e:\slave\CoE Communication\VS6\Debug\CifX_ApDemo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
800b705147ca8414d78b21da918fea6b232d362a7026fb384d808cacc84f70f8.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
800b705147ca8414d78b21da918fea6b232d362a7026fb384d808cacc84f70f8.exe
Resource
win10v2004-20240611-en
General
-
Target
800b705147ca8414d78b21da918fea6b232d362a7026fb384d808cacc84f70f8
-
Size
446KB
-
MD5
ed2771633ba1716272f5b057762e6b41
-
SHA1
50e670f621d90a5972a31fe629b8033f6b630d5b
-
SHA256
800b705147ca8414d78b21da918fea6b232d362a7026fb384d808cacc84f70f8
-
SHA512
b4c0c326df9041dfb7bae35e10041d20cacd0ffb3e12929a0e6defa4d3c520d1d723c1e27414ef4e93cec35d33ecc70feabbb4cd32fd127cc289d48fc2249f63
-
SSDEEP
12288:sn2vDglzhVMwfdld7xDnAwMVY7yZDySrjWAYeVW:S0DglzhV/fjRSuywS2AYeV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 800b705147ca8414d78b21da918fea6b232d362a7026fb384d808cacc84f70f8
Files
-
800b705147ca8414d78b21da918fea6b232d362a7026fb384d808cacc84f70f8.exe windows:5 windows x86 arch:x86
8145bccbc1cedba1d2e3404c966f3af4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
cifx32dll
ord70
ord71
ord1
ord40
ord50
ord53
ord55
ord41
ord2
ord61
ord62
kernel32
GetEnvironmentStringsW
CompareStringW
CompareStringA
GetTimeZoneInformation
SetStdHandle
GetLocaleInfoW
SetFilePointer
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoA
GetDateFormatA
Sleep
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetCommandLineA
IsDebuggerPresent
RaiseException
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
GetProcAddress
LoadLibraryA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
CreateFileA
CloseHandle
GetModuleFileNameW
HeapValidate
IsBadReadPtr
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleHandleW
InterlockedIncrement
InterlockedDecrement
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetLastError
SetEnvironmentVariableA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
HeapDestroy
HeapCreate
HeapFree
VirtualFree
WriteFile
HeapAlloc
GetProcessHeap
VirtualQuery
FreeLibrary
InitializeCriticalSectionAndSpinCount
RtlUnwind
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
OutputDebugStringA
OutputDebugStringW
SetConsoleCtrlHandler
LoadLibraryW
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
HeapSize
HeapReAlloc
VirtualAlloc
InterlockedExchange
FlushFileBuffers
GetConsoleCP
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
Sections
.textbss Size: - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 363KB - Virtual size: 362KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ