D:\jenkins_Trunk\workspace\8.11Patch_SourceJob\qqpcmgr_proj\Basic\Output\BinFinal\QQPCMgrPacket.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-28_15cf1e449a7147ddae919a08c7f7f2c7_magniber.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-28_15cf1e449a7147ddae919a08c7f7f2c7_magniber.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-28_15cf1e449a7147ddae919a08c7f7f2c7_magniber
-
Size
2.6MB
-
MD5
15cf1e449a7147ddae919a08c7f7f2c7
-
SHA1
934bdcbf9c36cb62957f663c1779cbe5c3b0d876
-
SHA256
fda33e31929fef93dcb9bdd065122d963a6223509bba0cffe15d765820298b39
-
SHA512
bf5e2bc75f006e0923473f640e938ced090f23e50fc6c65fbed27e3e81b07df0a4f17a1266c7fdeabb4653955e2a7c7342c084d6bf781dd59387cc823cc7f872
-
SSDEEP
49152:cr0cc56RpaoU33MVYTWWZI7epd5U5IsOleXhIMa:cQcc56RpaoUHymd5wA4a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-28_15cf1e449a7147ddae919a08c7f7f2c7_magniber
Files
-
2024-04-28_15cf1e449a7147ddae919a08c7f7f2c7_magniber.exe windows:4 windows x86 arch:x86
93aee0ed095cc40847cc91a02a7827c0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateDirectoryW
SetFilePointer
OutputDebugStringW
GetExitCodeProcess
QueryDosDeviceW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
LocalAlloc
LocalFree
MulDiv
GlobalUnlock
GlobalLock
GlobalAlloc
GetDriveTypeW
VirtualFree
VirtualAlloc
ReleaseSemaphore
CreateSemaphoreW
GetStdHandle
SetEndOfFile
GetTempFileNameW
GetWindowsDirectoryW
SetFileTime
SetFileAttributesW
MoveFileW
GetFullPathNameW
GetCurrentDirectoryW
GetSystemInfo
ExpandEnvironmentStringsW
IsBadReadPtr
RemoveDirectoryW
MoveFileExW
lstrcmpiW
UnmapViewOfFile
LoadLibraryExW
SetCurrentDirectoryW
CreateFileMappingW
MapViewOfFileEx
CreateMutexW
OpenMutexW
GetPrivateProfileIntW
GlobalMemoryStatus
MapViewOfFile
OpenSemaphoreW
CreateNamedPipeW
OpenEventW
LocalFileTimeToFileTime
SystemTimeToFileTime
DeviceIoControl
GetProcessTimes
ResumeThread
TerminateThread
SleepEx
GetDriveTypeA
GetCurrentDirectoryA
GetLocaleInfoW
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
HeapCreate
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
LCMapStringW
LCMapStringA
RtlUnwind
GetSystemTimeAsFileTime
ExitProcess
GetModuleHandleA
IsDebuggerPresent
UnhandledExceptionFilter
ExitThread
GetStartupInfoW
IsProcessorFeaturePresent
InterlockedCompareExchange
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetLocalTime
CreatePipe
LoadLibraryA
GetCPInfo
GetVersion
GetDiskFreeSpaceExW
lstrcmpW
lstrlenW
FindClose
CreateThread
FindNextFileW
FindFirstFileW
WriteFile
SetLastError
FreeResource
WideCharToMultiByte
RaiseException
GetFileAttributesW
FreeLibrary
FlushInstructionCache
GetPrivateProfileStringW
WritePrivateProfileStringW
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
OpenProcess
SearchPathW
InitializeCriticalSection
MultiByteToWideChar
SetErrorMode
GetModuleHandleW
GetCurrentThreadId
GetCurrentProcessId
GetModuleFileNameW
GetCommandLineW
lstrcpynW
VirtualAllocEx
WriteProcessMemory
SetUnhandledExceptionFilter
TerminateProcess
CreateProcessW
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
LeaveCriticalSection
EnterCriticalSection
DuplicateHandle
GetCurrentProcess
GetLastError
InitializeCriticalSectionAndSpinCount
HeapAlloc
InterlockedIncrement
GetProcessHeap
HeapFree
DeleteCriticalSection
GlobalFree
InterlockedDecrement
WaitForMultipleObjects
ResetEvent
CreateEventW
GetVersionExW
CopyFileW
Sleep
GetTickCount
SetEvent
WaitForSingleObject
ReadFile
CloseHandle
GetFileSize
CreateFileW
DeleteFileW
ReleaseMutex
VirtualQuery
GetSystemDefaultLangID
CreateFileA
GetTempPathW
lstrlenA
GetSystemTime
user32
PostMessageW
DefWindowProcW
CreateWindowExW
SetWindowLongW
DestroyWindow
FindWindowW
GetWindow
FindWindowExW
SetWindowPos
LoadCursorW
SetActiveWindow
IsIconic
SendMessageTimeoutW
FindWindowA
UnregisterClassW
MessageBoxW
GetPropW
SetPropW
PostQuitMessage
RemovePropW
EnumWindows
UnregisterClassA
LoadStringW
CopyImage
CharLowerW
CharUpperW
GetClassNameW
SetTimer
IsChild
GetFocus
KillTimer
SetFocus
GetWindowTextLengthW
RedrawWindow
InvalidateRgn
GetWindowTextW
FrameRect
LoadIconW
FillRect
GetSysColor
SetWindowTextW
GetWindowDC
DestroyAcceleratorTable
mouse_event
GetSystemMetrics
CreateAcceleratorTableW
LoadImageW
DrawTextW
SetCapture
SetCursor
PtInRect
SetWindowRgn
TrackPopupMenu
GetSystemMenu
PostThreadMessageW
DrawFrameControl
GetKeyState
OffsetRect
ClientToScreen
GetMonitorInfoW
MonitorFromWindow
EqualRect
GetDlgCtrlID
IsWindowVisible
DrawIconEx
BeginPaint
CallWindowProcW
ScreenToClient
EndPaint
RegisterWindowMessageW
CharNextW
GetDC
SetForegroundWindow
AttachThreadInput
GetForegroundWindow
GetWindowThreadProcessId
InflateRect
ReleaseDC
GetClassInfoExW
InvalidateRect
SystemParametersInfoW
ShowWindow
MapWindowPoints
RegisterClassExW
SetRect
EnableWindow
IsWindowEnabled
GetDesktopWindow
GetActiveWindow
SendMessageW
GetDlgItem
GetParent
GetClientRect
GetWindowRect
CopyRect
GetWindowLongW
MoveWindow
DispatchMessageW
TranslateMessage
GetMessageW
IsWindow
PeekMessageW
ReleaseCapture
gdi32
SaveDC
SelectClipRgn
CombineRgn
RectInRegion
MoveToEx
LineTo
SetBkMode
GetTextExtentPoint32W
GetStockObject
CreatePen
Rectangle
CreateFontIndirectW
CreateDIBSection
CreateCompatibleDC
BitBlt
CreateCompatibleBitmap
CreateBitmap
StretchBlt
SetBkColor
SetTextColor
SelectObject
DeleteDC
ExtTextOutW
GetObjectW
DeleteObject
TextOutW
RestoreDC
CreateRectRgnIndirect
RoundRect
OffsetRgn
GetDeviceCaps
ExtSelectClipRgn
CreateSolidBrush
GetCurrentObject
GetTextMetricsW
GetClipRgn
CreateRectRgn
advapi32
FreeSid
SetNamedSecurityInfoW
SetEntriesInAclW
AllocateAndInitializeSid
DeleteService
QueryServiceConfigW
ControlService
CloseServiceHandle
OpenServiceW
OpenSCManagerW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegQueryValueExW
RegCloseKey
RegOpenKeyW
RegCreateKeyExW
RegSetValueExW
LookupAccountNameW
shell32
ShellExecuteW
SHGetSpecialFolderPathW
ord680
SHCreateDirectoryExW
CommandLineToArgvW
SHGetSpecialFolderLocation
SHBrowseForFolderW
SHGetPathFromIDListW
ole32
CoGetClassObject
OleLockRunning
CLSIDFromProgID
CLSIDFromString
StringFromGUID2
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoInitializeEx
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoFreeLibrary
CoLoadLibrary
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
CoInitialize
CoTaskMemAlloc
CoUninitialize
oleaut32
OleLoadPicture
VariantCopy
SysAllocStringByteLen
DispCallFunc
VariantInit
VariantClear
SysAllocStringLen
SysStringLen
VarUI4FromStr
SysFreeString
VarBstrCmp
SysStringByteLen
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
SysAllocString
shlwapi
StrToIntA
PathRemoveBackslashW
PathAddBackslashW
PathRemoveFileSpecW
PathAppendW
PathIsDirectoryW
PathFileExistsW
comctl32
_TrackMouseEvent
InitCommonControlsEx
ws2_32
htons
ntohl
htonl
wininet
InternetReadFile
HttpQueryInfoW
InternetOpenUrlW
InternetGetConnectedState
InternetOpenW
InternetCloseHandle
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
netapi32
Netbios
Sections
.text Size: 924KB - Virtual size: 920KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ