D:\jenkins_Trunk\workspace\12.9Patch_SourceJob\qqpcmgr_proj\Basic\Output\BinFinal\QQPCMgrPacket.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-11_b301d7d661cb5d9f7b97e2931547d441_magniber.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-11_b301d7d661cb5d9f7b97e2931547d441_magniber.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-11_b301d7d661cb5d9f7b97e2931547d441_magniber
-
Size
9.4MB
-
MD5
b301d7d661cb5d9f7b97e2931547d441
-
SHA1
77937eea28d6107470b854fa4baadddca728730e
-
SHA256
dfaccee539d11d020a68f9760f49274a4fdc34aafc27813a1e7313dcef432406
-
SHA512
218c2cb0a1abbce4f1e3ce6e6ce81d48a189c930eba23a50cd4ad837e9a5f191117afc5ea03c7e8fd31c7f2fcfca4f4d428687fab2869511f062d45c2ddfdf09
-
SSDEEP
196608:iod780ME/x6dDYKaxhLbz9n4IUjFmJNCHC+12u2T:v3IdD/4Bbz14IUAJNCiDT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-11_b301d7d661cb5d9f7b97e2931547d441_magniber
Files
-
2024-05-11_b301d7d661cb5d9f7b97e2931547d441_magniber.exe windows:4 windows x86 arch:x86
369a4e9ef2be43b769d6b1fb360e8eb5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Process32NextW
Module32FirstW
Module32NextW
SetThreadPriority
ReleaseMutex
OpenThread
SuspendThread
VirtualFree
VirtualAlloc
ReleaseSemaphore
CreateSemaphoreW
GetStdHandle
SetEndOfFile
GetTempFileNameW
MoveFileW
GetFullPathNameW
GetSystemInfo
Process32FirstW
CreateToolhelp32Snapshot
GetDriveTypeA
GetCurrentDirectoryA
GetLocaleInfoW
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
OutputDebugStringW
IsValidCodePage
GetOEMCP
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
HeapCreate
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
LCMapStringW
LCMapStringA
RtlUnwind
GetSystemTimeAsFileTime
ExitProcess
IsDebuggerPresent
UnhandledExceptionFilter
GetModuleHandleA
VirtualProtect
ExitThread
GetStartupInfoW
IsProcessorFeaturePresent
InterlockedCompareExchange
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetLocalTime
CreatePipe
IsDBCSLeadByte
GetCPInfo
LoadLibraryA
VirtualQuery
GetSystemDefaultLangID
CreateFileA
GlobalAlloc
GlobalLock
SetFilePointer
CreateDirectoryW
RemoveDirectoryW
MoveFileExW
LocalAlloc
CreateFileMappingW
LoadLibraryExW
MapViewOfFileEx
CreateMutexW
OpenMutexW
SetCurrentDirectoryW
lstrcmpiW
GetPrivateProfileIntW
GlobalMemoryStatus
FreeResource
CreateThread
RaiseException
GetDriveTypeW
FreeLibrary
GetLogicalDriveStringsW
WriteFile
FlushInstructionCache
WideCharToMultiByte
GetDiskFreeSpaceExW
DeviceIoControl
GetVersion
GetPrivateProfileStringW
GetExitCodeProcess
lstrcmpW
UnmapViewOfFile
MapViewOfFile
OpenFileMappingW
MultiByteToWideChar
QueryDosDeviceW
FindNextFileW
GetFileAttributesW
lstrlenW
WritePrivateProfileStringW
GetCurrentDirectoryW
GetWindowsDirectoryW
ExpandEnvironmentStringsW
CreateProcessW
OpenProcess
SearchPathW
InitializeCriticalSection
SetErrorMode
GetCurrentThreadId
GetCurrentProcessId
GetModuleFileNameW
GetCommandLineW
lstrcpynW
VirtualAllocEx
WriteProcessMemory
SetUnhandledExceptionFilter
TerminateProcess
SetLastError
LocalFree
FindClose
FindFirstFileW
GetCurrentThread
GetModuleHandleW
FindResourceExW
LoadResource
LockResource
SetFileAttributesW
SizeofResource
FindResourceW
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
LeaveCriticalSection
EnterCriticalSection
DuplicateHandle
GetCurrentProcess
GetLastError
InitializeCriticalSectionAndSpinCount
HeapAlloc
InterlockedIncrement
GetProcessHeap
HeapFree
DeleteCriticalSection
GlobalFree
InterlockedDecrement
WaitForMultipleObjects
SetEvent
WaitForSingleObject
ResetEvent
CreateEventW
GetVersionExW
CopyFileW
Sleep
GetTickCount
ReadFile
CloseHandle
GetFileSize
CreateFileW
DeleteFileW
GetTempPathW
lstrlenA
user32
UnregisterClassA
LoadStringW
CharLowerW
LoadIconW
CreateWindowExW
SetWindowLongW
DestroyWindow
MessageBoxW
FindWindowW
SendMessageTimeoutW
CopyRect
SetWindowPos
LoadImageW
PostQuitMessage
GetWindowPlacement
PostThreadMessageW
MonitorFromWindow
SetActiveWindow
SendMessageW
DefWindowProcW
PostMessageW
IsWindow
GetWindowLongW
GetMessageW
TranslateMessage
SetWindowRgn
DestroyIcon
mouse_event
GetSystemMetrics
OffsetRect
CopyImage
DrawFrameControl
UpdateLayeredWindow
EqualRect
GetDlgCtrlID
DrawIconEx
IsWindowVisible
EndPaint
BeginPaint
ReleaseCapture
SetCursor
SetCapture
PtInRect
GetKeyState
TrackPopupMenu
GetMonitorInfoW
GetSystemMenu
FrameRect
FillRect
CallWindowProcW
GetWindowDC
ClientToScreen
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
SetTimer
KillTimer
DrawTextW
CharUpperW
AttachThreadInput
GetForegroundWindow
GetWindowThreadProcessId
GetDC
ReleaseDC
InflateRect
SetForegroundWindow
CharNextW
GetWindow
SetRect
GetClientRect
MoveWindow
SystemParametersInfoW
DispatchMessageW
GetWindowRect
MapWindowPoints
PeekMessageW
MsgWaitForMultipleObjectsEx
EnableWindow
IsWindowEnabled
GetDesktopWindow
GetActiveWindow
GetDlgItem
GetParent
LoadCursorW
GetClassInfoExW
ShowWindow
InvalidateRect
RegisterClassExW
gdi32
RoundRect
Rectangle
CreateCompatibleBitmap
CreateCompatibleDC
GetObjectW
GetStockObject
CreateDIBSection
BitBlt
CreateBitmap
GetClipRgn
SetBkColor
SetTextColor
DeleteDC
ExtTextOutW
CreateFontIndirectW
CreatePen
AddFontResourceW
DeleteObject
MoveToEx
CombineRgn
CreateRectRgn
CreateRectRgnIndirect
SelectClipRgn
SetBkMode
ExtSelectClipRgn
GetTextMetricsW
CreateSolidBrush
SaveDC
RectInRegion
RestoreDC
TextOutW
OffsetRgn
StretchBlt
LineTo
SelectObject
GetTextExtentPoint32W
advapi32
FreeSid
SetEntriesInAclW
AllocateAndInitializeSid
DeleteService
QueryServiceStatus
ControlService
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegEnumKeyExW
RegQueryInfoKeyW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegDeleteKeyW
RegLoadKeyW
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyW
RegDeleteValueW
RegCreateKeyExW
RegQueryValueExW
RegSetValueExW
GetTokenInformation
AdjustTokenPrivileges
IsValidSid
GetLengthSid
GetAce
LookupAccountNameW
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueW
GetAclInformation
SetNamedSecurityInfoW
SetSecurityInfo
AddAce
CopySid
GetSecurityInfo
InitializeAcl
GetNamedSecurityInfoW
RegCloseKey
RegOpenKeyExW
IsTextUnicode
shell32
SHBrowseForFolderW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ShellExecuteW
SHGetSpecialFolderPathW
ord680
SHCreateDirectoryExW
ole32
CoCreateInstance
CreateStreamOnHGlobal
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
CoTaskMemRealloc
oleaut32
VariantInit
VariantCopy
VariantClear
SysAllocString
SysFreeString
VarUI4FromStr
OleLoadPicture
shlwapi
PathRemoveFileSpecW
PathIsDirectoryW
StrStrW
StrChrW
StrCatW
PathAddBackslashW
StrToIntExW
StrToIntA
PathFindFileNameW
PathRemoveBackslashW
PathFileExistsW
PathAppendW
wnsprintfW
comctl32
_TrackMouseEvent
InitCommonControlsEx
ws2_32
htonl
ntohl
htons
wininet
InternetGetConnectedState
InternetCloseHandle
InternetReadFile
HttpQueryInfoW
InternetOpenUrlW
InternetOpenW
userenv
UnloadUserProfile
psapi
GetModuleFileNameExW
GetProcessImageFileNameW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
crypt32
CryptMsgGetParam
CertFindCertificateInStore
CryptQueryObject
CertGetNameStringW
netapi32
Netbios
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 168KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ