C:\Sirius\Old Projects\trunk\lxApplicationStartup\Release\lxapp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-20_53148d5f744a213a4ebf6beef40c3aa4_magniber.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-20_53148d5f744a213a4ebf6beef40c3aa4_magniber.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-20_53148d5f744a213a4ebf6beef40c3aa4_magniber
-
Size
8.0MB
-
MD5
53148d5f744a213a4ebf6beef40c3aa4
-
SHA1
5a070d20bee10d43b31fb2d9abf17b58598699fe
-
SHA256
f39079ebd2bbadc2a7009470a955b12000ecf15f822e61127693b6c4075fe07e
-
SHA512
bdf06a65925e7d55ad477cf72d04f367de9ee1320a4455ff4a152dcb575adf67db290361f68e096be86c867de6783c92441f1a80f2a1462b32551fa2b2f0b5a4
-
SSDEEP
196608:Sy/IWsBfl09DVRsvj1sC5UlZ9tvWB78Uk:SBW8f2wxpYzWB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-20_53148d5f744a213a4ebf6beef40c3aa4_magniber
Files
-
2024-05-20_53148d5f744a213a4ebf6beef40c3aa4_magniber.exe windows:6 windows x86 arch:x86
5cc85de3588fcea991202373321aa77f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InitializeCriticalSectionAndSpinCount
GetLogicalDriveStringsW
DeviceIoControl
GetDriveTypeW
CreateFileW
GetTimeZoneInformation
SystemTimeToTzSpecificLocalTime
SetFileAttributesW
CreateThread
MultiByteToWideChar
DeleteFileW
FindFirstFileW
FindNextFileW
FindClose
RemoveDirectoryW
OutputDebugStringW
GetCurrentThread
GetFileTime
GetComputerNameW
GetSystemTime
SetEvent
FileTimeToSystemTime
GetFileInformationByHandle
GetFileSize
SetFilePointer
ReadFile
CreateFileMappingW
MapViewOfFile
WriteFile
UnmapViewOfFile
GetLocalTime
SystemTimeToFileTime
GetCurrentDirectoryW
LocalFileTimeToFileTime
SetFileTime
EnterCriticalSection
LeaveCriticalSection
IsDebuggerPresent
WideCharToMultiByte
OutputDebugStringA
GetModuleHandleA
SetLastError
DeleteCriticalSection
InitializeCriticalSectionEx
WriteConsoleW
SetEndOfFile
GetLastError
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
SetConsoleCtrlHandler
HeapReAlloc
HeapSize
ReadConsoleW
SetStdHandle
GetFullPathNameW
SetCurrentDirectoryW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleCP
HeapAlloc
HeapFree
RaiseException
DecodePointer
GetBinaryTypeW
GetModuleHandleW
GetCurrentThreadId
Sleep
CreateEventW
WaitForSingleObject
ResetEvent
CloseHandle
GetTempPathW
CreateDirectoryW
GetCommandLineW
GetModuleFileNameW
LoadLibraryW
FindResourceW
SizeofResource
LockResource
LoadResource
GetProcAddress
GetStdHandle
GetModuleHandleExW
ExitProcess
PeekNamedPipe
GetFileType
GetFileAttributesW
LoadLibraryExW
InterlockedFlushSList
InterlockedPushEntrySList
RtlUnwind
InitializeSListHead
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTickCount
GetSystemTimeAsFileTime
TlsFree
FreeLibrary
FlushFileBuffers
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
EncodePointer
FormatMessageW
GetStringTypeW
LocalFree
user32
GetWindowLongW
EndDialog
UnregisterClassW
SendMessageW
GetWindow
GetClientRect
GetDlgItem
SetRect
FillRect
DrawIconEx
EndPaint
GetSysColorBrush
LoadCursorW
SetCursor
CallWindowProcW
DialogBoxParamW
IsWindow
BeginPaint
MessageBoxW
GetForegroundWindow
SetForegroundWindow
GetDesktopWindow
GetClassNameW
GetWindowThreadProcessId
GetSysColor
PostMessageW
SetWindowTextW
wsprintfW
LoadImageW
GetCursorPos
AppendMenuW
CreatePopupMenu
LoadStringW
SetWindowPos
SetWindowLongW
ScreenToClient
GetWindowRect
MoveWindow
ShowWindow
EnableWindow
GetDlgItemTextW
SetFocus
GetFocus
SetDlgItemTextW
DestroyIcon
TrackPopupMenu
advapi32
MapGenericMask
RegQueryValueExW
RegCloseKey
CryptDecrypt
CryptDestroyKey
CryptEncrypt
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
CryptDestroyHash
CryptDeriveKey
CryptHashData
CryptCreateHash
RevertToSelf
AccessCheck
GetFileSecurityW
OpenThreadToken
ImpersonateSelf
RegOpenKeyExW
ole32
CoCreateInstance
CLSIDFromProgID
StgOpenStorageEx
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
CoInitialize
CoUninitialize
StgCreateStorageEx
shell32
ShellExecuteW
CommandLineToArgvW
oleaut32
SysAllocString
SysFreeString
SysStringByteLen
CreateErrorInfo
GetErrorInfo
SysAllocStringByteLen
VariantInit
VariantClear
VariantChangeType
VariantCopy
SafeArrayCreate
SafeArrayAccessData
SafeArrayUnaccessData
SetErrorInfo
shlwapi
SHDeleteKeyW
iphlpapi
GetAdaptersInfo
ws2_32
send
connect
inet_addr
htons
socket
gethostbyname
WSACleanup
WSAStartup
htonl
ntohl
select
closesocket
recv
wininet
InternetOpenW
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
HttpQueryInfoW
InternetReadFile
InternetCloseHandle
gdi32
CreatePen
DeleteObject
SetTextColor
SelectObject
MoveToEx
LineTo
SetBkMode
Sections
.text Size: 901KB - Virtual size: 901KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7.0MB - Virtual size: 7.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ