File name:

@WanaDecryptor@.exe

Full analysis: https://app.any.run/tasks/5b97f9f1-2713-4808-aba6-b73c841bc335
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: December 12, 2024, 19:54:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
wannacry
ransomware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

E0EB88F4EA1ACA272C6E5012D269B578

SHA1:

E1C6CB93731CE1DE14A283A2C0AAC388DC2B1BD9

SHA256:

D8CDA3428FD96E1D4E42D852864CE53EE35DEA513C5BCB095D854BB867D25942

SSDEEP:

3072:2oHni6MUbXkBkvnNy1QTh3w9IR4ym+sy96Qn:VHCUb+kvnswh3w9IR4ym4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • WANNACRY has been detected (YARA)

      • @WanaDecryptor@.exe (PID: 1824)
    • Wannacry exe files

      • @WanaDecryptor@.exe (PID: 1824)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • @WanaDecryptor@.exe (PID: 1824)
    • Starts a Microsoft application from unusual location

      • @WanaDecryptor@.exe (PID: 1824)
  • INFO

    • The sample compiled with english language support

      • @WanaDecryptor@.exe (PID: 1824)
    • Checks supported languages

      • @WanaDecryptor@.exe (PID: 1824)
      • wmpnscfg.exe (PID: 3156)
    • Create files in a temporary directory

      • @WanaDecryptor@.exe (PID: 1824)
    • Reads the computer name

      • wmpnscfg.exe (PID: 3156)
    • The process uses the downloaded file

      • WINWORD.EXE (PID: 1452)
    • Drops encrypted VBS script (Microsoft Script Encoder)

      • WINWORD.EXE (PID: 1452)
    • Manual execution by a user

      • WINWORD.EXE (PID: 1452)
      • wmpnscfg.exe (PID: 3156)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:07:13 23:19:35+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 81920
InitializedDataSize: 159744
UninitializedDataSize: -
EntryPoint: 0x13102
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 6.1.7600.16385
ProductVersionNumber: 6.1.7600.16385
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: Load PerfMon Counters
FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255)
InternalName: LODCTR.EXE
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFileName: LODCTR.EXE
ProductName: Microsoft® Windows® Operating System
ProductVersion: 6.1.7600.16385
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #WANNACRY @wanadecryptor@.exe winword.exe no specs wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1452"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\collectionpresent.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
1824"C:\Users\admin\AppData\Local\Temp\@WanaDecryptor@.exe" C:\Users\admin\AppData\Local\Temp\@WanaDecryptor@.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Load PerfMon Counters
Exit code:
3221225477
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\users\admin\appdata\local\temp\@wanadecryptor@.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mfc42.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3156"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
2 908
Read events
2 462
Write events
132
Delete events
314

Modification events

(PID) Process:(1452) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:}15
Value:
7D313500AC050000010000000000000000000000
(PID) Process:(1452) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1040
Value:
Off
(PID) Process:(1452) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1049
Value:
Off
(PID) Process:(1452) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:3082
Value:
Off
(PID) Process:(1452) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1042
Value:
Off
(PID) Process:(1452) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1055
Value:
Off
(PID) Process:(1452) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:WORDFiles
Value:
(PID) Process:(1452) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
(PID) Process:(1452) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109F10021400000000000F01FEC\Usage
Operation:writeName:StemmerFiles_1042
Value:
(PID) Process:(1452) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
Executable files
1
Suspicious files
7
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1452WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRE5FD.tmp.cvr
MD5:
SHA256:
1452WINWORD.EXEC:\Users\admin\Desktop\~$llectionpresent.rtfbinary
MD5:C9FA12C468AE07432C3FE6DDB265B76C
SHA256:641C1BE5558C7639B656E92F1414AC1E973B1C7376C3002D7C71EFBF8FED9AD8
1452WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\collectionpresent.rtf.LNKbinary
MD5:2BDF14B4787862A8591110C9BE287D6E
SHA256:FB3233C1C68D72179CA7A5749674F94001371AA4E20E1D445CB878095A5CA143
1452WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:6ECCB11C0DF939D6F8208D7DA5BFDFB1
SHA256:4D821BEFC21B08081D58073CE1627E27315382236E367892EE56DF8AEC5B0822
1824@WanaDecryptor@.exeC:\Users\admin\AppData\Local\Temp\c.wnrybinary
MD5:9B2F860A288C233EB8FD3B0D684905D5
SHA256:F67E653BEBC8152B648DE05EC18AB27D3F5072E201F3B0019DB21AFAA93CE259
1452WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmbinary
MD5:6B6FD6AD6044419EE19675A0B1972F67
SHA256:37C3A0539575F0906B9EB45441E7255D1BF734209DE3A8768020DB0C074DB912
1452WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{3D894940-C7A0-468F-B3D6-684BA5848980}.tmpbinary
MD5:5D4D94EE7E06BBB0AF9584119797B23A
SHA256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
1452WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{B5DD434D-675C-4589-9997-468627160B5C}.tmpbinary
MD5:B361E94945194AD574F503F679C06C5F
SHA256:DB7FC37B25AEB0D0AF88028D3BFCD339EE4B78F78E8A2E67AF21175AE94102BB
1452WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{923C879B-8643-4FBA-AE64-E040E3C5305F}.tmpbinary
MD5:0C2B408C5B5B8BEE203916450FB3FBFF
SHA256:8BBAE4DE7E9E8D4F90F9E92193955C901675D952F6AA8A252A3E42F7389ECC35
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
6
DNS requests
2
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1108
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
856
WerFault.exe
104.208.16.93:443
watson.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.238
whitelisted
watson.microsoft.com
  • 104.208.16.93
whitelisted

Threats

No threats detected
No debug info