C:\Amon\AmonSystemBs\BootStrapper\ProductionNoSign\Launcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_a1ade51ac94ed0fc2af314869db17176_mafia_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-23_a1ade51ac94ed0fc2af314869db17176_mafia_magniber.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-23_a1ade51ac94ed0fc2af314869db17176_mafia_magniber
-
Size
667KB
-
MD5
a1ade51ac94ed0fc2af314869db17176
-
SHA1
75dab32a42eff5ca1b7f0181883bc57c998a0bb9
-
SHA256
140798716bcb1adebcd97cf84d8f6cd0b521ebc9d02ae2be60510aaa95acfc98
-
SHA512
d4c2bc76ec2258e0eac122ab615f48ec27859e171772c77bfb2a9ea3bb2f3d2a4954a3e26350075e862086ccc69649d9efb68e91ee32948dfc361587440a117e
-
SSDEEP
12288:QM5qO07Hh598v0Hg8pg3gHFEc0iEiQbWYXeqkx3sC7V7+mWKT:V5n0HgQigHAZGqkx8aIl2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-23_a1ade51ac94ed0fc2af314869db17176_mafia_magniber
Files
-
2024-05-23_a1ade51ac94ed0fc2af314869db17176_mafia_magniber.exe windows:5 windows x86 arch:x86
fb73f3d60db4e9161b1ee7d96bfd0f9b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
kernel32
Sleep
GetSystemDirectoryW
CreateFileW
CloseHandle
SetLastError
GetCurrentProcess
FlushInstructionCache
GlobalUnlock
GlobalLock
GlobalAlloc
MulDiv
lstrcmpW
GlobalHandle
GlobalFree
LockResource
lstrlenA
DeleteCriticalSection
ExitProcess
SetEvent
CreateEventW
CreateThread
InitializeCriticalSectionAndSpinCount
WaitForSingleObject
GetCommandLineW
LocalFree
lstrcpyW
SizeofResource
InterlockedIncrement
FreeResource
CreateDirectoryW
GetProcessId
RemoveDirectoryW
TerminateProcess
CreateSemaphoreW
ReleaseSemaphore
InitializeCriticalSection
ReadFile
GetPrivateProfileIntW
WriteFile
MoveFileW
WritePrivateProfileStringW
GetPrivateProfileStringW
GetProcAddress
GetModuleHandleW
LoadLibraryW
FreeLibrary
FindFirstFileW
FindClose
InterlockedDecrement
SetEnvironmentVariableA
CompareStringW
SetEndOfFile
CreateFileA
WriteConsoleW
SetStdHandle
GetTickCount
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointer
GetFileType
SetHandleCount
FatalAppExitA
FlushFileBuffers
IsValidCodePage
GetOEMCP
GetACP
GetLocaleInfoW
GetTimeZoneInformation
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapReAlloc
GetConsoleMode
GetConsoleCP
HeapDestroy
HeapCreate
GetStdHandle
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringW
GetCPInfo
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetDateFormatA
GetTimeFormatA
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
GetProcessAffinityMask
GetLastError
DeleteFileW
GetTempPathW
lstrlenW
GetVersionExW
GetCurrentThreadId
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
FindResourceW
LoadResource
MultiByteToWideChar
RaiseException
SetConsoleCtrlHandler
user32
GetClientRect
ScreenToClient
PtInRect
GetForegroundWindow
IsWindow
LoadIconW
SendMessageW
KillTimer
MessageBoxW
InvalidateRect
CharNextW
UnregisterClassA
ReleaseDC
GetDesktopWindow
DestroyAcceleratorTable
GetWindowThreadProcessId
IsChild
SetActiveWindow
GetDlgItem
wsprintfW
GetWindowTextW
GetWindowTextLengthW
SetWindowTextW
ShowWindow
DestroyWindow
MoveWindow
SetWindowPos
SetWindowLongW
GetWindowLongW
RegisterClassExW
LoadCursorW
GetSystemMetrics
DispatchMessageW
TranslateMessage
GetMessageW
PostMessageW
PostThreadMessageW
SendDlgItemMessageW
MapDialogRect
SetWindowContextHelpId
EndDialog
DialogBoxIndirectParamW
RegisterWindowMessageW
BeginPaint
EndPaint
GetDC
GetFocus
SetFocus
GetWindow
GetClassNameW
GetSysColor
RedrawWindow
GetClassInfoExW
CreateWindowExW
CreateAcceleratorTableW
ClientToScreen
GetParent
SetCapture
ReleaseCapture
FillRect
InvalidateRgn
CallWindowProcW
DefWindowProcW
gdi32
CreateFontW
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
BitBlt
DeleteDC
GetObjectW
GetDeviceCaps
GetStockObject
advapi32
RegEnumKeyW
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
shell32
CommandLineToArgvW
Shell_NotifyIconW
ole32
CoTaskMemAlloc
OleUninitialize
StringFromGUID2
OleLockRunning
CreateStreamOnHGlobal
CoCreateInstance
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoRevokeClassObject
CoRegisterClassObject
CoReleaseServerProcess
CoAddRefServerProcess
CoUninitialize
CoInitialize
OleInitialize
oleaut32
GetErrorInfo
VariantChangeType
SetErrorInfo
CreateErrorInfo
DispCallFunc
SysAllocStringLen
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
SysStringLen
VariantInit
SysFreeString
SysAllocString
SafeArrayCreateVector
VariantClear
VariantCopy
shlwapi
PathFileExistsW
secur32
GetUserNameExW
winhttp
WinHttpReceiveResponse
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpSendRequest
WinHttpSetStatusCallback
WinHttpOpenRequest
WinHttpConnect
WinHttpCrackUrl
WinHttpGetProxyForUrl
WinHttpSetOption
WinHttpOpen
WinHttpCloseHandle
Sections
.text Size: 396KB - Virtual size: 396KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ