D:\Tools\agent\workspace\MicroMsgWindowsV3911\out\x64\Release\bin\WeChat.pdb
Static task
static1
Behavioral task
behavioral1
Sample
beeffd5831fb19bd03cefc675d670b452fb221fd99c9cf2365deb0da2d88b0bcN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
beeffd5831fb19bd03cefc675d670b452fb221fd99c9cf2365deb0da2d88b0bcN.exe
Resource
win10v2004-20240802-en
General
-
Target
beeffd5831fb19bd03cefc675d670b452fb221fd99c9cf2365deb0da2d88b0bcN
-
Size
944KB
-
MD5
911e52aefec29b6a9f7876cfc320fff0
-
SHA1
3268475150f4b1c06b74ffdbd632ab499c0cc877
-
SHA256
beeffd5831fb19bd03cefc675d670b452fb221fd99c9cf2365deb0da2d88b0bc
-
SHA512
cddc428c855d270a9b63ecce9eddd1f0ee72fad5ec008d3033fd1f6ed62b1d454921e03ffcb6091049cc8f7894ce7fc17d717ea2c5718e5bf9cb6d7a777d54a1
-
SSDEEP
12288:eQy2Zo65kzLy92oIt0UrZIdz+b6q8L36BFLPpIRqTyq48Od/Kh:eQHl2/t03z+b6N3gIRq8twh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource beeffd5831fb19bd03cefc675d670b452fb221fd99c9cf2365deb0da2d88b0bcN
Files
-
beeffd5831fb19bd03cefc675d670b452fb221fd99c9cf2365deb0da2d88b0bcN.exe windows:6 windows x64 arch:x64
a68203879d867040380668ec7a879e5c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
VerSetConditionMask
VerifyVersionInfoW
GetSystemDirectoryW
GetModuleHandleW
LoadLibraryExW
FindFirstFileW
FindNextFileW
GetCurrentProcess
GetShortPathNameW
TerminateProcess
GetModuleFileNameW
FindClose
LocalAlloc
GetFileAttributesW
GetPrivateProfileStringW
Sleep
GetLastError
GetProcAddress
LoadLibraryW
LocalFree
FreeLibrary
SetDllDirectoryW
LoadLibraryExA
VirtualQuery
VirtualProtect
WriteConsoleW
CreateFileW
HeapReAlloc
HeapSize
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetSystemInfo
GetModuleHandleA
CloseHandle
GetVersionExW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
SetFilePointerEx
GetCurrentThreadId
WaitForSingleObjectEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
QueryPerformanceCounter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
WriteFile
HeapFree
HeapAlloc
GetFileType
LCMapStringW
user32
GetSystemMetrics
MessageBoxW
FindWindowW
advapi32
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHCreateDirectoryExW
ShellExecuteW
ole32
CoTaskMemFree
gdiplus
GdiplusShutdown
GdipGetGenericFontFamilySansSerif
GdiplusStartup
shlwapi
PathFileExistsW
PathRemoveFileSpecW
Sections
.text Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 418KB - Virtual size: 418KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ