Static task
static1
Behavioral task
behavioral1
Sample
2024-06-04_40e4fb3c8aad9f555c9f790116c91c9d_mafia_magniber.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-06-04_40e4fb3c8aad9f555c9f790116c91c9d_mafia_magniber.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-04_40e4fb3c8aad9f555c9f790116c91c9d_mafia_magniber
-
Size
3.7MB
-
MD5
40e4fb3c8aad9f555c9f790116c91c9d
-
SHA1
13bb896cd11a8e8d0fc56f2e1294f07d0718c7a5
-
SHA256
cac7cd8181322f9ee098a919a9e2cf813325113c30c0ef15cb2d4cfa815f7f7e
-
SHA512
85a229fbf1819e581af376aefa21a0c7a5045afd7b2cff1dd970ffe169c1e96b2ae14c741d50e4a034cf01b3c56e75055a944753c149598e9960906c90d14b25
-
SSDEEP
98304:6m36jQLgLngm3u11W9UoOeXIqw+POSJ53OliADMd:6oLgzB6bo/Iqw+fD3ONDMd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-04_40e4fb3c8aad9f555c9f790116c91c9d_mafia_magniber
Files
-
2024-06-04_40e4fb3c8aad9f555c9f790116c91c9d_mafia_magniber.exe windows:5 windows x86 arch:x86
3f9adaf508dc0d85c4657e9fe9280fcb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
DuplicateIcon
ShellExecuteExW
SHGetFolderPathW
ExtractIconExW
wsock32
WSAStartup
connect
ntohl
ioctlsocket
htonl
select
htons
recv
socket
gethostbyname
send
gdiplus
GdiplusStartup
GdiplusShutdown
GdipFree
GdipAlloc
GdipDeleteBrush
GdipGetImageBounds
GdipCloneImage
GdipCloneBrush
GdipDrawImageRectI
GdipSetSmoothingMode
GdipSetCompositingQuality
GdipDeleteGraphics
GdipCreateFromHDC
GdipDisposeImage
GdipCreateSolidFill
GdipLoadImageFromStream
kernel32
SetLastError
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
RaiseException
FreeLibrary
GetProcAddress
GetModuleHandleW
lstrcmpiW
GetLastError
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedIncrement
LoadLibraryW
MulDiv
GetCommandLineW
WaitForSingleObject
GetTempPathW
LocalFree
CreateThread
OpenProcess
GetCurrentProcessId
WriteProcessMemory
QueryPerformanceCounter
GetFileAttributesW
CreateFileW
LockResource
CloseHandle
GetWindowsDirectoryW
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalFree
GetDateFormatW
SystemTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
CreateRemoteThread
VirtualFreeEx
GetVersionExW
VirtualAllocEx
DeviceIoControl
SetEnvironmentVariableA
GlobalReAlloc
TlsAlloc
TlsGetValue
TlsFree
FlushInstructionCache
GetUserDefaultLCID
SetFilePointer
ReadFile
CompareStringW
GetTickCount
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleMode
GetConsoleCP
HeapReAlloc
HeapCreate
GetStdHandle
WriteFile
GetLocaleInfoW
TlsSetValue
IsValidCodePage
GetOEMCP
GetACP
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LCMapStringW
GetCPInfo
RtlUnwind
GetTimeZoneInformation
FindNextFileW
FindFirstFileExW
GetDriveTypeW
FindClose
DeleteFileW
GetFullPathNameW
RemoveDirectoryW
GetStartupInfoW
HeapSetInformation
CreateDirectoryW
SetCurrentDirectoryW
GetCurrentDirectoryW
SetEnvironmentVariableW
GetSystemTimeAsFileTime
ExitProcess
InitializeCriticalSection
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
WideCharToMultiByte
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
GetCurrentProcess
Sleep
lstrlenW
GetLongPathNameW
InterlockedDecrement
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
FlushFileBuffers
SetStdHandle
GetSystemDirectoryW
SetEndOfFile
GetSystemTime
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
GetVolumeInformationW
user32
DialogBoxIndirectParamW
UnregisterClassA
SendMessageW
GetDC
GetClientRect
MoveWindow
SetWindowTextW
GetWindowRect
ScreenToClient
EndDialog
CreateWindowExW
DefWindowProcW
SetWindowLongW
IsWindow
UpdateWindow
PeekMessageW
ShowWindow
InvalidateRect
DispatchMessageW
SetWindowPos
MapWindowPoints
GetParent
SystemParametersInfoW
CloseClipboard
SetClipboardData
EmptyClipboard
GetDialogBaseUnits
SetTimer
HideCaret
EndPaint
BeginPaint
GetSystemMetrics
ClientToScreen
KillTimer
EnumWindows
GetClassNameW
PostMessageW
SetForegroundWindow
DialogBoxParamW
FindWindowW
PostThreadMessageW
DestroyIcon
GetWindowThreadProcessId
CallWindowProcW
LoadCursorW
GetClassInfoExW
RegisterClassExW
RedrawWindow
ReleaseDC
GetWindowDC
FillRect
GetMessageW
OpenClipboard
MessageBoxW
GetActiveWindow
CharNextW
GetWindowTextW
SetFocus
DestroyWindow
CreateDialogParamW
GetWindow
GetWindowLongW
gdi32
GetStockObject
SelectObject
CreateSolidBrush
CreateFontIndirectW
GetDeviceCaps
CreateFontW
GetTextExtentPoint32W
DeleteDC
DeleteObject
SetBkColor
advapi32
RegQueryValueExW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
RegOpenKeyExA
IsTextUnicode
ole32
CreateBindCtx
CoTaskMemFree
CoInitializeSecurity
CoSetProxyBlanket
CreateStreamOnHGlobal
CLSIDFromProgID
CoInitialize
CLSIDFromString
CoUninitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
GetRunningObjectTable
oleaut32
SysAllocStringByteLen
CreateErrorInfo
VariantInit
VariantClear
VariantCopy
SysAllocString
OleLoadPicture
VariantChangeType
SysStringByteLen
VarUI4FromStr
SysStringLen
SysFreeString
Sections
.text Size: 528KB - Virtual size: 528KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 35KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ