E:\rc_v10_i18n_201903_branch\Build\Release\WPSOffice\office6\ksolaunch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_be262e7215d8345ee4ccbcd2793fad5a_mafia_magniber.exe
Resource
win7-20240215-en
General
-
Target
2024-03-06_be262e7215d8345ee4ccbcd2793fad5a_mafia_magniber
-
Size
1.8MB
-
MD5
be262e7215d8345ee4ccbcd2793fad5a
-
SHA1
c9ba5dd6ec3c8d9c5f5f76394e5af56e6448b8a5
-
SHA256
f240e1464bab0bca6abe8863d01388f5deaa05bac687f0d72acd332eceb29857
-
SHA512
d5d66591d2aabbf78b0eff4043718b0fce921169467c2a217572683844fe78eed469e5baa0febc2adf0d61b431b146368280ab0e9503e50f739b60046ab6d92b
-
SSDEEP
49152:mQGpj2KxQhe0jxMJ5laqxvwYTV9CtsFTFc:XGQSsuNaQv5pGy5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-06_be262e7215d8345ee4ccbcd2793fad5a_mafia_magniber
Files
-
2024-03-06_be262e7215d8345ee4ccbcd2793fad5a_mafia_magniber.exe windows:5 windows x86 arch:x86
bcb761f127943ed39ef6a812181aeb97
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateProcessW
GetModuleFileNameW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetModuleHandleW
GetProcAddress
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
LocalAlloc
LocalFree
CloseHandle
SetUnhandledExceptionFilter
SetFilePointerEx
GetFileSizeEx
WriteFile
FileTimeToSystemTime
SystemTimeToFileTime
GetSystemTime
CompareFileTime
CreateFileW
GetFileAttributesW
ReadFile
MultiByteToWideChar
SystemTimeToTzSpecificLocalTime
FindClose
FindFirstFileW
GetLastError
GetFileAttributesExW
CreateDirectoryW
WideCharToMultiByte
FindNextFileW
GetPrivateProfileIntW
GetVersionExW
FreeLibrary
LoadLibraryW
GetCurrentProcessId
Sleep
ExpandEnvironmentStringsW
GetCurrentThread
ProcessIdToSessionId
GetCurrentProcess
InterlockedIncrement
InterlockedDecrement
GetStringTypeW
InterlockedCompareExchange
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapFree
HeapAlloc
LCMapStringW
GetCPInfo
ExitProcess
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
UnhandledExceptionFilter
IsDebuggerPresent
HeapSize
GetLocaleInfoW
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleW
FlushFileBuffers
GetProcessHeap
OpenProcess
GetPrivateProfileStringW
TerminateProcess
user32
wsprintfW
shell32
CommandLineToArgvW
SHGetSpecialFolderPathW
advapi32
RevertToSelf
OpenThreadToken
EqualSid
IsValidSid
GetTokenInformation
OpenProcessToken
ImpersonateLoggedOnUser
RegOpenCurrentUser
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
shlwapi
PathFileExistsW
Sections
.text Size: 333KB - Virtual size: 332KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 714KB - Virtual size: 714KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 624KB - Virtual size: 628KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE