D:\Tools\agent\workspace\MicroMsgWindowsV3911\out\x86\Release\bin\WeChat.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7e8acf3b97cd7b728c4b6321712eddbcb234cf70d4bf93118c9c5650bfb07e13.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
7e8acf3b97cd7b728c4b6321712eddbcb234cf70d4bf93118c9c5650bfb07e13.exe
Resource
win10v2004-20240611-en
General
-
Target
7e8acf3b97cd7b728c4b6321712eddbcb234cf70d4bf93118c9c5650bfb07e13
-
Size
605KB
-
MD5
647925d7102e06896bfe4cc3e92158f2
-
SHA1
3c44c32ebbe44e28e41f0fb1e71fb55c0a64d75f
-
SHA256
7e8acf3b97cd7b728c4b6321712eddbcb234cf70d4bf93118c9c5650bfb07e13
-
SHA512
dde38f51caa1ed78292f2a8a8f418d9b09fd90878ff74e88e283c0cf41ce9485201ef7e5a5b517f06d61c9879ce8089a0e750f9680fe495f4516b5ae54a95dce
-
SSDEEP
6144:YPFQkK2pr+wGZj7Nf+z0EmjfgH29PRA1Ty:6FQL2J+wG1NfVs1Ty
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7e8acf3b97cd7b728c4b6321712eddbcb234cf70d4bf93118c9c5650bfb07e13
Files
-
7e8acf3b97cd7b728c4b6321712eddbcb234cf70d4bf93118c9c5650bfb07e13.exe windows:6 windows x86 arch:x86
ae5f146ec42057cadf8014d89ea67430
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleHandleA
GetModuleHandleW
LoadLibraryExW
GetSystemDirectoryW
GetLastError
LoadLibraryW
FreeLibrary
LocalAlloc
LocalFree
GetFileAttributesW
FindFirstFileW
FindNextFileW
FindClose
GetModuleFileNameW
GetCurrentProcess
TerminateProcess
Sleep
VerifyVersionInfoW
SetDllDirectoryW
GetShortPathNameW
GetPrivateProfileStringW
CreateFileW
DecodePointer
HeapReAlloc
HeapSize
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
VerSetConditionMask
GetProcAddress
GetVersionExW
CloseHandle
GetSystemInfo
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
SetFilePointerEx
LCMapStringW
WaitForSingleObjectEx
GetCurrentThreadId
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
RtlUnwind
RaiseException
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
WriteFile
HeapFree
HeapAlloc
GetFileType
WriteConsoleW
user32
GetSystemMetrics
MessageBoxW
FindWindowW
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHCreateDirectoryExW
ShellExecuteW
ole32
CoTaskMemFree
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
gdiplus
GdiplusStartup
GdiplusShutdown
GdipGetGenericFontFamilySansSerif
shlwapi
PathFileExistsW
PathRemoveFileSpecW
Sections
.text Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 418KB - Virtual size: 418KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.zero Size: 4KB - Virtual size: 3KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ