Static task
static1
Behavioral task
behavioral1
Sample
2024-11-22_3e57ae404aa087411e79fbd65e660c26_magniber.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2024-11-22_3e57ae404aa087411e79fbd65e660c26_magniber.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-22_3e57ae404aa087411e79fbd65e660c26_magniber
-
Size
293KB
-
MD5
3e57ae404aa087411e79fbd65e660c26
-
SHA1
15846f7adf243978c9e671c7b4afaad412085bf8
-
SHA256
f5fc251aa547075f623ef45bb4832f88cde788cbdab1ea5fd38df40b43b4d137
-
SHA512
9541d89029b6340f21841c32f528ee647cb85cc83786beca76c70bf43b4e2ac72b508bc5b70ac690fec578c99430d352ef14be9f6396e6f9268865a54bbf286f
-
SSDEEP
3072:jNdkchM4eJY+kPsSNxq8RPCUek4pZhzVB+Nm+5XNtOCq+IYKC9ADQFcgtgVsN6f7:BzhM4em+kPsgzr4tSRq+IYKEA0bN67kO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-11-22_3e57ae404aa087411e79fbd65e660c26_magniber
Files
-
2024-11-22_3e57ae404aa087411e79fbd65e660c26_magniber.exe windows:5 windows x86 arch:x86
2aad64a2a1de66a11942873365caafee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
SetProcessShutdownParameters
OutputDebugStringA
GetPrivateProfileSectionNamesA
GetCPInfo
CloseHandle
LoadLibraryA
SetFilePointerEx
SetProcessWorkingSetSize
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
OutputDebugStringW
GetSystemTimeAdjustment
GetTickCount
GetLocalTime
GetSystemTime
DuplicateHandle
GetFileSize
ResetEvent
WriteConsoleW
ExitProcess
GetProcessIoCounters
VirtualProtect
HeapReAlloc
GetOEMCP
GetACP
IsValidCodePage
LoadLibraryExW
SetStdHandle
LocalAlloc
FreeLibrary
FatalAppExitA
LeaveCriticalSection
EnterCriticalSection
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetCommandLineW
IsProcessorFeaturePresent
GetLastError
HeapAlloc
HeapFree
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapSize
SetLastError
GetCurrentThread
GetCurrentThreadId
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateSemaphoreW
IsDebuggerPresent
SetConsoleCtrlHandler
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
CreateFileW
user32
CreateWindowExA
IsIconic
CharPrevA
GetCaretPos
SetWindowContextHelpId
AdjustWindowRect
GetWindowTextLengthA
GetScrollRange
gdi32
CloseFigure
SetWinMetaFileBits
StretchBlt
CreateEllipticRgn
CreateCompatibleBitmap
CombineRgn
BitBlt
EndPath
advapi32
RegQueryInfoKeyA
shell32
DragQueryPoint
msimg32
AlphaBlend
TransparentBlt
comctl32
ord6
winhttp
WinHttpConnect
WinHttpReadData
WinHttpOpen
Sections
.text Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE