F:\Office\Target\x86\ship\click2run\en-us\AdminBootstrapper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_4d782f275df6dbab2d37808afa65fe71_magniber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_4d782f275df6dbab2d37808afa65fe71_magniber.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_4d782f275df6dbab2d37808afa65fe71_magniber
-
Size
5.4MB
-
MD5
4d782f275df6dbab2d37808afa65fe71
-
SHA1
0648d295cb9df08947c1192fc6be23c1d72c2275
-
SHA256
faa74361a18529971cc286d26343bba3a5d4fdee99fc461a4d26b0ec5fec42cf
-
SHA512
5516b1939d6b9b4835514b939305f48508d0ead8acc42050c4bb9057dbe4d8acd4401a6771d78c36932a3214997b92e8ed49301258d7684b88099d390dd8b664
-
SSDEEP
98304:70Ocn0xMTpKZKzRm0fxK2I94pXGOU8ybq5utbATwY2hlOt2vXtZ:70lKuppfs4pVUjt0TWlNX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-19_4d782f275df6dbab2d37808afa65fe71_magniber
Files
-
2024-09-19_4d782f275df6dbab2d37808afa65fe71_magniber.exe windows:5 windows x86 arch:x86
ecc0a4d1594b4f4dd175adbdf5d53fe8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
PDB Paths
Imports
advapi32
RegCreateKeyExW
RegCloseKey
CryptReleaseContext
CryptAcquireContextW
EventWrite
EventWriteTransfer
EventRegister
EventUnregister
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegDeleteTreeW
RegDeleteKeyW
RegGetValueW
RegSetValueExW
RegDeleteValueW
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
FreeSid
EqualSid
CreateWellKnownSid
IsValidSid
GetSidSubAuthorityCount
GetSidSubAuthority
RevertToSelf
OpenThreadToken
ConvertStringSecurityDescriptorToSecurityDescriptorW
OpenSCManagerW
CloseServiceHandle
OpenServiceW
QueryServiceStatusEx
QueryServiceConfigW
StartServiceW
ControlService
EnumDependentServicesW
DeleteService
CreateServiceW
ChangeServiceConfig2W
ChangeServiceConfigW
SetServiceObjectSecurity
GetLengthSid
InitializeAcl
AddAccessAllowedAce
CopySid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
ConvertSidToStringSidA
CheckTokenMembership
LookupPrivilegeValueW
AdjustTokenPrivileges
CryptDestroyHash
CryptGetHashParam
CryptCreateHash
CryptHashData
RegNotifyChangeKeyValue
RegEnumValueA
RegDeleteValueA
RegSetKeySecurity
kernel32
SetFileAttributesW
GetFileAttributesExW
GetDiskFreeSpaceExW
DeleteFileW
CloseHandle
GetCurrentDirectoryW
GetWindowsDirectoryW
GetProcAddress
SetFilePointerEx
MoveFileExW
CopyFileW
AreFileApisANSI
WideCharToMultiByte
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
Sleep
GetStringTypeExW
GetUserDefaultLCID
LoadLibraryA
LCMapStringW
FreeLibrary
LocalFree
FormatMessageA
GetTickCount64
GetCurrentThreadId
TlsAlloc
TlsFree
FlsGetValue
TlsGetValue
FlsSetValue
TlsSetValue
GetModuleHandleExW
K32GetProcessMemoryInfo
GlobalMemoryStatusEx
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetModuleHandleW
LoadLibraryExW
VerSetConditionMask
VerifyVersionInfoW
GetVersionExW
GetStringTypeW
InitializeSRWLock
ReleaseSRWLockShared
AcquireSRWLockShared
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
OpenProcess
GetCurrentProcessId
TerminateProcess
GetModuleFileNameA
GetShortPathNameA
K32GetModuleFileNameExW
CreateProcessW
FindResourceW
SizeofResource
LoadResource
GetCPInfoExW
GetUserDefaultLocaleName
IsValidCodePage
SetLastError
GetSystemTime
SystemTimeToFileTime
FileTimeToSystemTime
SetErrorMode
GetComputerNameW
MulDiv
FormatMessageW
GetLogicalProcessorInformation
GetNativeSystemInfo
GetSystemDirectoryW
CreateEventW
SetEvent
WaitForSingleObject
ReleaseSemaphore
WaitForSingleObjectEx
CreateEventExW
CreateThread
WaitForMultipleObjectsEx
CloseThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CreateThreadpoolTimer
CloseThreadpoolWait
SetThreadpoolWait
WaitForThreadpoolWaitCallbacks
CreateThreadpoolWait
CreateThreadpoolWork
SubmitThreadpoolWork
LoadLibraryW
OutputDebugStringA
RtlCaptureStackBackTrace
QueryDepthSList
FindClose
InitializeSListHead
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseMutex
SystemTimeToTzSpecificLocalTime
TzSpecificLocalTimeToSystemTime
CompareFileTime
GetTempPathW
GetLongPathNameW
ExpandEnvironmentStringsW
GetCommandLineW
GlobalFree
ProcessIdToSessionId
GetExitCodeThread
WaitForMultipleObjects
SignalObjectAndWait
GetProcessAffinityMask
CreateWaitableTimerW
SetWaitableTimerEx
CancelWaitableTimer
HeapFree
GetProcessHeap
ReadFile
GetFileSizeEx
GetTempFileNameW
WriteFile
GetTickCount
SetEndOfFile
GetThreadLocale
FindFirstFileExW
lstrcmpW
GetModuleHandleA
GetFileType
GetOverlappedResult
SetFileInformationByHandle
GetFileInformationByHandleEx
GetDriveTypeW
CreateMutexW
OpenEventA
CreateEventA
OpenMutexA
CreateMutexA
OpenSemaphoreA
CreateSemaphoreA
OpenFileMappingA
LocalAlloc
HeapAlloc
GlobalAlloc
GetPriorityClass
GetExitCodeProcess
K32EnumProcesses
GetTimeZoneInformation
IsValidLocale
VirtualProtectEx
GetSystemInfo
ResetEvent
LockResource
FlushFileBuffers
CancelIoEx
GetLocaleInfoEx
LCIDToLocaleName
LocaleNameToLCID
GetSystemDefaultLCID
LCMapStringEx
ResolveLocaleName
EnumSystemLocalesEx
GetSystemDefaultLocaleName
IsProcessorFeaturePresent
WerRegisterMemoryBlock
WerUnregisterMemoryBlock
QueryFullProcessImageNameW
CreateIoCompletionPort
PostQueuedCompletionStatus
GetThreadIOPendingFlag
GetQueuedCompletionStatus
IsDebuggerPresent
CreateMemoryResourceNotification
GetSystemPowerStatus
IsSystemResumeAutomatic
QueryUnbiasedInterruptTime
OutputDebugStringW
VirtualFree
VirtualAlloc
GetLocaleInfoW
GetUserPreferredUILanguages
GetACP
GetUserGeoID
GetProductInfo
SwitchToThread
GetEnvironmentVariableW
RemoveDirectoryW
DeviceIoControl
FindNextFileW
GetFullPathNameW
FindFirstFileW
CreateDirectoryW
GetThreadTimes
GetCurrentThread
GetProcessTimes
QueryPerformanceCounter
LoadLibraryExA
VirtualQuery
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
SetStdHandle
EnumSystemLocalesW
ExitProcess
HeapReAlloc
HeapSize
GetConsoleCP
ReadConsoleW
GetConsoleMode
UnregisterWaitEx
VirtualProtect
FreeLibraryAndExitThread
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
GetSystemTimeAsFileTime
QueryPerformanceFrequency
MultiByteToWideChar
GetModuleFileNameW
IsWow64Process
CreateTimerQueueTimer
GetThreadPriority
SetThreadPriority
CreateTimerQueue
InterlockedFlushSList
RtlUnwind
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CompareStringW
GetCPInfo
InitializeCriticalSectionAndSpinCount
EncodePointer
DuplicateHandle
K32GetProcessImageFileNameW
GetSystemPreferredUILanguages
GetFileAttributesW
CreateFileW
FlsAlloc
FlsFree
DeleteCriticalSection
CompareStringEx
GetLastError
InitializeCriticalSectionEx
GetCurrentProcess
GetDateFormatW
GetTimeFormatW
OpenThread
lstrcmpA
FreeConsole
WriteConsoleW
GetStdHandle
AllocConsole
AttachConsole
DecodePointer
TryEnterCriticalSection
GetLocalTime
ole32
CoRevokeInitializeSpy
CoRegisterInitializeSpy
CreateStreamOnHGlobal
CoTaskMemAlloc
IIDFromString
CLSIDFromString
CoTaskMemFree
CoCreateInstance
CoSetProxyBlanket
CoCreateFreeThreadedMarshaler
StringFromGUID2
CoCreateGuid
CoUninitialize
CoInitializeEx
oleaut32
VariantInit
VariantClear
SysFreeString
SysAllocString
cabinet
ord13
ord14
wintrust
WTHelperProvDataFromStateData
WinVerifyTrust
WTHelperGetProvSignerFromChain
setupapi
SetupIterateCabinetW
ws2_32
WSAStartup
FreeAddrInfoW
GetAddrInfoW
iphlpapi
CreateSortedAddressPairs
FreeMibTable
gdi32
GetDeviceCaps
CreateSolidBrush
SetTextColor
SetBkColor
GetStockObject
CreateFontW
SelectObject
GetTextMetricsW
CreatePen
SetDCPenColor
Rectangle
GetTextExtentPoint32W
SetDCBrushColor
DeleteObject
gdiplus
GdipDeleteGraphics
GdipCreateFromHDC
GdipDrawImageRectRectI
GdiplusStartup
GdipDrawImageRectI
GdipFree
GdipDisposeImage
GdipAlloc
GdipCloneImage
GdipLoadImageFromStream
GdipGetImageHeight
GdipFillRectangleI
GdipCloneBrush
GdipDeleteBrush
GdipGetImageWidth
GdipGetImageGraphicsContext
GdipCreateSolidFill
GdipCreateBitmapFromScan0
rpcrt4
RpcStringFreeW
UuidToStringW
Sections
.text Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 82KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 617KB - Virtual size: 616KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 836KB - Virtual size: 840KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE