C:\BUILD\work\e0dd96435fde7cb0\BUILDS\Release\x86\avDump.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-07_ea71be88f5b3accb6b51a9f2aa80d363_magniber.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-07_ea71be88f5b3accb6b51a9f2aa80d363_magniber.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-07_ea71be88f5b3accb6b51a9f2aa80d363_magniber
-
Size
3.2MB
-
MD5
ea71be88f5b3accb6b51a9f2aa80d363
-
SHA1
1e289a816ccc6e568df2da2c0376d8f78ee00105
-
SHA256
a3d0bb998bba01d98af76a29ad7233a922845cb690ca770f938fea48b094bafd
-
SHA512
e9baf508057c6f2fb04e97452085e0000af8e7f0e018dce11837ea18fa8b27fb6d5ad4551d1039a59821264d47a3502395b00a25ccfef4d6989ff4e15f64566f
-
SSDEEP
49152:0ZeFkAI0+Smz3ZOl6F5KJERCq3fECY/j6EEf2ELKgvgpUFuoI+Vzy1AyfSmYKYoj:oDAI0+S03WpGRT3fECY/j9VxkoL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-07_ea71be88f5b3accb6b51a9f2aa80d363_magniber
Files
-
2024-03-07_ea71be88f5b3accb6b51a9f2aa80d363_magniber.exe windows:6 windows x86 arch:x86
ea469a2cc6e69a6718febe0ad1372c55
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
rpcrt4
RpcStringBindingComposeW
UuidCreate
RpcMgmtEpEltInqDone
RpcIfInqId
RpcMgmtEpEltInqBegin
RpcMgmtEpEltInqNextW
RpcRevertToSelf
RpcImpersonateClient
RpcServerUnregisterIfEx
RpcServerRegisterIf2
RpcObjectSetType
RpcEpRegisterW
RpcEpUnregister
RpcBindingToStringBindingW
RpcAsyncCompleteCall
RpcAsyncInitializeHandle
RpcAsyncCancelCall
NdrAsyncClientCall
NdrAsyncServerCall
UuidToStringW
UuidFromStringW
RpcStringBindingParseW
NdrClientCall2
NdrServerCall2
RpcServerUnregisterIf
RpcServerRegisterIfEx
RpcServerUseProtseqEpW
I_RpcBindingInqLocalClientPID
RpcStringFreeW
RpcBindingFromStringBindingW
RpcBindingFree
wtsapi32
WTSQuerySessionInformationW
WTSFreeMemory
shell32
SHGetFolderPathW
ord165
ntdll
NtClose
RtlNtStatusToDosError
NtSystemDebugControl
VerSetConditionMask
RtlDllShutdownInProgress
RtlUnwind
NtOpenKey
NtQueryKey
NtDeleteKey
NtSetInformationThread
kernel32
SetLastError
GetModuleFileNameA
GetModuleHandleExW
GetCurrentThreadId
Sleep
LocalFree
SetFilePointerEx
UnlockFileEx
LockFileEx
GetFileSizeEx
ReadFile
CompareStringW
GetCurrentThread
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetThreadId
CreateProcessW
WriteFile
GetExitCodeProcess
ResumeThread
GetPriorityClass
GetProcessTimes
K32GetProcessMemoryInfo
InitializeCriticalSectionEx
LoadLibraryW
CompareFileTime
QueryFullProcessImageNameW
FlushFileBuffers
GetFileInformationByHandle
GetFullPathNameW
OutputDebugStringA
FileTimeToSystemTime
GetCurrentProcessId
TlsAlloc
TlsGetValue
TlsSetValue
FreeLibrary
ResetEvent
GetSystemInfo
GetTickCount
QueryPerformanceFrequency
QueryPerformanceCounter
GetThreadTimes
ExpandEnvironmentStringsW
GetFileAttributesW
LoadLibraryExW
GetSystemDirectoryW
SetErrorMode
HeapFree
VirtualProtect
HeapReAlloc
GlobalMemoryStatusEx
SetThreadPriority
GetThreadPriority
TerminateThread
GetExitCodeThread
TlsFree
SetFilePointer
SetEndOfFile
MoveFileExW
GetWindowsDirectoryW
DuplicateHandle
FindFirstFileW
FindClose
CreateDirectoryW
FindFirstFileExW
FindNextFileW
QueryDosDeviceW
GetEnvironmentVariableW
SetFileInformationByHandle
GetDiskFreeSpaceExW
K32GetMappedFileNameW
FindFirstVolumeW
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
FindVolumeClose
VirtualQuery
GetSystemTimes
GetTickCount64
RaiseException
DecodePointer
QueryThreadCycleTime
ProcessIdToSessionId
WaitForThreadpoolWaitCallbacks
UnregisterWaitEx
ReadDirectoryChangesW
GetOverlappedResult
CancelIoEx
WriteConsoleW
EncodePointer
HeapSize
GetProcessHeap
HeapAlloc
GetModuleFileNameW
SetConsoleCtrlHandler
SetDllDirectoryW
WaitForSingleObject
GetProcessId
GetNamedPipeServerProcessId
GetFileTime
MultiByteToWideChar
ContinueDebugEvent
DebugActiveProcessStop
GetFileAttributesExW
GetSystemTimeAsFileTime
ReadProcessMemory
OpenThread
DebugBreakProcess
SetEvent
WaitForDebugEvent
DebugSetProcessKillOnExit
DebugActiveProcess
WideCharToMultiByte
VirtualQueryEx
GetThreadContext
K32GetProcessImageFileNameW
K32GetModuleBaseNameW
K32EnumProcessModules
WaitForMultipleObjects
CreateEventW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DeleteFileW
VerifyVersionInfoW
K32GetPerformanceInfo
DeviceIoControl
CreateFileW
GetLastError
CloseHandle
OpenProcess
GetProcAddress
GetModuleHandleW
GetCurrentProcess
TerminateProcess
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
ReleaseSRWLockShared
AcquireSRWLockShared
RegisterWaitForSingleObject
InitOnceBeginInitialize
InterlockedPushEntrySList
InitializeCriticalSectionAndSpinCount
ExitThread
FreeLibraryAndExitThread
GetStdHandle
GetCommandLineA
GetCommandLineW
InitOnceComplete
LCMapStringEx
GetLocaleInfoEx
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
SleepConditionVariableSRW
WakeAllConditionVariable
ReadConsoleW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
GetConsoleMode
GetConsoleOutputCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetFileType
LoadLibraryExA
OutputDebugStringW
CheckRemoteDebuggerPresent
FlushInstructionCache
SetEnvironmentVariableW
CreateThread
SetUnhandledExceptionFilter
AddVectoredExceptionHandler
RemoveVectoredExceptionHandler
GetNativeSystemInfo
K32EnumProcesses
GetProcessHandleCount
GetStringTypeW
WaitForSingleObjectEx
FormatMessageA
AreFileApisANSI
GetFileInformationByHandleEx
WakeConditionVariable
ExitProcess
user32
SendMessageW
SetWindowLongW
LoadStringW
RegisterWindowMessageW
RegisterClassExW
GetSystemMetrics
GetClassInfoExW
PostMessageW
PeekMessageW
IsHungAppWindow
SendMessageCallbackW
GetGUIThreadInfo
advapi32
CryptReleaseContext
CryptGenRandom
CryptAcquireContextW
RegQueryMultipleValuesW
RegDeleteTreeW
RegNotifyChangeKeyValue
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryInfoKeyW
RegDeleteValueW
RegEnumValueW
RegEnumKeyExW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
FreeSid
EqualSid
GetTokenInformation
CheckTokenMembership
DuplicateToken
RegOpenKeyExW
StartServiceW
QueryServiceStatus
AllocateAndInitializeSid
RevertToSelf
ImpersonateSelf
OpenThreadToken
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
CloseServiceHandle
ControlService
ChangeServiceConfigW
CreateServiceW
DeleteService
OpenServiceW
OpenSCManagerW
StartServiceCtrlDispatcherW
ChangeServiceConfig2W
QueryServiceConfig2W
RegisterServiceCtrlHandlerExW
SetServiceStatus
SetThreadToken
powrprof
CallNtPowerInformation
shlwapi
PathAppendW
PathRemoveFileSpecW
PathFindFileNameW
ole32
CoCreateGuid
Exports
Exports
asw_process_storage_allocate_connector
asw_process_storage_deallocate_connector
on_avast_dll_unload
onexit_register_connector_avast_2
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 611KB - Virtual size: 610KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 411KB - Virtual size: 439KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ