C:\assemblage_aaai_code\Builds\2403685672888085105pikiobdaga\assemblage_outdir_bin\csgo-cheat.pdb
Static task
static1
Behavioral task
behavioral1
Sample
90bc642c44ef7de312374f5fe707be9fb2fe704829d0ce0d3e1269cb20ed525f.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
90bc642c44ef7de312374f5fe707be9fb2fe704829d0ce0d3e1269cb20ed525f.dll
Resource
win10v2004-20240802-en
General
-
Target
90bc642c44ef7de312374f5fe707be9fb2fe704829d0ce0d3e1269cb20ed525f
-
Size
3.3MB
-
MD5
45241d9ca52f6a200343b044b54377b6
-
SHA1
6e3f3f9fb8da748e0af98161e3ace6d3c8611595
-
SHA256
90bc642c44ef7de312374f5fe707be9fb2fe704829d0ce0d3e1269cb20ed525f
-
SHA512
fcb591356a462bf1f480cbe1ff2417a8f2d5bb310506a753033a927ed011c566c6ef53ab28989e604c269edb702b0dc2eb94b3438abeec5a13e064bafeab2cb6
-
SSDEEP
49152:HndyNsKbUAt5egVK4VE3uX6LuQ/nUgrSe4al+M9Q3rWv54OvBg2gxxx7bA:H0NLbUAt5egVK423uKR/9llY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 90bc642c44ef7de312374f5fe707be9fb2fe704829d0ce0d3e1269cb20ed525f
Files
-
90bc642c44ef7de312374f5fe707be9fb2fe704829d0ce0d3e1269cb20ed525f.dll windows:6 windows x86 arch:x86
0fac9596789a6a1c186ad6dca435191a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
VerSetConditionMask
QueryPerformanceCounter
QueryPerformanceFrequency
GetProcAddress
LoadLibraryA
VerifyVersionInfoW
VirtualAlloc
VirtualFree
VirtualQuery
CloseHandle
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
Sleep
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
OpenThread
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualProtect
GetModuleHandleW
CreateToolhelp32Snapshot
Thread32First
Thread32Next
GetModuleHandleA
AllocConsole
WideCharToMultiByte
SetConsoleTitleA
CreateThread
DisableThreadLibraryCalls
FreeLibraryAndExitThread
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
HeapQueryInformation
HeapSize
GetFileSizeEx
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
SetConsoleCtrlHandler
OutputDebugStringW
WriteFile
GetCurrentThread
ExitProcess
ExitThread
MultiByteToWideChar
GlobalFree
GlobalLock
GlobalUnlock
FreeConsole
GlobalAlloc
MoveFileExW
DeleteFileW
RemoveDirectoryW
LocalFree
FormatMessageA
CreateDirectoryW
CreateFileW
FindClose
FindFirstFileExW
FindNextFileW
GetDiskFreeSpaceExW
GetFileAttributesExW
GetFileInformationByHandle
SetEndOfFile
SetFileAttributesW
SetFilePointerEx
SetFileTime
GetTempPathW
AreFileApisANSI
GetLastError
CopyFileW
CreateHardLinkW
CreateSymbolicLinkW
WaitForSingleObjectEx
SwitchToThread
GetExitCodeThread
GetNativeSystemInfo
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
SetFileInformationByHandle
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
InitOnceExecuteOnce
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
CreateEventExW
CreateSemaphoreExW
FlushProcessWriteBuffers
GetCurrentProcessorNumber
GetSystemTimeAsFileTime
GetTickCount64
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
GetFileInformationByHandleEx
TryEnterCriticalSection
GetLocaleInfoEx
GetStringTypeW
CompareStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
RaiseException
GetStartupInfoW
GetProcessHeap
FreeLibrary
InitializeSListHead
RtlUnwind
GetModuleFileNameW
LoadLibraryExW
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
GetStdHandle
GetFileType
WriteConsoleW
ReadFile
HeapValidate
GetSystemInfo
GetDriveTypeW
GetFullPathNameW
SetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
SetStdHandle
user32
GetAsyncKeyState
CallWindowProcA
MessageBoxA
SetProcessDPIAware
MonitorFromWindow
LoadCursorA
ScreenToClient
ClientToScreen
GetCursorPos
SetCursor
SetCursorPos
GetClientRect
ReleaseDC
GetDC
GetForegroundWindow
ReleaseCapture
SetCapture
GetCapture
GetKeyState
IsChild
EmptyClipboard
GetClipboardData
SetClipboardData
CloseClipboard
OpenClipboard
FindWindowA
SetWindowLongA
gdi32
GetDeviceCaps
imm32
ImmGetContext
ImmReleaseContext
ImmSetCompositionWindow
xinput1_4
ord4
ord2
Sections
.textbss Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 445KB - Virtual size: 445KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 265B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ