D:\jenkins_Trunk\workspace\Mainline_SourceJob_2\qqpcmgr_proj\Basic\Output\BinFinal\QQPCMgrPacket.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-06_c366b0e01fd724e1f9a895e6036d2343_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-06_c366b0e01fd724e1f9a895e6036d2343_magniber.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-06_c366b0e01fd724e1f9a895e6036d2343_magniber
-
Size
5.3MB
-
MD5
c366b0e01fd724e1f9a895e6036d2343
-
SHA1
92f84bfd479e5ba7a8520223731820c52a2d1b61
-
SHA256
c550b13f36a7b39b3b16fc0bb0b7467ccce868c194caad57318ed383c728b09c
-
SHA512
9eb21f27b4818adc9311a8a9224da7f8f33c6e3f81a274648eebcde2c02cb9c568de7521ce37ef7946a7c96436aa4653994f1ad8afd9d80eb7d1333b241f36c6
-
SSDEEP
98304:6EOyPG2aTEhEfoUUUWc7tdRMPv6Pq4xgsmkMU86HBEgs43gr:wyunEeM6duC/GsgUlHS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-06_c366b0e01fd724e1f9a895e6036d2343_magniber
Files
-
2024-04-06_c366b0e01fd724e1f9a895e6036d2343_magniber.exe windows:4 windows x86 arch:x86
dd3395bef40c61aec92124b50793a88e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Process32NextW
Module32FirstW
Module32NextW
SetThreadPriority
ReleaseMutex
OpenThread
SuspendThread
VirtualFree
VirtualAlloc
ReleaseSemaphore
CreateSemaphoreW
GetStdHandle
SetEndOfFile
GetTempFileNameW
MoveFileW
GetFullPathNameW
GetSystemInfo
Process32FirstW
CreateToolhelp32Snapshot
GetDriveTypeA
GetCurrentDirectoryA
GetLocaleInfoW
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
OutputDebugStringW
IsValidCodePage
GetOEMCP
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
HeapCreate
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
LCMapStringW
LCMapStringA
RtlUnwind
GetSystemTimeAsFileTime
ExitProcess
IsDebuggerPresent
UnhandledExceptionFilter
GetModuleHandleA
VirtualProtect
ExitThread
GetStartupInfoW
IsProcessorFeaturePresent
InterlockedCompareExchange
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetLocalTime
CreatePipe
IsDBCSLeadByte
GetCPInfo
LoadLibraryA
VirtualQuery
GetSystemDefaultLangID
CreateFileA
GlobalAlloc
GlobalLock
SetFilePointer
CreateDirectoryW
RemoveDirectoryW
MoveFileExW
LocalAlloc
CreateFileMappingW
LoadLibraryExW
MapViewOfFileEx
CreateMutexW
OpenMutexW
SetCurrentDirectoryW
lstrcmpiW
GetPrivateProfileIntW
GlobalMemoryStatus
FreeResource
CreateThread
RaiseException
GetDriveTypeW
FreeLibrary
GetLogicalDriveStringsW
WriteFile
FlushInstructionCache
WideCharToMultiByte
GetDiskFreeSpaceExW
DeviceIoControl
GetVersion
GetPrivateProfileStringW
GetExitCodeProcess
lstrcmpW
UnmapViewOfFile
MapViewOfFile
OpenFileMappingW
MultiByteToWideChar
QueryDosDeviceW
FindNextFileW
GetFileAttributesW
lstrlenW
WritePrivateProfileStringW
GetCurrentDirectoryW
GetWindowsDirectoryW
ExpandEnvironmentStringsW
CreateProcessW
OpenProcess
SearchPathW
InitializeCriticalSection
SetErrorMode
GetCurrentThreadId
GetCurrentProcessId
GetModuleFileNameW
GetCommandLineW
lstrcpynW
VirtualAllocEx
WriteProcessMemory
SetUnhandledExceptionFilter
TerminateProcess
SetLastError
LocalFree
FindClose
FindFirstFileW
GetCurrentThread
GetModuleHandleW
FindResourceExW
LoadResource
LockResource
SetFileAttributesW
SizeofResource
FindResourceW
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
LeaveCriticalSection
EnterCriticalSection
DuplicateHandle
GetCurrentProcess
GetLastError
InitializeCriticalSectionAndSpinCount
HeapAlloc
InterlockedIncrement
GetProcessHeap
HeapFree
DeleteCriticalSection
GlobalFree
InterlockedDecrement
WaitForMultipleObjects
SetEvent
WaitForSingleObject
ResetEvent
CreateEventW
GetVersionExW
CopyFileW
Sleep
GetTickCount
ReadFile
CloseHandle
GetFileSize
CreateFileW
DeleteFileW
GetTempPathW
lstrlenA
user32
UnregisterClassA
LoadStringW
CharLowerW
LoadIconW
CreateWindowExW
SetWindowLongW
DestroyWindow
MessageBoxW
FindWindowW
SendMessageTimeoutW
CopyRect
SetWindowPos
LoadImageW
PostQuitMessage
GetWindowPlacement
PostThreadMessageW
DestroyIcon
SetActiveWindow
SendMessageW
DefWindowProcW
PostMessageW
IsWindow
GetWindowLongW
GetMessageW
TranslateMessage
mouse_event
GetSystemMetrics
OffsetRect
DrawFrameControl
UpdateLayeredWindow
CopyImage
EqualRect
GetDlgCtrlID
DrawIconEx
IsWindowVisible
EndPaint
BeginPaint
ReleaseCapture
SetCursor
SetCapture
PtInRect
GetKeyState
TrackPopupMenu
GetMonitorInfoW
GetSystemMenu
MonitorFromWindow
SetWindowRgn
FrameRect
FillRect
CallWindowProcW
GetWindowDC
ClientToScreen
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
SetTimer
KillTimer
DrawTextW
CharUpperW
AttachThreadInput
GetForegroundWindow
GetWindowThreadProcessId
GetDC
ReleaseDC
InflateRect
SetForegroundWindow
CharNextW
GetWindow
SetRect
GetClientRect
MoveWindow
SystemParametersInfoW
DispatchMessageW
GetWindowRect
MapWindowPoints
PeekMessageW
MsgWaitForMultipleObjectsEx
EnableWindow
IsWindowEnabled
GetDesktopWindow
GetActiveWindow
GetDlgItem
GetParent
LoadCursorW
GetClassInfoExW
ShowWindow
InvalidateRect
RegisterClassExW
gdi32
RoundRect
Rectangle
CreateCompatibleBitmap
CreateCompatibleDC
GetObjectW
GetStockObject
CreateDIBSection
BitBlt
CreateBitmap
GetClipRgn
SetBkColor
SetTextColor
DeleteDC
ExtTextOutW
CreateFontIndirectW
CreatePen
AddFontResourceW
DeleteObject
MoveToEx
CombineRgn
CreateRectRgn
CreateRectRgnIndirect
SelectClipRgn
SetBkMode
ExtSelectClipRgn
GetTextMetricsW
CreateSolidBrush
SaveDC
RectInRegion
RestoreDC
TextOutW
OffsetRgn
StretchBlt
LineTo
SelectObject
GetTextExtentPoint32W
advapi32
FreeSid
SetEntriesInAclW
AllocateAndInitializeSid
DeleteService
QueryServiceStatus
ControlService
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegEnumKeyExW
RegQueryInfoKeyW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegDeleteKeyW
RegLoadKeyW
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyW
RegDeleteValueW
RegCreateKeyExW
RegQueryValueExW
RegSetValueExW
GetTokenInformation
AdjustTokenPrivileges
IsValidSid
GetLengthSid
GetAce
LookupAccountNameW
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueW
GetAclInformation
SetNamedSecurityInfoW
SetSecurityInfo
AddAce
CopySid
GetSecurityInfo
InitializeAcl
GetNamedSecurityInfoW
RegCloseKey
RegOpenKeyExW
IsTextUnicode
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHBrowseForFolderW
ShellExecuteW
SHGetSpecialFolderPathW
ord680
SHCreateDirectoryExW
ole32
CoCreateInstance
CreateStreamOnHGlobal
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
CoTaskMemRealloc
oleaut32
VariantInit
VariantCopy
VariantClear
SysAllocString
SysFreeString
VarUI4FromStr
OleLoadPicture
shlwapi
PathRemoveFileSpecW
PathIsDirectoryW
StrStrW
StrChrW
StrCatW
PathAddBackslashW
StrToIntExW
StrToIntA
PathFindFileNameW
PathRemoveBackslashW
PathFileExistsW
PathAppendW
wnsprintfW
comctl32
_TrackMouseEvent
InitCommonControlsEx
ws2_32
htonl
ntohl
htons
wininet
InternetGetConnectedState
InternetCloseHandle
InternetReadFile
HttpQueryInfoW
InternetOpenUrlW
InternetOpenW
userenv
UnloadUserProfile
psapi
GetModuleFileNameExW
GetProcessImageFileNameW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
crypt32
CryptMsgGetParam
CertFindCertificateInStore
CryptQueryObject
CertGetNameStringW
netapi32
Netbios
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 168KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ