Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-21_bd98f8327370e404e7628f5224903499_hijackloader_magniber.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-21_bd98f8327370e404e7628f5224903499_hijackloader_magniber.exe
Resource
win10v2004-20240802-en
Target
2024-09-21_bd98f8327370e404e7628f5224903499_hijackloader_magniber
Size
1.4MB
MD5
bd98f8327370e404e7628f5224903499
SHA1
5cbc7a292a7e5dac63b22f46ab777009e47c79b2
SHA256
59199accd775100005c6a1b7cf9d034671c87a6914df36fb6aef512b94e69d48
SHA512
85a3722629e88903cdfc4701f830715ae0d5d96b5cad7e0ebb8aa96cd4edce866d9f95be0ecfccd3a9115ee71761dfdad6d6ae7294145c6425f514514365209c
SSDEEP
24576:+6/w3tD5G92xGBAaUxkjfSAuH7qmECTBdoq5bESjLmfW:fQ9rx1xAS5ECTjo4brjLmfW
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\zhanlue\rcimage\bin\Win32\Release\pdb\2345PicWorker.pdb
CreateMutexW
ReleaseMutex
Sleep
OpenMutexW
QueryDosDeviceW
GetCurrentProcess
OpenProcess
ResumeThread
InitializeCriticalSection
GetACP
WideCharToMultiByte
FindFirstFileW
FindNextFileW
FindClose
GetLongPathNameW
CreateFileW
GetFileAttributesExW
HeapFree
GetVersionExW
GlobalAlloc
GlobalFree
HeapAlloc
LocalFree
GetProcessHeap
LockResource
GetSystemInfo
GetVolumeInformationW
GetDiskFreeSpaceW
GetLogicalDriveStringsW
LoadLibraryW
ResetEvent
InterlockedExchangeAdd
ReadFile
WriteFile
SetFileTime
SetFilePointer
SetEndOfFile
GetFileSize
GetFileTime
CreateDirectoryW
GetFullPathNameW
lstrlenW
GetTempPathW
GetFileAttributesW
SetFileAttributesW
DeleteFileW
GetCurrentDirectoryW
GetWindowsDirectoryW
MoveFileExW
GetTempFileNameW
MoveFileW
GetCurrentProcessId
GlobalLock
GlobalUnlock
GlobalMemoryStatusEx
GetLocalTime
GetPrivateProfileStringW
TerminateProcess
LoadLibraryExW
lstrcmpiW
InterlockedIncrement
InterlockedExchange
IsBadStringPtrW
DeviceIoControl
GetFileSizeEx
lstrcpyW
lstrcatW
LocalAlloc
LoadLibraryA
GetEnvironmentVariableW
SystemTimeToFileTime
FileTimeToSystemTime
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
FreeLibrary
GetModuleHandleW
DeleteCriticalSection
GetProcAddress
DecodePointer
FindResourceW
LoadResource
RaiseException
GetLastError
MultiByteToWideChar
GetCurrentThreadId
SetErrorMode
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
InterlockedDecrement
EnterCriticalSection
SetLastError
SizeofResource
GetTickCount
CloseHandle
SetEvent
CreateEventW
WaitForSingleObject
GetTimeZoneInformation
HeapReAlloc
HeapSize
GetFileType
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
RtlUnwind
OutputDebugStringW
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
WaitForMultipleObjects
InterlockedPushEntrySList
InterlockedPopEntrySList
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ExpandEnvironmentStringsW
CreateProcessW
GetExitCodeProcess
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
EncodePointer
FormatMessageW
LoadCursorW
TranslateMessage
CharNextW
PeekMessageW
DispatchMessageW
ShowWindow
RegisterClassExW
IsWindow
CopyRect
MonitorFromWindow
GetMonitorInfoW
GetClassInfoExW
PostMessageW
SetWindowLongW
UnregisterClassW
GetClientRect
SetWindowTextW
EndPaint
BeginPaint
PtInRect
OffsetRect
GetWindowThreadProcessId
GetParent
GetDesktopWindow
CreateWindowExW
WindowFromPoint
InvalidateRect
GetForegroundWindow
GetSystemMetrics
SetTimer
GetDlgItem
EndDialog
SetWindowPos
MoveWindow
SendMessageW
SystemParametersInfoW
ReleaseDC
GetDC
GetWindowLongW
DefWindowProcW
CallWindowProcW
GetActiveWindow
PostQuitMessage
DialogBoxParamW
GetMessageW
DestroyWindow
IsRectEmpty
SetViewportOrgEx
SelectObject
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteDC
RegNotifyChangeKeyValue
RegCloseKey
GetUserNameW
RegQueryValueExW
RegOpenCurrentUser
RegQueryInfoKeyW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegDeleteValueW
RegOpenKeyExW
SHGetFolderPathW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
CoTaskMemFree
CoTaskMemRealloc
CreateStreamOnHGlobal
CoCreateInstance
CoTaskMemAlloc
VarUI4FromStr
SHDeleteKeyW
ImmDisableIME
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipSetTextRenderingHint
GdiplusStartup
GdipCreateFontFromLogfontW
GdipDeleteFont
GdipDrawString
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatFlags
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipSetStringFormatTrimming
GdipCreateFromHDC
GdipDeleteGraphics
GdipFree
GdipAlloc
GdiplusShutdown
GdipDrawImageRectI
GdipDrawImageRectRectI
GdipGetImageHeight
GdipGetImageWidth
MiniDumpWriteDump
CheckSigner
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ