Static task
static1
Behavioral task
behavioral1
Sample
2024-06-29_ab6852f48166e4b19afe994744de7a5b_mafia_magniber.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-29_ab6852f48166e4b19afe994744de7a5b_mafia_magniber.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-06-29_ab6852f48166e4b19afe994744de7a5b_mafia_magniber
-
Size
12.6MB
-
MD5
ab6852f48166e4b19afe994744de7a5b
-
SHA1
14fdc550fc14ee2c2b14075be63fabc5e3b6a050
-
SHA256
b0aa0517529d6869b44e8c29bc11449862b6754ceae58d0590ffb11c88f932db
-
SHA512
6f608d60025535ee41213ecff995d2d5859f2a3d44300729dc832fed0322b3301024f5c3138b4fa1e48358bc5080bf8cb60744ceccd71a02acb187eec6b7fe2d
-
SSDEEP
393216:ydNcfIks1QdopxCyoaGN7MQe6dzlwxxYs3KkhD:EcNdopxCyoadQe6dzlwxSs6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-29_ab6852f48166e4b19afe994744de7a5b_mafia_magniber
Files
-
2024-06-29_ab6852f48166e4b19afe994744de7a5b_mafia_magniber.exe windows:5 windows x86 arch:x86
c734cdb0ee119a5595f8cc9de3778c77
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEvent
WaitForSingleObject
GetCurrentThreadId
SetEnvironmentVariableA
CompareStringW
CreateFileW
SetEndOfFile
GetDriveTypeW
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
SetStdHandle
GetCurrentDirectoryW
GetFullPathNameA
FlushFileBuffers
LoadLibraryW
CreateEventA
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
HeapCreate
SetLastError
IsValidCodePage
GetOEMCP
GetACP
HeapSize
IsProcessorFeaturePresent
GetLocaleInfoW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
CreateThread
ExitThread
GetCPInfo
LCMapStringW
GetModuleHandleW
ReadFile
SetFilePointer
GetConsoleMode
GetConsoleCP
WriteFile
PeekNamedPipe
GetFileInformationByHandle
InitializeCriticalSectionAndSpinCount
FindNextFileA
DeleteFileA
CloseHandle
FindFirstFileExA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
InterlockedDecrement
InterlockedIncrement
GetProcAddress
WideCharToMultiByte
GetLocalTime
VirtualAlloc
VirtualQuery
VirtualFree
SleepEx
GetTickCount
GetSystemInfo
TlsSetValue
TlsFree
TlsAlloc
TlsGetValue
HeapFree
GetProcessHeap
HeapAlloc
GetModuleHandleA
QueryPerformanceCounter
QueryPerformanceFrequency
SetThreadAffinityMask
GetCurrentThread
GetProcessAffinityMask
GetCurrentProcess
FormatMessageA
GetLastError
LocalFree
LoadLibraryExA
FreeLibrary
ReleaseSemaphore
CreateSemaphoreA
DuplicateHandle
LoadLibraryA
SetCurrentDirectoryA
GetModuleFileNameA
GetCurrentDirectoryA
GetSystemTimeAsFileTime
WaitForMultipleObjects
CreateFileA
lstrlenA
ExitProcess
Sleep
GetLongPathNameA
CreateDirectoryA
MultiByteToWideChar
GetVersionExA
FoldStringW
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetCurrentProcessId
OpenEventA
ResetEvent
ResumeThread
SystemTimeToFileTime
SetWaitableTimer
CreateWaitableTimerA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
WriteConsoleW
GetFileType
GetStdHandle
GetModuleFileNameW
RaiseException
RtlUnwind
HeapReAlloc
user32
GetCursorPos
SendMessageA
ScreenToClient
ShowCursor
GetKeyboardLayout
SetWindowTextA
GetDlgItem
MoveWindow
GetSystemMetrics
GetWindowRect
EndDialog
DialogBoxParamA
EnableWindow
MessageBoxA
TranslateMessage
DispatchMessageA
PeekMessageA
IsIconic
DefWindowProcA
GetWindowLongA
SetWindowLongA
GetDesktopWindow
AdjustWindowRect
SetClassLongA
LoadIconA
SetWindowTextW
MessageBoxW
GetKeyboardState
FindWindowA
IsWindow
MonitorFromWindow
ClientToScreen
GetMonitorInfoA
SetRect
DestroyWindow
ShowWindow
SetWindowPos
GetClientRect
SetWindowRgn
CreateWindowExA
RegisterClassA
LoadCursorA
MonitorFromPoint
GetKeyState
ToUnicodeEx
MapVirtualKeyExA
SetForegroundWindow
shell32
ShellExecuteA
SHGetFolderPathA
shlwapi
PathFindFileNameA
psapi
EnumProcessModules
GetModuleFileNameExA
openal32
alGetError
alcGetEnumValue
alDeleteBuffers
alDeleteSources
alListenerf
alGetBufferi
alSourceQueueBuffers
alSourceUnqueueBuffers
alGenBuffers
alBufferData
alGetEnumValue
alSourceRewind
alSourcePlay
alSourceStop
alListenerfv
alListener3f
alcCaptureCloseDevice
alcCaptureSamples
alcCaptureStop
alcCloseDevice
alGenSources
alDistanceModel
alcGetString
alGetSourcei
alSourcePause
alGetSourcef
alSourcei
alSourcef
alSource3f
alcGetIntegerv
alcIsExtensionPresent
alcGetError
alcOpenDevice
alcCreateContext
alcMakeContextCurrent
alcDestroyContext
d3d9
Direct3DCreate9
D3DPERF_SetMarker
D3DPERF_BeginEvent
D3DPERF_EndEvent
dinput8
DirectInput8Create
ws2_32
htons
htonl
ntohl
ntohs
gdi32
GetStockObject
CreateRectRgn
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorA
Sections
.text Size: 6.6MB - Virtual size: 6.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 581KB - Virtual size: 633KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 603KB - Virtual size: 602KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ