D:\reversing\cheats\aimware\mapper\x64\Release\aimware.pdb
Static task
static1
Behavioral task
behavioral1
Sample
aimware.dll
Resource
win10-20240221-en
General
-
Target
aimware.dll
-
Size
6.6MB
-
MD5
ebae75ca2a9e24a53c538adb85037148
-
SHA1
a9b4773839f6adbc224afdf0da088c404aaae3a9
-
SHA256
a4bb79fd59c517c9d9b05123131e308cde211e7dcf210d2227e8943464234643
-
SHA512
e6eb4b84be878b3f84f4ff57f05d1a73129186b14d5403d7c3e7f911015a81dd753a95026f12f0fcca9d08070e894e7ecb50506fc0a8c7f4b727bfc46fbddf66
-
SSDEEP
98304:OW9fA9DaoSwP1M/1sJQVinJzHnj1cA9IND4VVLZ3hnIAtb:hMD72sJyinJzHnj2aIND4VVxhnIAh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aimware.dll
Files
-
aimware.dll.dll windows:6 windows x64 arch:x64
61af00276720e6b45d7322d097d5417f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
SizeofResource
SetConsoleTitleA
VirtualAlloc
FindResourceA
GetModuleHandleA
Sleep
LoadLibraryA
LockResource
CreateThread
LoadResource
AddVectoredExceptionHandler
GetProcAddress
AllocConsole
HeapCreate
VirtualProtect
HeapFree
GetCurrentProcess
Thread32Next
Thread32First
GetCurrentThreadId
SuspendThread
ResumeThread
CreateToolhelp32Snapshot
HeapReAlloc
CloseHandle
HeapAlloc
GetThreadContext
GetCurrentProcessId
GetModuleHandleW
FlushInstructionCache
SetThreadContext
OpenThread
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
msvcp140
?_Xlength_error@std@@YAXPEBD@Z
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memcpy
__std_exception_destroy
__std_exception_copy
__std_terminate
__current_exception
__current_exception_context
__C_specific_handler
__std_type_info_destroy_list
_CxxThrowException
memset
memmove
api-ms-win-crt-heap-l1-1-0
free
_callnewh
malloc
api-ms-win-crt-stdio-l1-1-0
freopen_s
__stdio_common_vfprintf
__acrt_iob_func
api-ms-win-crt-convert-l1-1-0
strtoul
api-ms-win-crt-runtime-l1-1-0
_seh_filter_dll
terminate
_register_onexit_function
_execute_onexit_table
_configure_narrow_argv
_initialize_onexit_table
_invalid_parameter_noinfo_noreturn
_initterm_e
_initterm
_cexit
_initialize_narrow_environment
_crt_atexit
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.),q Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 288B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ