d:\dbs\el\de2\Target\x86\ship\click2run\en-us.pre\SetupBootstrapper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_60e067b491d83e2e6d0a7fcf1b85514d_floxif_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-12_60e067b491d83e2e6d0a7fcf1b85514d_floxif_magniber.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-12_60e067b491d83e2e6d0a7fcf1b85514d_floxif_magniber
-
Size
6.2MB
-
MD5
60e067b491d83e2e6d0a7fcf1b85514d
-
SHA1
e8b094e8c9438dbeba9ce5c1307e09a96ce9f468
-
SHA256
10d0fe3c918d371c4fc32e7a9350b9aee514eba0ed7cf4c05b532bed98dbc826
-
SHA512
74d1f0516373b7dc7c899a3b6b7fd9614fa676130d065f0a2ddfab1682b5bc025117a8cb82bbe953eae654111943fedeb2dff0fef5a8093a2607bd93dc8c2114
-
SSDEEP
98304:8fmm/BK9y+NZYGzHaqXxSES8g+34/H5VG3WtP1h1oTMDntqKkx+lpLxnowY2hv:8fzo1fhTaqXxlyH54mtP1h1oTKtVloWv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-12_60e067b491d83e2e6d0a7fcf1b85514d_floxif_magniber
Files
-
2024-03-12_60e067b491d83e2e6d0a7fcf1b85514d_floxif_magniber.exe windows:5 windows x86 arch:x86
fdd218a2c7518cdb2b331ecafaf65e93
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
PDB Paths
Imports
advapi32
ConvertSidToStringSidW
OpenProcessToken
GetTokenInformation
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
EventWriteTransfer
EventRegister
EventUnregister
CreateWellKnownSid
CheckTokenMembership
RegEnumKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegDeleteTreeW
RegDeleteKeyW
RegGetValueW
RegDeleteValueW
IsValidSid
GetSidSubAuthorityCount
GetSidSubAuthority
RegNotifyChangeKeyValue
RevertToSelf
OpenThreadToken
GetLengthSid
CopySid
InitializeAcl
AddAccessAllowedAce
AllocateAndInitializeSid
FreeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidA
EqualSid
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenSCManagerW
CloseServiceHandle
OpenServiceW
QueryServiceStatusEx
QueryServiceConfigW
RegEnumValueA
RegDeleteValueA
RegGetValueA
EventWrite
ole32
CoEnableCallCancellation
CoDisableCallCancellation
CoUninitialize
CoInitialize
CLSIDFromString
CoRevokeInitializeSpy
CoRegisterInitializeSpy
CreateStreamOnHGlobal
CoTaskMemAlloc
IIDFromString
CoTaskMemFree
CoCreateInstance
CoSetProxyBlanket
CoCreateFreeThreadedMarshaler
StringFromGUID2
CoCreateGuid
CoInitializeSecurity
CoInitializeEx
CoCancelCall
gdi32
GetStockObject
CreateFontW
SelectObject
GetTextMetricsW
SetBkColor
SetDCPenColor
Rectangle
DeleteObject
GetTextExtentPoint32W
SetDCBrushColor
CreateSolidBrush
CreatePen
SetTextColor
GetDeviceCaps
oleaut32
VariantClear
SysFreeString
SysAllocString
VariantInit
ws2_32
FreeAddrInfoW
GetAddrInfoW
WSAStartup
kernel32
VirtualProtect
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetNumaHighestNodeNumber
ChangeTimerQueueTimer
GetThreadPriority
SetThreadPriority
CreateTimerQueue
InterlockedFlushSList
RtlUnwind
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
DuplicateHandle
UnhandledExceptionFilter
CompareStringW
GetCPInfo
EncodePointer
InitializeCriticalSectionAndSpinCount
InitOnceComplete
InitOnceBeginInitialize
GetFileInformationByHandle
GetStringTypeW
OpenThread
GetSystemPreferredUILanguages
UnregisterWaitEx
GetConsoleMode
K32GetProcessImageFileNameW
GetDateFormatW
GetTimeFormatW
GetDriveTypeW
DeleteTimerQueueTimer
CreateTimerQueueTimer
CloseHandle
GetLastError
GetModuleHandleA
GetModuleHandleW
GetProcAddress
LoadLibraryW
SetLastError
GetModuleFileNameW
OutputDebugStringA
CompareStringEx
LocalFree
HeapFree
GetProcessHeap
GetCurrentProcess
GetCurrentProcessId
CreateThread
GetCurrentThreadId
GetExitCodeThread
DeleteFileW
WriteFile
ReadFile
SetFilePointerEx
FreeLibrary
WideCharToMultiByte
IsWow64Process
GetModuleHandleExW
ExpandEnvironmentStringsW
GlobalFree
MultiByteToWideChar
RaiseException
InitializeCriticalSectionEx
DeleteCriticalSection
DecodePointer
CreateMutexW
GetCommandLineW
GlobalMemoryStatusEx
GetNativeSystemInfo
VerSetConditionMask
VerifyVersionInfoW
GetUserDefaultLocaleName
FlsFree
FlsAlloc
Sleep
AttachConsole
AllocConsole
GetStdHandle
WriteConsoleW
FreeConsole
LocaleNameToLCID
FindClose
UnmapViewOfFile
CreateFileA
CreateFileMappingA
GetFileSize
MapViewOfFile
GetStringTypeExW
GetUserDefaultLCID
LoadLibraryA
LCMapStringW
FormatMessageA
GetSystemTimeAsFileTime
TlsAlloc
TlsFree
FlsGetValue
TlsGetValue
FlsSetValue
TlsSetValue
GetTickCount64
K32GetProcessMemoryInfo
InitializeSRWLock
ReleaseSRWLockShared
AcquireSRWLockShared
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetProcessTimes
ReadConsoleW
GetModuleFileNameA
GetShortPathNameA
K32GetModuleFileNameExW
CreateProcessW
LoadLibraryExW
FindResourceW
SizeofResource
LoadResource
OpenProcess
GetVersionExW
GetDiskFreeSpaceExW
CreateFileW
DeviceIoControl
SetErrorMode
GetComputerNameW
MulDiv
FormatMessageW
GetLogicalProcessorInformation
GetSystemDirectoryW
HeapAlloc
IsValidCodePage
GetSystemTime
SystemTimeToFileTime
FileTimeToSystemTime
GetCPInfoExW
CreateEventW
SetEvent
WaitForSingleObject
WaitForMultipleObjectsEx
CreateEventExW
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
CloseThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CreateThreadpoolTimer
CloseThreadpoolWait
SetThreadpoolWait
WaitForThreadpoolWaitCallbacks
CreateThreadpoolWait
CreateThreadpoolWork
SubmitThreadpoolWork
ReleaseSemaphore
WaitForSingleObjectEx
QueryDepthSList
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeSListHead
InterlockedPushEntrySList
InterlockedPopEntrySList
RtlCaptureStackBackTrace
ReleaseMutex
TzSpecificLocalTimeToSystemTime
GetTempPathW
GetLongPathNameW
ResetEvent
QueryPerformanceCounter
QueryPerformanceFrequency
VirtualProtectEx
GetSystemInfo
GlobalAlloc
GetFileSizeEx
LockResource
CreateFileMappingW
SetEndOfFile
GetOverlappedResult
FlushFileBuffers
CancelIoEx
GetFileAttributesExW
CreateDirectoryW
SetFileAttributesW
GetFileAttributesW
RemoveDirectoryW
FindFirstFileExW
FindNextFileW
GetFileType
SetFilePointer
UnlockFile
LockFile
SetFileInformationByHandle
GetFileInformationByHandleEx
GetTempFileNameW
SignalObjectAndWait
GetProcessAffinityMask
CreateWaitableTimerW
SetWaitableTimerEx
CancelWaitableTimer
GetTickCount
WerRegisterMemoryBlock
WerUnregisterMemoryBlock
QueryFullProcessImageNameW
CreateIoCompletionPort
PostQueuedCompletionStatus
GetThreadIOPendingFlag
GetCurrentThread
GetQueuedCompletionStatus
IsDebuggerPresent
WaitForMultipleObjects
GetStartupInfoW
CreateMemoryResourceNotification
GetSystemPowerStatus
IsSystemResumeAutomatic
QueryUnbiasedInterruptTime
OutputDebugStringW
VirtualFree
VirtualAlloc
OpenEventA
CreateEventA
OpenMutexA
CreateMutexA
OpenSemaphoreA
CreateSemaphoreA
OpenFileMappingA
LocalAlloc
GetThreadLocale
MoveFileExW
FindFirstFileW
lstrcmpW
CopyFileW
FlushViewOfFile
GetFullPathNameW
ProcessIdToSessionId
DeleteFileA
GetTempPathA
GetCurrentDirectoryW
SetEnvironmentVariableW
GetPriorityClass
GetExitCodeProcess
K32EnumProcesses
GetTimeZoneInformation
IsValidLocale
GetLocaleInfoEx
LCIDToLocaleName
GetLocaleInfoW
ResolveLocaleName
GetUserPreferredUILanguages
GetACP
LCMapStringEx
GetSystemDefaultLCID
EnumSystemLocalesEx
GetSystemDefaultLocaleName
GetUserGeoID
AreFileApisANSI
HeapCreate
GetDiskFreeSpaceW
InitializeCriticalSection
GetFullPathNameA
UnlockFileEx
HeapValidate
HeapSize
GetDiskFreeSpaceA
GetFileAttributesA
HeapReAlloc
HeapCompact
HeapDestroy
LockFileEx
GetPhysicallyInstalledSystemMemory
GetProductInfo
SwitchToThread
GetConsoleOutputCP
ExitThread
ExitProcess
EnumSystemLocalesW
SetStdHandle
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
VirtualQuery
LoadLibraryExA
TerminateProcess
GetLocalTime
wintrust
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
WinVerifyTrust
setupapi
SetupIterateCabinetW
gdiplus
GdipLoadImageFromStream
GdipFree
GdipFillRectangleI
GdipCloneBrush
GdipDeleteBrush
GdipDrawImageRectI
GdipDrawImageRectRectI
GdipDeleteGraphics
GdipCreateFromHDC
GdipCreateSolidFill
GdipGetImageGraphicsContext
GdipGetImageWidth
GdipGetImageHeight
GdipCreateBitmapFromScan0
GdipDisposeImage
GdipCloneImage
GdiplusStartup
GdipAlloc
rpcrt4
UuidToStringW
RpcStringFreeW
Sections
.text Size: 3.7MB - Virtual size: 3.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 91KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 599KB - Virtual size: 598KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ