C:\live\games\s11\general\TreasuresOfMontezuma2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-07_3d4e291e1f80df7391e63b6e1fde3bd8_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-07_3d4e291e1f80df7391e63b6e1fde3bd8_magniber.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-07_3d4e291e1f80df7391e63b6e1fde3bd8_magniber
-
Size
5.0MB
-
MD5
3d4e291e1f80df7391e63b6e1fde3bd8
-
SHA1
a61f1ac4ae44d295031559e156ff7b3e60071aff
-
SHA256
8103562f1cf49825ea6c0f365941bb75ad03d365f3761d0b458737071b0486a1
-
SHA512
1c82cec0adc420df0d6db6d84fa2fc514865a9f7414c15bf49fabf9b45396919c82b25a37c32f1c6ff0a48738219204043cbcd9c29baf2631bf60542e7e8571d
-
SSDEEP
98304:Ku+ctH2+DRKddbJCHNMpXLZARw40ITRztJBwzUnb1ocvSZOYG:Ku+ctH2+DY0NmXsZwGSZO5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-07_3d4e291e1f80df7391e63b6e1fde3bd8_magniber
Files
-
2024-06-07_3d4e291e1f80df7391e63b6e1fde3bd8_magniber.exe windows:5 windows x86 arch:x86
93d00d2c64c6dba5f56237eabace659d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetLastError
GetModuleHandleW
GetModuleFileNameW
GetLastError
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateFileW
GetFileSize
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CloseHandle
SetEnvironmentVariableA
GetProcessHeap
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
GetExitCodeProcess
CreatePipe
IsValidLocale
GetUserDefaultLCID
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
SetCurrentDirectoryA
GetCurrentDirectoryA
GetFullPathNameA
IsValidCodePage
GetOEMCP
GetACP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapCreate
QueryPerformanceCounter
QueryPerformanceFrequency
Sleep
SetEvent
SetThreadPriority
CreateThread
CreateEventW
WaitForSingleObject
GetProcAddress
GetTickCount
SetThreadAffinityMask
GetCurrentThread
SetProcessAffinityMask
GetProcessAffinityMask
GetCurrentProcess
CreateMutexW
WaitForMultipleObjects
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FindClose
FindNextFileW
FindFirstFileW
MultiByteToWideChar
LoadLibraryW
FreeLibrary
ReadFile
WideCharToMultiByte
GetVersionExW
LocalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetFileTime
GetComputerNameW
GetPrivateProfileStringW
WriteFile
GetCurrentProcessId
CreateFileA
CreateFileMappingA
CreateEventA
GetLocalTime
ResetEvent
InterlockedDecrement
CreateDirectoryW
FormatMessageW
CopyFileW
CompareFileTime
GetSystemInfo
GetModuleFileNameA
FormatMessageA
LoadLibraryA
GetTimeFormatA
GetDateFormatA
GetSystemTime
InterlockedExchangeAdd
InterlockedExchange
InterlockedIncrement
GetStringTypeW
LCMapStringW
GetCPInfo
CompareStringA
CompareStringW
GetLocaleInfoA
lstrcmpiA
EnumSystemLocalesA
LCMapStringA
GetStringTypeA
GetVersionExA
GetFileType
SetFilePointer
SetEndOfFile
RtlUnwind
RaiseException
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
GetFileAttributesW
GetFileAttributesA
GetCommandLineA
GetStartupInfoA
WriteConsoleW
GetStdHandle
HeapReAlloc
ExitThread
ResumeThread
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
LockFile
UnlockFile
CreateDirectoryA
FindNextFileA
ExitProcess
DeleteFileA
MoveFileA
CreateProcessA
DuplicateHandle
GetFileInformationByHandle
PeekNamedPipe
SetHandleCount
SetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapSize
GetModuleHandleA
VirtualFree
VirtualAlloc
RemoveDirectoryA
user32
SendMessageW
PostMessageW
RegisterWindowMessageW
ClipCursor
PtInRect
GetClientRect
ScreenToClient
GetCursorPos
wsprintfW
SystemParametersInfoW
ReleaseDC
GetDC
EnumDisplaySettingsExW
ClientToScreen
EndPaint
BeginPaint
MessageBoxA
SetForegroundWindow
ShowWindow
GetWindowPlacement
DefWindowProcW
SetCursor
LoadCursorW
AdjustWindowRect
GetClipboardData
OpenClipboard
IsClipboardFormatAvailable
SetClipboardData
EmptyClipboard
UnregisterClassW
CloseClipboard
SetWindowTextW
CreateWindowExW
SetWindowPos
SetWindowLongW
RegisterClassW
LoadIconW
DispatchMessageW
TranslateMessage
PeekMessageW
SetCursorPos
ReleaseCapture
SetCapture
OffsetRect
MessageBoxW
GetAsyncKeyState
DestroyWindow
shell32
SHCreateDirectoryExW
ShellExecuteW
SHGetFolderPathW
SHFileOperationW
ole32
CoUninitialize
CoCreateGuid
CoInitialize
CoCreateInstance
winmm
timeEndPeriod
timeBeginPeriod
timeGetTime
ws2_32
WSACancelAsyncRequest
WSAAsyncGetHostByName
WSASend
WSAGetLastError
WSAStartup
WSACleanup
closesocket
WSACloseEvent
WSAEnumNetworkEvents
socket
htons
WSACreateEvent
WSARecv
WSAWaitForMultipleEvents
connect
WSAEventSelect
shlwapi
PathAppendW
PathRemoveFileSpecW
PathFileExistsW
PathIsRelativeW
PathFindExtensionW
PathFindFileNameW
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
gdi32
GetDeviceCaps
comdlg32
ChooseColorW
advapi32
SetSecurityDescriptorDacl
RegOpenKeyExW
RegQueryValueExW
FreeSid
SetNamedSecurityInfoW
SetEntriesInAclW
AllocateAndInitializeSid
InitializeSecurityDescriptor
oleaut32
SysFreeString
SysAllocString
Sections
.text Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 610KB - Virtual size: 609KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 253KB - Virtual size: 33.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
STLPORT_ Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 313KB - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 317KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ