Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-30_289791b26129f06edbce0919e029c3e8_floxif_hijackloader_luca-stealer_magniber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-30_289791b26129f06edbce0919e029c3e8_floxif_hijackloader_luca-stealer_magniber.exe
Resource
win10v2004-20241007-en
Target
2024-12-30_289791b26129f06edbce0919e029c3e8_floxif_hijackloader_luca-stealer_magniber
Size
6.7MB
MD5
289791b26129f06edbce0919e029c3e8
SHA1
1f0ed692754098ad4c9b66e9d80701a3ebb90b12
SHA256
f585ad9d3945ba061756e96667915e6e863f8788018d56c6514945dc436810fa
SHA512
8ba2bf71cf9b2b4acd01c865924d5deda7f0320187a3cbc7a91b9bbbe7e78214af013c6f6cc02be86551eb5ac8f1d65d54f690773c997491c0f3de515ca47b91
SSDEEP
98304:H7vTScaK6TllY2G2XDR+NGJqUWgTDcBgxlsFydFPLbpxTaz/FQM:DTScaK6TllYq1q2wgxljPRxWL7
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
C:\buildAgent\work\ci_deploy_ninja_boot-x86_git\build.ninja\common\vs2019\x86\release\Installer\Windows\RobloxPlayerInstaller.pdb
_TrackMouseEvent
InitCommonControlsEx
GdiplusShutdown
GdipCloneImage
GdiplusStartup
GdipCreateHBITMAPFromBitmap
GdipDisposeImage
GdipCreateBitmapFromStream
GdipAlloc
GdipFree
InternetReadFile
InternetQueryDataAvailable
InternetQueryOptionW
InternetSetStatusCallbackW
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestW
HttpQueryInfoW
InternetConnectW
InternetCloseHandle
InternetOpenW
ShellExecuteExW
SHGetFolderPathAndSubDirW
SHGetKnownFolderPath
Shell_NotifyIconW
GetAdaptersAddresses
BCryptGenRandom
GetUserNameW
IsValidSid
GetTokenInformation
GetLengthSid
FreeSid
EqualSid
CopySid
AllocateAndInitializeSid
OpenProcessToken
RegDeleteTreeW
RegQueryValueExW
RegQueryInfoKeyW
RegEnumKeyExW
CryptDestroyKey
SystemFunction036
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptSignHashW
RegQueryValueExA
RegOpenKeyExA
RegGetValueW
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
RegCreateKeyExW
RegCloseKey
CryptEnumProvidersW
CryptAcquireContextW
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
listen
getsockname
connect
recv
getaddrinfo
accept
select
__WSAFDIsSet
WSAIoctl
gethostname
WSACleanup
WSAStartup
inet_pton
WSAGetLastError
freeaddrinfo
closesocket
WSACreateEvent
WSACloseEvent
send
getsockopt
htons
htonl
inet_ntop
socket
ntohs
ntohl
ioctlsocket
getnameinfo
WSASetLastError
setsockopt
bind
CertOpenStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertOpenSystemStoreA
CertCloseStore
CertEnumCertificatesInStore
CertGetIntendedKeyUsage
CertGetEnhancedKeyUsage
CertGetCertificateContextProperty
CertFreeCertificateContext
InitOnceComplete
InitOnceBeginInitialize
SleepConditionVariableSRW
SleepConditionVariableCS
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
TryEnterCriticalSection
InitializeSRWLock
EncodePointer
LCMapStringEx
GetCPInfo
GetLocaleInfoEx
GetStringTypeW
IsProcessorFeaturePresent
InitializeSListHead
UnhandledExceptionFilter
GetStartupInfoW
RtlUnwind
InterlockedPushEntrySList
GetCommandLineA
CreateThread
GetExitCodeThread
ExitThread
FreeLibraryAndExitThread
GetConsoleOutputCP
SetStdHandle
GetDriveTypeW
PeekNamedPipe
IsDebuggerPresent
DebugBreak
OutputDebugStringW
CloseHandle
GetLastError
SetLastError
HeapAlloc
HeapFree
GetProcessHeap
ReleaseSemaphore
ReleaseMutex
WaitForSingleObject
WaitForSingleObjectEx
OpenSemaphoreW
CreateMutexExW
CreateSemaphoreExW
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
FormatMessageW
SetSearchPathMode
GetCommandLineW
VerSetConditionMask
GetDiskFreeSpaceExW
CreateMutexW
TerminateProcess
OpenProcess
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
VerifyVersionInfoW
MulDiv
LocaleNameToLCID
GetUserDefaultLocaleName
SetWaitableTimer
CancelWaitableTimer
CreateWaitableTimerW
Sleep
FindClose
SystemTimeToTzSpecificLocalTime
FindNextFileW
SetUnhandledExceptionFilter
SetEvent
CreateEventW
OpenEventW
GetExitCodeProcess
CreateProcessW
GetSystemTime
CreateFileW
GetFileSize
DeleteFileW
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
GetModuleFileNameW
SystemTimeToFileTime
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
K32GetModuleFileNameExW
GetCurrentProcess
GetCurrentProcessorNumber
GlobalMemoryStatusEx
GetSystemInfo
GetSystemTimeAsFileTime
GetVersionExA
IsWow64Process
LoadLibraryA
K32GetProcessMemoryInfo
ResetEvent
CreateEventA
CreateSemaphoreA
DuplicateHandle
GetModuleHandleA
GetTickCount
OutputDebugStringA
QueryPerformanceCounter
QueryPerformanceFrequency
SwitchToThread
MultiByteToWideChar
WideCharToMultiByte
GetNativeSystemInfo
LoadLibraryExW
FileTimeToSystemTime
DecodePointer
RaiseException
InitializeCriticalSectionEx
DeleteCriticalSection
VirtualQuery
GetCurrentThread
LoadLibraryW
WaitForMultipleObjectsEx
LocalAlloc
LocalFree
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
CreateDirectoryW
GetFileAttributesW
GetFileSizeEx
ReadFile
RemoveDirectoryW
SetFileAttributesW
WriteFile
CopyFileW
GlobalAlloc
GlobalFree
GlobalUnlock
GlobalLock
CompareStringEx
FreeLibrary
GetEnvironmentVariableW
VirtualAlloc
VirtualProtect
VirtualFree
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
FlushFileBuffers
FormatMessageA
LockFileEx
CreateFileMappingA
UnlockFile
HeapDestroy
HeapCompact
HeapReAlloc
DeleteFileA
CreateFileA
FlushViewOfFile
GetFileAttributesExW
GetFileAttributesA
GetDiskFreeSpaceA
GetTempPathA
HeapSize
HeapValidate
GetVersionExW
GetTempPathW
UnlockFileEx
SetEndOfFile
GetFullPathNameA
SetFilePointer
LockFile
GetDiskFreeSpaceW
GetFullPathNameW
HeapCreate
AreFileApisANSI
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryA
MoveFileExA
CompareFileTime
GetEnvironmentVariableA
SleepEx
ResumeThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateWaitableTimerA
GetCurrentDirectoryW
GetFileInformationByHandle
GetFileTime
SetFilePointerEx
SetFileTime
DeviceIoControl
MoveFileExW
InitializeCriticalSection
WriteConsoleW
GetStdHandle
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
SwitchToFiber
DeleteFiber
CreateFiber
GetFileType
ConvertFiberToThread
ConvertThreadToFiber
SetConsoleCtrlHandler
ExitProcess
GetTimeZoneInformation
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetFinalPathNameByHandleW
FindFirstFileW
GetUserObjectInformationW
GetProcessWindowStation
GetWindowRect
InvalidateRect
EndPaint
BeginPaint
GetDC
DrawTextW
GetSystemMetrics
EnableWindow
KillTimer
GetMessageW
GetDlgCtrlID
GetDlgItem
LoadBitmapW
DestroyWindow
CreateWindowExW
RegisterClassW
CallWindowProcW
PostQuitMessage
DefWindowProcW
EnumDisplayDevicesA
GetWindowThreadProcessId
GetShellWindow
MapWindowPoints
DestroyIcon
MessageBoxW
SendMessageW
TranslateAcceleratorW
LoadIconW
GetParent
SetWindowLongW
GetWindowLongW
LoadAcceleratorsW
DispatchMessageW
ShowWindow
TranslateMessage
SetTimer
RoundRect
GetDeviceCaps
DeleteObject
DeleteDC
CreateSolidBrush
CreatePatternBrush
CreateFontW
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SetDCBrushColor
SetDCPenColor
SetBkMode
SetTextColor
BitBlt
GetStockObject
CoInitializeEx
CoTaskMemAlloc
CoUninitialize
CoInitialize
CoCreateInstance
CoCreateGuid
CoTaskMemFree
StringFromGUID2
PathFindExtensionW
ord12
PathFindFileNameW
CallNtPowerInformation
timeSetEvent
timeGetDevCaps
timeBeginPeriod
timeGetTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ