C:\ent-slave-root\workspace\VNCConnect\Builds\Clients\VNC_7.11.x\label\con-windows-64\bld32\RelWithDebInfo\installers\viewer_bootstrap.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-27_a3fdda6699341de4b5d9baa69d4128f9_avoslocker_magniber.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-27_a3fdda6699341de4b5d9baa69d4128f9_avoslocker_magniber.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-27_a3fdda6699341de4b5d9baa69d4128f9_avoslocker_magniber
-
Size
11.8MB
-
MD5
a3fdda6699341de4b5d9baa69d4128f9
-
SHA1
be119f2349951146c8ee697cb556a2fd373a2772
-
SHA256
bf341af967eb41cec554c11507086e20a0313190c2543f73917f2ffbe38724a1
-
SHA512
e8410c8e03711445ffc23b79a96f3f379d94b7507a1d42280a703282b61599489d71a0655ccfb6f8f131e5f0c57b5ee84e5cd2b70597060a2dd8c2ca08c2fd0f
-
SSDEEP
196608:t19Ki8a/Qa4vHdlounj1SHNURgXjZFuGhNIMPSvoTk91HJd2OhZ9se8pF8w/wobr:t3Ki5IDvHd+ujFOXjbNIMYCI1WOhY/wc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-05-27_a3fdda6699341de4b5d9baa69d4128f9_avoslocker_magniber
Files
-
2024-05-27_a3fdda6699341de4b5d9baa69d4128f9_avoslocker_magniber.exe windows:6 windows x86 arch:x86
425a93f0bf37ad9c39ca7d12aa5f118e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
WSAEnumNetworkEvents
WSAEventSelect
WSAIoctl
accept
bind
closesocket
ioctlsocket
getsockopt
setsockopt
socket
htons
WSAStartup
WSASetLastError
getservbyname
getservbyport
gethostbyname
gethostbyaddr
ntohs
ntohl
inet_ntoa
inet_addr
WSAGetLastError
htonl
getsockname
getpeername
WSASocketW
WSADuplicateSocketW
WSAConnect
comctl32
_TrackMouseEvent
InitCommonControlsEx
ImageList_Destroy
ImageList_Create
ImageList_ReplaceIcon
ImageList_Add
kernel32
GetProcAddress
LoadLibraryW
WaitForSingleObject
GetExitCodeProcess
ResetEvent
CreateEventW
GetComputerNameW
QueryPerformanceCounter
QueryPerformanceFrequency
Sleep
GetSystemTimeAsFileTime
GetModuleHandleW
ExpandEnvironmentStringsW
SetEvent
RtlCaptureStackBackTrace
GetModuleHandleExW
GetStdHandle
GetFileType
AllocConsole
FreeConsole
GetConsoleMode
ReadConsoleW
WriteConsoleW
WaitForMultipleObjects
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
GetHandleInformation
SetHandleInformation
GetTimeFormatW
GetDateFormatW
GetSystemDirectoryA
LoadLibraryA
GetVersionExW
GlobalLock
GlobalAlloc
GlobalFree
GlobalSize
HeapSize
GetProcessHeap
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
DecodePointer
HeapReAlloc
SetEnvironmentVariableW
GetFileSizeEx
FlushFileBuffers
SetConsoleCtrlHandler
GetConsoleOutputCP
SetFilePointerEx
EnumSystemLocalesW
IsValidLocale
LCMapStringW
CompareStringW
HeapFree
HeapAlloc
GetCurrentThread
DuplicateHandle
WriteFile
ExitProcess
ReadFile
LoadLibraryExW
EncodePointer
InterlockedFlushSList
InterlockedPushEntrySList
RtlUnwind
RaiseException
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetCurrentThreadId
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
ReOpenFile
LocalAlloc
MultiByteToWideChar
SetErrorMode
FindNextFileW
FindFirstFileW
FindClose
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
QueryFullProcessImageNameW
GetModuleFileNameW
CreateFileW
SearchPathW
LoadLibraryExA
OutputDebugStringW
GetCurrentProcess
GetCurrentProcessId
SetStdHandle
FindResourceW
SizeofResource
LockResource
LoadResource
GetUserDefaultLCID
GetLocaleInfoW
CreateProcessW
GetCommandLineW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetSystemInfo
WideCharToMultiByte
GetTempPathW
MoveFileW
LocalFree
SetLastError
SetFilePointer
SetEndOfFile
RemoveDirectoryW
GetFileAttributesExW
GetFileAttributesW
DeleteFileW
CreateDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
FormatMessageW
FreeLibrary
GetSystemDirectoryW
GetProcessId
GetLastError
CloseHandle
ConnectNamedPipe
CreateNamedPipeW
GetOverlappedResult
CancelIo
OpenProcess
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CreateThread
TerminateThread
ResumeThread
GetThreadTimes
VirtualProtect
VirtualQuery
GlobalUnlock
user32
EnumDisplaySettingsW
ChangeDisplaySettingsExW
GetNextDlgTabItem
ScrollWindowEx
RedrawWindow
KillTimer
SetTimer
DefDlgProcW
IsIconic
DestroyWindow
CreateWindowExW
ScreenToClient
RegisterClipboardFormatW
DefWindowProcW
IsWindowVisible
GetMessagePos
GetDoubleClickTime
CreateMenu
SetMenu
SetMenuDefaultItem
SetMenuItemInfoW
InsertMenuItemW
TrackPopupMenu
DeleteMenu
GetMenuItemCount
CheckMenuItem
DestroyMenu
CreatePopupMenu
GetMenuState
GetKeyboardLayout
GetWindowThreadProcessId
GetOpenClipboardWindow
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
IsDialogMessageW
DestroyIcon
EnumChildWindows
SetWindowTextW
GetDlgItem
EndDialog
DialogBoxParamW
CreateDialogParamW
SetParent
GetClassNameW
IsWindowEnabled
PostMessageW
GetCursor
GetScrollInfo
SetScrollInfo
OffsetRect
AdjustWindowRectEx
GetCursorPos
InvalidateRect
GetWindowTextLengthW
GetWindowTextW
GetClipboardData
LoadIconW
GetDesktopWindow
SetWindowLongW
MapWindowPoints
ClientToScreen
GetWindowRect
EndPaint
BeginPaint
SetForegroundWindow
GetForegroundWindow
EnableMenuItem
GetSystemMenu
EnableWindow
ReleaseCapture
SetCapture
GetKeyState
GetDlgCtrlID
GetWindowPlacement
SetWindowPos
ShowWindow
IsChild
GetMessageW
GetComboBoxInfo
GetWindowDC
GetAncestor
SystemParametersInfoW
GetWindowLongW
InflateRect
FrameRect
FillRect
DrawFocusRect
GetSysColorBrush
GetSysColor
SetCursor
GetClientRect
DrawTextW
GetFocus
SendMessageW
DrawFrameControl
SetFocus
LoadCursorW
MsgWaitForMultipleObjects
PeekMessageW
GetSystemMetrics
ReleaseDC
GetDC
DispatchMessageW
TranslateMessage
MonitorFromRect
MonitorFromWindow
GetMonitorInfoW
EnumDisplayMonitors
ToUnicodeEx
GetKeyboardLayoutList
GetAsyncKeyState
ToAsciiEx
VkKeyScanExA
VkKeyScanExW
keybd_event
MapVirtualKeyW
SetWindowsHookExW
UnhookWindowsHookEx
CallNextHookEx
WindowFromPoint
CreateIconIndirect
GetParent
CallWindowProcW
UnregisterClassW
RegisterClassExW
gdi32
GetDeviceCaps
GetStockObject
SelectObject
SetBkMode
SetTextColor
GetCharWidthW
CreateSolidBrush
DeleteObject
CreatePen
LineTo
PatBlt
SetBkColor
CreateCompatibleBitmap
DeleteDC
GetPixel
BitBlt
CreateCompatibleDC
CreateDCW
GetClipBox
StretchBlt
SetWindowOrgEx
CreateBitmap
GdiAlphaBlend
CreateDIBSection
SetDIBColorTable
CreateFontIndirectW
GetTextExtentPoint32W
SetMapMode
GetDIBits
GetObjectW
MoveToEx
GetTextMetricsW
ExcludeClipRect
shell32
ShellExecuteW
SHGetKnownFolderPath
SHGetFileInfoW
ord74
SHFileOperationW
ole32
CoCreateInstance
CoUninitialize
CoInitializeEx
CoTaskMemFree
OleInitialize
RegisterDragDrop
DoDragDrop
ReleaseStgMedium
CoTaskMemAlloc
CoTaskMemRealloc
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
OleUninitialize
oleaut32
SysAllocString
SysFreeString
advapi32
GetUserNameW
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegNotifyChangeKeyValue
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyExW
RegCreateKeyExW
RegCloseKey
CreateProcessWithLogonW
LogonUserW
SetSecurityInfo
SetNamedSecurityInfoW
GetSecurityInfo
GetNamedSecurityInfoW
SetSecurityDescriptorSacl
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
SetSecurityDescriptorControl
MakeSelfRelativeSD
MakeAbsoluteSD
InitializeSecurityDescriptor
GetSecurityDescriptorLength
GetSecurityDescriptorControl
SetEntriesInAclW
InitializeAcl
GetAclInformation
ConvertStringSidToSidW
ConvertSidToStringSidW
LookupAccountNameW
LookupAccountSidW
IsValidSid
GetTokenInformation
GetSidIdentifierAuthority
CreateProcessAsUserW
OpenProcessToken
AllocateAndInitializeSid
CopySid
EqualSid
FreeSid
GetLengthSid
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10.3MB - Virtual size: 10.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ