Report - wsd.exe

Gen1 Generic Malware Malicious Library ASPack UPX Anti_VM PE File PE64 OS Processor Check DLL ZIP Format
ScreenShot
Created 2024.09.24 11:08 Machine s1_win7_x6403
Filename wsd.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score Not founds Behavior Score
2.0
ZERO API file : malware
VT API (file) 23 detected (AIDetectMalware, tsCx, Unsafe, Save, malicious, high confidence, Genric, Python, Static AI, Suspicious PE, afxx, ClipBanker, Artemis, Chgt, LockFile)
md5 f1a4608262276d12a77a5db012189fa6
sha256 63539ff4cb000aa3d9ed1f2f266cf2ffbccfffe30143110e761f31af81be0261
ssdeep 98304:Qms7lEWHioVQWJuhswoYv5eO0zo0Ahd6y0Naxxv8fqDDAxSSpXq0eS8+qiDj1wd:QhHiouWJysVYvsOaoyMxxvjDDAxSSE3V
imphash 456e8615ad4320c9f54e50319a19df9c
impfuzzy 48:tn6gF/gub6EwoQ54rzSv6xviAl9uUNBsc1OGt3S1MEc+pIuCGgTQV0Kq14r:pfh1lNNBswtt3S1MEc+pIuYQWHS
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 23 AntiVirus engines on VirusTotal as malicious
notice Creates executable files on the filesystem
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger

Rules (17cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch ASPack_Zero ASPack packed file binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (download)
info IsDLL (no description) binaries (download)
info IsPE64 (no description) binaries (download)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info zip_file_format ZIP file format binaries (download)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

USER32.dll
 0x14002b3b0 CreateWindowExW
 0x14002b3b8 PostMessageW
 0x14002b3c0 GetMessageW
 0x14002b3c8 MessageBoxW
 0x14002b3d0 MessageBoxA
 0x14002b3d8 SystemParametersInfoW
 0x14002b3e0 DestroyIcon
 0x14002b3e8 SetWindowLongPtrW
 0x14002b3f0 GetWindowLongPtrW
 0x14002b3f8 GetClientRect
 0x14002b400 InvalidateRect
 0x14002b408 ReleaseDC
 0x14002b410 GetDC
 0x14002b418 DrawTextW
 0x14002b420 GetDialogBaseUnits
 0x14002b428 EndDialog
 0x14002b430 DialogBoxIndirectParamW
 0x14002b438 MoveWindow
 0x14002b440 SendMessageW
COMCTL32.dll
 0x14002b028 None
KERNEL32.dll
 0x14002b058 GetACP
 0x14002b060 IsValidCodePage
 0x14002b068 GetStringTypeW
 0x14002b070 GetFileAttributesExW
 0x14002b078 SetEnvironmentVariableW
 0x14002b080 FlushFileBuffers
 0x14002b088 GetCurrentDirectoryW
 0x14002b090 GetOEMCP
 0x14002b098 GetCPInfo
 0x14002b0a0 GetModuleHandleW
 0x14002b0a8 MulDiv
 0x14002b0b0 GetLastError
 0x14002b0b8 FormatMessageW
 0x14002b0c0 GetModuleFileNameW
 0x14002b0c8 SetDllDirectoryW
 0x14002b0d0 CreateSymbolicLinkW
 0x14002b0d8 GetProcAddress
 0x14002b0e0 CreateDirectoryW
 0x14002b0e8 GetCommandLineW
 0x14002b0f0 GetEnvironmentVariableW
 0x14002b0f8 ExpandEnvironmentStringsW
 0x14002b100 GetEnvironmentStringsW
 0x14002b108 FindClose
 0x14002b110 FindFirstFileW
 0x14002b118 FindNextFileW
 0x14002b120 GetDriveTypeW
 0x14002b128 RemoveDirectoryW
 0x14002b130 GetTempPathW
 0x14002b138 CloseHandle
 0x14002b140 WaitForSingleObject
 0x14002b148 Sleep
 0x14002b150 GetCurrentProcess
 0x14002b158 GetExitCodeProcess
 0x14002b160 CreateProcessW
 0x14002b168 GetStartupInfoW
 0x14002b170 FreeLibrary
 0x14002b178 LoadLibraryExW
 0x14002b180 LocalFree
 0x14002b188 SetConsoleCtrlHandler
 0x14002b190 K32EnumProcessModules
 0x14002b198 K32GetModuleFileNameExW
 0x14002b1a0 CreateFileW
 0x14002b1a8 FindFirstFileExW
 0x14002b1b0 GetFinalPathNameByHandleW
 0x14002b1b8 MultiByteToWideChar
 0x14002b1c0 WideCharToMultiByte
 0x14002b1c8 FreeEnvironmentStringsW
 0x14002b1d0 GetProcessHeap
 0x14002b1d8 GetTimeZoneInformation
 0x14002b1e0 HeapSize
 0x14002b1e8 HeapReAlloc
 0x14002b1f0 WriteConsoleW
 0x14002b1f8 SetEndOfFile
 0x14002b200 DeleteFileW
 0x14002b208 IsProcessorFeaturePresent
 0x14002b210 RtlCaptureContext
 0x14002b218 RtlLookupFunctionEntry
 0x14002b220 RtlVirtualUnwind
 0x14002b228 UnhandledExceptionFilter
 0x14002b230 SetUnhandledExceptionFilter
 0x14002b238 TerminateProcess
 0x14002b240 QueryPerformanceCounter
 0x14002b248 GetCurrentProcessId
 0x14002b250 GetCurrentThreadId
 0x14002b258 GetSystemTimeAsFileTime
 0x14002b260 InitializeSListHead
 0x14002b268 IsDebuggerPresent
 0x14002b270 RtlUnwindEx
 0x14002b278 SetLastError
 0x14002b280 EnterCriticalSection
 0x14002b288 LeaveCriticalSection
 0x14002b290 DeleteCriticalSection
 0x14002b298 InitializeCriticalSectionAndSpinCount
 0x14002b2a0 TlsAlloc
 0x14002b2a8 TlsGetValue
 0x14002b2b0 TlsSetValue
 0x14002b2b8 TlsFree
 0x14002b2c0 EncodePointer
 0x14002b2c8 RaiseException
 0x14002b2d0 RtlPcToFileHeader
 0x14002b2d8 GetCommandLineA
 0x14002b2e0 GetFileInformationByHandle
 0x14002b2e8 GetFileType
 0x14002b2f0 PeekNamedPipe
 0x14002b2f8 SystemTimeToTzSpecificLocalTime
 0x14002b300 FileTimeToSystemTime
 0x14002b308 ReadFile
 0x14002b310 GetFullPathNameW
 0x14002b318 SetStdHandle
 0x14002b320 GetStdHandle
 0x14002b328 WriteFile
 0x14002b330 ExitProcess
 0x14002b338 GetModuleHandleExW
 0x14002b340 HeapFree
 0x14002b348 GetConsoleMode
 0x14002b350 ReadConsoleW
 0x14002b358 SetFilePointerEx
 0x14002b360 GetConsoleOutputCP
 0x14002b368 GetFileSizeEx
 0x14002b370 HeapAlloc
 0x14002b378 FlsAlloc
 0x14002b380 FlsGetValue
 0x14002b388 FlsSetValue
 0x14002b390 FlsFree
 0x14002b398 CompareStringW
 0x14002b3a0 LCMapStringW
ADVAPI32.dll
 0x14002b000 OpenProcessToken
 0x14002b008 GetTokenInformation
 0x14002b010 ConvertStringSecurityDescriptorToSecurityDescriptorW
 0x14002b018 ConvertSidToStringSidW
GDI32.dll
 0x14002b038 SelectObject
 0x14002b040 DeleteObject
 0x14002b048 CreateFontIndirectW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure