C:\Jenkins\workspace\MBAM-Windows\N_MB5Uns\bin\Win32\Release\mb5uns.pdb
Behavioral task
behavioral1
Sample
2024-07-02_8b57404c159736a24f6f87a8a1062d4f_magniber_revil.exe
Resource
win7-20240508-en
General
-
Target
2024-07-02_8b57404c159736a24f6f87a8a1062d4f_magniber_revil
-
Size
4.3MB
-
MD5
8b57404c159736a24f6f87a8a1062d4f
-
SHA1
2f22e1f2be6f60f07848e1f32722b075fe82fd06
-
SHA256
0843057d10b0d3c78a3faee8534134a4433596b806ad8c5b0cba9ef9cbec013c
-
SHA512
2cfb53c62e0c0291ee3d9a8f02ad0a99471f0c0cd587fd4c917561733b1d99c48d646258496cb2a74ad670301c8cd6f8ba65ea5a676dd9265c7ced98b0c59179
-
SSDEEP
49152:6ZRGPuGTHRe11vKzNaFCPcFxtxJzgZKUxT2BHHF6c9OtutAC8HNUPCAaq8Wdo0:6ZQ3HRe11SzoFrFxlgDx2B98t4C7
Malware Config
Signatures
-
Risepro family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-02_8b57404c159736a24f6f87a8a1062d4f_magniber_revil
Files
-
2024-07-02_8b57404c159736a24f6f87a8a1062d4f_magniber_revil.exe windows:6 windows x86 arch:x86
0cc64d938b1dd8acbfc68cbd56373afa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
crypt32
CryptMsgClose
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
CertFreeCertificateContext
CertGetNameStringW
CertFindCertificateInStore
CryptMsgGetParam
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CryptQueryObject
iphlpapi
GetAdaptersInfo
kernel32
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
LeaveCriticalSection
RaiseException
EnterCriticalSection
GetCurrentThreadId
SetLastError
DeleteCriticalSection
GetLastError
InitializeCriticalSectionEx
LocalFree
FormatMessageW
LocalAlloc
Sleep
CallNamedPipeW
FreeLibrary
GetProcAddress
GetModuleHandleW
lstrcmpiW
MultiByteToWideChar
LoadLibraryExW
GetModuleFileNameW
GetWindowsDirectoryW
SetCurrentDirectoryW
CreateMutexW
DecodePointer
WideCharToMultiByte
GlobalAlloc
GlobalLock
GlobalFree
LoadLibraryW
VerifyVersionInfoW
VerSetConditionMask
SetThreadUILanguage
GetSystemDirectoryW
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CloseHandle
OpenProcess
K32GetModuleFileNameExA
WaitForSingleObject
GetExitCodeProcess
GetModuleFileNameA
GetTickCount
OutputDebugStringW
CreateFileW
SwitchToThread
GetTempPathW
CopyFileW
FlushFileBuffers
GetFileSizeEx
ReadFile
WriteFile
GetFileInformationByHandle
GetCurrentProcess
GetSystemInfo
GetCurrentThread
FileTimeToSystemTime
FindFirstFileW
GetFileAttributesW
CreateDirectoryW
HeapReAlloc
GetLocalTime
GetSystemTime
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
HeapAlloc
SetEndOfFile
FindNextFileW
FindClose
GetModuleHandleA
GetStdHandle
GetCurrentDirectoryW
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
TerminateProcess
GetStartupInfoW
SetEvent
ResetEvent
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetEnvironmentVariableW
SetEnvironmentVariableW
SystemTimeToFileTime
DeleteFiber
GetFileType
QueryPerformanceCounter
ConvertFiberToThread
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapSize
GetOEMCP
GetACP
IsValidCodePage
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetConsoleCP
SetFilePointerEx
SetConsoleCtrlHandler
ExitProcess
PeekNamedPipe
GetDriveTypeW
GetModuleHandleExW
GetCommandLineW
GetCommandLineA
RtlUnwind
GetThreadTimes
HeapDestroy
MulDiv
GetProcessHeap
HeapFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
IsDebuggerPresent
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
AreFileApisANSI
GetFullPathNameW
FindFirstFileExW
GetStringTypeW
LoadLibraryExA
VirtualQuery
VirtualProtect
dwmapi
DwmGetWindowAttribute
bcrypt
BCryptGenRandom
ws2_32
WSAGetLastError
send
recv
WSASetLastError
closesocket
WSAStartup
WSACleanup
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 679KB - Virtual size: 678KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 660KB - Virtual size: 664KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE