C:\Tabs3\_work\5\s\Release\stweb\stweb.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7b745a52419d8423f4ed7d3d947122ec0ea38a24a61efe1f2434daa4c404fdca.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7b745a52419d8423f4ed7d3d947122ec0ea38a24a61efe1f2434daa4c404fdca.exe
Resource
win10v2004-20240802-en
General
-
Target
7b745a52419d8423f4ed7d3d947122ec0ea38a24a61efe1f2434daa4c404fdca
-
Size
478KB
-
MD5
edeacf36f381793a97ff5a460b73a8da
-
SHA1
7039edd4c343973fa53da053f7f808309b784a2e
-
SHA256
7b745a52419d8423f4ed7d3d947122ec0ea38a24a61efe1f2434daa4c404fdca
-
SHA512
d251023903a952906b037af1c07336c29a2ed1589f7921fe0c4fd59d22382b670d4605396d2da1ac59ef7fe4b8b5bac9c04182561423ea56658ae6b21dbeb53b
-
SSDEEP
6144:fBQAHZl66Hsbv0ixWPli7E1sk2ipkkkgVI:fBUbvH7eVI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7b745a52419d8423f4ed7d3d947122ec0ea38a24a61efe1f2434daa4c404fdca
Files
-
7b745a52419d8423f4ed7d3d947122ec0ea38a24a61efe1f2434daa4c404fdca.exe windows:6 windows x86 arch:x86
9299688673e2917c1bf6562de44e20a9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcp140
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEPAV12@PAD_J@Z
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEXABVlocale@2@@Z
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEPADXZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z
?_Xlength_error@std@@YAXPBD@Z
kernel32
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SetLastError
GetModuleHandleW
vcruntime140
_purecall
__CxxFrameHandler3
__std_terminate
memcpy
memmove
memset
__std_exception_copy
__std_exception_destroy
_CxxThrowException
_except_handler4_common
api-ms-win-crt-runtime-l1-1-0
_initterm
_initterm_e
exit
_exit
_get_wide_winmain_command_line
_initialize_wide_environment
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_set_app_type
_seh_filter_exe
_invalid_parameter_noinfo_noreturn
terminate
_configure_wide_argv
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_controlfp_s
api-ms-win-crt-heap-l1-1-0
free
_callnewh
malloc
_set_new_mode
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
libcef
cef_string_utf16_set
cef_string_utf16_clear
cef_string_userfree_utf16_free
cef_string_list_alloc
cef_string_list_free
cef_execute_process
cef_api_hash
cef_string_map_alloc
cef_string_map_free
cef_string_utf16_cmp
cef_string_list_size
cef_string_list_value
cef_string_list_append
cef_string_map_size
cef_string_map_key
cef_string_map_value
cef_string_map_append
cef_string_multimap_size
cef_string_multimap_key
cef_string_multimap_value
cef_string_multimap_append
cef_string_multimap_alloc
cef_string_multimap_free
cef_log
Sections
.text Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 285KB - Virtual size: 285KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ