Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-26_3b821164a9b0f5c3ade2323801520f3a_hijackloader_magniber_virut.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-26_3b821164a9b0f5c3ade2323801520f3a_hijackloader_magniber_virut.exe
Resource
win10v2004-20240709-en
Target
2024-07-26_3b821164a9b0f5c3ade2323801520f3a_hijackloader_magniber_virut
Size
1.4MB
MD5
3b821164a9b0f5c3ade2323801520f3a
SHA1
12beedb68cea7034bbe3f42b231d1066fad16ac8
SHA256
bc75866a8f069d8b863aecefb9c6c47a28437a77070e03f9f07410819f2fe76b
SHA512
d2a943220055ae10f90dd9207de261aee42267db37ed99e79057f3dc43e947580338269a88808d6882289517ae121454a00ee0dab3371af76183205d2d205cde
SSDEEP
24576:/kKrFTatHwem1FIoeCsKsTTiNFut8zxxTU/kLxy6AnKtF:1FsmfQXiDut8zxxT8k9y6AnKtF
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\zhanlue\rcimage\bin\Win32\Release\pdb\2345PicWorker.pdb
CreateMutexW
ReleaseMutex
Sleep
OpenMutexW
QueryDosDeviceW
GetCurrentProcess
OpenProcess
ResumeThread
InitializeCriticalSection
GetACP
WideCharToMultiByte
FindFirstFileW
FindNextFileW
FindClose
GetLongPathNameW
CreateFileW
GetFileAttributesExW
HeapFree
GetVersionExW
GlobalAlloc
GlobalFree
HeapAlloc
LocalFree
GetProcessHeap
LockResource
GetSystemInfo
GetVolumeInformationW
GetDiskFreeSpaceW
GetLogicalDriveStringsW
LoadLibraryW
ResetEvent
InterlockedExchangeAdd
ReadFile
WriteFile
SetFileTime
SetFilePointer
SetEndOfFile
GetFileSize
GetFileTime
CreateDirectoryW
GetFullPathNameW
lstrlenW
GetTempPathW
GetFileAttributesW
SetFileAttributesW
DeleteFileW
GetCurrentDirectoryW
GetWindowsDirectoryW
MoveFileExW
GetTempFileNameW
MoveFileW
GetCurrentProcessId
GetExitCodeProcess
CreateProcessW
ExpandEnvironmentStringsW
GetPrivateProfileStringW
GlobalLock
GlobalUnlock
GlobalMemoryStatusEx
GetLocalTime
TerminateProcess
LoadLibraryExW
InterlockedExchange
IsBadStringPtrW
DeviceIoControl
GetFileSizeEx
lstrcpyW
lstrcatW
LocalAlloc
LoadLibraryA
GetEnvironmentVariableW
SystemTimeToFileTime
FileTimeToSystemTime
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeZoneInformation
HeapReAlloc
HeapSize
GetFileType
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
lstrcmpiW
InterlockedIncrement
FreeLibrary
GetModuleHandleW
DeleteCriticalSection
GetProcAddress
DecodePointer
FindResourceW
LoadResource
RaiseException
GetLastError
MultiByteToWideChar
GetCurrentThreadId
SetErrorMode
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
InterlockedDecrement
WaitForMultipleObjects
EnterCriticalSection
SetLastError
SizeofResource
GetTickCount
CloseHandle
SetEvent
CreateEventW
WaitForSingleObject
ExitThread
CreateThread
RtlUnwind
OutputDebugStringW
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
EncodePointer
FormatMessageW
PeekMessageW
DispatchMessageW
ShowWindow
CharNextW
TranslateMessage
LoadCursorW
SetWindowLongW
GetClassInfoExW
RegisterClassExW
PostMessageW
UnregisterClassW
CreateWindowExW
DestroyWindow
GetMessageW
DialogBoxParamW
PostQuitMessage
GetActiveWindow
CallWindowProcW
DefWindowProcW
GetWindowLongW
GetDlgItem
GetParent
SendMessageW
IsWindow
SetWindowPos
GetForegroundWindow
GetDC
ReleaseDC
InvalidateRect
SetWindowTextW
EndPaint
BeginPaint
PtInRect
OffsetRect
GetDesktopWindow
IsRectEmpty
WindowFromPoint
GetSystemMetrics
SetTimer
EndDialog
MoveWindow
GetMonitorInfoW
MonitorFromWindow
SystemParametersInfoW
GetWindowThreadProcessId
CopyRect
GetClientRect
SetViewportOrgEx
SelectObject
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteDC
RegDeleteKeyW
RegOpenKeyExW
GetUserNameW
RegQueryValueExW
RegOpenCurrentUser
RegQueryInfoKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegDeleteValueW
RegNotifyChangeKeyValue
RegCloseKey
SHGetFolderPathW
SHGetSpecialFolderPathW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
CreateStreamOnHGlobal
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
VarUI4FromStr
SHDeleteKeyW
ImmDisableIME
GdipDisposeImage
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipSetTextRenderingHint
GdipCloneImage
GdipDeleteFont
GdipDeleteGraphics
GdipGetImageWidth
GdipGetImageHeight
GdipDeleteBrush
GdipDrawImageRectI
GdipCreateSolidFill
GdipCreateFontFromLogfontW
GdipCloneBrush
GdipCreateFromHDC
GdipDrawString
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatFlags
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdiplusShutdown
GdiplusStartup
GdipFree
GdipAlloc
GdipSetStringFormatTrimming
GdipDrawImageRectRectI
MiniDumpWriteDump
CheckSigner
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE