2024-02-13_44fdc72fc0a97509e50301ad509c1786_magniber.exe windows:6 windows x86 arch:x86
7e88062c714afaad9089cbfaed5229a2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntdll
NtResumeProcess
NtSuspendProcess
RtlUnwind
kernel32
GetCurrentProcess
GetFileSize
ReadFile
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetCurrentProcessId
lstrcmpiW
Module32FirstW
Module32NextW
TerminateProcess
GetModuleFileNameW
GetModuleFileNameA
CreateEventW
CreateProcessW
K32GetProcessMemoryInfo
FindFirstFileW
FindNextFileW
FindClose
CreateFileA
WaitNamedPipeA
CreateNamedPipeA
ConnectNamedPipe
FlushFileBuffers
DisconnectNamedPipe
WideCharToMultiByte
MultiByteToWideChar
GetFileAttributesW
CreateDirectoryW
GetLogicalDriveStringsW
QueryDosDeviceW
lstrlenW
lstrcpyW
lstrcatW
K32GetProcessImageFileNameW
GetFullPathNameW
GetExitCodeProcess
CreateEventA
LoadLibraryW
DeleteFileA
SetFileAttributesA
SetFileAttributesW
lstrcpyA
lstrcatA
FindFirstFileA
lstrcmpiA
FindNextFileA
RemoveDirectoryA
GetFileAttributesA
InitializeCriticalSection
DeleteCriticalSection
LocalFree
LocalAlloc
CreateNamedPipeW
GetTickCount
ResetEvent
EnterCriticalSection
LeaveCriticalSection
FindResourceW
LoadResource
LockResource
SizeofResource
CopyFileW
FreeResource
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFinalPathNameByHandleA
GetPrivateProfileIntA
CreateDirectoryA
SetUnhandledExceptionFilter
GetCurrentThread
GetCurrentThreadId
IsWow64Process
PostQueuedCompletionStatus
CreateIoCompletionPort
GetQueuedCompletionStatus
QueryPerformanceCounter
QueryPerformanceFrequency
GetThreadTimes
FindFirstFileExW
ReadConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetFileType
EnumSystemLocalesW
SetLastError
GetModuleHandleW
WaitForSingleObject
CreateRemoteThread
GetProcAddress
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
OpenProcess
Sleep
CloseHandle
WriteFile
CreateFileW
DeleteFileW
SetEvent
GetLastError
GetLocalTime
VirtualFree
VirtualAlloc
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetACP
GetStdHandle
ExitProcess
GetStartupInfoW
IsDebuggerPresent
UnhandledExceptionFilter
GetModuleHandleExW
SetEndOfFile
WriteConsoleW
SetStdHandle
InitializeSListHead
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
ExitThread
GetTimeZoneInformation
GetFileAttributesExW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
GetVersionExW
LoadLibraryExW
FreeLibraryAndExitThread
FreeLibrary
OutputDebugStringW
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
CreateThread
SwitchToThread
SignalObjectAndWait
CreateTimerQueue
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
WaitForMultipleObjects
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
TryEnterCriticalSection
EncodePointer
DecodePointer
RaiseException
DuplicateHandle
WaitForSingleObjectEx
GetExitCodeThread
GetNativeSystemInfo
IsProcessorFeaturePresent
QueueUserWorkItem
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
FindResourceExW
user32
CharNextW
GetIconInfo
GetParent
GetWindowLongW
GetWindowThreadProcessId
EnumWindows
MessageBoxW
gdi32
GetObjectW
DeleteObject
advapi32
InitializeSecurityDescriptor
OpenThreadToken
RegEnumKeyExA
RegOpenKeyExW
RegSetValueExA
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
SetSecurityDescriptorDacl
LookupPrivilegeValueW
RegEnumKeyExW
RegQueryInfoKeyW
AdjustTokenPrivileges
OpenProcessToken
shell32
SHGetSpecialFolderPathA
ShellExecuteA
ExtractIconExW
ole32
CoInitialize
CoInitializeEx
CoCreateInstance
CoUninitialize
OleRun
oleaut32
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
shlwapi
PathAddBackslashA
PathRemoveFileSpecA
PathAddBackslashW
PathRemoveFileSpecW
StrCpyW
StrToIntW
PathFindFileNameW
gdiplus
GdipBitmapUnlockBits
GdipCreateBitmapFromScan0
GdipGetImagePixelFormat
GdipBitmapLockBits
GdipGetImageWidth
GdiplusStartup
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipCreateBitmapFromHICON
GdipGetImageHeight
GdipAlloc
GdipCloneImage
GdiplusShutdown
GdipSaveImageToFile
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipFree
winhttp
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpOpenRequest
WinHttpConnect
WinHttpSetOption
WinHttpSetTimeouts
WinHttpOpen
WinHttpCloseHandle
iphlpapi
GetAdaptersInfo
Sections
.text Size: 964KB - Virtual size: 963KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ