SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  WannaCrypt.RSM.ar7
WannaCrypt.RSM.ar7 is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious ways. Trojans do not replicate or spread to other computers.

Mutexes created
  • Nothing to report


Directory level activity
    • Nothing to report


    File level activity
      • Nothing to report


      Registry level activity
        • Nothing to report


        Library level activity
        • load - library - C:\WINDOWS\system32\rpcss.dll
        • load - library - C:\WINDOWS\system32\uxtheme.dll
        • load - library - uxtheme.dll
        • load - library - OLEAUT32.DLL
        • load - library - oleaut32.dll
        • load - library - ole32.dll
        • load - library - SXS.DLL
        • load - library - USER32
        • load - library - C:\WINDOWS\system32\MSVBVM60.DLL
        • load - library - MPR.DLL
        • load - library - C:\WINDOWS\system32\VBoxMRXNP.dll
        • load - library - C:\WINDOWS\System32\drprov.dll
        • load - library - C:\WINDOWS\System32\ntlanman.dll
        • load - library - C:\WINDOWS\System32\davclnt.dll
        • load - library - GDI32.DLL
        • load - library - KERNEL32
        • load - library - kernel32
        • load - library - user32
        • load - library - ntdll
        • load - library - advapi32
        • load - library - IPHlpApi
        • load - library - shell32
        • load - library - User32
        • load - library - CRYPT32.dll
        • load - library - SHLWAPI.dll
        • load - library - KERNEL32.dll
        • load - library - USER32.dll
        • load - library - ADVAPI32.dll
        • load - library - SHELL32.dll
        • load - library - OLEAUT32.dll
        • load - library - ntdll.dll
        • load - library - C:\eskvdxwdt\dll\xQHsRi.dll


        Process API calls used
        • ZwMapViewOfSection
        • VirtualProtectEx
        • NtFreeVirtualMemory
        • NtCreateSection
        • CreateProcessInternalW
        • ExitProcess


        Registry API calls used
        • NtOpenKey
        • NtQueryValueKey
        • RegOpenKeyExA
        • RegOpenKeyExW
        • RegQueryValueExW
        • RegCloseKey
        • RegQueryValueExA
        • RegCloseKey


        System API calls used
        • LdrGetDllHandle
        • LdrLoadDll
        • IsDebuggerPresent
        • LdrGetProcedureAddress
        • SetWindowsHookExA
        • NtDelayExecution
        • LdrGetProcedureAddress


        Filesystem API calls used
        • FindFirstFileExW
        • NtQueryDirectoryFile
        • NtOpenFile
        • NtQueryInformationFile
        • NtCreateFile
        • NtDeviceIoControlFile
        • NtDeviceIoControlFile

        DLL related data
        Number of DLL's imported = 1
        • MSVBVM60.DLL

        Domains:
        • NA

        DNS Request:
        • NA

        HTTP Request:
        • NA

        Network

        UDP source >> destination
        • 192.168.30.254 >> 192.168.30.9
        • 192.168.30.9 >> 192.168.30.255


        TCP source >> destination
        • 192.168.30.9 >> 192.168.30.254



        VirusTotal
        • Scans show 30 positive out of 61 scanners


        Relevant Information