Static task
static1
Behavioral task
behavioral1
Sample
2024-10-06_6b36d98c23a825fbbe66106b3b9a9a99_magniber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-06_6b36d98c23a825fbbe66106b3b9a9a99_magniber.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-06_6b36d98c23a825fbbe66106b3b9a9a99_magniber
-
Size
20.2MB
-
MD5
6b36d98c23a825fbbe66106b3b9a9a99
-
SHA1
8f62b02727ab4e9f220db42e6300dee4922dd9e5
-
SHA256
c63c6606231f7077da858d10d36e5b3926cb585fa08943955f4a48f185a78051
-
SHA512
600f9148c9cad0369f3fe4fe63902738ed4bd9037b9c484319b0b53d8aace39ce550b91212eeb207301bd0c82ffbf6ea74b7e93380aa64f8a297b79009714e63
-
SSDEEP
393216:SyAWIi6YSl3876SLzcLP+oVJBvGxHVAhLN4u3y/KoTvEHg:Syh6YXPkLVJdiAz4u3SKi
Malware Config
Signatures
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule sample Nirsoft -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-06_6b36d98c23a825fbbe66106b3b9a9a99_magniber
Files
-
2024-10-06_6b36d98c23a825fbbe66106b3b9a9a99_magniber.exe windows:4 windows x86 arch:x86
04ee027b004efb3ea882ad3295c21d97
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
HeapCreate
GetEnvironmentVariableW
GetUserDefaultLangID
CreateSemaphoreW
GetLastError
CloseHandle
HeapDestroy
ExitProcess
GetCurrentThreadId
SystemTimeToFileTime
LocalFileTimeToFileTime
FindResourceW
LoadResource
LockResource
SizeofResource
CreateToolhelp32Snapshot
GetLogicalDriveStringsW
QueryDosDeviceW
FileTimeToLocalFileTime
FileTimeToSystemTime
ExpandEnvironmentStringsW
GetCurrentProcess
GetSystemDefaultLangID
MultiByteToWideChar
GetProcAddress
CreateRemoteThread
WaitForSingleObject
GetExitCodeThread
GetCurrentProcessId
OpenProcess
FormatMessageW
GetVolumeInformationW
FindFirstFileW
FindNextFileW
FindClose
WideCharToMultiByte
BeginUpdateResourceW
UpdateResourceW
EndUpdateResourceW
CreateProcessW
Beep
CreateFileW
DeviceIoControl
GetCommandLineW
GetComputerNameW
GetDateFormatW
GetDiskFreeSpaceExW
GetExitCodeProcess
GetFileTime
GetPrivateProfileStringW
GetShortPathNameW
GetSystemDirectoryW
GetSystemPowerStatus
GetTimeZoneInformation
GetUserDefaultLCID
GetWindowsDirectoryW
GlobalMemoryStatus
LocalFree
Process32FirstW
Process32NextW
QueryPerformanceCounter
QueryPerformanceFrequency
SetComputerNameW
SetFileTime
SetSystemTime
SetVolumeLabelW
Sleep
TerminateProcess
WritePrivateProfileStringW
InitializeSListHead
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
GetSystemTimeAsFileTime
GetStdHandle
WriteFile
GetModuleFileNameW
FreeLibrary
GetModuleHandleExW
EnterCriticalSection
DeleteCriticalSection
LeaveCriticalSection
HeapFree
SetLastError
GetCurrentThread
HeapAlloc
EnumSystemLocalesW
LoadLibraryExW
CompareStringW
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
GetLocaleInfoW
GetTempPathW
GetTimeFormatW
InitializeCriticalSectionAndSpinCount
IsValidLocale
LCMapStringW
OutputDebugStringW
GetFileType
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
IsValidCodePage
GetCommandLineA
FindFirstFileExW
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetEnvironmentVariableW
SetConsoleCtrlHandler
GetProcessHeap
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapSize
HeapReAlloc
ReadFile
ReadConsoleW
SetFilePointerEx
WriteConsoleW
InterlockedFlushSList
InterlockedPushEntrySList
RtlUnwind
EncodePointer
RaiseException
InitializeCriticalSection
CreateThread
GetTickCount
DuplicateHandle
CreatePipe
PeekNamedPipe
GetFileSize
SetFilePointer
SetEndOfFile
LoadLibraryW
DeleteFileW
GetVersionExW
GetDriveTypeW
GetFileAttributesW
SetFileAttributesW
MoveFileW
CreateDirectoryW
RemoveDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
CopyFileW
MulDiv
GetLocalTime
GlobalFree
GlobalAlloc
SetEvent
CreateEventA
LoadLibraryA
ReleaseSemaphore
GetFileInformationByHandle
CreateFileA
ResetEvent
SetThreadPriority
UnregisterWait
RegisterWaitForSingleObject
DecodePointer
GetFileSizeEx
user32
RegisterWindowMessageW
GetKeyState
SendMessageW
ShowWindow
SetForegroundWindow
SetTimer
GetClassNameW
CallNextHookEx
SetWindowsHookExW
UnhookWindowsHookEx
GetCursorPos
WindowFromPoint
SetClassLongW
KillTimer
ReleaseDC
OemToCharW
EnumWindows
GetWindowThreadProcessId
FindWindowExW
FindWindowW
GetForegroundWindow
SetCursorPos
AnimateWindow
AttachThreadInput
BlockInput
ChangeDisplaySettingsW
CharToOemW
CreateWindowExW
DispatchMessageW
DrawMenuBar
EnableMenuItem
EnableWindow
EnumDisplaySettingsW
ExitWindowsEx
FlashWindow
GetDC
GetDesktopWindow
GetFocus
GetLastInputInfo
GetSysColor
GetSystemMenu
GetSystemMetrics
GetWindow
GetWindowLongW
GetWindowRect
GetWindowTextW
InvalidateRect
IsWindow
IsWindowEnabled
LoadCursorW
LockWorkStation
MessageBeep
PeekMessageW
PostMessageW
RegisterHotKey
RemoveMenu
SetFocus
SetWindowLongW
SetWindowPos
TranslateMessage
UnregisterHotKey
UpdateLayeredWindow
UpdateWindow
WaitForInputIdle
keybd_event
mouse_event
SetWindowRgn
SetWindowLongA
SetClassLongA
GetClientRect
CallWindowProcA
DefWindowProcA
MessageBoxW
IsWindowVisible
DestroyWindow
SystemParametersInfoW
GetPropW
BeginPaint
EndPaint
ClipCursor
SetCursor
RedrawWindow
MapWindowPoints
SetCapture
GetCapture
ReleaseCapture
CallWindowProcW
DefWindowProcW
FillRect
DrawStateW
DrawFocusRect
GetMessagePos
ScreenToClient
SetPropW
ChildWindowFromPointEx
RegisterClassExW
GetIconInfo
GetWindowTextLengthW
GetParent
MoveWindow
ClientToScreen
SetWindowTextW
RemovePropW
SetScrollPos
InflateRect
GetWindowDC
GetSysColorBrush
GetAsyncKeyState
SetActiveWindow
DestroyIcon
LoadIconW
GetMenu
IsZoomed
IsIconic
RegisterClassW
AdjustWindowRectEx
UnregisterClassW
CreateAcceleratorTableW
MsgWaitForMultipleObjects
GetMessageW
GetActiveWindow
TranslateAcceleratorW
DefFrameProcW
EnumChildWindows
DestroyAcceleratorTable
SetRect
TrackPopupMenu
IsChild
SetMenu
DestroyMenu
DrawIconEx
DrawTextW
GetMenuItemCount
GetSubMenu
GetMenuItemInfoW
ModifyMenuW
SetMenuItemInfoW
FrameRect
CreateMenu
AppendMenuW
CreatePopupMenu
CreateIconIndirect
CopyImage
CreateIconFromResourceEx
CreateIconFromResource
CharUpperW
CharLowerW
gdi32
GetStockObject
CreateDCW
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteDC
GetDIBits
GetPixel
SetDIBits
DeleteObject
GetObjectA
CreateRectRgn
CombineRgn
CreateFontIndirectW
GetObjectW
CreateSolidBrush
CreateDIBSection
GdiGetBatchLimit
GdiSetBatchLimit
GetObjectType
GetTextExtentPoint32W
ExcludeClipRect
SetBkColor
SetTextColor
SelectClipRgn
CreateRectRgnIndirect
GetClipRgn
ExtSelectClipRgn
SetPixel
SetBkMode
LineTo
MoveToEx
CreatePen
GetDeviceCaps
SetTextAlign
TextOutW
SetStretchBltMode
SetBrushOrgEx
StretchBlt
GetTextMetricsW
CreateBitmap
CreateFontW
advapi32
OpenSCManagerW
OpenServiceW
CloseServiceHandle
RegOpenKeyExW
RegOpenKeyW
RegConnectRegistryW
RegQueryValueExW
RegCloseKey
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
LookupAccountNameW
IsValidSid
RegEnumKeyExW
RegDeleteValueW
RegCreateKeyW
AdjustTokenPrivileges
ChangeServiceConfigW
ControlService
CryptAcquireContextW
CryptCreateHash
CryptDeriveKey
CryptDestroyHash
CryptDestroyKey
CryptEncrypt
CryptHashData
CryptReleaseContext
GetUserNameW
ImpersonateLoggedOnUser
LogonUserW
LookupPrivilegeValueW
OpenProcessToken
QueryServiceStatus
RegEnumValueW
RevertToSelf
StartServiceW
oleaut32
SafeArrayGetDim
SafeArrayGetUBound
SafeArrayGetElement
ole32
CoInitialize
CoCreateInstance
CoUninitialize
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoCreateGuid
StringFromGUID2
RevokeDragDrop
OleUninitialize
OleInitialize
shell32
ExtractIconW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ExtractIconExW
ord66
ord524
SHAddToRecentDocs
SHFileOperationW
SHFormatDrive
SHGetFileInfoW
ShellAboutW
Shell_NotifyIconW
ShellExecuteExW
ws2_32
WSAStartup
gethostbyname
WSACleanup
gethostbyaddr
inet_addr
closesocket
gethostname
htons
select
__WSAFDIsSet
ioctlsocket
recvfrom
socket
connect
recv
bind
winmm
timeBeginPeriod
gdiplus
GdipDeleteFont
GdipDeleteGraphics
GdipDeletePath
GdipDeleteMatrix
GdipDeletePen
GdipDeleteStringFormat
GdipFree
icmp
IcmpCloseHandle
IcmpCreateFile
IcmpSendEcho
imagehlp
MakeSureDirectoryPathExists
iphlpapi
GetAdaptersInfo
GetNetworkParams
msi
ord45
ord70
netapi32
NetApiBufferFree
NetLocalGroupAdd
NetLocalGroupDel
NetLocalGroupEnum
NetUserDel
NetUserGetInfo
NetUserSetInfo
setupapi
SetupIterateCabinetW
urlmon
URLDownloadToFileW
UrlMkSetSessionOption
userenv
GetDefaultUserProfileDirectoryW
wininet
DeleteUrlCacheEntryW
InternetCloseHandle
InternetGetConnectedState
InternetOpenUrlW
InternetOpenW
InternetReadFile
UnlockUrlCacheEntryFileW
winspool.drv
ClosePrinter
DeletePrinter
OpenPrinterW
SetPrinterW
comctl32
InitCommonControlsEx
_TrackMouseEvent
Sections
.code Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 199KB - Virtual size: 198KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18.8MB - Virtual size: 18.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ