Static task
static1
Behavioral task
behavioral1
Sample
2024-04-22_03f7c63acbfcab0b90cb0eaa138fc6f0_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-22_03f7c63acbfcab0b90cb0eaa138fc6f0_magniber.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-22_03f7c63acbfcab0b90cb0eaa138fc6f0_magniber
-
Size
8.3MB
-
MD5
03f7c63acbfcab0b90cb0eaa138fc6f0
-
SHA1
ac8d59d78735c935827c1b25599e118849104092
-
SHA256
a87efb8ecd80c87e0887273ec866e5b4034659e7d4cec60c39d57b8c77729827
-
SHA512
8a7ea1fc91e7b2889743aa436643b5cda34964c4996edfef5e1ea080aab9d60964c3c0808b44597748308b19f041e3cf57b4d7af0f531e08f6e1bb107ced750a
-
SSDEEP
196608:1myyZaizOPOC2YAj1yJcQew3QVaxQwolJCHiYfP2:4zqJ7ViaxQZlJ+iYH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-22_03f7c63acbfcab0b90cb0eaa138fc6f0_magniber
Files
-
2024-04-22_03f7c63acbfcab0b90cb0eaa138fc6f0_magniber.exe windows:5 windows x86 arch:x86
39488d46e3e9bd5475107803d3d09da7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyW
RegFlushKey
RegCloseKey
RegSetValueExW
bass
BASS_ChannelSetAttribute
BASS_ChannelPause
BASS_StreamFree
BASS_ChannelStop
BASS_ChannelPlay
BASS_ChannelIsActive
BASS_GetDeviceInfo
BASS_GetInfo
BASS_ErrorGetCode
BASS_Init
BASS_Free
BASS_ChannelGetDevice
BASS_ChannelSetPosition
BASS_ChannelGetPosition
BASS_StreamCreateFileUser
BASS_StreamCreateFile
gdi32
CreateDIBSection
StretchBlt
SetStretchBltMode
SelectObject
SetDIBits
DeleteDC
DeleteObject
GetStockObject
CreateCompatibleDC
kernel32
CloseHandle
GetVersionExW
GetModuleHandleW
SetProcessAffinityMask
ExitProcess
FormatMessageA
LoadLibraryExA
DeleteFileW
GetDiskFreeSpaceExW
CreateFileW
WriteConsoleW
SetStdHandle
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetModuleFileNameA
GetTimeZoneInformation
MoveFileExW
CreatePipe
GetExitCodeProcess
WaitForSingleObject
LoadLibraryExW
GetConsoleCP
FlushFileBuffers
SetFilePointerEx
SetFilePointer
ReadConsoleW
GetConsoleMode
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetProcAddress
SetLastError
LoadLibraryW
FreeLibrary
GetCurrentProcessId
SetCurrentDirectoryW
GetLastError
GetModuleFileNameW
GetSystemDirectoryW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
DeleteCriticalSection
GetFileType
TerminateProcess
GetCurrentProcess
FindClose
FindNextFileW
FindFirstFileW
SetThreadExecutionState
GetShortPathNameW
GetWindowsDirectoryW
CopyFileW
GetCurrentDirectoryW
WideCharToMultiByte
CreateDirectoryW
GetLocalTime
MultiByteToWideChar
SetEnvironmentVariableA
SetEndOfFile
OutputDebugStringW
GetCurrentThreadId
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
InterlockedIncrement
Sleep
HeapFree
HeapAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
DecodePointer
GetCommandLineW
RtlUnwind
ReadFile
EnterCriticalSection
LeaveCriticalSection
HeapReAlloc
GetSystemTimeAsFileTime
InterlockedDecrement
GetModuleHandleExW
AreFileApisANSI
GetTempPathA
DuplicateHandle
CreateProcessA
GetFileAttributesExW
GetProcessHeap
GetStdHandle
WriteFile
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
HeapSize
shell32
SHGetSpecialFolderPathW
SHFileOperationW
ShellExecuteW
SHGetFolderPathW
shlwapi
PathRemoveFileSpecW
user32
GetClientRect
SetForegroundWindow
UnregisterClassW
GetSystemMetrics
GetWindowRect
LoadIconW
MessageBoxW
FindWindowW
GetCursor
GetForegroundWindow
DispatchMessageW
TranslateMessage
PeekMessageW
EnumDisplaySettingsW
EnumDisplayDevicesW
DefWindowProcW
TrackMouseEvent
SetCursor
GetWindowLongW
LoadCursorW
SetFocus
PostQuitMessage
SendMessageW
UpdateWindow
SetWindowPos
SetWindowLongW
CreateWindowExW
RegisterClassExW
ShowWindow
winmm
waveOutGetNumDevs
timeGetTime
d3d9
Direct3DCreate9
ole32
CoInitialize
CoCreateInstance
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 460KB - Virtual size: 460KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 688KB - Virtual size: 688KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text1 Size: 704KB - Virtual size: 704KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc1 Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.pdata Size: 3.6MB - Virtual size: 3.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 652KB - Virtual size: 651KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Geddon Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE