d:\src\master\Client\Confidence\Loader\Release\rkverify.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-14_9d7929e6dd668e271fd4e113985bc531_magniber.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-14_9d7929e6dd668e271fd4e113985bc531_magniber.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-14_9d7929e6dd668e271fd4e113985bc531_magniber
-
Size
1017KB
-
MD5
9d7929e6dd668e271fd4e113985bc531
-
SHA1
f57b3c8d5b3b3c935929cab6501a387cad3159f5
-
SHA256
0ab1bcd4a53de6769403102c7a269095fb77f2cc9cc2bcbecf32ddc3c7b8968a
-
SHA512
18044d49e3d571de967f15632fc2d4c26508b4a0992faa7682134bbf3dc28131d833162229df3688430a5a9ababb6bc69ad620af0a04613a64c8acc005c6b810
-
SSDEEP
24576:p820cKhW3YqJiETfhZMDM2Am3QzUjVvsLK:p8lcKhJGiETfU/Am3Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-14_9d7929e6dd668e271fd4e113985bc531_magniber
Files
-
2024-03-14_9d7929e6dd668e271fd4e113985bc531_magniber.exe windows:5 windows x86 arch:x86
224abdce18beea40b6b05b792b0d9955
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetTempPathA
SetEvent
CreateEventA
GetCurrentProcessId
GetModuleFileNameA
GetCurrentProcess
GetVersion
InitializeSListHead
Process32Next
GetTempFileNameA
CreateToolhelp32Snapshot
InterlockedPopEntrySList
Thread32Next
Thread32First
WaitForSingleObject
InterlockedIncrement
InterlockedDecrement
InterlockedPushEntrySList
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
InterlockedCompareExchange
ResetEvent
WaitForMultipleObjects
GetTickCount
Sleep
DeleteFileA
GetModuleHandleA
FindResourceA
LoadResource
LockResource
SizeofResource
LoadLibraryA
GetProcAddress
FormatMessageA
lstrlenA
LocalAlloc
FreeLibrary
CloseHandle
GetBinaryTypeA
MoveFileExA
GetWindowsDirectoryA
WritePrivateProfileStringA
GetVersionExA
OpenProcess
LocalFree
GetCurrentThreadId
SetUnhandledExceptionFilter
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
Process32First
TryEnterCriticalSection
SetCriticalSectionSpinCount
ReleaseMutex
ReleaseSemaphore
CancelWaitableTimer
SetWaitableTimer
OpenEventA
CreateMutexA
OpenMutexA
CreateSemaphoreA
CreateWaitableTimerA
GetComputerNameA
GetSystemDirectoryA
HeapFree
HeapAlloc
GetProcessHeap
GetExitCodeThread
SetThreadPriority
QueryPerformanceFrequency
QueryPerformanceCounter
SystemTimeToFileTime
CompareFileTime
GetSystemTimeAsFileTime
FileTimeToSystemTime
GetSystemTime
GetLocalTime
GetDateFormatA
GetTimeFormatA
SetEnvironmentVariableA
LoadLibraryExA
FindClose
FindFirstFileA
FindNextFileA
FindFirstFileW
FindNextFileW
GetShortPathNameA
WritePrivateProfileSectionA
GetPrivateProfileSectionA
CreateDirectoryA
WriteFile
SetFilePointer
CreateFileA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
InterlockedExchange
InitializeCriticalSection
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
ExitThread
CreateThread
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
HeapSize
HeapCreate
HeapDestroy
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
SetHandleCount
GetStdHandle
GetFileType
FatalAppExitA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
GetACP
GetOEMCP
IsValidCodePage
SetConsoleCtrlHandler
LoadLibraryW
GetLocaleInfoW
VirtualQuery
HeapQueryInformation
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetStdHandle
GetTimeZoneInformation
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
CreateFileW
SetEndOfFile
CompareStringW
GetModuleFileNameW
user32
LoadMenuA
LoadStringA
PostMessageA
LoadImageA
EnumWindows
EnumChildWindows
ExitWindowsEx
InvalidateRect
UnhookWindowsHookEx
GetSystemMetrics
MessageBoxA
GetWindowThreadProcessId
SetWindowsHookExA
GetClassNameA
advapi32
RegSetKeySecurity
RegSaveKeyA
RegFlushKey
RegQueryInfoKeyA
InitializeAcl
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
ConvertSidToStringSidA
GetTokenInformation
SetTokenInformation
GetLengthSid
GetSidSubAuthority
GetSidSubAuthorityCount
IsValidSid
DuplicateTokenEx
SetSecurityDescriptorDacl
AddAccessAllowedAce
RegDeleteKeyA
RegCreateKeyExA
RegEnumValueA
RegEnumKeyExA
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetFileSecurityA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
SetSecurityInfo
ole32
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoUninitialize
CoCreateInstance
CoTaskMemFree
oleaut32
SysFreeString
VariantInit
VariantClear
SysAllocString
GetErrorInfo
VariantChangeType
SetErrorInfo
CreateErrorInfo
psapi
GetModuleFileNameExA
shlwapi
SHCopyKeyA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueA
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 355KB - Virtual size: 356KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 473KB - Virtual size: 472KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 87KB - Virtual size: 87KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE