Behavioral task
behavioral1
Sample
2024-03-15_62ba373d940292096da3a20ca231cc0e_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-15_62ba373d940292096da3a20ca231cc0e_magniber.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-15_62ba373d940292096da3a20ca231cc0e_magniber
-
Size
3.3MB
-
MD5
62ba373d940292096da3a20ca231cc0e
-
SHA1
146aeee9b3b8d485af2f2c1e17548eb59fbac052
-
SHA256
b3aee3a6eee2cfcfa7ebfa57bb851038656818930b4219d75e7d0df80958de88
-
SHA512
c9f5ecb239d8c0a281b680bf724aaff316ebf2708344b9de5e7f612bfb64d93b04521c7dadfba4484e9ebd3e79c06c49716dff6b1eb822ac2ec70d6873d145cb
-
SSDEEP
24576:w0w5hBTnxx33JNOdNaeae7h0qTk8PHs1uUJbKkKF/eMNPjOIDFW:w0W3DuNaeae7nHz69KFeM3W
Malware Config
Signatures
-
Detects executables packed with VMProtect. 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_VMProtect -
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-15_62ba373d940292096da3a20ca231cc0e_magniber
Files
-
2024-03-15_62ba373d940292096da3a20ca231cc0e_magniber.exe windows:5 windows x86 arch:x86
0baa75faa7dcfec6b49bf40dd1dd095d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryW
ProcessIdToSessionId
Sleep
CreateProcessW
TerminateProcess
LoadLibraryA
GetVersionExW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
QueryPerformanceCounter
InitializeCriticalSection
TerminateThread
DeleteCriticalSection
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
SetEvent
CreateEventW
OutputDebugStringW
GetFileSizeEx
ReadFile
GetFileSize
InterlockedDecrement
GlobalAlloc
GlobalFree
VirtualQuery
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
CreateFileA
GetSystemDirectoryW
LoadLibraryW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
CreateThread
GetCurrentThread
SetThreadPriority
SetPriorityClass
GetModuleFileNameW
ExitProcess
SetUnhandledExceptionFilter
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetProcAddress
GetCurrentProcessId
OpenProcess
MultiByteToWideChar
WriteFile
GetTickCount
GetCurrentThreadId
GetLocaleInfoW
SetStdHandle
WriteConsoleW
LocalFileTimeToFileTime
GetCurrentDirectoryW
SystemTimeToFileTime
GetProcessId
CreateRemoteThread
ResumeThread
SuspendThread
WaitForMultipleObjects
ExitThread
SetThreadContext
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeA
FlushFileBuffers
GetConsoleMode
GetThreadContext
GetConsoleCP
IsValidCodePage
GetOEMCP
WriteProcessMemory
GetACP
HeapCreate
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
GetStringTypeW
LCMapStringW
LCMapStringA
GetCPInfo
RtlUnwind
GetSystemTimeAsFileTime
IsDebuggerPresent
UnhandledExceptionFilter
GetStartupInfoW
CreateFileW
GetModuleHandleW
GetCurrentProcess
VirtualAllocEx
VirtualAlloc
OpenMutexW
GetLastError
CloseHandle
CreateMutexW
InterlockedIncrement
InterlockedCompareExchange
InterlockedExchange
SetFilePointer
GetSystemInfo
GetModuleHandleA
VirtualFree
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
OpenDesktopW
GetWindowThreadProcessId
FindWindowExW
GetAsyncKeyState
wsprintfW
GetThreadDesktop
SetThreadDesktop
FindWindowW
advapi32
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
CreateProcessAsUserW
shell32
ShellExecuteW
ShellExecuteExW
oleaut32
VariantClear
shlwapi
PathFileExistsW
StrCmpIW
wininet
InternetOpenW
InternetSetOptionW
InternetOpenUrlW
InternetReadFile
InternetCloseHandle
InternetConnectW
HttpOpenRequestW
InternetSetOptionA
InternetQueryOptionW
HttpSendRequestW
HttpQueryInfoW
psapi
GetModuleFileNameExW
ws2_32
socket
setsockopt
htons
inet_addr
sendto
recvfrom
ntohs
closesocket
inet_ntoa
ntohl
htonl
WSAJoinLeaf
gethostname
WSAStartup
WSASocketW
recv
send
gethostbyname
WSAConnect
bind
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
dnsapi
DnsFree
DnsQuery_W
iphlpapi
GetAdaptersInfo
SendARP
GetIpNetTable
Sections
.text Size: - Virtual size: 248KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 507KB - Virtual size: 507KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 156B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ