Magnification.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Magnification.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Magnification.dll
Resource
win10v2004-20240426-en
General
-
Target
Magnification.dll
-
Size
40KB
-
MD5
5d089a8bf75e6c7e692745dde907174b
-
SHA1
5dfa4b06854fbca50df80c441f4a793e79e884e3
-
SHA256
209d60e04fee0b81be62faafb32eaf62e520ad602c9fd9025fb237ce5696ef3e
-
SHA512
abf909928147d7dc975fec6e35940289f66cb307e82a8ea65cefb975d23008c3f5698389a1a903254c2b98fb6151211ca113290f56c02a60bd4539d7884ce3de
-
SSDEEP
768:wreFPip9AWudZpwaykKwc8DGB+VfnCMHKPuj:aeFPipKLfKoGBynCyKGj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Magnification.dll
Files
-
Magnification.dll.dll windows:6 windows x86 arch:x86
8bf993afd8a9480e7a359bac85bf7d28
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
??3@YAXPAX@Z
_isnan
_vsnwprintf
memmove
_stricmp
_XcptFilter
_amsg_exit
free
malloc
_initterm
_except_handler4_common
memcpy
_ftol2_sse
??2@YAPAXI@Z
_ftol2
__CxxFrameHandler3
memset
ntdll
RtlImageNtHeader
ord1
kernel32
HeapFree
GetProcessHeap
HeapAlloc
HeapReAlloc
InitializeCriticalSection
DeleteCriticalSection
CloseHandle
OpenEventW
EnterCriticalSection
LeaveCriticalSection
MapViewOfFile
UnmapViewOfFile
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetLastError
GetModuleHandleW
SetLastError
Sleep
user32
ShowSystemCursor
ord2001
CreateWindowExW
DestroyWindow
SetMagnificationDesktopMagnification
GetWindowLongW
SetWindowLongW
SendMessageW
ControlMagnification
SetMagnificationLensCtxInformation
LoadCursorW
SetMagnificationDesktopColorEffect
UnregisterClassW
IsThreadDesktopComposited
GetAncestor
SetMirrorRendering
GetPhysicalCursorPos
MapWindowPoints
GetCursorInfo
GetIconInfo
DrawIcon
GetDC
ReleaseDC
GetClientRect
DefWindowProcW
GetMagnificationDesktopColorEffect
PostQuitMessage
SetTimer
SetWindowPos
BeginPaint
IsWindowVisible
IsIconic
EndPaint
GetWindowRect
FillRect
GetWindowInfo
GetParent
GetMagnificationLensCtxInformation
GetSystemMetrics
IntersectRect
OffsetRect
ord1550
EnumDisplayMonitors
GetMonitorInfoA
GetMagnificationDesktopMagnification
RegisterClassW
ord2002
KillTimer
gdi32
CreateCompatibleDC
GetBitmapBits
GetObjectW
ord1005
GdiEntry13
CreateSolidBrush
ExcludeClipRect
SelectClipRgn
CreateRectRgn
DeleteDC
PlgBlt
IntersectClipRect
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
advapi32
EventWrite
EventUnregister
EventRegister
wtsapi32
WTSRegisterSessionNotification
WTSUnRegisterSessionNotification
gdiplus
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipSetInterpolationMode
GdipDeleteGraphics
GdipCreateFromHDC
GdipSetImageAttributesColorMatrix
GdipDisposeImageAttributes
GdipDrawImageRectRectI
GdiplusStartup
GdiplusShutdown
GdipCreateImageAttributes
d3d9
Direct3DCreate9Ex
dwmapi
ord100
ord133
ord134
ord132
Exports
Exports
MagGetColorEffect
MagGetFullscreenColorEffect
MagGetFullscreenTransform
MagGetImageScalingCallback
MagGetInputTransform
MagGetWindowFilterList
MagGetWindowSource
MagGetWindowTransform
MagInitialize
MagSetColorEffect
MagSetFullscreenColorEffect
MagSetFullscreenTransform
MagSetImageScalingCallback
MagSetInputTransform
MagSetWindowFilterList
MagSetWindowSource
MagSetWindowTransform
MagShowSystemCursor
MagUninitialize
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ