Static task
static1
Behavioral task
behavioral1
Sample
2024-06-08_f0d18d1852fe693716af2f45188d5788_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-08_f0d18d1852fe693716af2f45188d5788_magniber.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-06-08_f0d18d1852fe693716af2f45188d5788_magniber
-
Size
3.8MB
-
MD5
f0d18d1852fe693716af2f45188d5788
-
SHA1
68cd8370e0081748b39c0a258cedd6a8af1c81c3
-
SHA256
c043a68534873ce8defa468fff1a93524073723cf60f764c721eae54b7747629
-
SHA512
1fe73dd8b12c92dc73204b1d933cdfb1c31c557d9f75a38e68d4e3800c26c135f891bb23e2b755c16ada3cec4724c8ace81d5fbeeec376ad55344f3fe4b21876
-
SSDEEP
98304:FnDT6TjpyMNQdIl/v6JqxJ/NMC/Y7RFgGkBP:FDT6TjpyMeil/v6JI/3Y73Lk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-08_f0d18d1852fe693716af2f45188d5788_magniber
Files
-
2024-06-08_f0d18d1852fe693716af2f45188d5788_magniber.exe windows:4 windows x86 arch:x86
82935279cc64d412044c6dabd2edb61e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
GetVolumeInformationA
DeviceIoControl
IsBadReadPtr
GlobalUnlock
GlobalLock
MulDiv
lstrcpyA
EnumResourceLanguagesA
ConvertDefaultLocale
lstrcmpA
GlobalDeleteAtom
FreeResource
GlobalAddAtomA
lstrcmpW
lstrcatA
GlobalFindAtomA
GlobalGetAtomNameA
GlobalReAlloc
GlobalHandle
LocalReAlloc
TlsFree
GlobalFlags
LockFile
UnlockFile
GetCPInfo
GetOEMCP
SetErrorMode
GetFileTime
VirtualAllocEx
RtlUnwind
ExitProcess
VirtualQuery
HeapReAlloc
GetStartupInfoA
GetCommandLineA
ExitThread
GetDriveTypeA
GetSystemTimeAsFileTime
GetFileType
HeapSize
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
SetStdHandle
GetStringTypeA
GetStringTypeW
IsBadCodePtr
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetEnvironmentVariableA
CreateRemoteThread
ReadProcessMemory
VirtualProtectEx
VirtualFreeEx
DosDateTimeToFileTime
SetFileTime
CreateJobObjectA
SetInformationJobObject
AssignProcessToJobObject
TerminateProcess
OpenEventA
OpenMutexA
OpenFileMappingA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CreateThread
WaitForMultipleObjects
ResetEvent
GetProcessId
QueryInformationJobObject
GetProcessTimes
GetExitCodeProcess
TerminateJobObject
OpenProcess
OpenThread
WritePrivateProfileStringA
WriteProcessMemory
GetFullPathNameA
TlsAlloc
ResumeThread
TlsSetValue
TlsGetValue
FlushFileBuffers
MoveFileA
CopyFileA
LocalFileTimeToFileTime
SetFileAttributesA
DeleteFileA
FindNextFileA
GetFileAttributesExA
GetCurrentDirectoryA
SetThreadAffinityMask
QueryPerformanceCounter
QueryPerformanceFrequency
DebugBreak
DuplicateHandle
CreateDirectoryA
GetWindowsDirectoryA
LocalAlloc
LocalFree
FormatMessageA
FileTimeToSystemTime
CreateEventA
SetEndOfFile
SetFilePointer
WriteFile
SetEvent
TerminateThread
GetSystemTime
SystemTimeToFileTime
FileTimeToLocalFileTime
IsDBCSLeadByte
InterlockedIncrement
lstrcpynA
CompareStringW
CompareStringA
lstrcmpiA
GetVersion
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
LoadLibraryExA
FindResourceA
LockResource
SizeofResource
ReleaseMutex
CreateMutexA
lstrlenW
FindResourceExA
LoadResource
GlobalAlloc
ReadFile
GlobalFree
WideCharToMultiByte
GetFileAttributesW
CreateFileW
GetFileSize
GetProcessHeap
HeapAlloc
GetPrivateProfileStringW
HeapFree
GetModuleFileNameW
FindFirstFileW
FindNextFileW
GetUserDefaultLCID
GetUserGeoID
GetUserDefaultUILanguage
GetSystemDefaultLangID
GetLocaleInfoW
GetNumberFormatW
GetDateFormatW
LoadLibraryW
FreeLibrary
GetModuleFileNameA
GetPrivateProfileStringA
GetCurrentProcessId
lstrlenA
MultiByteToWideChar
GetLastError
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
WaitForSingleObject
Sleep
IsDebuggerPresent
LoadLibraryA
GetTickCount
GetCurrentThread
GetThreadContext
SetThreadContext
SetUnhandledExceptionFilter
OutputDebugStringA
FindFirstFileA
FindClose
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualFree
GetModuleHandleA
GetProcAddress
GetCurrentProcess
CreateFileA
GetCurrentThreadId
CreateProcessA
CloseHandle
GetFileAttributesA
DeleteCriticalSection
InitializeCriticalSection
RaiseException
user32
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetPropA
RemovePropA
IsChild
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
UpdateWindow
GetMenu
GetSysColor
AdjustWindowRectEx
EqualRect
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
CopyRect
RegisterWindowMessageA
RegisterClipboardFormatA
GetWindow
SetWindowContextHelpId
MapDialogRect
UnregisterClassA
IntersectRect
GetWindowDC
BeginPaint
EndPaint
GetSysColorBrush
SetForegroundWindow
AttachThreadInput
SetMenuItemBitmaps
ModifyMenuA
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetLastActivePopup
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
UnhookWindowsHookEx
GetWindowTextA
GetFocus
SetWindowPos
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetMenuState
IsRectEmpty
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
GetMenuItemID
GetSubMenu
FindWindowExA
SetWindowPlacement
WaitForInputIdle
GetWindowPlacement
EnumWindows
PostThreadMessageA
GetSystemMetrics
GetWindowThreadProcessId
GetForegroundWindow
FindWindowA
GetWindowRect
MoveWindow
SetFocus
SystemParametersInfoA
PostMessageA
wsprintfA
CharLowerBuffW
PtInRect
OffsetRect
GetCursorPos
SetCapture
ReleaseCapture
IsWindow
SetCursor
LoadCursorA
MessageBoxW
CharLowerBuffA
LoadIconA
PostQuitMessage
SetRect
EnableMenuItem
GetMenuItemCount
InsertMenuA
SendMessageA
GetSystemMenu
IsIconic
SetWindowRgn
GetClientRect
InvalidateRect
SetTimer
EnableWindow
CharUpperA
GetClassNameA
ShowWindow
GetLastInputInfo
IsWindowVisible
GetParent
MessageBoxA
ChangeDisplaySettingsA
GetDC
ReleaseDC
CharNextA
SetPropA
gdi32
GetRgnBox
GetTextColor
GetBkColor
GetMapMode
CreateRectRgnIndirect
GetStockObject
DeleteDC
ExtSelectClipRgn
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
GetObjectA
SetBkColor
CreateRoundRectRgn
CreateRectRgn
GetDeviceCaps
CreateBitmap
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetTextColor
GetClipBox
SetViewportExtEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
CryptDestroyKey
CryptDestroyHash
CryptReleaseContext
GetUserNameA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
RegCloseKey
CryptDeriveKey
CryptHashData
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegQueryValueExW
CryptSetKeyParam
RevertToSelf
ImpersonateSelf
RegCreateKeyExW
RegOpenKeyExW
RegSetKeySecurity
CryptDecrypt
CryptAcquireContextW
CryptCreateHash
shell32
SHGetSpecialFolderPathA
ShellExecuteExA
SHFileOperationA
comctl32
ord17
shlwapi
PathFileExistsA
PathRemoveFileSpecA
PathStripPathA
PathAppendA
PathAppendW
PathRemoveFileSpecW
PathUnquoteSpacesW
PathFindExtensionA
PathIsUNCA
PathFindFileNameA
PathStripToRootA
oledlg
ord8
ole32
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoRevokeClassObject
CoCreateInstance
CoInitializeEx
CoInitializeSecurity
StringFromCLSID
CoSetProxyBlanket
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoInitialize
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoUninitialize
CoCreateGuid
CLSIDFromString
oleaut32
SysAllocString
SysFreeString
SysStringLen
VariantClear
VariantInit
DispCallFunc
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
VariantChangeType
SysAllocStringByteLen
SysStringByteLen
VariantCopy
SysAllocStringLen
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetElemsize
SafeArrayCreate
SafeArrayDestroy
SystemTimeToVariantTime
OleCreateFontIndirect
urlmon
URLDownloadToCacheFileA
rasapi32
RasEnumEntriesA
ws2_32
gethostname
gethostbyname
ntohl
WSACleanup
WSAStartup
crypt32
CertFreeCertificateContext
CertNameToStrA
CryptMsgGetAndVerifySigner
CryptQueryObject
CryptMsgClose
wintrust
WinVerifyTrust
wininet
InternetCloseHandle
HttpAddRequestHeadersA
InternetGetLastResponseInfoA
InternetReadFile
InternetQueryOptionA
HttpSendRequestA
HttpQueryInfoA
InternetOpenA
InternetConnectA
HttpOpenRequestA
winmm
timeGetTime
PlaySoundA
iphlpapi
GetAdaptersInfo
psapi
GetProcessImageFileNameW
dinput8
DirectInput8Create
version
VerQueryValueW
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 503KB - Virtual size: 502KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.pecode Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pccode Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 139KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.phs Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 311KB - Virtual size: 311KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ