Static task
static1
Behavioral task
behavioral1
Sample
2024-11-22_d8cfea3758dc1124b0e02a9fa28d0722_magniber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-22_d8cfea3758dc1124b0e02a9fa28d0722_magniber.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-22_d8cfea3758dc1124b0e02a9fa28d0722_magniber
-
Size
292KB
-
MD5
d8cfea3758dc1124b0e02a9fa28d0722
-
SHA1
7b980571c8ca5b749f7547a5ba181b26d7a781bf
-
SHA256
603ffa1c95423c869539f8a7844de8f6f6ca7aea135aa026f92fb499ab7868a4
-
SHA512
c1d13f3162ba4dc331575e60e288ec9db64e10448cede3a551cb5304df3d6e96adac2908a6543862df70261783bc038f6fb26dae14a4fd359e3ed181d2ef808d
-
SSDEEP
3072:jNdkchM4eJY+kPsSNxq8RPCUek4pZhzVB+Nm+5XNtOCq+IYKC9ADQFcgtgVsN6fs:BzhM4em+kPsgzr4tSRq+IYKEA0bN67rc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-11-22_d8cfea3758dc1124b0e02a9fa28d0722_magniber
Files
-
2024-11-22_d8cfea3758dc1124b0e02a9fa28d0722_magniber.exe windows:5 windows x86 arch:x86
2aad64a2a1de66a11942873365caafee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
SetProcessShutdownParameters
OutputDebugStringA
GetPrivateProfileSectionNamesA
GetCPInfo
CloseHandle
LoadLibraryA
SetFilePointerEx
SetProcessWorkingSetSize
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
OutputDebugStringW
GetSystemTimeAdjustment
GetTickCount
GetLocalTime
GetSystemTime
DuplicateHandle
GetFileSize
ResetEvent
WriteConsoleW
ExitProcess
GetProcessIoCounters
VirtualProtect
HeapReAlloc
GetOEMCP
GetACP
IsValidCodePage
LoadLibraryExW
SetStdHandle
LocalAlloc
FreeLibrary
FatalAppExitA
LeaveCriticalSection
EnterCriticalSection
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetCommandLineW
IsProcessorFeaturePresent
GetLastError
HeapAlloc
HeapFree
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapSize
SetLastError
GetCurrentThread
GetCurrentThreadId
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateSemaphoreW
IsDebuggerPresent
SetConsoleCtrlHandler
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
CreateFileW
user32
CreateWindowExA
IsIconic
CharPrevA
GetCaretPos
SetWindowContextHelpId
AdjustWindowRect
GetWindowTextLengthA
GetScrollRange
gdi32
CloseFigure
SetWinMetaFileBits
StretchBlt
CreateEllipticRgn
CreateCompatibleBitmap
CombineRgn
BitBlt
EndPath
advapi32
RegQueryInfoKeyA
shell32
DragQueryPoint
msimg32
AlphaBlend
TransparentBlt
comctl32
ord6
winhttp
WinHttpConnect
WinHttpReadData
WinHttpOpen
Sections
.text Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE