c:\OtherComp\D\D1Ex\Projects\src\xls2exe\RtmStarter\Win32\Release_lic\RtmStarter.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-16_2efaba7d57b8215060f2b6a972c37b54_magniber.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-16_2efaba7d57b8215060f2b6a972c37b54_magniber.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-16_2efaba7d57b8215060f2b6a972c37b54_magniber
-
Size
4.8MB
-
MD5
2efaba7d57b8215060f2b6a972c37b54
-
SHA1
4ffa90acfa2980f1b1df7b54427798ecc2840c0c
-
SHA256
d90d91235af58768d2695d788ebc7f6fb52a4d710328bb0c4b4d2a7f8f2c9c1a
-
SHA512
1cb1bb917d5266eaf5200dadf393bee27b84a10da60b51e4d5ca18b2055f2b0cb0fae671559549830af567ce8fd4b05a4999da42068b25223bb41f29e24eda69
-
SSDEEP
98304:KxSboQF9bSz/fOVVnGbbFadUOGDJbBHFPP0T2cMKTom1mFiijzNbPghqb24LBTF7:OQFhSz/yVnGblhP0TTVUzjBTghqbtVV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-16_2efaba7d57b8215060f2b6a972c37b54_magniber
Files
-
2024-05-16_2efaba7d57b8215060f2b6a972c37b54_magniber.exe windows:5 windows x86 arch:x86
c1f00e1a5cbde03de00d9d485446d000
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
SHGetFolderPathW
ShellExecuteExW
DuplicateIcon
ExtractIconExW
wsock32
connect
ioctlsocket
ntohl
recv
htonl
send
socket
select
htons
WSAStartup
gethostbyname
gdiplus
GdipGetImageBounds
GdipLoadImageFromStream
GdipDrawImageRectI
GdipSetSmoothingMode
GdipSetCompositingQuality
GdipDeleteGraphics
GdipCreateFromHDC
GdipDisposeImage
GdipCreateSolidFill
GdipCloneBrush
GdipDeleteBrush
GdipAlloc
GdipFree
GdiplusShutdown
GdiplusStartup
GdipCloneImage
kernel32
Sleep
SetLastError
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
RaiseException
DeleteCriticalSection
GetLastError
InitializeCriticalSectionAndSpinCount
FreeLibrary
GetProcAddress
GetModuleHandleW
lstrcmpiW
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
InterlockedIncrement
DecodePointer
MulDiv
GetCommandLineW
GetTempPathW
CreateMutexW
WaitForSingleObject
CloseHandle
CreateThread
LocalFree
OpenProcess
GetCurrentProcessId
VirtualProtect
WriteProcessMemory
CreateFileW
GetFileAttributesW
LockResource
QueryPerformanceFrequency
GetWindowsDirectoryW
QueryPerformanceCounter
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
GetVolumeInformationW
DeviceIoControl
GetVersionExW
VirtualAllocEx
VirtualFreeEx
FileTimeToSystemTime
FileTimeToLocalFileTime
SystemTimeToFileTime
GetDateFormatW
LoadLibraryW
lstrlenW
TlsGetValue
TlsFree
TlsAlloc
GetSystemDirectoryW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetACP
WriteFile
GetStdHandle
HeapReAlloc
GetTimeZoneInformation
FindNextFileW
FindFirstFileExW
FindClose
SystemTimeToTzSpecificLocalTime
GetFileType
CreateDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
SetEnvironmentVariableW
SetEnvironmentVariableA
GetFullPathNameW
GetDriveTypeW
RemoveDirectoryW
DeleteFileW
GetFileAttributesExW
GetCommandLineA
GetModuleHandleExW
ExitProcess
RtlUnwind
CreateTimerQueue
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
ReleaseSemaphore
DuplicateHandle
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
GetCurrentThread
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
GetStartupInfoW
WaitForSingleObjectEx
ResetEvent
SetEvent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetLongPathNameW
InterlockedDecrement
HeapSize
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointerEx
SetStdHandle
ReadConsoleW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
WriteConsoleW
SetEndOfFile
GetSystemTime
GlobalReAlloc
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTickCount
GetSystemTimeAsFileTime
TlsSetValue
CreateEventW
TryEnterCriticalSection
GetStringTypeW
WideCharToMultiByte
OutputDebugStringW
IsDebuggerPresent
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
GetCurrentProcess
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetProcessHeap
HeapFree
HeapAlloc
EncodePointer
user32
SendMessageW
GetDC
GetClientRect
MoveWindow
SetWindowTextW
GetWindowRect
ScreenToClient
EndDialog
CreateWindowExW
DefWindowProcW
SetWindowLongW
IsWindow
UpdateWindow
PeekMessageW
ShowWindow
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetDialogBaseUnits
SetTimer
HideCaret
EndPaint
BeginPaint
SetForegroundWindow
GetSystemMetrics
ClientToScreen
KillTimer
EnumWindows
GetClassNameW
GetWindowThreadProcessId
PostMessageW
DestroyIcon
FindWindowW
PostThreadMessageW
DialogBoxParamW
CallWindowProcW
LoadCursorW
GetClassInfoExW
RegisterClassExW
RedrawWindow
ReleaseDC
GetWindowDC
FillRect
GetMessageW
DialogBoxIndirectParamW
MessageBoxW
GetActiveWindow
CharNextW
GetWindowTextW
SetFocus
CreateDialogParamW
UnregisterClassW
DestroyWindow
GetWindow
GetWindowLongW
MonitorFromWindow
GetMonitorInfoW
GetParent
MapWindowPoints
SetWindowPos
DispatchMessageW
InvalidateRect
gdi32
GetStockObject
SelectObject
CreateSolidBrush
CreateFontIndirectW
GetDeviceCaps
CreateFontW
GetTextExtentPoint32W
DeleteDC
DeleteObject
SetBkColor
advapi32
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExW
IsTextUnicode
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
ole32
CreateBindCtx
GetRunningObjectTable
CoInitializeSecurity
CoSetProxyBlanket
CreateStreamOnHGlobal
CLSIDFromProgID
CLSIDFromString
CoUninitialize
CoInitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
oleaut32
OleLoadPicture
VariantInit
CreateErrorInfo
VariantCopy
SysAllocString
VariantChangeType
SysFreeString
SysStringLen
VariantClear
SysAllocStringByteLen
SysStringByteLen
VarUI4FromStr
Sections
.text Size: 646KB - Virtual size: 646KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 177KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ