AdobeIPCBroker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-11_41ee51b3ab13977537877b0b80f9bef2_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-11_41ee51b3ab13977537877b0b80f9bef2_magniber.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-06-11_41ee51b3ab13977537877b0b80f9bef2_magniber
-
Size
1.6MB
-
MD5
41ee51b3ab13977537877b0b80f9bef2
-
SHA1
3a7120e0d5ff1ec8f16c020fc56dc87cc421ba93
-
SHA256
b02f39b9f0a6a0393a8355d947aa23c5d7203997f7c8a76d21834667a42d94d3
-
SHA512
7c10eb8ce2c9cea1e97d6f73310fbdb94d8a74776c8c7d61cdbdb2e42cad4280397ba084fccc5901ab9f17b8cfe7df516b8406c8647a0061248f9b4caeae73c9
-
SSDEEP
49152:D8E1mGfCzI3vZU6OHb/lfLkeua/Trr2F6:P1mGqI/ZWHvusrb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-11_41ee51b3ab13977537877b0b80f9bef2_magniber
Files
-
2024-06-11_41ee51b3ab13977537877b0b80f9bef2_magniber.exe windows:6 windows x86 arch:x86
6978cea612f11e72b2ac52f0bebecea1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
htonl
getsockopt
ioctlsocket
connect
closesocket
listen
getsockname
bind
WSAGetLastError
WSASetLastError
WSAStartup
getservbyname
getservbyport
gethostbyname
gethostbyaddr
socket
send
select
recv
ntohs
inet_ntoa
inet_addr
htons
__WSAFDIsSet
kernel32
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLastError
WaitForSingleObject
CreateSemaphoreW
FindFirstFileW
FindNextFileW
InitializeCriticalSectionEx
FindClose
RaiseException
DecodePointer
ReleaseMutex
CreateMutexA
Sleep
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetVersionExA
GetModuleHandleA
GetModuleFileNameA
GetSystemDirectoryA
CreateMutexW
FreeLibrary
CreateProcessW
GetProcAddress
CloseHandle
LoadLibraryA
MultiByteToWideChar
GetStdHandle
FindFirstFileExA
FindNextFileA
EnumSystemLocalesW
GetUserDefaultLCID
IsValidCodePage
ReleaseSemaphore
GetModuleFileNameW
HeapSize
WriteConsoleW
GetProcessHeap
SetEnvironmentVariableA
SwitchToThread
FreeEnvironmentStringsW
GetCommandLineW
GetEnvironmentVariableW
GetCurrentProcessId
GetLocalTime
ReadFile
WriteFile
ConnectNamedPipe
GetOverlappedResult
GetCurrentThread
GetTickCount
GetEnvironmentStringsW
SetStdHandle
SetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateFileW
FlushFileBuffers
GetFileAttributesExW
GetFileSizeEx
GetFullPathNameW
LockFileEx
SetEndOfFile
SetFilePointerEx
UnlockFile
GetTempPathW
DuplicateHandle
PeekNamedPipe
CreateNamedPipeW
SetEvent
ResetEvent
CreateEventW
GetCurrentProcess
SetThreadPriority
GetThreadPriority
VirtualAlloc
VirtualFree
IsValidLocale
GetModuleHandleExW
LoadLibraryExW
WaitForMultipleObjects
GetNamedPipeInfo
LocalAlloc
LocalReAlloc
LocalFree
FormatMessageW
LCMapStringW
RtlCaptureStackBackTrace
SetFilePointer
GetSystemTimeAsFileTime
TerminateProcess
OpenProcess
GlobalAlloc
GlobalFree
WaitForSingleObjectEx
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
QueryPerformanceCounter
IsDebuggerPresent
GetStartupInfoW
WideCharToMultiByte
EncodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CompareStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
OutputDebugStringW
RtlUnwind
InterlockedPushEntrySList
CreateThread
ExitThread
FreeLibraryAndExitThread
GetTimeZoneInformation
ExitProcess
GetDriveTypeW
GetFileType
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCommandLineA
GetACP
GetConsoleMode
ReadConsoleW
GetConsoleCP
GetFullPathNameA
HeapAlloc
HeapReAlloc
HeapFree
GetOEMCP
user32
KillTimer
TranslateMessage
DispatchMessageW
PeekMessageW
PostMessageW
PostQuitMessage
DestroyWindow
SetTimer
GetWindowLongW
GetShellWindow
EnumWindows
GetWindowThreadProcessId
SetWindowLongW
RegisterClassW
CreateWindowExW
DefWindowProcW
MsgWaitForMultipleObjectsEx
ole32
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
OleRun
CoUninitialize
oleaut32
SysFreeString
SysAllocString
VariantInit
VariantClear
advapi32
GetUserNameW
SystemFunction036
CreateProcessWithTokenW
LookupPrivilegeValueW
GetTokenInformation
FreeSid
EqualSid
DuplicateTokenEx
AllocateAndInitializeSid
AdjustTokenPrivileges
OpenProcessToken
shell32
ShellExecuteExW
SHCreateDirectoryExW
CommandLineToArgvW
Sections
.text Size: 740KB - Virtual size: 740KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 195KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 724B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 612KB - Virtual size: 616KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE