C:\BUILD\work\e0dd96435fde7cb0\BUILDS\Release\x86\avDump.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-02_9a9e54e2c0b5076ebbddd676c45a7c6e_magniber.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-02_9a9e54e2c0b5076ebbddd676c45a7c6e_magniber.exe
Resource
win10v2004-20240730-en
General
-
Target
2024-08-02_9a9e54e2c0b5076ebbddd676c45a7c6e_magniber
-
Size
3.5MB
-
MD5
9a9e54e2c0b5076ebbddd676c45a7c6e
-
SHA1
29969d8d71dd863088190dfcabb7713ffc8484ae
-
SHA256
4a802496f5171c7f9d8862a579795c346489d7ab0b0b1b0df7da6621911e6b91
-
SHA512
fc0d7f50c36b969bdb2af43834f947129ea1710599054100a01964b63a3541d06df6e3eeb8c782041ede182be3c9a7c16dbe498f4acac14c8a2646dc26510401
-
SSDEEP
98304:a4ODsHJdRwsCAxQ5YBvByzTD+8b7bZJzSw:a4ODspdRwsCAmgv2Oud5S
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-02_9a9e54e2c0b5076ebbddd676c45a7c6e_magniber
Files
-
2024-08-02_9a9e54e2c0b5076ebbddd676c45a7c6e_magniber.exe windows:6 windows x86 arch:x86
a13d287c7ba45ba753ba6547874efe89
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
rpcrt4
UuidToStringW
NdrAsyncServerCall
NdrAsyncClientCall
NdrClientCall2
I_RpcBindingInqLocalClientPID
UuidFromStringW
RpcAsyncInitializeHandle
RpcAsyncCompleteCall
RpcBindingToStringBindingW
RpcEpUnregister
UuidCreate
RpcBindingFree
RpcStringFreeW
RpcStringBindingParseW
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcAsyncCancelCall
RpcEpRegisterW
RpcObjectSetType
RpcServerRegisterIf2
RpcServerUnregisterIfEx
RpcImpersonateClient
RpcRevertToSelf
RpcMgmtEpEltInqNextW
RpcMgmtEpEltInqBegin
RpcIfInqId
RpcMgmtEpEltInqDone
RpcServerUseProtseqEpW
RpcServerRegisterIfEx
RpcServerUnregisterIf
NdrServerCall2
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
shell32
ord165
SHGetFolderPathW
ntdll
VerSetConditionMask
RtlNtStatusToDosError
RtlUnwind
RtlDllShutdownInProgress
NtClose
NtOpenKey
NtQueryKey
NtSetInformationThread
NtDeleteKey
RtlCaptureContext
NtSystemDebugControl
kernel32
Sleep
LocalFree
SetFilePointerEx
UnlockFileEx
LockFileEx
GetFileSizeEx
ReadFile
CompareStringW
GetCurrentProcess
GetCurrentThread
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetThreadId
CreateProcessW
WriteFile
GetExitCodeProcess
ResumeThread
GetPriorityClass
GetProcessTimes
K32GetProcessMemoryInfo
InitializeCriticalSectionEx
LoadLibraryW
CompareFileTime
QueryFullProcessImageNameW
FlushFileBuffers
DeleteFileW
GetFileInformationByHandle
GetFullPathNameW
OutputDebugStringA
FileTimeToSystemTime
GetCurrentProcessId
TlsAlloc
TlsGetValue
TlsSetValue
FreeLibrary
ResetEvent
GetSystemInfo
GetTickCount
QueryPerformanceFrequency
QueryPerformanceCounter
GetThreadTimes
ExpandEnvironmentStringsW
GetFileAttributesW
LoadLibraryExW
GetSystemDirectoryW
SetErrorMode
VirtualProtect
HeapReAlloc
GlobalMemoryStatusEx
SetThreadPriority
GetThreadPriority
TerminateThread
GetExitCodeThread
TlsFree
SetFilePointer
SetEndOfFile
MoveFileExW
GetWindowsDirectoryW
DuplicateHandle
FindFirstFileW
FindClose
CreateDirectoryW
FindFirstFileExW
FindNextFileW
QueryDosDeviceW
GetEnvironmentVariableW
SetFileInformationByHandle
GetDiskFreeSpaceExW
K32GetMappedFileNameW
FindFirstVolumeW
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
FindVolumeClose
VirtualQuery
GetSystemTimes
GetTickCount64
RaiseException
ExitProcess
GetCommandLineW
GetCommandLineA
GetStdHandle
FreeLibraryAndExitThread
ExitThread
InitializeCriticalSectionAndSpinCount
InterlockedPushEntrySList
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetCPInfo
RegisterWaitForSingleObject
GetCurrentThreadId
GetModuleHandleExW
GetModuleFileNameA
SetLastError
HeapFree
GetProcessHeap
HeapAlloc
GetModuleFileNameW
VerifyVersionInfoW
SetConsoleCtrlHandler
SetDllDirectoryW
GetProcAddress
GetModuleHandleW
WaitForSingleObject
GetProcessId
GetNamedPipeServerProcessId
GetFileTime
MultiByteToWideChar
ContinueDebugEvent
DebugActiveProcessStop
GetFileAttributesExW
GetSystemTimeAsFileTime
ReadProcessMemory
OpenThread
DebugBreakProcess
CreateFileW
DeviceIoControl
SetEvent
WaitForDebugEvent
DebugSetProcessKillOnExit
DebugActiveProcess
WideCharToMultiByte
VirtualQueryEx
GetThreadContext
K32GetProcessImageFileNameW
K32GetModuleBaseNameW
K32EnumProcessModules
OpenProcess
WaitForMultipleObjects
GetLastError
CreateEventW
CloseHandle
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetFileType
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleOutputCP
GetConsoleMode
ReadConsoleW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
SetStdHandle
HeapSize
WriteConsoleW
CancelIoEx
GetOverlappedResult
ReadDirectoryChangesW
UnregisterWaitEx
ProcessIdToSessionId
QueryThreadCycleTime
WaitForThreadpoolWaitCallbacks
ReleaseSRWLockShared
AcquireSRWLockShared
CloseThreadpoolWait
SetThreadpoolWait
CreateThreadpoolWait
LCMapStringEx
DecodePointer
EncodePointer
GetLocaleInfoEx
InitOnceComplete
InitOnceBeginInitialize
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
LoadLibraryExA
SetUnhandledExceptionFilter
AddVectoredExceptionHandler
RemoveVectoredExceptionHandler
K32GetPerformanceInfo
CheckRemoteDebuggerPresent
FlushInstructionCache
K32EnumProcesses
GetProcessHandleCount
TerminateProcess
SetEnvironmentVariableW
CreateThread
GetNativeSystemInfo
WaitForSingleObjectEx
FormatMessageA
GetStringTypeW
AreFileApisANSI
GetFileInformationByHandleEx
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
user32
RegisterClassExW
GetClassInfoExW
GetSystemMetrics
SetWindowLongW
SendMessageW
RegisterWindowMessageW
LoadStringW
GetGUIThreadInfo
SendMessageCallbackW
PostMessageW
PeekMessageW
IsHungAppWindow
advapi32
SetThreadToken
CryptReleaseContext
CryptGenRandom
CryptAcquireContextW
RegQueryMultipleValuesW
RegDeleteTreeW
RegNotifyChangeKeyValue
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryInfoKeyW
RegDeleteValueW
RegEnumValueW
RegEnumKeyExW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
FreeSid
EqualSid
GetTokenInformation
CheckTokenMembership
DuplicateToken
RegOpenKeyExW
StartServiceW
QueryServiceStatus
AllocateAndInitializeSid
RevertToSelf
ImpersonateSelf
OpenThreadToken
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
CloseServiceHandle
ControlService
ChangeServiceConfigW
CreateServiceW
DeleteService
OpenServiceW
OpenSCManagerW
StartServiceCtrlDispatcherW
ChangeServiceConfig2W
QueryServiceConfig2W
RegisterServiceCtrlHandlerExW
SetServiceStatus
powrprof
CallNtPowerInformation
shlwapi
PathAppendW
PathRemoveFileSpecW
PathFindFileNameW
ole32
CoCreateGuid
Exports
Exports
asw_process_storage_allocate_connector
asw_process_storage_deallocate_connector
on_avast_dll_unload
onexit_register_connector_avast_2
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 599KB - Virtual size: 598KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 379KB - Virtual size: 407KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 475KB - Virtual size: 475KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 126KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ