C:\buildAgent\work\ci_deploy_ninja_boot-x86_git\build.ninja\common\vs2019\x86\release\Installer\Windows\RobloxPlayerInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_395703eb5b502e4d2a33c0ac15c5c1e0_magniber.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-23_395703eb5b502e4d2a33c0ac15c5c1e0_magniber.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-23_395703eb5b502e4d2a33c0ac15c5c1e0_magniber
-
Size
5.1MB
-
MD5
395703eb5b502e4d2a33c0ac15c5c1e0
-
SHA1
014b4896581907077a4de9d80dccf7f98c04a54b
-
SHA256
299d9e709cb975e4911221470769a95247bf3f41f600dffc31777ae6a0aabbbc
-
SHA512
4b29701172774005c8de50f8a06bdf903f404b499013f63770c406181d34099c9acc8bcf9f155ff83d85b64a56e55b0928884e3557fac0e1f8465e5ecbd13663
-
SSDEEP
98304:9/vt45232uPpqj4BB5Dg+8/nJ6rNbO3yguFbsTD527BWG:5N3ZpHpgNIbEGFuVQBWG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-05-23_395703eb5b502e4d2a33c0ac15c5c1e0_magniber
Files
-
2024-05-23_395703eb5b502e4d2a33c0ac15c5c1e0_magniber.exe windows:6 windows x86 arch:x86
dacc3efd22b462eb22a8e98fc6d7df70
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
_TrackMouseEvent
InitCommonControlsEx
gdiplus
GdipAlloc
GdipFree
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromStream
GdipCreateHBITMAPFromBitmap
wininet
InternetQueryOptionW
HttpQueryInfoW
InternetQueryDataAvailable
HttpAddRequestHeadersW
HttpSendRequestW
InternetReadFile
InternetConnectW
InternetCloseHandle
InternetOpenW
HttpOpenRequestW
shell32
Shell_NotifyIconW
SHGetFolderPathAndSubDirW
SHGetKnownFolderPath
ws2_32
ntohl
connect
socket
getnameinfo
inet_pton
freeaddrinfo
getaddrinfo
WSAIoctl
WSACreateEvent
WSACloseEvent
WSAGetLastError
gethostname
getsockopt
getpeername
ioctlsocket
inet_ntop
__WSAFDIsSet
htonl
WSASetLastError
WSACleanup
WSAStartup
setsockopt
send
select
recv
listen
htons
getsockname
closesocket
bind
accept
ntohs
crypt32
CertDuplicateCertificateContext
CertFindCertificateInStore
CertOpenStore
CertOpenSystemStoreA
CertGetIntendedKeyUsage
CertGetEnhancedKeyUsage
CertFreeCertificateContext
CertEnumCertificatesInStore
CertCloseStore
CertGetCertificateContextProperty
iphlpapi
GetAdaptersAddresses
kernel32
LCMapStringEx
EncodePointer
InitOnceComplete
InitOnceBeginInitialize
SleepConditionVariableSRW
SleepConditionVariableCS
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
TryEnterCriticalSection
InitializeSRWLock
IsDebuggerPresent
DebugBreak
OutputDebugStringW
CloseHandle
GetLastError
SetLastError
HeapAlloc
HeapFree
GetProcessHeap
ReleaseSemaphore
ReleaseMutex
WaitForSingleObject
WaitForSingleObjectEx
OpenSemaphoreW
CreateMutexExW
CreateSemaphoreExW
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
FormatMessageW
SetSearchPathMode
GetCommandLineW
VerSetConditionMask
GetDiskFreeSpaceExW
CreateFileMappingW
VerifyVersionInfoW
MulDiv
LocaleNameToLCID
GetUserDefaultLocaleName
Sleep
FindClose
FindFirstFileW
FindNextFileW
SetEvent
CreateEventW
OpenEventW
CreateProcessW
GetSystemTime
CreateFileW
GetFileSize
MapViewOfFile
UnmapViewOfFile
DeleteFileW
TerminateProcess
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
OpenProcess
GetModuleFileNameW
SystemTimeToFileTime
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
K32GetModuleFileNameExW
WideCharToMultiByte
GetCurrentProcess
GetCurrentProcessorNumber
GlobalMemoryStatusEx
GetSystemInfo
GetSystemTimeAsFileTime
GetVersionExA
IsWow64Process
LoadLibraryA
K32GetProcessMemoryInfo
DecodePointer
InitializeCriticalSectionEx
DeleteCriticalSection
GetModuleHandleA
OutputDebugStringA
QueryPerformanceCounter
QueryPerformanceFrequency
CreateEventA
SwitchToThread
MultiByteToWideChar
GetNativeSystemInfo
LoadLibraryExW
FileTimeToSystemTime
VirtualQuery
CreateSemaphoreA
GetTickCount
WaitForMultipleObjectsEx
GetExitCodeProcess
LocalAlloc
LocalFree
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
LoadLibraryW
GlobalAlloc
GlobalFree
GlobalUnlock
GlobalLock
CreateDirectoryW
GetFileAttributesW
GetFileSizeEx
ReadFile
RemoveDirectoryW
SetFileAttributesW
WriteFile
CopyFileW
CompareStringEx
FreeLibrary
GetEnvironmentVariableW
GetEnvironmentVariableA
CompareFileTime
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
SleepEx
GetSystemDirectoryA
MoveFileExA
VirtualAlloc
ReleaseSRWLockShared
AcquireSRWLockShared
GetStdHandle
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SwitchToFiber
DeleteFiber
CreateFiber
GetFileType
ConvertFiberToThread
ConvertThreadToFiber
InitializeCriticalSection
FormatMessageA
GetCurrentDirectoryW
GetFileAttributesExW
GetFileInformationByHandle
GetFileTime
GetFullPathNameW
SetEndOfFile
SetFilePointerEx
SetFileTime
GetTempPathW
DeviceIoControl
MoveFileExW
ResetEvent
SetWaitableTimer
ResumeThread
CreateWaitableTimerA
AreFileApisANSI
GetExitCodeThread
GetCPInfo
GetLocaleInfoEx
GetStringTypeW
IsProcessorFeaturePresent
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
RtlUnwind
InterlockedPushEntrySList
GetCommandLineA
CreateThread
ExitThread
FreeLibraryAndExitThread
GetConsoleOutputCP
SetStdHandle
HeapSize
GetDriveTypeW
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
SetConsoleCtrlHandler
ExitProcess
GetTimeZoneInformation
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
HeapReAlloc
FindFirstFileExW
IsValidCodePage
DuplicateHandle
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
WriteConsoleW
GetFinalPathNameByHandleW
RaiseException
user32
LoadBitmapW
EnumDisplayDevicesA
GetWindowThreadProcessId
GetShellWindow
TranslateAcceleratorW
LoadAcceleratorsW
DispatchMessageW
TranslateMessage
GetMessageW
DestroyIcon
LoadIconW
SetWindowLongW
GetUserObjectInformationW
FillRect
GetWindowRect
InvalidateRect
EndPaint
BeginPaint
GetDC
DrawTextW
GetSystemMetrics
EnableWindow
KillTimer
GetProcessWindowStation
GetDlgCtrlID
GetDlgItem
ShowWindow
DestroyWindow
CreateWindowExW
RegisterClassW
CallWindowProcW
PostQuitMessage
DefWindowProcW
SendMessageW
MessageBoxW
GetWindowLongW
SetTimer
gdi32
SetTextColor
CreateSolidBrush
CreatePen
DeleteDC
DeleteObject
GetDeviceCaps
GetStockObject
Rectangle
RoundRect
SelectObject
SetDCBrushColor
SetDCPenColor
SetBkMode
CreateFontW
ole32
CoCreateGuid
StringFromGUID2
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoInitialize
CoInitializeEx
advapi32
GetUserNameW
SystemFunction036
CryptAcquireContextW
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegGetValueW
RegOpenKeyExA
RegQueryValueExA
CryptDestroyKey
OpenProcessToken
AllocateAndInitializeSid
CopySid
EqualSid
FreeSid
GetLengthSid
GetTokenInformation
IsValidSid
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegDeleteTreeW
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptSignHashW
CryptEnumProvidersW
shlwapi
PathFindFileNameW
ord12
PathFindExtensionW
powrprof
CallNtPowerInformation
winmm
timeSetEvent
timeGetTime
timeGetDevCaps
timeBeginPeriod
bcrypt
BCryptGenRandom
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 896KB - Virtual size: 896KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 7.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 365KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 708KB - Virtual size: 712KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE