D:\SoftMgr\main\bin\Win32\release\pdb\2345SoftMgr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-10_2a4e73343d292094887603afe35e6dcb_magniber.exe
Resource
win7-20240215-en
General
-
Target
2024-05-10_2a4e73343d292094887603afe35e6dcb_magniber
-
Size
2.6MB
-
MD5
2a4e73343d292094887603afe35e6dcb
-
SHA1
40c0794d347ee7e2a7fc9a442e5e68f2b1e0326c
-
SHA256
17e78ed36dbb76816bae6fb3152035fbc7b1d266db850e04743c8a059fc1bd00
-
SHA512
d7b240c322cff55d1f891e37d1bcf10e0dc55963856ef127176d25848c0e17bd6850bda299dd82356cb42e7d710ac0b92f5b82ff75f5a004922e0577c4a741f5
-
SSDEEP
49152:YUJ7lASKzdiqtWxpA2RRdG5EyZqc5gvDop+HTzLcUPSbbeqmd9/V3E8QWY:5LASKZb4xSnquEmUP+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-10_2a4e73343d292094887603afe35e6dcb_magniber
Files
-
2024-05-10_2a4e73343d292094887603afe35e6dcb_magniber.exe windows:5 windows x86 arch:x86
4bcddb5af9721cb70076c08da136a63c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
crypt32
CryptMsgClose
CryptDecodeObject
CertGetNameStringW
CertFindCertificateInStore
CryptMsgGetParam
CertCloseStore
CryptQueryObject
CertFreeCertificateContext
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
kernel32
Sleep
GetCurrentProcess
ExpandEnvironmentStringsW
GetVersion
GetDriveTypeW
GetCurrentThread
GetVolumeInformationW
GetDiskFreeSpaceW
GetLogicalDriveStringsW
InterlockedCompareExchange
FlushInstructionCache
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
GetThreadContext
SetThreadContext
SuspendThread
ResumeThread
SetLastError
WaitForMultipleObjects
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
ReadFile
SetEndOfFile
GetFileSize
GetComputerNameW
GetTickCount
GetProcessHeap
SetEvent
GetACP
GlobalMemoryStatusEx
InterlockedExchange
InterlockedExchangeAdd
lstrlenW
GetModuleHandleW
GetVersionExW
GetFileAttributesW
HeapAlloc
GlobalFree
GlobalAlloc
OpenProcess
HeapFree
DeleteFileW
lstrcpyW
LocalFree
lstrcmpA
LocalAlloc
CreateFileMappingW
FileTimeToLocalFileTime
FileTimeToSystemTime
EnumResourceNamesW
SizeofResource
GetUserDefaultLangID
WriteConsoleW
GetLocalTime
GetCurrentThreadId
CreateFileW
SetFilePointer
GetModuleFileNameW
WriteFile
FreeLibrary
GetProcAddress
GetWindowsDirectoryW
CreateDirectoryW
LoadLibraryW
GetEnvironmentVariableW
SetEnvironmentVariableW
GetCurrentProcessId
DeleteCriticalSection
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
MoveFileExW
CloseHandle
GetLastError
HeapSize
SetStdHandle
OutputDebugStringA
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
FlushFileBuffers
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetConsoleCP
ReadConsoleW
GetConsoleMode
SetFilePointerEx
HeapReAlloc
SetConsoleCtrlHandler
GetModuleFileNameA
ExitProcess
CreateMutexW
WaitForSingleObject
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
InterlockedFlushSList
InterlockedPushEntrySList
RtlUnwind
GetFileType
GetStdHandle
WaitNamedPipeW
TransactNamedPipe
DuplicateHandle
SetNamedPipeHandleState
VirtualQueryEx
OpenThread
InterlockedIncrement
CreateSemaphoreW
CreateThread
TerminateThread
GetProcessId
InterlockedDecrement
ReleaseSemaphore
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileIntW
WritePrivateProfileSectionW
GetSystemDirectoryW
FindFirstFileW
FindNextFileW
DeviceIoControl
FindClose
CreateProcessW
QueryInformationJobObject
WriteProcessMemory
AssignProcessToJobObject
CreateJobObjectW
IsProcessInJob
GetModuleHandleA
VirtualAllocEx
CreateRemoteThread
TerminateJobObject
GetExitCodeProcess
GetLongPathNameW
GetShortPathNameW
GetFileAttributesExW
SearchPathW
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryA
LockResource
GetSystemInfo
LoadResource
FindResourceW
lstrcmpiW
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
ReleaseMutex
OpenMutexW
QueryDosDeviceW
LoadLibraryExW
OpenFileMappingW
UnmapViewOfFile
MapViewOfFile
OpenEventW
CreateEventW
ResetEvent
SetFileTime
GetFileTime
GetComputerNameExW
LocalFileTimeToFileTime
SystemTimeToFileTime
GetSystemTime
DosDateTimeToFileTime
FileTimeToDosDateTime
TerminateProcess
GetFullPathNameW
RemoveDirectoryW
GetTempPathW
SetFileAttributesW
GetCurrentDirectoryW
SetCurrentDirectoryW
CopyFileW
GetTempFileNameW
MoveFileW
lstrcatW
GetFileSizeEx
FormatMessageW
GetStringTypeW
EncodePointer
GetCPInfo
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
OutputDebugStringW
RtlCaptureContext
user32
GetDesktopWindow
GetParent
SetFocus
GetClassNameW
GetForegroundWindow
AttachThreadInput
WindowFromPoint
GetShellWindow
GetSystemMetrics
SetWindowPos
GetFocus
CreateIconFromResourceEx
PrivateExtractIconsW
GetWindowRect
DestroyIcon
LookupIconIdFromDirectoryEx
LoadImageW
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
GetWindowTextLengthW
GetDC
IsWindowVisible
EnumChildWindows
IsWindow
EnumDesktopWindows
GetActiveWindow
GetWindowThreadProcessId
UnregisterClassW
FindWindowW
SendMessageW
GetIconInfo
OpenDesktopW
CloseDesktop
GetWindowTextW
ReleaseDC
advapi32
LookupPrivilegeValueW
IsValidSid
GetTokenInformation
GetLengthSid
ConvertSidToStringSidW
FreeSid
OpenProcessToken
AllocateAndInitializeSid
EqualSid
ReportEventW
RegisterEventSourceW
DeregisterEventSource
SetEntriesInAclW
RegQueryValueExW
RegOpenKeyExW
SystemFunction036
CheckTokenMembership
RegCloseKey
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegDeleteValueW
RegEnumValueW
SetNamedSecurityInfoW
AdjustTokenPrivileges
shell32
SHGetFileInfoW
SHFileOperationW
SHGetMalloc
ExtractIconExW
SHGetDesktopFolder
SHGetFolderPathW
ShellExecuteW
SHChangeNotify
SHGetPathFromIDListW
ShellExecuteExW
SHGetSpecialFolderLocation
DuplicateIcon
SHGetSpecialFolderPathW
ord727
ole32
OleInitialize
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
OleUninitialize
CreateStreamOnHGlobal
oleaut32
SysFreeString
VariantClear
SysAllocString
shlwapi
SHDeleteKeyW
PathRemoveFileSpecW
PathFileExistsW
wininet
InternetGetConnectedState
InternetCheckConnectionW
iphlpapi
GetAdaptersInfo
imagehlp
ImageEnumerateCertificates
ImageRemoveCertificate
gdiplus
GdipGetImageHeight
GdipGetImageEncoders
GdipLoadImageFromFileICM
GdipCloneImage
GdipAlloc
GdipCreateBitmapFromStream
GdipLoadImageFromFile
GdiplusStartup
GdipGetImageWidth
GdipDisposeImage
GdipFree
GdipGetImageRawFormat
GdipGetImageEncodersSize
GdipCreateHICONFromBitmap
GdiplusShutdown
GdipCreateBitmapFromStreamICM
GdipSaveImageToFile
gdi32
DeleteDC
DeleteObject
CreateCompatibleDC
CreateFontIndirectW
GetObjectW
GetStockObject
GetTextExtentPointW
GetTextExtentExPointW
SelectObject
GetDIBits
Exports
Exports
CheckSignerInfo
ExportFunc01
ExportFunc02
IsNetConnect
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 389KB - Virtual size: 389KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 11KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 150KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE