Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-24_9605a026bae092d35b392400ff39e3a4_magniber.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-08-24_9605a026bae092d35b392400ff39e3a4_magniber.exe
Resource
win10v2004-20240802-en
Target
2024-08-24_9605a026bae092d35b392400ff39e3a4_magniber
Size
3.1MB
MD5
9605a026bae092d35b392400ff39e3a4
SHA1
458835310ddcc5bd0850f77691817c8f574e8798
SHA256
c892917650014711341e1be3445274a61fe9133122c9246373867ccf014a312c
SHA512
1bbb11e05e7a8599fc4dc514d4cf53e6d719a4ffaa3c1d9391d56eeab016e2859ad2c623ce27d835215e96ff97b5564eeb5a214eea875efc8227706cd192e407
SSDEEP
49152:myecIdZosHspMV7KuOsFulvjfrgAPSwdSaG29AJThsMMUgKF7FgWXnIuF9lv3+ux:myeldJMpMdK0QlrfF6wdAsMMUBXnR
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Techinline\CCNET\4.5.0.0_Refactoring\TIRD_Client\Core\Client\Win32\Release\TiClientCore.pdb
ord204
GetAdaptersInfo
AlphaBlend
HttpOpenRequestA
InternetReadFile
HttpQueryInfoA
InternetQueryOptionA
InternetCloseHandle
InternetSetOptionA
InternetOpenUrlA
DetectAutoProxyUrl
HttpSendRequestA
InternetOpenA
InternetConnectA
getnameinfo
WSASocketA
gethostbyname
htons
connect
inet_addr
gethostname
getaddrinfo
freeaddrinfo
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
EnumProcessModules
GetModuleBaseNameA
GetProcessMemoryInfo
GetProcessImageFileNameW
GetModuleFileNameExW
NetApiBufferFree
NetUserEnum
GetUserNameExW
FindClose
FindFirstFileW
ExpandEnvironmentStringsW
GetWindowsDirectoryW
lstrlenA
InitializeCriticalSectionAndSpinCount
FlushInstructionCache
GetCurrentProcess
lstrcmpA
MulDiv
InterlockedIncrement
InterlockedDecrement
GlobalUnlock
GlobalLock
GlobalAlloc
RaiseException
FindResourceA
GetSystemTimeAsFileTime
GlobalHandle
LocalFree
CreateProcessW
GetCommandLineW
CreateFileMappingA
FormatMessageA
GetTempPathW
GetModuleHandleW
GetTempFileNameA
GetTempPathA
DeleteFileA
GetExitCodeThread
TerminateProcess
Process32NextW
GetProcessTimes
Process32FirstW
FormatMessageW
LocalAlloc
GlobalFindAtomA
GlobalSize
GetVolumeInformationA
GetDriveTypeA
GetSystemInfo
lstrcpyW
GetFileAttributesExW
OutputDebugStringA
SetEndOfFile
GetFileInformationByHandle
IsBadStringPtrW
IsBadStringPtrA
ResumeThread
TlsGetValue
GlobalFree
TlsSetValue
CreateMutexA
OpenMutexA
CreateDirectoryW
RemoveDirectoryW
MoveFileW
CopyFileW
GetFileTime
FileTimeToSystemTime
GetFileSizeEx
SetFilePointerEx
InterlockedCompareExchange
InterlockedExchange
ReleaseMutex
OpenFileMappingW
CreateFileA
CreateNamedPipeA
SetNamedPipeHandleState
Process32First
GetCurrentThread
Thread32First
Thread32Next
Process32Next
QueryDosDeviceW
GetExitCodeProcess
GetCurrentDirectoryW
SetThreadPriority
CreateSemaphoreA
ReleaseSemaphore
CreateEventW
VirtualFree
VirtualAlloc
LoadLibraryW
FindNextFileW
TerminateThread
GetVersionExA
VerifyVersionInfoA
VerSetConditionMask
VerifyVersionInfoW
GetComputerNameW
OpenEventA
OpenFileMappingA
WaitForSingleObject
UnmapViewOfFile
MapViewOfFile
OpenProcess
GetLocalTime
GetModuleHandleA
FindResourceW
SizeofResource
LockResource
LoadResource
lstrlenW
WideCharToMultiByte
MoveFileExW
EncodePointer
DecodePointer
ExitThread
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RtlUnwind
VirtualProtect
VirtualQuery
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapSize
ExitProcess
GetStdHandle
HeapCreate
TlsFree
CreateEventA
ResetEvent
SetEvent
IsBadWritePtr
IsBadReadPtr
ProcessIdToSessionId
Sleep
SetThreadExecutionState
SetCurrentDirectoryA
GetModuleFileNameA
FreeLibrary
LoadLibraryA
GetProcAddress
HeapFree
HeapReAlloc
GetProcessHeap
HeapAlloc
WriteFile
MultiByteToWideChar
QueryPerformanceFrequency
GetCurrentProcessId
QueryPerformanceCounter
SetFilePointer
SetLastError
GetFileSize
CreateFileW
GetLastError
GetModuleFileNameW
GetFileAttributesW
CloseHandle
CreateToolhelp32Snapshot
GetTickCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetCurrentThreadId
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
IsProcessorFeaturePresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetConsoleCP
GetConsoleMode
GetStringTypeW
SetStdHandle
WriteConsoleW
FlushFileBuffers
InterlockedPushEntrySList
InterlockedPopEntrySList
CreateThread
ReadFile
TlsAlloc
keybd_event
SetProcessWindowStation
CloseWindowStation
OpenWindowStationA
ExitWindowsEx
EnumDesktopWindows
OpenInputDesktop
LoadStringW
GetUserObjectInformationA
GetProcessWindowStation
EnumDesktopsA
RegisterClipboardFormatW
GetClassNameW
SetRectEmpty
CreateWindowExW
BringWindowToTop
GetCursorInfo
GetIconInfo
MonitorFromPoint
EnumDisplayMonitors
ChangeClipboardChain
SetClipboardViewer
MapVirtualKeyA
SendInput
GetCapture
WindowFromPoint
GetPropA
FindWindowA
EnumThreadWindows
FindWindowExA
SendMessageW
EnumDisplayDevicesA
GetUpdateRgn
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
DrawTextW
ShowCursor
LoadStringA
DrawTextExW
GetSysColorBrush
GetClipboardFormatNameA
RegisterClipboardFormatA
mouse_event
GetAsyncKeyState
GetKeyState
CreateDialogIndirectParamA
GetWindowDC
UpdateWindow
DestroyCursor
SetCursorPos
SetRect
UnionRect
SetCursor
TrackMouseEvent
ScrollWindowEx
IsIconic
GetSystemMenu
DeleteMenu
EnableMenuItem
TrackPopupMenu
SetWindowRgn
GetClassInfoA
SetDlgItemTextA
EnableWindow
GetDlgItemTextW
SetDlgItemTextW
MonitorFromWindow
GetMonitorInfoA
MapWindowPoints
LoadImageA
RegisterClassA
PeekMessageA
LoadAcceleratorsA
TranslateAcceleratorA
PostQuitMessage
GetActiveWindow
DialogBoxIndirectParamA
GetLastInputInfo
RegisterWindowMessageA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
CreateAcceleratorTableA
RegisterClassExA
LoadCursorA
GetClassInfoExA
GetDesktopWindow
SetFocus
GetFocus
DestroyAcceleratorTable
BeginPaint
EndPaint
CallWindowProcA
DestroyWindow
ReleaseCapture
GetClassNameA
GetDlgItem
GetParent
IsChild
SetCapture
RedrawWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
ScreenToClient
ClientToScreen
GetClientRect
MoveWindow
CharNextA
GetSysColor
MapDialogRect
EndDialog
SetWindowContextHelpId
GetWindow
SendDlgItemMessageA
GetDlgItemTextA
CreateWindowExA
SetWindowLongA
GetCursorPos
IsWindowVisible
GetWindowLongA
ShowWindow
GetWindowRect
PostMessageA
GetSystemMetrics
SetThreadDesktop
SendMessageA
CloseDesktop
OpenDesktopA
PostThreadMessageA
TranslateMessage
DispatchMessageA
GetMessageA
MessageBoxA
KillTimer
SetTimer
DefWindowProcA
SystemParametersInfoA
GetThreadDesktop
GetUserObjectInformationW
IsWindow
SetForegroundWindow
AttachThreadInput
GetWindowThreadProcessId
GetForegroundWindow
SetWindowPos
UnregisterClassA
FillRect
PtInRegion
DPtoLP
LPtoDP
SetTextColor
SetBkMode
GetClipBox
CreateDIBSection
CreateFontIndirectA
GetStockObject
GetObjectA
CreateSolidBrush
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
DeleteObject
GetTextExtentPoint32A
RectInRegion
GetRgnBox
SetRectRgn
CreatePen
CreateDCA
SetDIBColorTable
RectVisible
CreateEllipticRgn
Ellipse
GetPixel
GetEnhMetaFileBits
SetEnhMetaFileBits
GetTextExtentPoint32W
GetDIBits
GetRegionData
Rectangle
LineTo
MoveToEx
SetTextAlign
TextOutW
CreateRectRgn
CombineRgn
OffsetRgn
GetDeviceCaps
GetSaveFileNameW
GetOpenFileNameW
OpenSCManagerA
SetTokenInformation
GetLengthSid
RegCloseKey
RegQueryValueExA
ConvertStringSidToSidW
OpenProcessToken
SetKernelObjectSecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetUserNameW
LogonUserW
CreateProcessWithLogonW
AdjustTokenPrivileges
LookupPrivilegeValueA
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryValueExW
RegDeleteValueA
GetTokenInformation
ConvertSidToStringSidA
AllocateAndInitializeSid
SetEntriesInAclA
SetNamedSecurityInfoW
RegOpenKeyExA
LookupAccountSidW
LookupAccountNameW
OpenThreadToken
ConvertStringSecurityDescriptorToSecurityDescriptorW
EnumServicesStatusExW
FreeSid
EqualSid
CloseServiceHandle
DeleteService
OpenServiceW
ControlService
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetPathFromIDListA
CommandLineToArgvW
SHBrowseForFolderW
SHGetFolderPathW
DragQueryFileW
SHGetMalloc
ShellExecuteW
StringFromGUID2
OleLockRunning
CoTaskMemAlloc
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
CreateStreamOnHGlobal
OleInitialize
CoUninitialize
CoInitializeEx
CoTaskMemFree
CoInitialize
CreateBindCtx
DoDragDrop
RegisterDragDrop
RevokeDragDrop
ReleaseStgMedium
OleGetClipboard
OleFlushClipboard
OleIsCurrentClipboard
OleSetClipboard
CoFreeUnusedLibraries
OleUninitialize
OleCreateFontIndirect
VarBstrCat
LoadTypeLi
LoadRegTypeLi
VariantClear
VariantInit
SysAllocString
SysStringLen
SysAllocStringLen
SysFreeString
UrlUnescapeW
ord219
PathFileExistsW
SHGetValueA
PathRemoveFileSpecW
SHSetValueW
SHDeleteValueW
PathIsDirectoryW
GdipGetImageWidth
GdipDisposeImage
GdipGetImageHeight
GdipAlloc
GdipCreateHBITMAPFromBitmap
GdipGetImagePixelFormat
GdipCreateBitmapFromStream
GdiplusShutdown
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromScan0
GdipCloneImage
GdipDrawImageRectI
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipFree
GdiplusStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ