Static task
static1
Behavioral task
behavioral1
Sample
2024-10-09_d7de6b6005cc059ab97adf469544891c_magniber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-09_d7de6b6005cc059ab97adf469544891c_magniber.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-09_d7de6b6005cc059ab97adf469544891c_magniber
-
Size
8.4MB
-
MD5
d7de6b6005cc059ab97adf469544891c
-
SHA1
fcad5537f197fc50e8c306f9ce5ab18d1de29e21
-
SHA256
65f9b5a3bf59759996949841a5ea1689b206fbf4d863a907f967b0de8e8b214b
-
SHA512
333fccd261741236599dde603e9f456108e229f2aed705512abd3d6b3bfedbf423ca0560f66fc0feb71d8901f47340c28eacd1f8e499efcc53bb11ff35cf5f52
-
SSDEEP
196608:KngZQ8wrPTKXA5YA/eyJcQeMxQJ9aSlARLf0:LQlLJ7Xal
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-09_d7de6b6005cc059ab97adf469544891c_magniber
Files
-
2024-10-09_d7de6b6005cc059ab97adf469544891c_magniber.exe windows:5 windows x86 arch:x86
fa898458ebfbdb823e031be524e0f06b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegFlushKey
RegOpenKeyW
RegSetValueExW
api-ms-win-downlevel-shlwapi-l1-1-0
PathRemoveFileSpecW
bass
BASS_ChannelGetDevice
BASS_ChannelGetPosition
BASS_ChannelIsActive
BASS_ChannelPause
BASS_ChannelPlay
BASS_ChannelSetAttribute
BASS_ChannelSetPosition
BASS_ChannelStop
BASS_ErrorGetCode
BASS_Free
BASS_GetDeviceInfo
BASS_GetInfo
BASS_Init
BASS_StreamCreateFile
BASS_StreamCreateFileUser
BASS_StreamFree
d3d9
Direct3DCreate9
gdi32
CreateCompatibleDC
CreateDIBSection
DeleteDC
DeleteObject
GetStockObject
SelectObject
SetDIBits
SetStretchBltMode
StretchBlt
kernel32
AreFileApisANSI
CloseHandle
CompareStringW
CopyFileW
CreateDirectoryW
CreateFileW
CreatePipe
CreateProcessA
DecodePointer
DeleteCriticalSection
DeleteFileW
DuplicateHandle
EncodePointer
EnterCriticalSection
EnumSystemLocalesW
ExitProcess
FindClose
FindFirstFileW
FindNextFileW
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineW
GetConsoleCP
GetConsoleMode
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceExW
GetEnvironmentStringsW
GetExitCodeProcess
GetFileAttributesExW
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetShortPathNameW
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTempPathA
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetVersionExW
GetWindowsDirectoryW
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedIncrement
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LCMapStringW
LeaveCriticalSection
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
MoveFileExW
MultiByteToWideChar
OutputDebugStringW
QueryPerformanceCounter
RaiseException
ReadConsoleW
ReadFile
RtlUnwind
SetCurrentDirectoryW
SetEndOfFile
SetEnvironmentVariableA
SetFilePointer
SetFilePointerEx
SetLastError
SetProcessAffinityMask
SetStdHandle
SetThreadExecutionState
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
WaitForSingleObject
WideCharToMultiByte
WriteConsoleW
WriteFile
ole32
CoCreateInstance
CoInitialize
shell32
ord175
SHFileOperationW
SHGetFolderPathW
ShellExecuteW
user32
CreateWindowExW
DefWindowProcW
DispatchMessageW
EnumDisplayDevicesW
EnumDisplaySettingsW
FindWindowW
GetClientRect
GetCursor
GetForegroundWindow
GetSystemMetrics
GetWindowLongW
GetWindowRect
LoadCursorW
LoadIconW
MessageBoxW
PeekMessageW
PostQuitMessage
RegisterClassExW
SendMessageW
SetCursor
SetFocus
SetForegroundWindow
SetWindowLongW
SetWindowPos
ShowWindow
TrackMouseEvent
TranslateMessage
UnregisterClassW
UpdateWindow
winmm
timeGetTime
waveOutGetNumDevs
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 460KB - Virtual size: 460KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 752KB - Virtual size: 752KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text1 Size: 704KB - Virtual size: 704KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc1 Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.pdata Size: 3.6MB - Virtual size: 3.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 716KB - Virtual size: 716KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Geddon Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zero Size: 4KB - Virtual size: 3KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ