Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
THN6clTA6P.exe

Overview

General Information

Sample Name:THN6clTA6P.exe
Analysis ID:694554
MD5:3983f0ebeec88b8005724a203ae27180
SHA1:9f34d48eae30b6da0a5c5297a873f989a49e10e8
SHA256:ed492db95034ca288dd52df88e3ce3ec7b146ffd854a394ac187f0553ef966d9
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Tries to download HTTP data from a sinkholed server
Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Yara detected Wannacry ransomware
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Machine Learning detection for sample
Uses 32bit PE files
Found decision node followed by non-executed suspicious APIs
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
HTTP GET or POST without a user agent
PE file contains executable resources (Code or Archives)
Contains functionality to query network adapater information

Classification

  • System is w10x64
  • THN6clTA6P.exe (PID: 2996 cmdline: "C:\Users\user\Desktop\THN6clTA6P.exe" MD5: 3983F0EBEEC88B8005724A203AE27180)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
THN6clTA6P.exeWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
  • 0x415a0:$x1: icacls . /grant Everyone:F /T /C /Q
  • 0x374de5:$x2: taskdl.exe
  • 0x38b6d1:$x2: taskdl.exe
  • 0x3136c:$x3: tasksche.exe
  • 0x4157c:$x3: tasksche.exe
  • 0x41558:$x4: Global\MsWinZonesCacheCounterMutexA
  • 0x415d0:$x5: WNcry@2ol7
  • 0xe048:$x7: mssecsvc.exe
  • 0x17350:$x7: mssecsvc.exe
  • 0x31344:$x8: C:\%s\qeriuwjhrf
  • 0x415a0:$x9: icacls . /grant Everyone:F /T /C /Q
  • 0xe034:$s1: C:\%s\%s
  • 0x17338:$s1: C:\%s\%s
  • 0x31358:$s1: C:\%s\%s
  • 0x38be35:$s2: Windows 10 -->
  • 0x414d0:$s3: cmd.exe /c "%s"
  • 0x73a24:$s4: msg/m_portuguese.wnry
  • 0x38b2a3:$s4: msg/m_portuguese.wnry
  • 0x2e68c:$s5: \\192.168.56.20\IPC$
  • 0x1ba81:$s6: \\172.16.99.5\IPC$
  • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
THN6clTA6P.exeWannaCry_Ransomware_GenDetects WannaCry RansomwareFlorian Roth (based on rule by US CERT)
  • 0x1bacc:$s1: __TREEID__PLACEHOLDER__
  • 0x1bb68:$s1: __TREEID__PLACEHOLDER__
  • 0x1c3d4:$s1: __TREEID__PLACEHOLDER__
  • 0x1d439:$s1: __TREEID__PLACEHOLDER__
  • 0x1e4a0:$s1: __TREEID__PLACEHOLDER__
  • 0x1f508:$s1: __TREEID__PLACEHOLDER__
  • 0x20570:$s1: __TREEID__PLACEHOLDER__
  • 0x215d8:$s1: __TREEID__PLACEHOLDER__
  • 0x22640:$s1: __TREEID__PLACEHOLDER__
  • 0x236a8:$s1: __TREEID__PLACEHOLDER__
  • 0x24710:$s1: __TREEID__PLACEHOLDER__
  • 0x25778:$s1: __TREEID__PLACEHOLDER__
  • 0x267e0:$s1: __TREEID__PLACEHOLDER__
  • 0x27848:$s1: __TREEID__PLACEHOLDER__
  • 0x288b0:$s1: __TREEID__PLACEHOLDER__
  • 0x29918:$s1: __TREEID__PLACEHOLDER__
  • 0x2a980:$s1: __TREEID__PLACEHOLDER__
  • 0x2ab94:$s1: __TREEID__PLACEHOLDER__
  • 0x2abf4:$s1: __TREEID__PLACEHOLDER__
  • 0x2e2c4:$s1: __TREEID__PLACEHOLDER__
  • 0x2e340:$s1: __TREEID__PLACEHOLDER__
THN6clTA6P.exeJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    THN6clTA6P.exewanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x4157c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x415a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    THN6clTA6P.exeWin32_Ransomware_WannaCryunknownReversingLabs
    • 0x340ba:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
    • 0x8140:$main_3: 83 EC 50 56 57 B9 0E 00 00 00 BE D0 13 43 00 8D 7C 24 08 33 C0 F3 A5 A4 89 44 24 41 89 44 24 45 89 44 24 49 89 44 24 4D 89 44 24 51 66 89 44 24 55 50 50 50 6A 01 50 88 44 24 6B FF 15 34 A1 40 ...
    • 0x8090:$start_service_3: 83 EC 10 68 04 01 00 00 68 60 F7 70 00 6A 00 FF 15 6C A0 40 00 FF 15 2C A1 40 00 83 38 02 7D 09 E8 6B FE FF FF 83 C4 10 C3 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 10 A0 40 00 8B F8 85 FF 74 32 53 ...
    • 0x9a16:$entrypoint_all: 55 8B EC 6A FF 68 A0 A1 40 00 68 A2 9B 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C0 A0 40 00 59 83 0D 94 F8 70 00 FF 83 0D 98 F8 70 ...
    • 0x3985e:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
    SourceRuleDescriptionAuthorStrings
    00000001.00000002.265600976.000000000040F000.00000008.00000001.01000000.00000005.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      00000001.00000000.262463921.000000000040F000.00000008.00000001.01000000.00000005.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000001.00000000.262558061.0000000000710000.00000002.00000001.01000000.00000005.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0xf57c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0xf5a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        00000001.00000002.265724046.0000000000710000.00000002.00000001.01000000.00000005.sdmpwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
        • 0xf57c:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
        • 0xf5a4:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
        Process Memory Space: THN6clTA6P.exe PID: 2996JoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          SourceRuleDescriptionAuthorStrings
          1.2.THN6clTA6P.exe.7100a4.1.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
          • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
          • 0x342d41:$x2: taskdl.exe
          • 0x35962d:$x2: taskdl.exe
          • 0xf4d8:$x3: tasksche.exe
          • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
          • 0xf52c:$x5: WNcry@2ol7
          • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
          • 0x359d91:$s2: Windows 10 -->
          • 0xf42c:$s3: cmd.exe /c "%s"
          • 0x41980:$s4: msg/m_portuguese.wnry
          • 0x3591ff:$s4: msg/m_portuguese.wnry
          • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
          • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
          • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
          1.2.THN6clTA6P.exe.7100a4.1.raw.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
          • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
          • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
          1.2.THN6clTA6P.exe.7100a4.1.raw.unpackWin32_Ransomware_WannaCryunknownReversingLabs
          • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
          • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
          1.0.THN6clTA6P.exe.400000.0.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
          • 0x415a0:$x1: icacls . /grant Everyone:F /T /C /Q
          • 0x374de5:$x2: taskdl.exe
          • 0x38b6d1:$x2: taskdl.exe
          • 0x3136c:$x3: tasksche.exe
          • 0x4157c:$x3: tasksche.exe
          • 0x41558:$x4: Global\MsWinZonesCacheCounterMutexA
          • 0x415d0:$x5: WNcry@2ol7
          • 0x17350:$x7: mssecsvc.exe
          • 0x31344:$x8: C:\%s\qeriuwjhrf
          • 0x415a0:$x9: icacls . /grant Everyone:F /T /C /Q
          • 0x17338:$s1: C:\%s\%s
          • 0x31358:$s1: C:\%s\%s
          • 0x38be35:$s2: Windows 10 -->
          • 0x414d0:$s3: cmd.exe /c "%s"
          • 0x73a24:$s4: msg/m_portuguese.wnry
          • 0x38b2a3:$s4: msg/m_portuguese.wnry
          • 0x2e68c:$s5: \\192.168.56.20\IPC$
          • 0x1ba81:$s6: \\172.16.99.5\IPC$
          • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
          • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
          • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
          1.0.THN6clTA6P.exe.400000.0.unpackWannaCry_Ransomware_GenDetects WannaCry RansomwareFlorian Roth (based on rule by US CERT)
          • 0x1bacc:$s1: __TREEID__PLACEHOLDER__
          • 0x1bb68:$s1: __TREEID__PLACEHOLDER__
          • 0x1c3d4:$s1: __TREEID__PLACEHOLDER__
          • 0x1d439:$s1: __TREEID__PLACEHOLDER__
          • 0x1e4a0:$s1: __TREEID__PLACEHOLDER__
          • 0x1f508:$s1: __TREEID__PLACEHOLDER__
          • 0x20570:$s1: __TREEID__PLACEHOLDER__
          • 0x215d8:$s1: __TREEID__PLACEHOLDER__
          • 0x22640:$s1: __TREEID__PLACEHOLDER__
          • 0x236a8:$s1: __TREEID__PLACEHOLDER__
          • 0x24710:$s1: __TREEID__PLACEHOLDER__
          • 0x25778:$s1: __TREEID__PLACEHOLDER__
          • 0x267e0:$s1: __TREEID__PLACEHOLDER__
          • 0x27848:$s1: __TREEID__PLACEHOLDER__
          • 0x288b0:$s1: __TREEID__PLACEHOLDER__
          • 0x29918:$s1: __TREEID__PLACEHOLDER__
          • 0x2a980:$s1: __TREEID__PLACEHOLDER__
          • 0x2ab94:$s1: __TREEID__PLACEHOLDER__
          • 0x2abf4:$s1: __TREEID__PLACEHOLDER__
          • 0x2e2c4:$s1: __TREEID__PLACEHOLDER__
          • 0x2e340:$s1: __TREEID__PLACEHOLDER__
          Click to see the 17 entries
          No Sigma rule has matched
          Timestamp:192.168.2.38.8.8.860625532024293 08/31/22-23:46:48.979040
          SID:2024293
          Source Port:60625
          Destination Port:53
          Protocol:UDP
          Classtype:A Network Trojan was detected
          Timestamp:104.21.68.165192.168.2.380497462016803 08/31/22-23:46:49.148342
          SID:2016803
          Source Port:80
          Destination Port:49746
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: THN6clTA6P.exeAvira: detected
          Source: THN6clTA6P.exeVirustotal: Detection: 88%Perma Link
          Source: THN6clTA6P.exeMetadefender: Detection: 89%Perma Link
          Source: THN6clTA6P.exeReversingLabs: Detection: 100%
          Source: http://www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Avira URL Cloud: Label: malware
          Source: http://www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.comAvira URL Cloud: Label: malware
          Source: www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.comVirustotal: Detection: 5%Perma Link
          Source: http://www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.com/Virustotal: Detection: 5%Perma Link
          Source: http://www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.comVirustotal: Detection: 5%Perma Link
          Source: THN6clTA6P.exeJoe Sandbox ML: detected
          Source: 1.2.THN6clTA6P.exe.7100a4.1.unpackAvira: Label: TR/Ransom.JB
          Source: 1.2.THN6clTA6P.exe.400000.0.unpackAvira: Label: TR/Ransom.JB
          Source: 1.0.THN6clTA6P.exe.7100a4.1.unpackAvira: Label: TR/Ransom.JB
          Source: 1.0.THN6clTA6P.exe.400000.0.unpackAvira: Label: TR/Ransom.JB
          Source: C:\Users\user\Desktop\THN6clTA6P.exeCode function: 1_2_00407660 rand,EnterCriticalSection,CryptGenRandom,LeaveCriticalSection,
          Source: C:\Users\user\Desktop\THN6clTA6P.exeCode function: 1_2_00407620 CryptAcquireContextA,CryptAcquireContextA,InitializeCriticalSection,
          Source: THN6clTA6P.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE

          Networking

          barindex
          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 31 Aug 2022 21:46:49 GMTContent-Type: text/html;charset=UTF-8Content-Length: 113Connection: keep-alivex-sinkhole: sinkhole@blacklistthisdomain.comReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=BwAJjUBV7QoBfDcQC5xHuwWf6HaSer5urPutgRH%2BIhWdxjAnZxQhv3Lj7wdnu2PPlKacdGr9jV%2FTSwi3vI%2BYOhYgTU0rv1q0jFccnc7tRao14EgvdRHCOJyooOZRF5g5vft43xf7R9Y9%2BZ3RRpCsAmuUjh5Fhtj03GcJjYsFDcilY2Vk"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 7438f608df147765-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 62 6f 64 79 3e 0a 20 20 3c 68 31 3e 42 6c 61 63 6b 4c 69 73 74 54 68 69 73 44 6f 6d 61 69 6e 20 2d 20 53 69 6e 6b 68 6f 6c 65 3c 2f 68 31 3e 0a 20 20 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e Data Ascii: <!DOCTYPE html><body> <h1>BlackListThisDomain - Sinkhole</h1> <p>This domain has been sinkholed.</p></body>
          Source: TrafficSnort IDS: 2024293 ET TROJAN Possible WannaCry DNS Lookup 2 192.168.2.3:60625 -> 8.8.8.8:53
          Source: TrafficSnort IDS: 2016803 ET TROJAN Known Sinkhole Response Header 104.21.68.165:80 -> 192.168.2.3:49746
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
          Source: THN6clTA6P.exeString found in binary or memory: http://www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.com
          Source: unknownDNS traffic detected: queries for: www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.com
          Source: C:\Users\user\Desktop\THN6clTA6P.exeCode function: 1_2_00406F50 GlobalAlloc,send,recv,htons,send,recv,GlobalFree,
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache

          Spam, unwanted Advertisements and Ransom Demands

          barindex
          Source: Yara matchFile source: THN6clTA6P.exe, type: SAMPLE
          Source: Yara matchFile source: 1.0.THN6clTA6P.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.THN6clTA6P.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000001.00000002.265600976.000000000040F000.00000008.00000001.01000000.00000005.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.262463921.000000000040F000.00000008.00000001.01000000.00000005.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: THN6clTA6P.exe PID: 2996, type: MEMORYSTR

          System Summary

          barindex
          Source: THN6clTA6P.exe, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: THN6clTA6P.exe, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
          Source: THN6clTA6P.exe, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: THN6clTA6P.exe, type: SAMPLEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 1.2.THN6clTA6P.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 1.2.THN6clTA6P.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 1.2.THN6clTA6P.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 1.0.THN6clTA6P.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 1.0.THN6clTA6P.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
          Source: 1.0.THN6clTA6P.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 1.0.THN6clTA6P.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 1.2.THN6clTA6P.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 1.2.THN6clTA6P.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 1.2.THN6clTA6P.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 1.0.THN6clTA6P.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 1.0.THN6clTA6P.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 1.0.THN6clTA6P.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 1.0.THN6clTA6P.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 1.0.THN6clTA6P.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 1.0.THN6clTA6P.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 1.2.THN6clTA6P.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
          Source: 1.2.THN6clTA6P.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
          Source: 1.2.THN6clTA6P.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 1.2.THN6clTA6P.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
          Source: 00000001.00000000.262558061.0000000000710000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: 00000001.00000002.265724046.0000000000710000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
          Source: THN6clTA6P.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: THN6clTA6P.exe, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: THN6clTA6P.exe, type: SAMPLEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
          Source: THN6clTA6P.exe, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: THN6clTA6P.exe, type: SAMPLEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 1.2.THN6clTA6P.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 1.2.THN6clTA6P.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 1.2.THN6clTA6P.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 1.0.THN6clTA6P.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 1.0.THN6clTA6P.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
          Source: 1.0.THN6clTA6P.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 1.0.THN6clTA6P.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 1.2.THN6clTA6P.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 1.2.THN6clTA6P.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 1.2.THN6clTA6P.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 1.0.THN6clTA6P.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 1.0.THN6clTA6P.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 1.0.THN6clTA6P.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 1.0.THN6clTA6P.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 1.0.THN6clTA6P.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 1.0.THN6clTA6P.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 1.2.THN6clTA6P.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
          Source: 1.2.THN6clTA6P.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
          Source: 1.2.THN6clTA6P.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 1.2.THN6clTA6P.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
          Source: 00000001.00000000.262558061.0000000000710000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: 00000001.00000002.265724046.0000000000710000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
          Source: THN6clTA6P.exeBinary or memory string: OriginalFilenamediskpart.exej% vs THN6clTA6P.exe
          Source: THN6clTA6P.exeBinary or memory string: OriginalFilenamelhdfrgui.exej% vs THN6clTA6P.exe
          Source: THN6clTA6P.exeStatic PE information: Resource name: R type: PE32 executable (GUI) Intel 80386, for MS Windows
          Source: THN6clTA6P.exeVirustotal: Detection: 88%
          Source: THN6clTA6P.exeMetadefender: Detection: 89%
          Source: THN6clTA6P.exeReversingLabs: Detection: 100%
          Source: C:\Users\user\Desktop\THN6clTA6P.exeCode function: 1_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,
          Source: THN6clTA6P.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\THN6clTA6P.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Users\user\Desktop\THN6clTA6P.exeCode function: 1_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,
          Source: C:\Users\user\Desktop\THN6clTA6P.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
          Source: C:\Users\user\Desktop\THN6clTA6P.exeCode function: 1_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,
          Source: THN6clTA6P.exeBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
          Source: classification engineClassification label: mal100.rans.winEXE@1/0@1/1
          Source: C:\Users\user\Desktop\THN6clTA6P.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,
          Source: C:\Users\user\Desktop\THN6clTA6P.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\THN6clTA6P.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: THN6clTA6P.exeStatic file information: File size 3723293 > 1048576
          Source: THN6clTA6P.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x35b000
          Source: C:\Users\user\Desktop\THN6clTA6P.exeCode function: 1_2_00409860 push eax; ret
          Source: C:\Users\user\Desktop\THN6clTA6P.exeCode function: 1_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,
          Source: C:\Users\user\Desktop\THN6clTA6P.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
          Source: C:\Users\user\Desktop\THN6clTA6P.exeAPI coverage: 9.3 %
          Source: C:\Users\user\Desktop\THN6clTA6P.exeCode function: GetAdaptersInfo,LocalAlloc,GetAdaptersInfo,LocalFree,inet_addr,inet_addr,inet_addr,htonl,htonl,htonl,htonl,GetPerAdapterInfo,LocalAlloc,GetPerAdapterInfo,inet_addr,htonl,htonl,htonl,htonl,LocalFree,LocalFree,
          Source: C:\Users\user\Desktop\THN6clTA6P.exeAPI call chain: ExitProcess graph end node
          Source: THN6clTA6P.exe, 00000001.00000002.266409095.0000000000C9A000.00000004.00000020.00020000.00000000.sdmp, THN6clTA6P.exe, 00000001.00000002.266400087.0000000000C8D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts2
          Service Execution
          4
          Windows Service
          4
          Windows Service
          1
          Software Packing
          OS Credential Dumping1
          Security Software Discovery
          Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Obfuscated Files or Information
          LSASS Memory1
          System Information Discovery
          Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
          Non-Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
          Remote System Discovery
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
          Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS1
          System Network Configuration Discovery
          Distributed Component Object ModelInput CaptureScheduled Transfer12
          Ingress Tool Transfer
          SIM Card SwapCarrier Billing Fraud
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          THN6clTA6P.exe89%VirustotalBrowse
          THN6clTA6P.exe89%MetadefenderBrowse
          THN6clTA6P.exe100%ReversingLabsWin32.Ransomware.WannaCry
          THN6clTA6P.exe100%AviraTR/Ransom.IZ
          THN6clTA6P.exe100%Joe Sandbox ML
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          1.2.THN6clTA6P.exe.7100a4.1.unpack100%AviraTR/Ransom.JBDownload File
          1.2.THN6clTA6P.exe.400000.0.unpack100%AviraTR/Ransom.JBDownload File
          1.0.THN6clTA6P.exe.7100a4.1.unpack100%AviraTR/Ransom.JBDownload File
          1.0.THN6clTA6P.exe.400000.0.unpack100%AviraTR/Ransom.JBDownload File
          SourceDetectionScannerLabelLink
          www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.com6%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.com/6%VirustotalBrowse
          http://www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.com/100%Avira URL Cloudmalware
          http://www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.com6%VirustotalBrowse
          http://www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.com100%Avira URL Cloudmalware
          NameIPActiveMaliciousAntivirus DetectionReputation
          www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.com
          104.21.68.165
          truetrueunknown
          NameMaliciousAntivirus DetectionReputation
          http://www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.com/true
          • 6%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.comTHN6clTA6P.exetrue
          • 6%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          104.21.68.165
          www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.comUnited States
          13335CLOUDFLARENETUStrue
          Joe Sandbox Version:35.0.0 Citrine
          Analysis ID:694554
          Start date and time:2022-08-31 23:45:45 +02:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 6m 27s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:THN6clTA6P.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:19
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.rans.winEXE@1/0@1/1
          EGA Information:
          • Successful, ratio: 100%
          HDC Information:
          • Successful, ratio: 100% (good quality ratio 93.3%)
          • Quality average: 78.1%
          • Quality standard deviation: 28.8%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Adjust boot time
          • Enable AMSI
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, eudb.ris.api.iris.microsoft.com, ctldl.windowsupdate.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtQueryValueKey calls found.
          No simulations
          No context
          No context
          No context
          No context
          No context
          No created / dropped files found
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):7.964259281750754
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:THN6clTA6P.exe
          File size:3723293
          MD5:3983f0ebeec88b8005724a203ae27180
          SHA1:9f34d48eae30b6da0a5c5297a873f989a49e10e8
          SHA256:ed492db95034ca288dd52df88e3ce3ec7b146ffd854a394ac187f0553ef966d9
          SHA512:8e9956ad6ec1ef73a3555eaebc1efd2bf51a1794af2ee06d6fce2aace5e197d949fc27a2c8a89d224655db486f91c494e11235021a5238e81da3495f0b17d320
          SSDEEP:98304:whqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g30:whqPe1Cxcxk3ZAEUadzR8yc4gk
          TLSH:7B0633A8962DA1BCF0050DB044928557EBFB3C57B7BA5A2FCF4045660E43B6F9BC0E61
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U<S..]=..]=..]=.jA1..]=..A3..]=.~B7..]=.~B6..]=.~B9..]=..R`..]=..]<.J]=.'{6..]=..[;..]=.Rich.]=.........................PE..L..
          Icon Hash:00828e8e8686b000
          Entrypoint:0x409a16
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          DLL Characteristics:
          Time Stamp:0x4CE78ECC [Sat Nov 20 09:03:08 2010 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:9ecee117164e0b870a53dd187cdd7174
          Instruction
          push ebp
          mov ebp, esp
          push FFFFFFFFh
          push 0040A1A0h
          push 00409BA2h
          mov eax, dword ptr fs:[00000000h]
          push eax
          mov dword ptr fs:[00000000h], esp
          sub esp, 68h
          push ebx
          push esi
          push edi
          mov dword ptr [ebp-18h], esp
          xor ebx, ebx
          mov dword ptr [ebp-04h], ebx
          push 00000002h
          call dword ptr [0040A0C0h]
          pop ecx
          or dword ptr [0070F894h], FFFFFFFFh
          or dword ptr [0070F898h], FFFFFFFFh
          call dword ptr [0040A0C8h]
          mov ecx, dword ptr [0070F88Ch]
          mov dword ptr [eax], ecx
          call dword ptr [0040A0CCh]
          mov ecx, dword ptr [0070F888h]
          mov dword ptr [eax], ecx
          mov eax, dword ptr [0040A0E4h]
          mov eax, dword ptr [eax]
          mov dword ptr [0070F890h], eax
          call 00007F77E0708F21h
          cmp dword ptr [00431410h], ebx
          jne 00007F77E0708E0Eh
          push 00409B9Eh
          call dword ptr [0040A0D4h]
          pop ecx
          call 00007F77E0708EF3h
          push 0040B010h
          push 0040B00Ch
          call 00007F77E0708EDEh
          mov eax, dword ptr [0070F884h]
          mov dword ptr [ebp-6Ch], eax
          lea eax, dword ptr [ebp-6Ch]
          push eax
          push dword ptr [0070F880h]
          lea eax, dword ptr [ebp-64h]
          push eax
          lea eax, dword ptr [ebp-70h]
          push eax
          lea eax, dword ptr [ebp-60h]
          push eax
          call dword ptr [0040A0DCh]
          push 0040B008h
          push 0040B000h
          call 00007F77E0708EABh
          Programming Language:
          • [C++] VS98 (6.0) SP6 build 8804
          • [EXP] VC++ 6.0 SP5 build 8804
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0xa1e00xa0.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x3100000x35a454.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0xa0000x188.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x8bca0x9000False0.5344509548611112data6.134590828123831IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0xa0000x9980x1000False0.29345703125data3.503615586181224IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0xb0000x30489c0x27000unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x3100000x35a4540x35b000unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountry
          R0x3100a40x35a000PE32 executable (GUI) Intel 80386, for MS WindowsEnglishUnited States
          RT_VERSION0x66a0a40x3b0dataEnglishUnited States
          DLLImport
          KERNEL32.dllWaitForSingleObject, InterlockedIncrement, GetCurrentThreadId, GetCurrentThread, ReadFile, GetFileSize, CreateFileA, MoveFileExA, SizeofResource, TerminateThread, LoadResource, FindResourceA, GetProcAddress, GetModuleHandleW, ExitProcess, GetModuleFileNameA, LocalFree, LocalAlloc, CloseHandle, InterlockedDecrement, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, GlobalAlloc, GlobalFree, QueryPerformanceFrequency, QueryPerformanceCounter, GetTickCount, LockResource, Sleep, GetStartupInfoA, GetModuleHandleA
          ADVAPI32.dllStartServiceCtrlDispatcherA, RegisterServiceCtrlHandlerA, ChangeServiceConfig2A, SetServiceStatus, OpenSCManagerA, CreateServiceA, CloseServiceHandle, StartServiceA, CryptGenRandom, CryptAcquireContextA, OpenServiceA
          WS2_32.dllclosesocket, recv, send, htonl, ntohl, WSAStartup, inet_ntoa, ioctlsocket, select, htons, socket, connect, inet_addr
          MSVCP60.dll??1_Lockit@std@@QAE@XZ, ??0_Lockit@std@@QAE@XZ
          iphlpapi.dllGetAdaptersInfo, GetPerAdapterInfo
          WININET.dllInternetOpenA, InternetOpenUrlA, InternetCloseHandle
          MSVCRT.dll__set_app_type, _stricmp, __p__fmode, __p__commode, _except_handler3, __setusermatherr, _initterm, __getmainargs, _acmdln, _adjust_fdiv, _controlfp, exit, _XcptFilter, _exit, _onexit, __dllonexit, free, ??2@YAPAXI@Z, _ftol, sprintf, _endthreadex, strncpy, rand, _beginthreadex, __CxxFrameHandler, srand, time, __p___argc
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
          192.168.2.38.8.8.860625532024293 08/31/22-23:46:48.979040UDP2024293ET TROJAN Possible WannaCry DNS Lookup 26062553192.168.2.38.8.8.8
          104.21.68.165192.168.2.380497462016803 08/31/22-23:46:49.148342TCP2016803ET TROJAN Known Sinkhole Response Header8049746104.21.68.165192.168.2.3
          TimestampSource PortDest PortSource IPDest IP
          Aug 31, 2022 23:46:49.046582937 CEST4974680192.168.2.3104.21.68.165
          Aug 31, 2022 23:46:49.079365015 CEST8049746104.21.68.165192.168.2.3
          Aug 31, 2022 23:46:49.079502106 CEST4974680192.168.2.3104.21.68.165
          Aug 31, 2022 23:46:49.084465981 CEST4974680192.168.2.3104.21.68.165
          Aug 31, 2022 23:46:49.117137909 CEST8049746104.21.68.165192.168.2.3
          Aug 31, 2022 23:46:49.148341894 CEST8049746104.21.68.165192.168.2.3
          Aug 31, 2022 23:46:49.149030924 CEST4974680192.168.2.3104.21.68.165
          Aug 31, 2022 23:46:49.856214046 CEST4974680192.168.2.3104.21.68.165
          TimestampSource PortDest PortSource IPDest IP
          Aug 31, 2022 23:46:48.979039907 CEST6062553192.168.2.38.8.8.8
          Aug 31, 2022 23:46:49.004631042 CEST53606258.8.8.8192.168.2.3
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
          Aug 31, 2022 23:46:48.979039907 CEST192.168.2.38.8.8.80xb27cStandard query (0)www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
          Aug 31, 2022 23:46:49.004631042 CEST8.8.8.8192.168.2.30xb27cNo error (0)www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.21.68.165A (IP address)IN (0x0001)
          Aug 31, 2022 23:46:49.004631042 CEST8.8.8.8192.168.2.30xb27cNo error (0)www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.com172.67.196.228A (IP address)IN (0x0001)
          • www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.com
          Session IDSource IPSource PortDestination IPDestination PortProcess
          0192.168.2.349746104.21.68.16580C:\Users\user\Desktop\THN6clTA6P.exe
          TimestampkBytes transferredDirectionData
          Aug 31, 2022 23:46:49.084465981 CEST902OUTGET / HTTP/1.1
          Host: www.ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.com
          Cache-Control: no-cache
          Aug 31, 2022 23:46:49.148341894 CEST903INHTTP/1.1 200 OK
          Date: Wed, 31 Aug 2022 21:46:49 GMT
          Content-Type: text/html;charset=UTF-8
          Content-Length: 113
          Connection: keep-alive
          x-sinkhole: sinkhole@blacklistthisdomain.com
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=BwAJjUBV7QoBfDcQC5xHuwWf6HaSer5urPutgRH%2BIhWdxjAnZxQhv3Lj7wdnu2PPlKacdGr9jV%2FTSwi3vI%2BYOhYgTU0rv1q0jFccnc7tRao14EgvdRHCOJyooOZRF5g5vft43xf7R9Y9%2BZ3RRpCsAmuUjh5Fhtj03GcJjYsFDcilY2Vk"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 7438f608df147765-LHR
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 62 6f 64 79 3e 0a 20 20 3c 68 31 3e 42 6c 61 63 6b 4c 69 73 74 54 68 69 73 44 6f 6d 61 69 6e 20 2d 20 53 69 6e 6b 68 6f 6c 65 3c 2f 68 31 3e 0a 20 20 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e
          Data Ascii: <!DOCTYPE html><body> <h1>BlackListThisDomain - Sinkhole</h1> <p>This domain has been sinkholed.</p></body>


          No statistics
          Target ID:1
          Start time:23:46:47
          Start date:31/08/2022
          Path:C:\Users\user\Desktop\THN6clTA6P.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\THN6clTA6P.exe"
          Imagebase:0x400000
          File size:3723293 bytes
          MD5 hash:3983F0EBEEC88B8005724A203AE27180
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000001.00000002.265600976.000000000040F000.00000008.00000001.01000000.00000005.sdmp, Author: Joe Security
          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000001.00000000.262463921.000000000040F000.00000008.00000001.01000000.00000005.sdmp, Author: Joe Security
          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000001.00000000.262558061.0000000000710000.00000002.00000001.01000000.00000005.sdmp, Author: us-cert code analysis team
          • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000001.00000002.265724046.0000000000710000.00000002.00000001.01000000.00000005.sdmp, Author: us-cert code analysis team
          Reputation:low

          No disassembly