Report - gWsmPty.exe

Generic Malware Malicious Library PE File PE64
ScreenShot
Created 2024.09.03 08:57 Machine s1_win7_x6401
Filename gWsmPty.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
5
Behavior Score
3.2
ZERO API file : clean
VT API (file)
md5 b7e1019218936fc5967b3b3845981231
sha256 ae14896e173be08c6c9ec88f41bf110c20ed9f57dc96a42807198638179e2183
ssdeep 49152:QarQHPJCx4x9MWvruVciMjjnH1LOUTXHOTtV1N+rS/9H60/mrDF2GGNZvHaVI7L:QMQQixuciSHhO8H4UK
imphash 66475359b0c2416bb4244ad6de079b92
impfuzzy 24:FIXV41/1bfxOov1cDqcLV5X0Mf5XGe6Zpd:RdbfEic5aWJGewpd
  Network IP location

Signature (8cnts)

Level Description
watch Harvests credentials from local FTP client softwares
notice Allocates read-write-execute memory (usually to unpack itself)
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system

Rules (4cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://animalesfans.space/105567956143109?zlrgciye=pruV0RC8hqiqgVzdZv9xztJ7m5HTZdfHAqbII593BXvMow8T%2BYmEpf3Dn8pnzbBr US CLOUDFLARENET 104.21.35.232 clean
animalesfans.space US CLOUDFLARENET 104.21.35.232 clean
104.21.35.232 US CLOUDFLARENET 104.21.35.232 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x14027b1a8 RegOpenKeyExW
 0x14027b1b0 RegOpenKeyW
 0x14027b1b8 RegQueryInfoKeyW
 0x14027b1c0 RegQueryMultipleValuesW
 0x14027b1c8 RegQueryValueA
 0x14027b1d0 RegQueryValueExA
KERNEL32.dll
 0x14027b1e0 DeleteCriticalSection
 0x14027b1e8 EnterCriticalSection
 0x14027b1f0 GetCommandLineA
 0x14027b1f8 GetLastError
 0x14027b200 GetProcAddress
 0x14027b208 GetStartupInfoA
 0x14027b210 InitializeCriticalSection
 0x14027b218 LeaveCriticalSection
 0x14027b220 LoadLibraryA
 0x14027b228 SetUnhandledExceptionFilter
 0x14027b230 Sleep
 0x14027b238 TlsAlloc
 0x14027b240 TlsGetValue
 0x14027b248 TlsSetValue
 0x14027b250 VirtualAlloc
 0x14027b258 VirtualFree
 0x14027b260 VirtualProtect
 0x14027b268 VirtualQuery
msvcrt.dll
 0x14027b278 __C_specific_handler
 0x14027b280 __initenv
 0x14027b288 __set_app_type
 0x14027b290 __setusermatherr
 0x14027b298 _acmdln
 0x14027b2a0 _commode
 0x14027b2a8 _fmode
 0x14027b2b0 _initterm
 0x14027b2b8 _ismbblead
 0x14027b2c0 _onexit
 0x14027b2c8 abort
 0x14027b2d0 calloc
 0x14027b2d8 free
 0x14027b2e0 memcpy
 0x14027b2e8 memset
 0x14027b2f0 strncmp

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure