0% found this document useful (0 votes)
27 views4 pages

Global Verdict Report

The WildFire Analysis Report assesses a PE file identified as benign, detailing its static and dynamic analysis results. The static analysis reveals suspicious properties such as unusual entry points and non-standard section names, while dynamic analysis on two virtual machines confirms benign behavior with limited activities. Network activity includes DNS queries related to azure.com, but no malicious behavior was detected during the analysis.

Uploaded by

tvquynh1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views4 pages

Global Verdict Report

The WildFire Analysis Report assesses a PE file identified as benign, detailing its static and dynamic analysis results. The static analysis reveals suspicious properties such as unusual entry points and non-standard section names, while dynamic analysis on two virtual machines confirms benign behavior with limited activities. Network activity includes DNS queries related to azure.com, but no malicious behavior was detected during the analysis.

Uploaded by

tvquynh1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

WildFire Analysis Report

WildFire Analysis Report 1


1 File Information 2
2 Static Analysis 2
2.1. Suspicious File Properties 2
3 Dynamic Analysis 3
3.1. VM1 (Windows 7 x64 SP1, Adobe Reader 11, Flash 11, Office 2010) 3
3.1.1. Behavioral Summary 3
3.1.2. Network Activity 3
3.1.3. Host Activity 3
Process Activity 3
Process Name - sample.exe 3
Event Timeline 3
3.2. VM2 (Windows 10 x64, Flash 22, Adobe Reader 11, Office 2019) 3
3.2.1. Behavioral Summary 4
3.2.2. Network Activity 4
3.2.3. Host Activity 4
Process Activity 4
Process Name - sample.exe 4
Event Timeline 4

1/4
1 File Information

File Type PE

File Signer

SHA-256 8592884eec4b189bfd66d99a44c50cb480304b0c3971c470c2952716852236f0

SHA-1 1335946fbaf382fc0b8c26899cea201c7fbf5506

MD5 3f1f9cbc4fcc7d654c0ebc2c91a8a608

File Size 2039808bytes

First Seen Timestamp 2024-07-09 21:26:01 UTC

Verdict Benign

Antivirus Coverage VirusTotal Information

2 Static Analysis

2.1. Suspicious File Properties

This sample was not found to contain any high-risk content during a pre-screening
analysis of the sample.

Contains an unusual entry point


The entry point of a PE file is the starting address for execution. An unusually located entry point may
indicate a packed or obfuscated file.

Contains sections with size discrepancies


Sections with a large discrepancy between raw and virtual sizes may indicate a packed or obfuscated PE file.

Contains an invalid checksum


The PE file checksum is required for drivers, boot-time DLLs, and other DLLs loaded into secure system
processes. Malware often ignores this value or sets it to zero.

Contains sections set to both writable and executable


Standard sections are set to either writable or executable. PE files with sections set to both writable and
executable are likely packed or obfuscated.

Uses a known packer


This PE file is packed by a known packer.

Contains non-standard section names


Standard section names are defined by the compiler. Non-standard section names may indicate a packed or
obfuscated PE file.

2/4
Last section is executable
In standard PE files the execute flag is reserved for the first section. Use of the execute flag in the last
section may indicate a packed or obfuscated file.

First section is writable


In standard PE files the write flag is reserved for sections after the first. Use of the write flag in the first
section may indicate a packed or obfuscated file.

3 Dynamic Analysis

3.1. VM1 (Windows 7 x64 SP1, Adobe Reader 11, Flash 11, Office
2010)

3.1.1. Behavioral Summary

This sample was found to be benign on this virtual machine.

Behavior Severity

Program has shown a message box.


The program has shown a message box.

Created or modified a file


Legitimate software creates or modifies files to preserve data across system restarts. Malware may create or modify files
to deliver malicious payloads or maintain persistence on a system.

The sample shows limited activities during analysis.


A sample may not be able to generate much behaviors by design or because of its dependency on user input or system
environment, which could means it is trying to evade the dynamic analysis.

The idle time between two API events are too long.
The idle time between two API events are too long.

Created an unusually large registry key


Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config

3.1.2. Network Activity


No network data available.

3.1.3. Host Activity


Process Activity

Process Name - sample.exe

(command: C:\Users\Administrator\sample.exe)

Event Timeline

1 Created Process C:\Users\Administrator\sample.exe

3.2. VM2 (Windows 10 x64, Flash 22, Adobe Reader 11, Office 2019)

3/4
3.2.1. Behavioral Summary

This sample was found to be benign on this virtual machine.

Behavior Severity

Program has shown a message box.


The program has shown a message box.

Created or modified a file


Legitimate software creates or modifies files to preserve data across system restarts. Malware may create or modify files
to deliver malicious payloads or maintain persistence on a system.

Identify System domain DNS controller


Identify System domain DNS controller on an endpoint using nslookup LDAP query. This command is being abused by
malware to gather information on the domain controller of the targeted or compromised host.

The sample shows limited activities during analysis.


A sample may not be able to generate much behaviors by design or because of its dependency on user input or system
environment, which could means it is trying to evade the dynamic analysis.

The idle time between two API events are too long.
The idle time between two API events are too long.

Created an unusually large registry key


Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config

3.2.2. Network Activity


DNS Queries

Domain Name Query Type DNS Response

azure.com NS ns1-39.azure-dns.com

azure.com NS ns3-39.azure-dns.org

azure.com NS ns4-39.azure-dns.info

azure.com NS ns2-39.azure-dns.net

3.2.3. Host Activity


Process Activity

Process Name - sample.exe

(command: C:\Users\Administrator\sample.exe)

Event Timeline

1 Created Process C:\Users\Administrator\sample.exe

4/4

You might also like