D:\reversing\cheats\aimware\mapper\x64\Release\aimware.pdb
Static task
static1
Behavioral task
behavioral1
Sample
aimware/aimware.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aimware/aimware.dll
Resource
win10v2004-20240226-en
General
-
Target
276e84d44d0722ba9a4552077a2db6b2.bin
-
Size
4.5MB
-
MD5
276e84d44d0722ba9a4552077a2db6b2
-
SHA1
044a2bad13db951e537d1ada7ae7e3c03dbc21d4
-
SHA256
7d5ce3b6254a34bc707ea3f4645e3264353b35390f4fcd89223a12e02cff112b
-
SHA512
bab33474bc890c177ccf2eea344064ecf1e987744fbfcd8dd6824f328474179067bbb1b95d7b36955842ae6c682e72f000f0f33cf6bd9e7a1d8211add0fdd4a9
-
SSDEEP
98304:NhhiRF+PUhr/I0d0SgAiBMPStNv2hmVHKjBhd0bVjafnBs8f:NhhiRFHIagAiePvqHKjBD0b9y3f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/aimware/aimware.dll
Files
-
276e84d44d0722ba9a4552077a2db6b2.bin.rar
-
aimware/aimware.dll.dll windows:6 windows x64 arch:x64
61af00276720e6b45d7322d097d5417f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
SizeofResource
SetConsoleTitleA
VirtualAlloc
FindResourceA
GetModuleHandleA
Sleep
LoadLibraryA
LockResource
CreateThread
LoadResource
AddVectoredExceptionHandler
GetProcAddress
AllocConsole
HeapCreate
VirtualProtect
HeapFree
GetCurrentProcess
Thread32Next
Thread32First
GetCurrentThreadId
SuspendThread
ResumeThread
CreateToolhelp32Snapshot
HeapReAlloc
CloseHandle
HeapAlloc
GetThreadContext
GetCurrentProcessId
GetModuleHandleW
FlushInstructionCache
SetThreadContext
OpenThread
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
msvcp140
?_Xlength_error@std@@YAXPEBD@Z
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memcpy
__std_exception_destroy
__std_exception_copy
__std_terminate
__current_exception
__current_exception_context
__C_specific_handler
__std_type_info_destroy_list
_CxxThrowException
memset
memmove
api-ms-win-crt-heap-l1-1-0
free
_callnewh
malloc
api-ms-win-crt-stdio-l1-1-0
freopen_s
__stdio_common_vfprintf
__acrt_iob_func
api-ms-win-crt-convert-l1-1-0
strtoul
api-ms-win-crt-runtime-l1-1-0
_seh_filter_dll
terminate
_register_onexit_function
_execute_onexit_table
_configure_narrow_argv
_initialize_onexit_table
_invalid_parameter_noinfo_noreturn
_initterm_e
_initterm
_cexit
_initialize_narrow_environment
_crt_atexit
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.),q Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 288B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
aimware/readme.txt