F:\Office\Target\x86\ship\click2run\en-us\AdminBootstrapper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_740b78f7afce3746db6bf8940f7480a5_magniber.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_740b78f7afce3746db6bf8940f7480a5_magniber.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-13_740b78f7afce3746db6bf8940f7480a5_magniber
-
Size
5.4MB
-
MD5
740b78f7afce3746db6bf8940f7480a5
-
SHA1
df8871dadd08c6005c52d200dbac57aa0db1e5ea
-
SHA256
dd1831da9bbc9ba8e4e3f717090fc7c7395dd6dc477511e06c28592ca5b1a9c3
-
SHA512
3a07bcf9d4b86f7e6c8d4b8b6606d0c2908a5dce0261e0600cae12a5a9243d7ee81e7bdc90d6f321d849cc2cd81637951f79d4953322198abc393f0a09934a7d
-
SSDEEP
98304:27M701RgX4iuSl1DtlEq81xZPGnzURnBh6gGA/QmvD/cTwY2h3lNMKGYQw:QM7pTXexZPGzURnBh6gGAF+W3jMF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-13_740b78f7afce3746db6bf8940f7480a5_magniber
Files
-
2024-02-13_740b78f7afce3746db6bf8940f7480a5_magniber.exe windows:5 windows x86 arch:x86
6fd96551a83b4bafde8d378b3aa33c9d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
PDB Paths
Imports
gdi32
GetTextExtentPoint32W
CreateSolidBrush
SetTextColor
SetBkColor
GetStockObject
CreateFontW
SelectObject
GetTextMetricsW
CreatePen
SetDCPenColor
DeleteObject
SetDCBrushColor
GetDeviceCaps
Rectangle
oleaut32
VariantInit
VariantClear
SysFreeString
SysAllocString
advapi32
RevertToSelf
OpenServiceW
CloseServiceHandle
OpenSCManagerW
AdjustTokenPrivileges
RegDeleteValueA
RegEnumValueA
SetServiceObjectSecurity
ChangeServiceConfigW
ChangeServiceConfig2W
CreateServiceW
DeleteService
EnumDependentServicesW
ControlService
StartServiceW
QueryServiceConfigW
RegSetKeySecurity
RegCreateKeyExW
RegCloseKey
CryptReleaseContext
CryptAcquireContextW
EventWriteTransfer
EventRegister
EventUnregister
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegDeleteTreeW
RegDeleteKeyW
RegGetValueW
RegSetValueExW
RegDeleteValueW
GetTokenInformation
IsValidSid
GetSidSubAuthorityCount
GetSidSubAuthority
CryptDestroyHash
CryptGetHashParam
CryptCreateHash
CryptHashData
RegNotifyChangeKeyValue
LookupPrivilegeValueW
EventWrite
OpenThreadToken
GetLengthSid
InitializeAcl
AddAccessAllowedAce
AllocateAndInitializeSid
CopySid
OpenProcessToken
FreeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidA
CheckTokenMembership
CreateWellKnownSid
EqualSid
QueryServiceStatusEx
kernel32
QueryPerformanceFrequency
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetProcessTimes
GetCurrentThread
GetThreadTimes
CreateDirectoryW
FindFirstFileW
GetFullPathNameW
FindNextFileW
DeviceIoControl
RemoveDirectoryW
GetEnvironmentVariableW
SetEndOfFile
FindClose
CreateFileW
GetFileAttributesW
SetFileAttributesW
GetFileAttributesExW
GetDiskFreeSpaceExW
DeleteFileW
CloseHandle
GetCurrentDirectoryW
GetProcAddress
SetFilePointerEx
MoveFileExW
GetModuleHandleW
CopyFileW
AreFileApisANSI
WideCharToMultiByte
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
Sleep
GetStringTypeExW
GetUserDefaultLCID
LoadLibraryA
LCMapStringW
FreeLibrary
LocalFree
FormatMessageA
GetTickCount64
GetCurrentThreadId
TlsAlloc
TlsFree
FlsGetValue
TlsGetValue
FlsSetValue
TlsSetValue
GetModuleHandleExW
K32GetProcessMemoryInfo
GlobalMemoryStatusEx
LeaveCriticalSection
EnterCriticalSection
RaiseException
InitializeSRWLock
ReleaseSRWLockShared
AcquireSRWLockShared
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
VerSetConditionMask
VerifyVersionInfoW
OpenProcess
GetCurrentProcessId
TerminateProcess
GetModuleFileNameA
GetShortPathNameA
K32GetModuleFileNameExW
CreateProcessW
LoadLibraryExW
FindResourceW
SizeofResource
LoadResource
GetVersionExW
GetStringTypeW
GetCPInfoExW
GetUserDefaultLocaleName
IsValidCodePage
SetLastError
GetSystemTime
SystemTimeToFileTime
FileTimeToSystemTime
SetErrorMode
GetComputerNameW
MulDiv
FormatMessageW
GetLogicalProcessorInformation
GetNativeSystemInfo
GetSystemDirectoryW
CreateEventW
SetEvent
WaitForSingleObject
ReleaseSemaphore
WaitForSingleObjectEx
CreateEventExW
FlsFree
WaitForMultipleObjectsEx
CloseThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CreateThreadpoolTimer
CloseThreadpoolWait
SetThreadpoolWait
WaitForThreadpoolWaitCallbacks
CreateThreadpoolWait
CreateThreadpoolWork
SubmitThreadpoolWork
GetModuleHandleA
LoadLibraryW
OutputDebugStringA
RtlCaptureStackBackTrace
QueryDepthSList
TryEnterCriticalSection
InitializeSListHead
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseMutex
TzSpecificLocalTimeToSystemTime
GetTempPathW
GetLongPathNameW
VirtualProtectEx
GetSystemInfo
ResetEvent
GlobalFree
GlobalAlloc
ReadFile
WriteFile
GetFileSizeEx
LockResource
GetOverlappedResult
FlushFileBuffers
CancelIoEx
FindFirstFileExW
GetDriveTypeW
MultiByteToWideChar
SetFileInformationByHandle
GetFileInformationByHandleEx
GetTempFileNameW
SignalObjectAndWait
GetProcessAffinityMask
CreateWaitableTimerW
SetWaitableTimerEx
CancelWaitableTimer
GetTickCount
IsProcessorFeaturePresent
WerRegisterMemoryBlock
WerUnregisterMemoryBlock
QueryFullProcessImageNameW
CreateIoCompletionPort
PostQueuedCompletionStatus
GetThreadIOPendingFlag
GetQueuedCompletionStatus
IsDebuggerPresent
WaitForMultipleObjects
GetStartupInfoW
CreateMemoryResourceNotification
GetSystemPowerStatus
IsSystemResumeAutomatic
QueryUnbiasedInterruptTime
OutputDebugStringW
CreateMutexW
VirtualFree
ExpandEnvironmentStringsW
VirtualAlloc
OpenEventA
CreateEventA
OpenMutexA
CreateMutexA
OpenSemaphoreA
CreateSemaphoreA
OpenFileMappingA
LocalAlloc
HeapAlloc
GetProcessHeap
HeapFree
GetThreadLocale
lstrcmpW
ProcessIdToSessionId
GetExitCodeThread
GetCommandLineW
GetPriorityClass
GetExitCodeProcess
K32EnumProcesses
GetTimeZoneInformation
IsValidLocale
GetLocaleInfoEx
LCIDToLocaleName
GetLocaleInfoW
ResolveLocaleName
GetUserPreferredUILanguages
GetACP
LocaleNameToLCID
GetSystemDefaultLCID
LCMapStringEx
EnumSystemLocalesEx
GetSystemDefaultLocaleName
GetUserGeoID
GetProductInfo
SwitchToThread
ExitProcess
HeapReAlloc
HeapSize
GetConsoleCP
ReadConsoleW
GetConsoleMode
UnregisterWaitEx
VirtualProtect
FreeLibraryAndExitThread
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetNumaHighestNodeNumber
ChangeTimerQueueTimer
GetThreadPriority
SetThreadPriority
CreateTimerQueue
InterlockedFlushSList
RtlUnwind
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CompareStringW
GetCPInfo
InitializeCriticalSectionAndSpinCount
EncodePointer
DuplicateHandle
OpenThread
DeleteCriticalSection
CompareStringEx
GetLastError
InitializeCriticalSectionEx
GetCurrentProcess
K32GetProcessImageFileNameW
GetSystemPreferredUILanguages
GetDateFormatW
GetTimeFormatW
DeleteTimerQueueTimer
CreateTimerQueueTimer
lstrcmpA
FreeConsole
WriteConsoleW
GetStdHandle
AllocConsole
AttachConsole
DecodePointer
EnumSystemLocalesW
SetStdHandle
GetModuleFileNameW
IsWow64Process
GetFileType
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
VirtualQuery
LoadLibraryExA
FlsAlloc
CreateThread
GetLocalTime
ole32
CoTaskMemAlloc
IIDFromString
CLSIDFromString
CoTaskMemFree
CoCreateInstance
CoSetProxyBlanket
CoCreateFreeThreadedMarshaler
StringFromGUID2
CoCreateGuid
CoUninitialize
CoInitializeEx
CreateStreamOnHGlobal
CoRegisterInitializeSpy
CoRevokeInitializeSpy
cabinet
ord13
ord14
wintrust
WinVerifyTrust
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
setupapi
SetupIterateCabinetW
ws2_32
FreeAddrInfoW
WSAStartup
GetAddrInfoW
iphlpapi
CreateSortedAddressPairs
FreeMibTable
gdiplus
GdipCloneBrush
GdipFillRectangleI
GdipCreateFromHDC
GdipDeleteBrush
GdipCreateSolidFill
GdipGetImageGraphicsContext
GdipGetImageWidth
GdipGetImageHeight
GdipDeleteGraphics
GdipDrawImageRectRectI
GdiplusStartup
GdipDrawImageRectI
GdipFree
GdipDisposeImage
GdipAlloc
GdipCloneImage
GdipLoadImageFromStream
GdipCreateBitmapFromScan0
rpcrt4
UuidToStringW
RpcStringFreeW
Sections
.text Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 618KB - Virtual size: 617KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 672KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ