Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-05_3ca906af1af5cd1937afe62100b742b2_hijackloader_magniber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-05_3ca906af1af5cd1937afe62100b742b2_hijackloader_magniber.exe
Resource
win10v2004-20240802-en
Target
2024-10-05_3ca906af1af5cd1937afe62100b742b2_hijackloader_magniber
Size
1.4MB
MD5
3ca906af1af5cd1937afe62100b742b2
SHA1
12f2643b65d38a402221e88210a05d78f0a88689
SHA256
84b32cbd8d5c0f88c245ef2f573293dcedb6ab578a6c85fa51a0d5ac6aab16a9
SHA512
2a1e88fa811b7577427f8fbd788ec4b0d92195a422cb3b4c9a9e624fae8a96bb98b4ef9a7bddec60b87e88d99fec831aaadb7a1cdcdda3281d5385a01e89501c
SSDEEP
24576:K6/w3tD5G92xGBAaUxMjfSAuH7qmECTBdw/5bESjLmfP:7Q9rx15AS5ECTjwBbrjLmfP
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\zhanlue\rcimage\bin\Win32\Release\pdb\2345PicWorker.pdb
CreateMutexW
ReleaseMutex
Sleep
OpenMutexW
QueryDosDeviceW
GetCurrentProcess
OpenProcess
ResumeThread
InitializeCriticalSection
GetACP
WideCharToMultiByte
FindFirstFileW
FindNextFileW
FindClose
GetLongPathNameW
CreateFileW
GetFileAttributesExW
HeapFree
GetVersionExW
GlobalAlloc
GlobalFree
HeapAlloc
LocalFree
GetProcessHeap
LockResource
GetSystemInfo
GetVolumeInformationW
GetDiskFreeSpaceW
GetLogicalDriveStringsW
LoadLibraryW
ResetEvent
InterlockedExchangeAdd
ReadFile
WriteFile
SetFileTime
SetFilePointer
SetEndOfFile
GetFileSize
GetFileTime
CreateDirectoryW
GetFullPathNameW
lstrlenW
GetTempPathW
GetFileAttributesW
SetFileAttributesW
DeleteFileW
GetCurrentDirectoryW
GetWindowsDirectoryW
MoveFileExW
GetTempFileNameW
MoveFileW
GetCurrentProcessId
GlobalLock
GlobalUnlock
GlobalMemoryStatusEx
GetLocalTime
GetPrivateProfileStringW
TerminateProcess
LoadLibraryExW
lstrcmpiW
InterlockedIncrement
InterlockedExchange
IsBadStringPtrW
DeviceIoControl
GetFileSizeEx
lstrcpyW
lstrcatW
LocalAlloc
LoadLibraryA
GetEnvironmentVariableW
SystemTimeToFileTime
FileTimeToSystemTime
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
FreeLibrary
GetModuleHandleW
DeleteCriticalSection
GetProcAddress
DecodePointer
FindResourceW
LoadResource
RaiseException
GetLastError
MultiByteToWideChar
GetCurrentThreadId
SetErrorMode
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
InterlockedDecrement
EnterCriticalSection
SetLastError
SizeofResource
GetTickCount
CloseHandle
SetEvent
CreateEventW
WaitForSingleObject
GetTimeZoneInformation
HeapReAlloc
HeapSize
GetFileType
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
RtlUnwind
OutputDebugStringW
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
WaitForMultipleObjects
InterlockedPushEntrySList
InterlockedPopEntrySList
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ExpandEnvironmentStringsW
CreateProcessW
GetExitCodeProcess
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
EncodePointer
FormatMessageW
LoadCursorW
TranslateMessage
CharNextW
PeekMessageW
DispatchMessageW
ShowWindow
RegisterClassExW
IsWindow
CopyRect
MonitorFromWindow
GetMonitorInfoW
GetClassInfoExW
PostMessageW
SetWindowLongW
UnregisterClassW
GetClientRect
SetWindowTextW
EndPaint
BeginPaint
PtInRect
OffsetRect
GetWindowThreadProcessId
GetParent
GetDesktopWindow
CreateWindowExW
WindowFromPoint
InvalidateRect
GetForegroundWindow
GetSystemMetrics
SetTimer
GetDlgItem
EndDialog
SetWindowPos
MoveWindow
SendMessageW
SystemParametersInfoW
ReleaseDC
GetDC
GetWindowLongW
DefWindowProcW
CallWindowProcW
GetActiveWindow
PostQuitMessage
DialogBoxParamW
GetMessageW
DestroyWindow
IsRectEmpty
SetViewportOrgEx
SelectObject
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteDC
RegNotifyChangeKeyValue
RegCloseKey
GetUserNameW
RegQueryValueExW
RegOpenCurrentUser
RegQueryInfoKeyW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegDeleteValueW
RegOpenKeyExW
SHGetFolderPathW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
CoTaskMemFree
CoTaskMemRealloc
CreateStreamOnHGlobal
CoCreateInstance
CoTaskMemAlloc
VarUI4FromStr
SHDeleteKeyW
ImmDisableIME
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipSetTextRenderingHint
GdiplusStartup
GdipCreateFontFromLogfontW
GdipDeleteFont
GdipDrawString
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatFlags
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipSetStringFormatTrimming
GdipCreateFromHDC
GdipDeleteGraphics
GdipFree
GdipAlloc
GdiplusShutdown
GdipDrawImageRectI
GdipDrawImageRectRectI
GdipGetImageHeight
GdipGetImageWidth
MiniDumpWriteDump
CheckSigner
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ