D:\a\StyLua\StyLua\output\x86_64-pc-windows-msvc\release\deps\stylua.pdb
Static task
static1
Behavioral task
behavioral1
Sample
stylua.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
stylua.exe
Resource
win10v2004-20231215-en
General
-
Target
stylua.exe
-
Size
7.5MB
-
MD5
6fb174cb1d60904d08efc534801d60d3
-
SHA1
2fccd5a8ef2ab1529a468acdfb440e50afcd37b1
-
SHA256
44614118350e2c616000012b7b5e5f478e7ce2a63b822f8647d12eeb5aae2dfb
-
SHA512
b9e78b5ca3d8a5190cbc9654cd779235cd593506bd2a52e1cd2b1d3292508ef472dcbf3f4810e4848802d872d2e1d22231c595e10653e23c53a840191d8622ca
-
SSDEEP
98304:d6BOpBtdcGnJQfuN8w1uQYbj+JlaIH9lWyAF9:d6BuXqNQa+l9lrA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource stylua.exe
Files
-
stylua.exe.exe windows:6 windows x64 arch:x64
Password: infected
f26190cbdc5320d31b1abe40815c1730
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
SetFilePointerEx
GetEnvironmentVariableW
GetConsoleScreenBufferInfo
GetStdHandle
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
DeleteCriticalSection
TerminateProcess
WakeAllConditionVariable
QueryPerformanceFrequency
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
AcquireSRWLockShared
ReleaseMutex
GetModuleHandleA
GetProcAddress
FindNextFileW
FindClose
CreateFileW
EncodePointer
GetFileInformationByHandle
FindFirstFileW
GetCurrentDirectoryW
GetFinalPathNameByHandleW
GetCommandLineW
ReleaseSRWLockExclusive
RaiseException
GetModuleHandleW
FormatMessageW
GetModuleFileNameW
ExitProcess
GetFullPathNameW
ReleaseSRWLockShared
GetSystemInfo
MultiByteToWideChar
WriteConsoleW
WideCharToMultiByte
ReadConsoleW
CreateThread
GetCurrentThread
GetSystemTimeAsFileTime
RtlPcToFileHeader
RtlUnwindEx
IsProcessorFeaturePresent
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetCurrentThreadId
TryAcquireSRWLockExclusive
SetLastError
GetConsoleMode
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlCaptureContext
QueryPerformanceCounter
Sleep
WaitForSingleObject
SetWaitableTimer
CreateWaitableTimerExW
SwitchToThread
SetThreadStackGuarantee
AddVectoredExceptionHandler
GetLastError
SetConsoleMode
SleepConditionVariableSRW
AcquireSRWLockExclusive
SetConsoleTextAttribute
GetFileInformationByHandleEx
CloseHandle
GetCurrentProcess
advapi32
SystemFunction036
OpenProcessToken
userenv
GetUserProfileDirectoryW
ntdll
NtReadFile
RtlNtStatusToDosError
NtWriteFile
bcrypt
BCryptGenRandom
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-string-l1-1-0
strcpy_s
wcsncmp
api-ms-win-crt-runtime-l1-1-0
_crt_atexit
_register_onexit_function
_initialize_onexit_table
terminate
_register_thread_local_exe_atexit_callback
_c_exit
_cexit
__p___argv
abort
_seh_filter_exe
_exit
exit
_initterm_e
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
__p___argc
_set_app_type
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
calloc
free
_set_new_mode
malloc
Sections
.text Size: 5.5MB - Virtual size: 5.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 278KB - Virtual size: 278KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ