Edit tour
Windows
Analysis Report
wps_wid.cid-735916525.1730301987.exe
Overview
General Information
Detection
Score: | 26 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 0% |
Compliance
Score: | 34 |
Range: | 0 - 100 |
Signatures
Contains functionality to infect the boot sector
Drops large PE files
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Drops certificate files (DER)
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file does not import any functions
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- wps_wid.cid-735916525.1730301987.exe (PID: 5656 cmdline:
"C:\Users\ user\Deskt op\wps_wid .cid-73591 6525.17303 01987.exe" MD5: 8D76BB0011099F752D1DF93AD3F697F2) - 060656cfd1a6402a9035e6288b01ca4d-15_setup_XA_mui_Free.exe.500.2083.exe (PID: 2548 cmdline:
C:\Users\u ser\Deskto p\wps_down load\06065 6cfd1a6402 a9035e6288 b01ca4d-15 _setup_XA_ mui_Free.e xe.500.208 3.exe -ins tallCallBy OnlineSetu p -default Open -defa ultOpenPdf -asso_pic _setup -cr eateIcons -curlangof installedp roduct=en_ GB -D="C:\ Users\user \AppData\L ocal\Kings oft\WPS Of fice" -not autostartw ps -enable SetupMuiPk g -appdata ="C:\Users \user\AppD ata\Roamin g" MD5: 4A300FA35A277A4BE0455ECEEF3B4FDB)
- 060656cfd1a6402a9035e6288b01ca4d-15_setup_XA_mui_Free.exe.500.2083.exe (PID: 6128 cmdline:
"C:\Users\ user\Deskt op\wps_dow nload\0606 56cfd1a640 2a9035e628 8b01ca4d-1 5_setup_XA _mui_Free. exe.500.20 83.exe" -d ownpower - installCal lByOnlineS etup -defa ultOpen -d efaultOpen Pdf -asso_ pic_setup -createIco ns -curlan gofinstall edproduct= "en_GB" -D ="C:\Users \user\AppD ata\Local\ Kingsoft\W PS Office" -notautos tartwps="C :\Users\us er\AppData \Local\Kin gsoft\WPS Office" -e nableSetup MuiPkg="C: \Users\use r\AppData\ Local\King soft\WPS O ffice" -ap pdata="C:\ Users\user \AppData\R oaming" -m sgwndname= wpssetup_m essage_488 54E -curin stalltempp ath=C:\Use rs\user\Ap pData\Loca l\Temp\wps \~4872e0\ MD5: 4A300FA35A277A4BE0455ECEEF3B4FDB) - ksomisc.exe (PID: 368 cmdline:
"C:\Users\ user\AppDa ta\Local\K ingsoft\WP S Office\1 2.2.0.1860 7\office6\ ksomisc.ex e" -setlng en_GB MD5: 7680119F3DE2925404AE2615898AC605)
- cleanup
⊘No configs have been found
⊘No yara matches
⊘No Sigma rule has matched
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
Source: | Code function: | 5_2_009CA920 | |
Source: | Code function: |