F:\wechat_third_party\wechat-subproject\WeChatSpt\x64\Release\WeChatSpt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1cbd117252d8dd707efcfcca71db2cc6df877b5628b30ced099255fd5519e389.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1cbd117252d8dd707efcfcca71db2cc6df877b5628b30ced099255fd5519e389.exe
Resource
win10v2004-20240709-en
General
-
Target
1cbd117252d8dd707efcfcca71db2cc6df877b5628b30ced099255fd5519e389
-
Size
371KB
-
MD5
9d1e6ab67a41c2e3e08e909edaec33cc
-
SHA1
d1b962fd4e262a8d740d48ef37138eb15d4987e5
-
SHA256
1cbd117252d8dd707efcfcca71db2cc6df877b5628b30ced099255fd5519e389
-
SHA512
8288dbf48c2cc2c0a58e6901192db67e603b5df66db0083db3d92e770ddf31c86dd9d7d5606dc008908b7a73a81dc1d4c3d4a02d659a530be915fb76823e92a3
-
SSDEEP
6144:V5a1HmRoXXt3HWwQdsgxFnBG6YCz8KamVtnohLTB2YFM0orjwLA3:V41Hm2X93HWwQdq6hpPotTsYFuYA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1cbd117252d8dd707efcfcca71db2cc6df877b5628b30ced099255fd5519e389
Files
-
1cbd117252d8dd707efcfcca71db2cc6df877b5628b30ced099255fd5519e389.exe windows:6 windows x64 arch:x64
38d9a6485a5894cf8e8ce314dc9255be
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
CloseHandle
GetLocalTime
DeleteCriticalSection
FlushFileBuffers
ReadFile
GetModuleFileNameW
SetEndOfFile
GetTempPathW
GetFileAttributesW
SetFileAttributesW
DeleteFileW
GetFileSize
FindFirstFileExW
UnmapViewOfFile
MultiByteToWideChar
LoadLibraryW
GetProcAddress
WideCharToMultiByte
CreateFileMappingW
MapViewOfFile
CreateDirectoryW
GetCurrentProcess
GetShortPathNameW
GetLastError
GetTimeZoneInformation
CreateMutexW
ReleaseMutex
OpenFileMappingW
GetSystemDirectoryW
OpenProcess
GetModuleHandleW
OpenMutexW
LoadLibraryExW
WriteConsoleW
HeapSize
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
GetCurrentThreadId
CreateFileW
FindClose
SetFilePointer
InitializeCriticalSection
LeaveCriticalSection
OutputDebugStringA
WriteFile
FindNextFileW
EnterCriticalSection
FindFirstFileW
IsValidCodePage
ReadConsoleW
HeapReAlloc
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
RtlUnwind
LCMapStringW
CompareStringW
InitializeCriticalSectionEx
EncodePointer
DecodePointer
GetStringTypeW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
ExitProcess
GetModuleHandleExW
GetStdHandle
HeapFree
HeapAlloc
GetFileType
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetDateFormatW
GetTimeFormatW
user32
EnumChildWindows
GetWindowPlacement
GetDesktopWindow
EnumDisplayMonitors
GetWindow
GetWindowRect
IsWindowVisible
GetMonitorInfoW
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHCreateDirectoryExW
shlwapi
PathFileExistsW
PathRemoveFileSpecW
Sections
.text Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ