C:\Users\Admin\Desktop\dfir-orc\build-x86\MinSizeRel\DFIR-Orc_x86.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-18_b5dc212604d9c9ab2dee325005b95cfd_magniber_revil.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-18_b5dc212604d9c9ab2dee325005b95cfd_magniber_revil.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-18_b5dc212604d9c9ab2dee325005b95cfd_magniber_revil
-
Size
13.3MB
-
MD5
b5dc212604d9c9ab2dee325005b95cfd
-
SHA1
bbc38366e5d3f9d36290bd325c9089c65b887ad4
-
SHA256
3714573cdaea26776d6de06a79ad5842ee8da76a246c2823a46b71878cd70110
-
SHA512
b168be8d1bae2967967ea2204ccc776c40130715fb2c7c108f52ae0603ebb264fcd985b5f7db1a70678b5a3ce1885789b6123472632f172b4e154a757eda9d70
-
SSDEEP
393216:wJKpXrrO28aaU11AWPqSyhDSZ6EAh9+wOZOZbXUN3:wYk28aa+yhGZ6EuwwOoBe3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-18_b5dc212604d9c9ab2dee325005b95cfd_magniber_revil
Files
-
2024-03-18_b5dc212604d9c9ab2dee325005b95cfd_magniber_revil.exe windows:5 windows x86 arch:x86
bc97dd70a2deee8216bc01a7aac1d5f5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
setupapi
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInterfaceDetailW
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsW
psapi
GetModuleFileNameExW
EnumProcesses
EnumDeviceDrivers
GetDeviceDriverFileNameW
GetProcessImageFileNameW
cabinet
ord22
ord20
ord14
ord12
ord13
ord11
ord10
ord23
wintrust
CryptCATAdminReleaseContext
crypt32
CryptQueryObject
CertGetCertificateChain
CertFreeCertificateChain
CertGetCertificateContextProperty
CertGetNameStringW
CryptBinaryToStringW
CertAddEncodedCertificateToStore
CertNameToStrW
CryptStringToBinaryA
CryptMsgOpenToEncode
CryptMsgUpdate
CryptMsgOpenToDecode
CryptMsgControl
CertGetSubjectCertificateFromStore
CertAddCertificateContextToStore
CryptAcquireCertificatePrivateKey
CertOpenSystemStoreW
CryptMsgGetAndVerifySigner
CertFreeCertificateContext
CertDuplicateCertificateContext
CertCloseStore
CertOpenStore
CryptMsgGetParam
CryptMsgClose
CryptDecodeObject
CryptStringToBinaryW
ws2_32
closesocket
connect
getsockopt
recv
send
setsockopt
WSAGetLastError
kernel32
DeleteCriticalSection
InterlockedIncrement
IsDebuggerPresent
DebugBreak
GetStdHandle
OutputDebugStringW
SetConsoleTextAttribute
GetProcAddress
SetLastError
GetModuleHandleW
SetEnvironmentVariableW
GetFullPathNameW
ExpandEnvironmentStringsW
FreeLibrary
OpenProcess
GetCurrentProcess
GetCurrentThread
SetThreadPriority
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
Sleep
CloseHandle
GetSystemTime
GetTickCount
SetPriorityClass
SystemTimeToFileTime
GetSystemTimeAsFileTime
DeviceIoControl
GetWindowsDirectoryW
CreateFileW
QueryPerformanceCounter
WaitForSingleObject
CreateProcessW
DeleteFileW
LocalFree
SetCurrentDirectoryW
GetCurrentDirectoryW
CopyFileW
SetThreadExecutionState
GetFileAttributesExW
GetProcessTimes
ExitProcess
SetUnhandledExceptionFilter
SetErrorMode
SetEvent
ResetEvent
CreateEventW
SetConsoleCtrlHandler
VirtualAlloc
VirtualFree
HeapCreate
lstrcmpA
VirtualProtect
WriteFile
GetSystemInfo
FileTimeToSystemTime
FormatMessageW
MultiByteToWideChar
GetConsoleMode
GetConsoleScreenBufferInfo
WriteConsoleA
WriteConsoleW
GetOverlappedResult
GetEnvironmentVariableW
QueryDosDeviceW
GetFileAttributesW
CancelIo
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
GetVolumePathNamesForVolumeNameW
LockResource
LoadResource
SizeofResource
LoadLibraryExW
GetModuleFileNameW
FindResourceW
GetBinaryTypeW
CreateDirectoryW
GetDriveTypeW
GetComputerNameW
GetComputerNameExW
GetVersionExW
GetVolumePathNameW
MoveFileExW
GetLastError
GetTempPathW
GetTempFileNameW
WideCharToMultiByte
InterlockedDecrement
TerminateProcess
CreateIoCompletionPort
GetQueuedCompletionStatus
RegisterWaitForSingleObject
QueueUserWorkItem
RaiseException
TerminateJobObject
QueryInformationJobObject
SetInformationJobObject
GetFileSizeEx
ReadFile
SetEndOfFile
SetFilePointerEx
DuplicateHandle
CreateToolhelp32Snapshot
Module32FirstW
Module32NextW
GetCurrentProcessId
Process32FirstW
Process32NextW
GetLogicalDrives
CreateNamedPipeW
BindIoCompletionCallback
GetExitCodeProcess
ResumeThread
WaitForSingleObjectEx
RemoveDirectoryW
AssignProcessToJobObject
IsProcessInJob
GetFileSize
FindClose
FindFirstFileW
FindNextFileW
GetFileInformationByHandle
GetVolumeInformationW
SetFilePointer
BeginUpdateResourceW
UpdateResourceW
RtlCaptureStackBackTrace
DosDateTimeToFileTime
VirtualQuery
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
FreeResource
CreatePipe
PeekNamedPipe
GetProcessIoCounters
FileTimeToDosDateTime
LocalAlloc
OpenThread
GetThreadContext
WaitForDebugEvent
ContinueDebugEvent
DebugActiveProcess
InterlockedCompareExchange
GetThreadLocale
CopyFileExW
CompareFileTime
LocalFileTimeToFileTime
GlobalMemoryStatus
GetProcessAffinityMask
FileTimeToLocalFileTime
ReleaseSemaphore
CreateSemaphoreW
GetCurrentThreadId
LoadLibraryW
WaitForMultipleObjects
SetFileTime
SetFileAttributesW
GetSystemDirectoryW
MoveFileW
FindCloseChangeNotification
FindFirstChangeNotificationW
GetLogicalDriveStringsW
GetModuleHandleA
ReleaseMutex
CreateMutexA
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateFileA
CreateFileMappingA
VirtualQueryEx
ReadProcessMemory
QueryPerformanceFrequency
SwitchToThread
InitOnceExecuteOnce
GetModuleFileNameA
MoveFileExA
GetCommandLineA
GetFileType
ExitThread
GetModuleHandleExW
SetConsoleMode
ReadConsoleInputA
PeekConsoleInputA
GetNumberOfConsoleInputEvents
RtlUnwind
WaitForMultipleObjectsEx
SetProcessAffinityMask
UnregisterWait
SetThreadAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetThreadPriority
CreateThread
SignalObjectAndWait
CreateTimerQueue
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
FreeLibraryAndExitThread
GetThreadTimes
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
DecodePointer
GetCommandLineW
EnumSystemLocalesW
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetACP
ReadConsoleW
GetConsoleCP
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
CreateJobObjectW
FlushFileBuffers
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
OutputDebugStringA
GetTimeZoneInformation
GetLongPathNameW
EndUpdateResourceW
TryEnterCriticalSection
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
EncodePointer
CreateHardLinkW
CreateDirectoryExW
AreFileApisANSI
GetDiskFreeSpaceExW
FindFirstFileExW
GetStringTypeW
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
InitializeSListHead
user32
WaitForInputIdle
GetSystemMetrics
UnregisterClassW
CharPrevExA
CharUpperW
MessageBeep
shell32
SHGetFolderPathW
ole32
StringFromGUID2
CoSetProxyBlanket
CoCreateInstance
CoTaskMemFree
CLSIDFromString
CoInitializeEx
CoInitializeSecurity
oleaut32
VariantClear
SysAllocStringLen
GetErrorInfo
SetErrorInfo
CreateErrorInfo
SysAllocStringByteLen
SysStringLen
SysFreeString
VariantCopy
SysAllocString
VariantInit
VariantChangeType
advapi32
CryptGenRandom
CryptAcquireContextA
LookupPrivilegeValueA
SetSecurityInfo
SetEntriesInAclW
LookupPrivilegeValueW
CopySid
GetLengthSid
EqualSid
IsValidSid
AdjustTokenPrivileges
CryptReleaseContext
GetSecurityInfo
ConvertSidToStringSidW
LookupAccountSidW
GetTokenInformation
OpenProcessToken
IsTextUnicode
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptAcquireContextW
RegSetValueExW
RegQueryValueExW
RegOpenKeyW
ConvertSecurityDescriptorToStringSecurityDescriptorW
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorLength
RegFlushKey
shlwapi
PathMatchSpecA
StrRChrW
PathMatchSpecW
mpr
WNetCancelConnection2W
WNetAddConnection2W
winhttp
WinHttpOpen
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpOpenRequest
WinHttpSendRequest
WinHttpSetCredentials
WinHttpQueryAuthSchemes
WinHttpReceiveResponse
WinHttpConnect
Sections
.text Size: 4.4MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 188KB - Virtual size: 231KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7.2MB - Virtual size: 7.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 248KB - Virtual size: 247KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ