C:\Users\Bammy\Desktop\PWare\build\Developer\1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
axion/axion.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
axion/axion.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
axion/injector.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
axion/injector.exe
Resource
win10v2004-20240802-en
General
-
Target
axion.zip
-
Size
2.7MB
-
MD5
7ac11920c629d46a61a2836799aae962
-
SHA1
c77c00cd9892c0040424e50c8559c815fd26a9c9
-
SHA256
d690d23996aacbb53f3c9cc411b00fd8ad071ce57d0184607c09c0a0cd40d6b6
-
SHA512
8660c893b5c3fd4d7700fe112f0a9d39564e5c8f658771b01b76a57af33db8e18b5abe3c54783e8c4d38ec3f1a5328c619c8ab1bd5deef672d69638bd134fc09
-
SSDEEP
49152:y8nsi9yTKZzscmHKwFSKV5E1IiGD7e3JGCO6Nq/7qc0bSH:yAsBKKvjHXig0Jefe3OH
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/axion/axion.dll unpack001/axion/injector.exe
Files
-
axion.zip.zip
-
axion/README.txt
-
axion/axion.dll.dll windows:6 windows x64 arch:x64
6df235e2b72f9b6e5a5b027034f32966
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
winmm
PlaySoundA
kernel32
FreeLibrary
GetModuleHandleA
GetProcAddress
LoadLibraryA
GetSystemInfo
VirtualAlloc
VirtualFree
VirtualQuery
CloseHandle
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
Sleep
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
OpenThread
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualProtect
GetModuleHandleW
CreateToolhelp32Snapshot
Thread32First
Thread32Next
CreateDirectoryW
GetLastError
CreateThread
FreeLibraryAndExitThread
CreateFileW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetFileSize
ReadFile
SetEndOfFile
SetFilePointer
WriteFile
K32GetModuleInformation
GetCommandLineW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
MultiByteToWideChar
GetConsoleWindow
QueryPerformanceFrequency
AllocConsole
FreeConsole
WriteConsoleA
SetConsoleTextAttribute
SetConsoleTitleW
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
HeapQueryInformation
GetTimeZoneInformation
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetCurrentThread
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
SetConsoleCtrlHandler
OutputDebugStringW
ExitProcess
HeapValidate
HeapSize
WriteConsoleW
GlobalFree
GlobalLock
GlobalUnlock
GlobalAlloc
SetEnvironmentVariableW
GetModuleHandleExW
GetFileType
GetStdHandle
TlsFree
QueryPerformanceCounter
VerSetConditionMask
GetTickCount
SetStdHandle
WideCharToMultiByte
FreeEnvironmentStringsW
TryAcquireSRWLockExclusive
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
FormatMessageA
InitializeCriticalSectionEx
DeleteCriticalSection
LocalFree
GetLocaleInfoEx
EncodePointer
DecodePointer
SetFileInformationByHandle
GetTempPathW
InitOnceExecuteOnce
CreateEventExW
CreateSemaphoreExW
FlushProcessWriteBuffers
GetCurrentProcessorNumber
GetSystemTimeAsFileTime
GetTickCount64
FreeLibraryWhenCallbackReturns
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
GetFileInformationByHandleEx
CreateSymbolicLinkW
LCMapStringEx
GetStringTypeW
CompareStringEx
GetCPInfo
IsDebuggerPresent
RaiseException
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
GetModuleFileNameW
LoadLibraryExW
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
RtlUnwind
user32
SetClipboardData
GetClipboardData
CloseClipboard
OpenClipboard
SetCursorPos
GetAsyncKeyState
PostMessageW
GetWindow
EnumWindows
SetWindowLongPtrW
IsWindowVisible
CallWindowProcW
SetProcessDPIAware
MonitorFromWindow
LoadCursorA
ScreenToClient
ClientToScreen
SetCursor
GetDC
GetClientRect
ReleaseDC
GetForegroundWindow
IsWindowUnicode
ReleaseCapture
SetCapture
GetCapture
GetKeyState
GetMessageExtraInfo
TrackMouseEvent
GetCursorPos
EmptyClipboard
gdi32
DeleteObject
CreateRectRgn
GetPixel
GetDeviceCaps
shell32
SHGetKnownFolderPath
ole32
CoTaskMemFree
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
ImmSetCandidateWindow
d3dcompiler_47
D3DCompile
dwmapi
DwmEnableBlurBehindWindow
DwmGetColorizationColor
DwmIsCompositionEnabled
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 711KB - Virtual size: 751KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
axion/injector.exe.exe windows:6 windows x64 arch:x64
4f6e44dfa58da7301f4ef856caa4ced9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
C:\Users\sixifyaccount\source\repos\CSGO2 Injector\x64\Release\CSGO2 Injector.pdb
Imports
kernel32
WriteProcessMemory
SetConsoleTitleA
Module32Next
GetFullPathNameA
OpenProcess
CreateToolhelp32Snapshot
Sleep
LoadLibraryA
CloseHandle
LoadLibraryW
GetProcAddress
VirtualAllocEx
CreateRemoteThread
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetModuleHandleW
RtlCaptureContext
user32
MessageBoxA
GetWindowThreadProcessId
FindWindowA
msvcp140
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z
?getloc@ios_base@std@@QEBA?AVlocale@2@XZ
?good@ios_base@std@@QEBA_NXZ
?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
??Bid@locale@std@@QEAA_KXZ
?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z
??1_Lockit@std@@QEAA@XZ
??0_Lockit@std@@QEAA@H@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?uncaught_exceptions@std@@YAHXZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
?id@?$ctype@D@std@@2V0locale@2@A
?_Xlength_error@std@@YAXPEBD@Z
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_exception_destroy
memcpy
__C_specific_handler
_CxxThrowException
__current_exception
__current_exception_context
__std_terminate
memset
__std_exception_copy
memmove
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_initterm_e
_exit
exit
_c_exit
_register_thread_local_exe_atexit_callback
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
terminate
_set_app_type
_seh_filter_exe
_cexit
__p___argv
__p___argc
_invalid_parameter_noinfo_noreturn
system
_initterm
api-ms-win-crt-stdio-l1-1-0
_set_fmode
fopen
__p__commode
fclose
api-ms-win-crt-heap-l1-1-0
_callnewh
malloc
free
_set_new_mode
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ