Static task
static1
Behavioral task
behavioral1
Sample
2024-04-24_9c979069a0164e31738876c3f0c569fd_magniber.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-24_9c979069a0164e31738876c3f0c569fd_magniber.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-24_9c979069a0164e31738876c3f0c569fd_magniber
-
Size
9.0MB
-
MD5
9c979069a0164e31738876c3f0c569fd
-
SHA1
e8699c54ce3e19d5a15cfac16074b897b017ebdb
-
SHA256
3bbb96502670cff29e4c81875816e33d32095bb5d7ea8dc7ffe954ea7a3b60ad
-
SHA512
5226a336bbaaec1a363ca6daa3911f6e881cf4e01c37a17f2331d318f9b010a3aa71850b844e28d09af711b101562018ae89c2aa90ac918d2e7502b36bc09315
-
SSDEEP
196608:1WPkm3TXJz4gilPdkft8vUE5wHoav7BMmKSoFcX7P3seF:UMocgO2qsE53azBMR6r3sy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-04-24_9c979069a0164e31738876c3f0c569fd_magniber
Files
-
2024-04-24_9c979069a0164e31738876c3f0c569fd_magniber.exe windows:6 windows x86 arch:x86
e8f0ae9c7386ade112ff0aabb34177f8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteExW
DuplicateIcon
SHGetFolderPathW
ExtractIconExW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
wsock32
socket
connect
send
htonl
htons
ioctlsocket
gethostbyname
select
recv
WSAStartup
ntohl
gdiplus
GdipCreateFromHDC
GdipDisposeImage
GdipCreateSolidFill
GdipCloneBrush
GdipDeleteBrush
GdipSetCompositingQuality
GdipFree
GdiplusShutdown
GdiplusStartup
GdipDeleteGraphics
GdipSetSmoothingMode
GdipDrawImageRectI
GdipLoadImageFromStream
GdipCloneImage
GdipGetImageBounds
GdipAlloc
kernel32
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
lstrlenW
Sleep
SetLastError
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
RaiseException
DeleteCriticalSection
GetLastError
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObject
GlobalUnlock
GlobalFree
MulDiv
DecodePointer
GetCommandLineW
GetLongPathNameW
GetModuleFileNameW
GetTempPathW
CreateMutexW
CreateEventW
CloseHandle
CreateThread
GetProcAddress
LocalFree
GetCurrentProcessId
GetModuleHandleW
SizeofResource
CreateFileW
GetFileAttributesW
LockResource
QueryPerformanceFrequency
LoadResource
FindResourceW
GetWindowsDirectoryW
FreeLibrary
QueryPerformanceCounter
LoadLibraryExW
MultiByteToWideChar
WideCharToMultiByte
InitializeCriticalSectionEx
GlobalAlloc
GlobalLock
FileTimeToSystemTime
FileTimeToLocalFileTime
SystemTimeToFileTime
GetDateFormatW
GetVolumeInformationW
DeviceIoControl
GetVersionExW
LoadLibraryW
GlobalReAlloc
GetConsoleOutputCP
TlsFree
TlsAlloc
GetSystemDirectoryW
LCMapStringW
CompareStringW
WriteFile
GetStdHandle
ExitProcess
GetTimeZoneInformation
PeekNamedPipe
GetFileType
GetFileInformationByHandle
CreateDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
SetEnvironmentVariableW
GetFullPathNameW
GetDriveTypeW
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
RemoveDirectoryW
DeleteFileW
SystemTimeToTzSpecificLocalTime
FindNextFileW
FindFirstFileExW
FindClose
GetFileAttributesExW
GetCommandLineA
TlsSetValue
RtlUnwind
GetStartupInfoW
SetEvent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetSystemTimeAsFileTime
LCMapStringEx
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
ReadFile
ReadConsoleW
SetStdHandle
IsValidCodePage
GetACP
HeapReAlloc
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
WriteConsoleW
SetEndOfFile
GetSystemTime
TlsGetValue
TryEnterCriticalSection
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
InitializeSRWLock
GetStringTypeW
WaitForSingleObjectEx
OutputDebugStringW
IsDebuggerPresent
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
GetCurrentProcess
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetProcessHeap
HeapFree
HeapAlloc
EncodePointer
user32
MessageBoxW
SendMessageW
GetDC
GetClientRect
MoveWindow
SetWindowTextW
GetWindowRect
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
UnhookWindowsHookEx
SetWindowsHookExW
CallNextHookEx
GetAsyncKeyState
GetDialogBaseUnits
SetTimer
HideCaret
EndPaint
BeginPaint
SetForegroundWindow
GetSystemMetrics
ClientToScreen
KillTimer
EnumWindows
GetClassNameW
GetWindowThreadProcessId
PostMessageW
FindWindowW
PostThreadMessageW
DialogBoxParamW
CallWindowProcW
LoadCursorW
GetClassInfoExW
RegisterClassExW
RedrawWindow
ReleaseDC
GetWindowDC
FillRect
GetMessageW
DialogBoxIndirectParamW
DestroyIcon
GetActiveWindow
GetWindowTextW
SetFocus
CreateDialogParamW
UnregisterClassW
DestroyWindow
GetWindow
GetWindowLongW
MonitorFromWindow
GetMonitorInfoW
GetParent
MapWindowPoints
SetWindowPos
DispatchMessageW
InvalidateRect
ShowWindow
PeekMessageW
UpdateWindow
IsWindow
SetWindowLongW
DefWindowProcW
EndDialog
CreateWindowExW
ScreenToClient
gdi32
SetBkColor
SelectObject
CreateSolidBrush
CreateFontIndirectW
GetDeviceCaps
CreateFontW
GetTextExtentPoint32W
DeleteDC
DeleteObject
GetStockObject
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
IsTextUnicode
ole32
CoInitializeSecurity
CoSetProxyBlanket
CreateStreamOnHGlobal
CoCreateInstance
CLSIDFromProgID
CLSIDFromString
CoUninitialize
CoInitialize
oleaut32
CreateErrorInfo
SysFreeString
SysStringByteLen
SysAllocStringByteLen
SysAllocString
VariantClear
VariantInit
VariantCopy
SysStringLen
VariantChangeType
OleLoadPicture
Sections
.text Size: 604KB - Virtual size: 603KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 149KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8.2MB - Virtual size: 8.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ