AdobeIPCBroker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-10_78bb1b776a27063e523370729520a6db_magniber.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-10_78bb1b776a27063e523370729520a6db_magniber.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-10_78bb1b776a27063e523370729520a6db_magniber
-
Size
2.4MB
-
MD5
78bb1b776a27063e523370729520a6db
-
SHA1
3a68e85c19aea95a1c585d75da91812442567011
-
SHA256
7765306bbce901870714bd486997e4243039067fc1e7be4aa6af10a843df0ba3
-
SHA512
e2353632b87a62703eb5006a600fffe16f438de7f951657f9679f08784c14eab602c49edfb5b50af20d21d0e46240c656bad7c71f2a45b8ed26487868f6fa20a
-
SSDEEP
49152:5MDaJfmsLo6vN0hvIP/hlpx5z0EYu1AFCEwVqu0pn7wDmg27RnWGj:5sBsLo6wk/xRsBC2juD527BWG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-10_78bb1b776a27063e523370729520a6db_magniber
Files
-
2024-07-10_78bb1b776a27063e523370729520a6db_magniber.exe windows:6 windows x86 arch:x86
462438b5eaadb12fbab96575fdf9e36a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
__WSAFDIsSet
htonl
getsockopt
connect
closesocket
listen
getsockname
bind
WSAGetLastError
WSASetLastError
WSAStartup
getservbyname
getservbyport
gethostbyname
gethostbyaddr
socket
send
select
recv
ntohs
inet_ntoa
inet_addr
htons
ioctlsocket
kernel32
DeleteCriticalSection
ReleaseSemaphore
LeaveCriticalSection
CreateSemaphoreW
FindFirstFileW
FindNextFileW
InitializeCriticalSectionEx
FindClose
RaiseException
DecodePointer
GetModuleFileNameW
ReleaseMutex
CreateMutexA
Sleep
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetVersionExA
GetModuleHandleA
GetModuleFileNameA
GetSystemDirectoryA
GetACP
EnterCriticalSection
GetLastError
CreateMutexW
GetCommandLineW
FreeLibrary
CreateProcessW
GetProcAddress
CloseHandle
LoadLibraryA
MultiByteToWideChar
GetStdHandle
InitializeCriticalSection
IsValidCodePage
FindFirstFileExW
GetOEMCP
GetProcessHeap
HeapSize
WriteConsoleW
CreateTimerQueue
WaitForSingleObject
GetThreadPriority
LoadLibraryW
UnregisterWaitEx
QueryDepthSList
InterlockedPopEntrySList
GetVersionExW
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetSystemInfo
VirtualProtect
VirtualQuery
GetModuleHandleW
LoadLibraryExA
GetLocaleInfoW
GetUserDefaultLCID
SwitchToThread
GetCurrentProcess
TerminateProcess
OpenProcess
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
FreeEnvironmentStringsW
GetEnvironmentVariableW
GetCurrentProcessId
GetLocalTime
SetStdHandle
GetEnvironmentStringsW
SetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateFileW
FlushFileBuffers
GetFileAttributesExW
GetFileSizeEx
GetFullPathNameW
ReadFile
SetEndOfFile
SetFilePointerEx
WriteFile
GetTempPathW
DuplicateHandle
ConnectNamedPipe
PeekNamedPipe
CreateNamedPipeW
GetNamedPipeInfo
GetOverlappedResult
SetEvent
ResetEvent
CreateEventW
WaitForMultipleObjects
SetThreadPriority
VirtualAlloc
VirtualFree
GetModuleHandleExW
LoadLibraryExW
GetCurrentThread
GetTickCount
WideCharToMultiByte
SetFilePointer
FormatMessageW
LocalReAlloc
LCMapStringW
RtlCaptureStackBackTrace
GetSystemTimeAsFileTime
SetWaitableTimer
CreateWaitableTimerW
lstrcpyW
InitializeCriticalSectionAndSpinCount
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
QueryPerformanceCounter
IsDebuggerPresent
GetStartupInfoW
GetExitCodeThread
TryEnterCriticalSection
SetLastError
EncodePointer
CompareStringW
GetStringTypeW
GetCPInfo
OutputDebugStringW
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
CreateThread
ExitThread
FreeLibraryAndExitThread
GetTimeZoneInformation
ExitProcess
GetDriveTypeW
GetFileInformationByHandle
GetFileType
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCommandLineA
GetConsoleMode
ReadConsoleW
GetConsoleCP
GetDateFormatW
GetTimeFormatW
IsValidLocale
EnumSystemLocalesW
HeapFree
HeapAlloc
HeapReAlloc
SignalObjectAndWait
user32
DefWindowProcW
RegisterClassW
SetWindowLongW
DispatchMessageW
CreateWindowExW
GetWindowLongW
MsgWaitForMultipleObjectsEx
DestroyWindow
GetShellWindow
EnumWindows
GetWindowThreadProcessId
SetTimer
KillTimer
TranslateMessage
PostMessageW
PeekMessageW
PostQuitMessage
ole32
CoCreateGuid
StringFromGUID2
CoUninitialize
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
oleaut32
SysAllocString
SysFreeString
VariantClear
shlwapi
PathFileExistsW
winhttp
WinHttpQueryHeaders
WinHttpGetProxyForUrl
WinHttpGetIEProxyConfigForCurrentUser
WinHttpSetStatusCallback
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpOpenRequest
WinHttpAddRequestHeaders
WinHttpSendRequest
advapi32
OpenProcessToken
AllocateAndInitializeSid
DuplicateTokenEx
EqualSid
FreeSid
GetLengthSid
GetSidSubAuthority
GetTokenInformation
SetTokenInformation
LookupPrivilegeValueW
CreateProcessWithTokenW
ConvertStringSidToSidW
GetUserNameW
AdjustTokenPrivileges
shell32
CommandLineToArgvW
ShellExecuteExW
SHCreateDirectoryExW
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 268KB - Virtual size: 267KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 676KB - Virtual size: 680KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE