D:\jenkins_Trunk\workspace\12.10Patch_SourceJob\qqpcmgr_proj\Basic\Output\BinFinal\QQPCMgrPacket.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-30_ecea0d06e778fe8eef03a40c4aaee0f7_magniber.exe
Resource
win7-20240708-en
General
-
Target
2024-09-30_ecea0d06e778fe8eef03a40c4aaee0f7_magniber
-
Size
15.8MB
-
MD5
ecea0d06e778fe8eef03a40c4aaee0f7
-
SHA1
442edebf9f3ae7be880ab51a4cb614f8c8c0712d
-
SHA256
edfeb4383bf05a8089560fcefe41e1a9f68e004827868d5bf5faea4fcab2f107
-
SHA512
4036d7422ab6e63a4f6f58cdb0e45b797b28bbec47a7dab76ecf67b84764bc805acbc2b7613f1febfb72a4cfaf98df001a5af1b95ab46fb24730c07ff291c0dd
-
SSDEEP
393216:sjdD/kAGgydejoeYhAbSVmgTSPs0DWd7qioGjSh:kd/FGYj5YhLVKE0DWdSGu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-30_ecea0d06e778fe8eef03a40c4aaee0f7_magniber
Files
-
2024-09-30_ecea0d06e778fe8eef03a40c4aaee0f7_magniber.exe windows:4 windows x86 arch:x86
7ea7372e9708c9349decd91e96fc6e2d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OutputDebugStringW
Module32FirstW
Module32NextW
SetThreadPriority
ReleaseMutex
OpenThread
SuspendThread
VirtualAlloc
VirtualFree
ReleaseSemaphore
CreateSemaphoreW
GetStdHandle
GetTempFileNameW
SetEndOfFile
MoveFileW
GetFullPathNameW
GetSystemInfo
SetFilePointer
CreateDirectoryW
GetDriveTypeA
GetCurrentDirectoryA
GetLocaleInfoW
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
RemoveDirectoryW
IsValidCodePage
GetOEMCP
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
HeapCreate
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
LCMapStringW
LCMapStringA
RtlUnwind
GetSystemTimeAsFileTime
ExitProcess
IsDebuggerPresent
UnhandledExceptionFilter
GetModuleHandleA
VirtualProtect
ExitThread
GetStartupInfoW
IsProcessorFeaturePresent
InterlockedCompareExchange
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
CreatePipe
LoadLibraryA
GetSystemDefaultLangID
VirtualQuery
CreateFileA
GlobalAlloc
GlobalLock
GetCPInfo
GetLocalTime
MoveFileExW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
LocalAlloc
SetCurrentDirectoryW
lstrcmpiW
CreateFileMappingW
MapViewOfFileEx
CreateMutexW
OpenMutexW
LoadLibraryExW
GlobalMemoryStatus
GetPrivateProfileIntW
CreateThread
WideCharToMultiByte
FreeResource
GetDriveTypeW
GetLogicalDriveStringsW
FreeLibrary
WriteFile
GetDiskFreeSpaceExW
RaiseException
DeviceIoControl
GetVersion
GetExitCodeProcess
lstrcmpW
GetPrivateProfileStringW
UnmapViewOfFile
MapViewOfFile
OpenFileMappingW
FlushInstructionCache
MultiByteToWideChar
QueryDosDeviceW
GetFileAttributesW
FindNextFileW
lstrlenW
GetCurrentDirectoryW
GetWindowsDirectoryW
ExpandEnvironmentStringsW
WritePrivateProfileStringW
GetCommandLineW
lstrcpynW
VirtualAllocEx
WriteProcessMemory
SetUnhandledExceptionFilter
TerminateProcess
CreateProcessW
OpenProcess
SearchPathW
InitializeCriticalSection
SetErrorMode
GetCurrentThreadId
GetCurrentProcessId
GetModuleFileNameW
SetLastError
LocalFree
FindResourceExW
LoadResource
LockResource
SetFileAttributesW
SizeofResource
FindResourceW
FindClose
FindFirstFileW
GetCurrentThread
GetModuleHandleW
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
LeaveCriticalSection
EnterCriticalSection
DuplicateHandle
GetCurrentProcess
GetLastError
InitializeCriticalSectionAndSpinCount
HeapAlloc
InterlockedIncrement
GetProcessHeap
HeapFree
DeleteCriticalSection
GlobalFree
InterlockedDecrement
WaitForMultipleObjects
SetEvent
WaitForSingleObject
ResetEvent
CreateEventW
GetVersionExW
CopyFileW
Sleep
GetTickCount
ReadFile
CloseHandle
GetFileSize
CreateFileW
DeleteFileW
GetTempPathW
lstrlenA
user32
UnregisterClassA
LoadStringW
CharLowerW
LoadIconW
CreateWindowExW
SetWindowLongW
DestroyWindow
FindWindowW
MessageBoxW
RegisterClassExW
SetWindowPos
InvalidateRect
LoadImageW
PostQuitMessage
GetWindowPlacement
PostThreadMessageW
GetKeyState
SendMessageTimeoutW
SetActiveWindow
DefWindowProcW
PostMessageW
IsWindow
GetClassInfoExW
GetMessageW
TranslateMessage
TrackPopupMenu
GetSystemMenu
GetMonitorInfoW
MonitorFromWindow
SetWindowRgn
CopyImage
mouse_event
GetSystemMetrics
OffsetRect
DrawFrameControl
UpdateLayeredWindow
EqualRect
GetDlgCtrlID
DrawIconEx
IsWindowVisible
EndPaint
ReleaseCapture
BeginPaint
SetCursor
SetCapture
PtInRect
GetWindowDC
ClientToScreen
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
FrameRect
FillRect
CallWindowProcW
SetTimer
KillTimer
DrawTextW
CharUpperW
InflateRect
SetForegroundWindow
AttachThreadInput
GetForegroundWindow
GetWindowThreadProcessId
CharNextW
ReleaseDC
GetDC
GetWindow
GetClientRect
SystemParametersInfoW
DispatchMessageW
GetWindowRect
MapWindowPoints
GetWindowLongW
PeekMessageW
SendMessageW
SetRect
MsgWaitForMultipleObjectsEx
EnableWindow
IsWindowEnabled
CopyRect
GetDesktopWindow
GetActiveWindow
MoveWindow
GetDlgItem
GetParent
ShowWindow
LoadCursorW
gdi32
GetClipRgn
SetBkColor
DeleteDC
ExtTextOutW
CreateFontIndirectW
CreatePen
Rectangle
SelectObject
CreateCompatibleBitmap
CreateRectRgn
GetObjectW
GetStockObject
CreateDIBSection
BitBlt
CreateBitmap
StretchBlt
DeleteObject
AddFontResourceW
RestoreDC
TextOutW
CreateRectRgnIndirect
SelectClipRgn
SetBkMode
RoundRect
GetTextMetricsW
CreateSolidBrush
ExtSelectClipRgn
OffsetRgn
GetTextExtentPoint32W
LineTo
MoveToEx
CombineRgn
CreateCompatibleDC
RectInRegion
SetTextColor
SaveDC
advapi32
FreeSid
SetEntriesInAclW
AllocateAndInitializeSid
DeleteService
OpenServiceW
OpenSCManagerW
CloseServiceHandle
RegEnumKeyExW
RegQueryInfoKeyW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegDeleteKeyW
RegLoadKeyW
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExW
RegOpenKeyW
RegDeleteValueW
RegCreateKeyExW
RegQueryValueExW
GetSecurityInfo
GetNamedSecurityInfoW
GetTokenInformation
AdjustTokenPrivileges
IsValidSid
GetLengthSid
RegCloseKey
RegOpenKeyExW
GetAce
LookupAccountNameW
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueW
GetAclInformation
SetNamedSecurityInfoW
AddAce
SetSecurityInfo
CopySid
InitializeAcl
shell32
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderLocation
ShellExecuteW
SHGetSpecialFolderPathW
ord680
SHCreateDirectoryExW
ole32
CoTaskMemFree
CreateStreamOnHGlobal
CoTaskMemAlloc
CoInitialize
CoCreateInstance
CoTaskMemRealloc
CoUninitialize
oleaut32
VariantInit
VariantCopy
VariantClear
SysAllocString
SysFreeString
VarUI4FromStr
OleLoadPicture
shlwapi
PathAppendW
PathIsDirectoryW
StrStrW
StrChrW
StrCatW
PathAddBackslashW
StrToIntExW
StrToIntA
PathFindFileNameW
PathQuoteSpacesW
PathRemoveBackslashW
PathFileExistsW
PathRemoveFileSpecW
wnsprintfW
comctl32
_TrackMouseEvent
InitCommonControlsEx
ws2_32
htonl
ntohl
htons
wininet
InternetOpenW
InternetGetConnectedState
InternetCloseHandle
InternetReadFile
HttpQueryInfoW
InternetOpenUrlW
userenv
UnloadUserProfile
psapi
GetModuleFileNameExW
GetProcessImageFileNameW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
crypt32
CryptMsgGetParam
CertFindCertificateInStore
CryptQueryObject
CertGetNameStringW
netapi32
Netbios
Sections
.text Size: 848KB - Virtual size: 844KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ