C:\Users\Dankor\Desktop\asphyixa\build\Debug\cstrike.pdb
Static task
static1
Behavioral task
behavioral1
Sample
asphyxia.dll
Resource
win11-20240802-en
General
-
Target
asphyxia.dll
-
Size
3.9MB
-
MD5
3665c47b206824a3bf475f7585a97498
-
SHA1
56859f4be103fa51ffaf2fe7add479ca8aa7c671
-
SHA256
c0e968c55cdcb09950d5c85eaae0b93dce0c6e3d2050cf2b19ddd7b51a53d9a3
-
SHA512
376abded0bb726147e7aa0294d4622a37c75d889b4ba21579c918da90cd65a39b57b3247b68e60ad9bcdf49ab2851a043941690a3934bc2333fe32657e12954c
-
SSDEEP
49152:cMoNgCYqZ+bNGRzRktwOgLt1ZMc81nJkVS4luLnVL:LmWgje
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource asphyxia.dll
Files
-
asphyxia.dll.dll windows:6 windows x64 arch:x64
6063bf29ffc1152321b546b24f3c7b8b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetProcAddress
LoadLibraryA
GetSystemInfo
VirtualAlloc
VirtualFree
VirtualQuery
CloseHandle
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
Sleep
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
OpenThread
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualProtect
GetModuleHandleW
CreateToolhelp32Snapshot
Thread32First
Thread32Next
CreateDirectoryW
GetLastError
CreateThread
DisableThreadLibraryCalls
FreeLibraryAndExitThread
CreateFileW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetFileSize
ReadFile
SetEndOfFile
SetFilePointer
WriteFile
GetCommandLineW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
GetModuleHandleA
SetStdHandle
AllocConsole
FreeConsole
WriteConsoleA
SetConsoleTextAttribute
SetConsoleTitleW
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
HeapQueryInformation
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetCurrentThread
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
IsThreadAFiber
FlsFree
GetStringTypeW
FlsSetValue
FlsGetValue
FlsAlloc
GetTempPathW
FreeLibrary
QueryPerformanceFrequency
QueryPerformanceCounter
VerSetConditionMask
SetConsoleCtrlHandler
OutputDebugStringW
HeapValidate
HeapSize
WideCharToMultiByte
MultiByteToWideChar
GlobalFree
GlobalUnlock
GlobalLock
GetConsoleWindow
GlobalAlloc
ExitProcess
WriteConsoleW
GetModuleHandleExW
GetFileType
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
WakeAllConditionVariable
SleepConditionVariableSRW
IsDebuggerPresent
RaiseException
GetStartupInfoW
GetSystemTimeAsFileTime
InitializeSListHead
InitializeCriticalSectionEx
DeleteCriticalSection
RtlUnwindEx
GetModuleFileNameW
LoadLibraryExW
InterlockedPushEntrySList
InterlockedFlushSList
RtlPcToFileHeader
RtlUnwind
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
GetStdHandle
user32
SetClipboardData
GetClipboardData
CloseClipboard
OpenClipboard
GetCursorPos
EmptyClipboard
PostMessageW
GetWindow
GetWindowThreadProcessId
SetWindowLongPtrW
IsWindowVisible
CallWindowProcW
SetProcessDPIAware
MonitorFromWindow
LoadCursorW
ScreenToClient
ClientToScreen
EnumWindows
SetCursor
SetCursorPos
GetClientRect
ReleaseDC
GetDC
GetForegroundWindow
IsWindowUnicode
ReleaseCapture
SetCapture
GetCapture
GetKeyState
GetMessageExtraInfo
TrackMouseEvent
gdi32
DeleteObject
GetDeviceCaps
CreateRectRgn
shell32
SHGetKnownFolderPath
ole32
CoTaskMemFree
imm32
ImmGetContext
ImmReleaseContext
ImmSetCompositionWindow
ImmSetCandidateWindow
d3dcompiler_47
D3DCompile
dwmapi
DwmGetColorizationColor
DwmEnableBlurBehindWindow
DwmIsCompositionEnabled
Sections
.text Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 989KB - Virtual size: 988KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fptable Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ