InitEngine
Static task
static1
Behavioral task
behavioral1
Sample
0c8177b131ac5c4a0dd6953c9741ad663a2af47e88f2aaae1b985d584a74db95.dll
Resource
win10v2004-20230621-en
General
-
Target
0c8177b131ac5c4a0dd6953c9741ad663a2af47e88f2aaae1b985d584a74db95
-
Size
152KB
-
MD5
0d2932c2ee5b8aca3939d38fa9f527d7
-
SHA1
36cc61ebf6c3e5c7595c3a5f0d84315ebf119662
-
SHA256
0c8177b131ac5c4a0dd6953c9741ad663a2af47e88f2aaae1b985d584a74db95
-
SHA512
8be46c0dca170b6514a840854293269f766e4b8fb1cfa01c92b64d5bc6c876dd4a591ba073f463cb2fb403c1bdc46522cebc9db15aa0065b3fc583891a093d0b
-
SSDEEP
3072:qMANjd+TEhOFburYo0MFhT/IN8o9vxz/1aSdbEAQNTBJ9PFyUd:n6QoAFih0MFhT/Bs/1aUbERNreM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c8177b131ac5c4a0dd6953c9741ad663a2af47e88f2aaae1b985d584a74db95
Files
-
0c8177b131ac5c4a0dd6953c9741ad663a2af47e88f2aaae1b985d584a74db95.dll windows x86
ac79b1861cf5da0c9d8ed6e84c90ec97
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord825
ord389
ord6059
ord3229
ord5204
ord5808
ord1988
ord690
ord5356
ord800
ord540
ord772
ord500
ord823
msvcrt
strstr
malloc
free
wcscat
time
localtime
strftime
vsprintf
sprintf
__CxxFrameHandler
sscanf
strncpy
strchr
srand
rand
atoi
strcspn
_except_handler3
_CxxThrowException
tolower
toupper
_mbsicmp
__dllonexit
_onexit
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
strrchr
_strcmpi
wcslen
kernel32
FreeLibrary
LocalAlloc
LocalFree
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetFileInformationByHandle
FileTimeToSystemTime
SystemTimeToFileTime
FormatMessageA
GetLocalTime
lstrcatA
DeviceIoControl
InterlockedIncrement
InterlockedExchange
CreateMutexA
ReleaseMutex
SetLastError
WinExec
GetSystemDirectoryA
GetLastError
MultiByteToWideChar
GlobalMemoryStatusEx
GetSystemDefaultUILanguage
GetVersionExA
GlobalAlloc
GlobalFree
VirtualQueryEx
ReadProcessMemory
CreateDirectoryA
WriteProcessMemory
GetSystemInfo
InterlockedDecrement
GetFileSize
ReadFile
lstrcpyA
LoadLibraryA
GetProcAddress
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetModuleFileNameA
GetCurrentProcess
WideCharToMultiByte
WaitForSingleObject
CreateThread
GetCurrentProcessId
TerminateProcess
OpenProcess
GetTickCount
MoveFileExA
DeleteFileA
Sleep
lstrlenA
RaiseException
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
msvcp60
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Exports
Exports
Sections
.text Size: - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.uver0 Size: - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.uver1 Size: 144KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ