corrEngine.pdb
Static task
static1
Behavioral task
behavioral1
Sample
correngine.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
correngine.dll
Resource
win10v2004-20240426-en
General
-
Target
correngine.dll
-
Size
85KB
-
MD5
f29679c52956722c9a9c880fe7f6b68d
-
SHA1
9c292e87148255055747c018572e4085c98b2e2f
-
SHA256
b03dd372f5dbede4c85e2d0686e6fd793130372fed6f9d213702544e2668e7de
-
SHA512
0108b7b6cabb202cb6bf1e441da21c81f43e092d8120946bfa8493fd72f6655128c7f32970bd8b3dcfb148cdac13f0d40beb1766b7af46e65a6f4d9f0897ad5f
-
SSDEEP
1536:QuQMux0imVorwtvEnb7yY7Ln3acz1QbdGO6kzf0caW+W1poQfdz+GQJuIXkzUqh2:Qmua+rlnb7NnKxlhaWTrQYIXfDYuF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource correngine.dll
Files
-
correngine.dll.dll regsvr32 windows:6 windows x64 arch:x64
4ca1764f5696ec91ae4f1c0a7f06793c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
__C_specific_handler
memcmp
__CxxFrameHandler3
_XcptFilter
memset
_initterm
vswprintf_s
calloc
?terminate@@YAXXZ
_lock
_unlock
__dllonexit
_onexit
??1type_info@@UEAA@XZ
_errno
??3@YAXPEAX@Z
realloc
_CxxThrowException
_amsg_exit
_ltow_s
wcstoul
_vscwprintf
memmove_s
??2@YAPEAX_K@Z
memcpy_s
_purecall
malloc
??_U@YAPEAX_K@Z
wcscpy_s
wcscat_s
??_V@YAXPEAX@Z
free
wcsncpy_s
bsearch_s
memcpy
kernel32
Sleep
OutputDebugStringA
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
LoadLibraryExW
GetModuleHandleW
InitializeCriticalSection
LeaveCriticalSection
GetModuleFileNameW
RaiseException
SetThreadLocale
GetLastError
GetThreadLocale
GetProcAddress
EnterCriticalSection
DisableThreadLibraryCalls
DeleteCriticalSection
FindResourceExW
FreeLibrary
LoadResource
SizeofResource
MultiByteToWideChar
lstrcmpiW
LockResource
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
user32
UnregisterClassA
CharNextW
ole32
CoCreateInstance
StringFromGUID2
CoTaskMemRealloc
CLSIDFromString
CoTaskMemFree
CoTaskMemAlloc
oleaut32
RegisterTypeLi
LoadRegTypeLi
VarUI4FromStr
SysFreeString
SysAllocString
UnRegisterTypeLi
LoadTypeLi
SysStringLen
shlwapi
HashData
advapi32
RegEnumKeyExW
TraceEvent
EventRegister
EventUnregister
StartTraceW
RegEnumValueW
RegQueryValueExW
RegSetValueExW
CloseTrace
RegDeleteValueW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegQueryInfoKeyW
ControlTraceW
OpenTraceW
ProcessTrace
wevtapi
EvtNext
EvtQuery
EvtRender
EvtCreateRenderContext
EvtClose
rpcrt4
UuidCreateSequential
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 372B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ