C:\_work\wechat-windows-sub\Release\WechatBrowser.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f1d68cea2d7f968b5f39612de9840eef7f4d3fbba2a521f8246b4390ced78143.exe
Resource
win7-20240221-en
General
-
Target
f1d68cea2d7f968b5f39612de9840eef7f4d3fbba2a521f8246b4390ced78143
-
Size
1.2MB
-
MD5
aa65e392e86c10fb9cc3bc038d2701ff
-
SHA1
d88d1fc0a1214490c1e77ed42b8e605405379e6a
-
SHA256
f1d68cea2d7f968b5f39612de9840eef7f4d3fbba2a521f8246b4390ced78143
-
SHA512
e17a3f4084a09a1b3d63eecf9edf0cc721a22d025532ca0d339d59d4f7c4e0ed180fd43f817f5ef1ac492a0a515b1a7388da4528f4a7d619bf936887a090066f
-
SSDEEP
12288:hq+e48dJWBKlUgF1J0stz9o4D1DeDecOMehHgSDv0e9+nK+kOFHZa4fG24:hqh4AXlU61JTw4DteDNehK5ai4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f1d68cea2d7f968b5f39612de9840eef7f4d3fbba2a521f8246b4390ced78143
Files
-
f1d68cea2d7f968b5f39612de9840eef7f4d3fbba2a521f8246b4390ced78143.exe windows:6 windows x86 arch:x86
45b28e24916f7e7b4e42369bb7ceabbf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetHandleInformation
DeleteProcThreadAttributeList
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
UnregisterWaitEx
AssignProcessToJobObject
WriteProcessMemory
CreateFileMappingW
MapViewOfFile
GetCurrentProcessorNumber
SetThreadAffinityMask
VirtualFree
GetProcessHandleCount
GetProcessHeaps
SignalObjectAndWait
ExpandEnvironmentStringsW
GetFileAttributesW
QueryDosDeviceW
GetLongPathNameW
CreateFileW
VirtualProtectEx
VirtualFreeEx
ReadProcessMemory
GetCurrentDirectoryW
GetLocalTime
OutputDebugStringA
WriteFile
FormatMessageA
LoadLibraryExW
FreeLibrary
GetModuleHandleExW
ReleaseSRWLockExclusive
GetSystemTimeAsFileTime
QueryPerformanceFrequency
QueryPerformanceCounter
QueryThreadCycleTime
CreateNamedPipeW
CreateProcessW
CreateRemoteThread
CreateJobObjectW
HeapCreate
CreateMutexW
UnmapViewOfFile
GetCommandLineW
ReadFile
SetCurrentDirectoryW
TlsGetValue
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
GetProcessTimes
SearchPathW
lstrlenW
DebugBreak
GetFileType
HeapFree
HeapReAlloc
HeapSize
SetFilePointerEx
GetFileSizeEx
FlushFileBuffers
FindClose
FindNextFileW
FindFirstFileExW
SetUnhandledExceptionFilter
RtlCaptureStackBackTrace
TlsAlloc
TlsFree
TlsSetValue
VirtualQuery
WideCharToMultiByte
K32QueryWorkingSetEx
SetEnvironmentVariableW
SwitchToThread
InitOnceExecuteOnce
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
ReadConsoleW
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetStdHandle
SetStdHandle
ExitProcess
GetConsoleMode
GetConsoleOutputCP
RtlUnwind
GetStartupInfoW
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
GetCPInfo
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetThreadPriority
SetThreadPriority
GetThreadId
CloseHandle
RaiseException
GetModuleHandleW
IsDebuggerPresent
Sleep
ProcessIdToSessionId
GetCurrentProcessId
LocalFree
IsWow64Process
GetNativeSystemInfo
GetProductInfo
GetVersionExW
GetTickCount
HeapDestroy
EnumSystemLocalesEx
GetUserDefaultLocaleName
GetUserDefaultLCID
GetUserDefaultLangID
TerminateProcess
GetCurrentThreadId
SetInformationJobObject
DuplicateHandle
WaitForSingleObject
PostQueuedCompletionStatus
TerminateJobObject
RegisterWaitForSingleObject
UnregisterWait
SetEvent
GetQueuedCompletionStatus
ResetEvent
SetLastError
CreateThread
CreateEventW
CreateIoCompletionPort
VirtualAllocEx
VirtualQueryEx
GetCurrentThread
GetCurrentProcess
SetProcessDEPPolicy
HeapSetInformation
GetLastError
GetModuleHandleA
GetProcAddress
LoadLibraryW
HeapAlloc
GetModuleFileNameW
GetStringTypeW
LCMapStringEx
MultiByteToWideChar
DecodePointer
EncodePointer
InitializeCriticalSectionEx
WriteConsoleW
user32
CreateDesktopW
SetProcessWindowStation
CreateWindowStationW
GetProcessWindowStation
CloseDesktop
CloseWindowStation
GetThreadDesktop
GetUserObjectInformationW
advapi32
EventWriteTransfer
EventUnregister
EventRegister
SetEntriesInAclW
GetSecurityInfo
GetSidSubAuthority
InitializeSid
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
DuplicateToken
CreateRestrictedToken
RegQueryValueExW
RegCreateKeyExW
SetThreadToken
GetTokenInformation
CreateProcessAsUserW
AccessCheck
EqualSid
IsValidSid
GetNamedSecurityInfoW
MapGenericMask
ImpersonateLoggedOnUser
FreeSid
SystemFunction036
ConvertSidToStringSidW
DuplicateTokenEx
GetKernelObjectSecurity
SetKernelObjectSecurity
GetAce
OpenProcessToken
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegCloseKey
RegOpenKeyExW
RegDisablePredefinedCache
RevertToSelf
ole32
CoTaskMemFree
shlwapi
PathRemoveFileSpecW
PathAppendW
winmm
timeGetTime
Exports
Exports
GetHandleVerifier
IsSandboxedProcess
Sections
.text Size: 534KB - Virtual size: 534KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 169KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 415KB - Virtual size: 414KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE