D:\jenkins_Trunk\workspace\8.11Patch_SourceJob\qqpcmgr_proj\Basic\Output\BinFinal\QQPCMgrPacket.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-30_b76739cc516b04da138a551f96336998_magniber.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-30_b76739cc516b04da138a551f96336998_magniber.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-30_b76739cc516b04da138a551f96336998_magniber
-
Size
4.2MB
-
MD5
b76739cc516b04da138a551f96336998
-
SHA1
bfea274140f4bf94eefc0fd41782ae85ff13a246
-
SHA256
a574bc59bb322117f4d3df162de2da24a67c4b3cb27dcc86c1cf63cb0f332112
-
SHA512
f20ea65a9ecdb91e7a9628437c9fd7b4b4b5cabf15052dc66ece244539889b128aa8655d750d93796d387315cbc762f6ad3f8b3f3d458dd9126b6e27661c0959
-
SSDEEP
98304:cQcc56RpaoUHymd5wA4H33wXUYbVWW/8hDOX:ncc56RpaoUSmd5w9HwkYbQlDOX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-30_b76739cc516b04da138a551f96336998_magniber
Files
-
2024-04-30_b76739cc516b04da138a551f96336998_magniber.exe windows:4 windows x86 arch:x86
93aee0ed095cc40847cc91a02a7827c0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateDirectoryW
SetFilePointer
OutputDebugStringW
GetExitCodeProcess
QueryDosDeviceW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
LocalAlloc
LocalFree
MulDiv
GlobalUnlock
GlobalLock
GlobalAlloc
GetDriveTypeW
VirtualFree
VirtualAlloc
ReleaseSemaphore
CreateSemaphoreW
GetStdHandle
SetEndOfFile
GetTempFileNameW
GetWindowsDirectoryW
SetFileTime
SetFileAttributesW
MoveFileW
GetFullPathNameW
GetCurrentDirectoryW
GetSystemInfo
ExpandEnvironmentStringsW
IsBadReadPtr
RemoveDirectoryW
MoveFileExW
lstrcmpiW
UnmapViewOfFile
LoadLibraryExW
SetCurrentDirectoryW
CreateFileMappingW
MapViewOfFileEx
CreateMutexW
OpenMutexW
GetPrivateProfileIntW
GlobalMemoryStatus
MapViewOfFile
OpenSemaphoreW
CreateNamedPipeW
OpenEventW
LocalFileTimeToFileTime
SystemTimeToFileTime
DeviceIoControl
GetProcessTimes
ResumeThread
TerminateThread
SleepEx
GetDriveTypeA
GetCurrentDirectoryA
GetLocaleInfoW
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
HeapCreate
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
LCMapStringW
LCMapStringA
RtlUnwind
GetSystemTimeAsFileTime
ExitProcess
GetModuleHandleA
IsDebuggerPresent
UnhandledExceptionFilter
ExitThread
GetStartupInfoW
IsProcessorFeaturePresent
InterlockedCompareExchange
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetLocalTime
CreatePipe
LoadLibraryA
GetCPInfo
GetVersion
GetDiskFreeSpaceExW
lstrcmpW
lstrlenW
FindClose
CreateThread
FindNextFileW
FindFirstFileW
WriteFile
SetLastError
FreeResource
WideCharToMultiByte
RaiseException
GetFileAttributesW
FreeLibrary
FlushInstructionCache
GetPrivateProfileStringW
WritePrivateProfileStringW
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
OpenProcess
SearchPathW
InitializeCriticalSection
MultiByteToWideChar
SetErrorMode
GetModuleHandleW
GetCurrentThreadId
GetCurrentProcessId
GetModuleFileNameW
GetCommandLineW
lstrcpynW
VirtualAllocEx
WriteProcessMemory
SetUnhandledExceptionFilter
TerminateProcess
CreateProcessW
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
LeaveCriticalSection
EnterCriticalSection
DuplicateHandle
GetCurrentProcess
GetLastError
InitializeCriticalSectionAndSpinCount
HeapAlloc
InterlockedIncrement
GetProcessHeap
HeapFree
DeleteCriticalSection
GlobalFree
InterlockedDecrement
WaitForMultipleObjects
ResetEvent
CreateEventW
GetVersionExW
CopyFileW
Sleep
GetTickCount
SetEvent
WaitForSingleObject
ReadFile
CloseHandle
GetFileSize
CreateFileW
DeleteFileW
ReleaseMutex
VirtualQuery
GetSystemDefaultLangID
CreateFileA
GetTempPathW
lstrlenA
GetSystemTime
user32
PostMessageW
DefWindowProcW
CreateWindowExW
SetWindowLongW
DestroyWindow
FindWindowW
GetWindow
FindWindowExW
SetWindowPos
LoadCursorW
SetActiveWindow
IsIconic
SendMessageTimeoutW
FindWindowA
UnregisterClassW
MessageBoxW
GetPropW
SetPropW
PostQuitMessage
RemovePropW
EnumWindows
UnregisterClassA
LoadStringW
CopyImage
CharLowerW
CharUpperW
GetClassNameW
SetTimer
IsChild
GetFocus
KillTimer
SetFocus
GetWindowTextLengthW
RedrawWindow
InvalidateRgn
GetWindowTextW
FrameRect
LoadIconW
FillRect
GetSysColor
SetWindowTextW
GetWindowDC
DestroyAcceleratorTable
mouse_event
GetSystemMetrics
CreateAcceleratorTableW
LoadImageW
DrawTextW
SetCapture
SetCursor
PtInRect
SetWindowRgn
TrackPopupMenu
GetSystemMenu
PostThreadMessageW
DrawFrameControl
GetKeyState
OffsetRect
ClientToScreen
GetMonitorInfoW
MonitorFromWindow
EqualRect
GetDlgCtrlID
IsWindowVisible
DrawIconEx
BeginPaint
CallWindowProcW
ScreenToClient
EndPaint
RegisterWindowMessageW
CharNextW
GetDC
SetForegroundWindow
AttachThreadInput
GetForegroundWindow
GetWindowThreadProcessId
InflateRect
ReleaseDC
GetClassInfoExW
InvalidateRect
SystemParametersInfoW
ShowWindow
MapWindowPoints
RegisterClassExW
SetRect
EnableWindow
IsWindowEnabled
GetDesktopWindow
GetActiveWindow
SendMessageW
GetDlgItem
GetParent
GetClientRect
GetWindowRect
CopyRect
GetWindowLongW
MoveWindow
DispatchMessageW
TranslateMessage
GetMessageW
IsWindow
PeekMessageW
ReleaseCapture
gdi32
SaveDC
SelectClipRgn
CombineRgn
RectInRegion
MoveToEx
LineTo
SetBkMode
GetTextExtentPoint32W
GetStockObject
CreatePen
Rectangle
CreateFontIndirectW
CreateDIBSection
CreateCompatibleDC
BitBlt
CreateCompatibleBitmap
CreateBitmap
StretchBlt
SetBkColor
SetTextColor
SelectObject
DeleteDC
ExtTextOutW
GetObjectW
DeleteObject
TextOutW
RestoreDC
CreateRectRgnIndirect
RoundRect
OffsetRgn
GetDeviceCaps
ExtSelectClipRgn
CreateSolidBrush
GetCurrentObject
GetTextMetricsW
GetClipRgn
CreateRectRgn
advapi32
FreeSid
SetNamedSecurityInfoW
SetEntriesInAclW
AllocateAndInitializeSid
DeleteService
QueryServiceConfigW
ControlService
CloseServiceHandle
OpenServiceW
OpenSCManagerW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegQueryValueExW
RegCloseKey
RegOpenKeyW
RegCreateKeyExW
RegSetValueExW
LookupAccountNameW
shell32
ShellExecuteW
SHGetSpecialFolderPathW
ord680
SHCreateDirectoryExW
CommandLineToArgvW
SHGetSpecialFolderLocation
SHBrowseForFolderW
SHGetPathFromIDListW
ole32
CoGetClassObject
OleLockRunning
CLSIDFromProgID
CLSIDFromString
StringFromGUID2
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoInitializeEx
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoFreeLibrary
CoLoadLibrary
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
CoInitialize
CoTaskMemAlloc
CoUninitialize
oleaut32
OleLoadPicture
VariantCopy
SysAllocStringByteLen
DispCallFunc
VariantInit
VariantClear
SysAllocStringLen
SysStringLen
VarUI4FromStr
SysFreeString
VarBstrCmp
SysStringByteLen
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
SysAllocString
shlwapi
StrToIntA
PathRemoveBackslashW
PathAddBackslashW
PathRemoveFileSpecW
PathAppendW
PathIsDirectoryW
PathFileExistsW
comctl32
_TrackMouseEvent
InitCommonControlsEx
ws2_32
htons
ntohl
htonl
wininet
InternetReadFile
HttpQueryInfoW
InternetOpenUrlW
InternetGetConnectedState
InternetOpenW
InternetCloseHandle
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
netapi32
Netbios
Sections
.text Size: 924KB - Virtual size: 920KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ