C:\Users\Bammy\Desktop\PWare\build\Developer\1.pdb
Static task
static1
General
-
Target
Axion.dll
-
Size
7.3MB
-
MD5
859e1b689f230c43fc7831d3fb21ea97
-
SHA1
9ea60dbefb7b30274a029181d0209440a6d1b440
-
SHA256
f05d3bdad550ab7f298ffd91c6a214c87755f1fde9fafb88a111e12d9a2c1aec
-
SHA512
f45c25df4e75de7178646707883285a384a48386332fda880d177da9f8b23f7125726d07c742bfa65e6aaba1ed50401b5fe27a3ceb6eb68fab50275cd7b71c71
-
SSDEEP
49152:Yv4QCQlty2QBCYql2sTeKQi4XvJzl/StlnMg8D9vSP3Kvz3gqeWvtAzlunvh/qNl:sO9/Xj/PD9aPMBSG/lgQ/6S+ttYzPc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Axion.dll
Files
-
Axion.dll.dll windows:6 windows x64 arch:x64
6df235e2b72f9b6e5a5b027034f32966
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
winmm
PlaySoundA
kernel32
FreeLibrary
GetModuleHandleA
GetProcAddress
LoadLibraryA
GetSystemInfo
VirtualAlloc
VirtualFree
VirtualQuery
CloseHandle
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
Sleep
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
OpenThread
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualProtect
GetModuleHandleW
CreateToolhelp32Snapshot
Thread32First
Thread32Next
CreateDirectoryW
GetLastError
CreateThread
FreeLibraryAndExitThread
CreateFileW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetFileSize
ReadFile
SetEndOfFile
SetFilePointer
WriteFile
K32GetModuleInformation
GetCommandLineW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
MultiByteToWideChar
GetConsoleWindow
QueryPerformanceFrequency
AllocConsole
FreeConsole
WriteConsoleA
SetConsoleTextAttribute
SetConsoleTitleW
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
HeapQueryInformation
GetTimeZoneInformation
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetCurrentThread
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
SetConsoleCtrlHandler
OutputDebugStringW
ExitProcess
HeapValidate
HeapSize
WriteConsoleW
GlobalFree
GlobalLock
GlobalUnlock
GlobalAlloc
SetEnvironmentVariableW
GetModuleHandleExW
GetFileType
GetStdHandle
TlsFree
QueryPerformanceCounter
VerSetConditionMask
GetTickCount
SetStdHandle
WideCharToMultiByte
FreeEnvironmentStringsW
TryAcquireSRWLockExclusive
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
FormatMessageA
InitializeCriticalSectionEx
DeleteCriticalSection
LocalFree
GetLocaleInfoEx
EncodePointer
DecodePointer
SetFileInformationByHandle
GetTempPathW
InitOnceExecuteOnce
CreateEventExW
CreateSemaphoreExW
FlushProcessWriteBuffers
GetCurrentProcessorNumber
GetSystemTimeAsFileTime
GetTickCount64
FreeLibraryWhenCallbackReturns
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
GetFileInformationByHandleEx
CreateSymbolicLinkW
LCMapStringEx
GetStringTypeW
CompareStringEx
GetCPInfo
IsDebuggerPresent
RaiseException
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
GetModuleFileNameW
LoadLibraryExW
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
RtlUnwind
user32
SetClipboardData
GetClipboardData
CloseClipboard
OpenClipboard
SetCursorPos
GetAsyncKeyState
PostMessageW
GetWindow
EnumWindows
SetWindowLongPtrW
IsWindowVisible
CallWindowProcW
SetProcessDPIAware
MonitorFromWindow
LoadCursorA
ScreenToClient
ClientToScreen
SetCursor
GetDC
GetClientRect
ReleaseDC
GetForegroundWindow
IsWindowUnicode
ReleaseCapture
SetCapture
GetCapture
GetKeyState
GetMessageExtraInfo
TrackMouseEvent
GetCursorPos
EmptyClipboard
gdi32
DeleteObject
CreateRectRgn
GetPixel
GetDeviceCaps
shell32
SHGetKnownFolderPath
ole32
CoTaskMemFree
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
ImmSetCandidateWindow
d3dcompiler_47
D3DCompile
dwmapi
DwmEnableBlurBehindWindow
DwmGetColorizationColor
DwmIsCompositionEnabled
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 711KB - Virtual size: 751KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ