WannaCrypt.RSM.ar2 is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious ways. Trojans do not replicate or spread to other computers.
Mutexes created
Directory level activity
File level activity
Registry level activity
Library level activity- load - library - C:\WINDOWS\system32\rpcss.dll
- load - library - C:\WINDOWS\system32\uxtheme.dll
- load - library - uxtheme.dll
- load - library - OLEAUT32.DLL
- load - library - oleaut32.dll
- load - library - ole32.dll
- load - library - SXS.DLL
- load - library - USER32
- load - library - C:\WINDOWS\system32\MSVBVM60.DLL
- load - library - MPR.DLL
- load - library - C:\WINDOWS\system32\VBoxMRXNP.dll
- load - library - C:\WINDOWS\System32\drprov.dll
- load - library - C:\WINDOWS\System32\ntlanman.dll
- load - library - C:\WINDOWS\System32\davclnt.dll
- load - library - GDI32.DLL
- load - library - KERNEL32
- load - library - kernel32
- load - library - user32
- load - library - ntdll
- load - library - advapi32
- load - library - IPHlpApi
- load - library - shell32
- load - library - User32
- load - library - CRYPT32.dll
- load - library - SHLWAPI.dll
- load - library - KERNEL32.dll
- load - library - USER32.dll
- load - library - ADVAPI32.dll
- load - library - SHELL32.dll
- load - library - OLEAUT32.dll
- load - library - ntdll.dll
- load - library - C:\eskvdxwdt\dll\xQHsRi.dll
Process API calls used
- ZwMapViewOfSection
- VirtualProtectEx
- NtFreeVirtualMemory
- NtCreateSection
- CreateProcessInternalW
- ExitProcess
Registry API calls used
- NtOpenKey
- NtQueryValueKey
- RegOpenKeyExA
- RegOpenKeyExW
- RegQueryValueExW
- RegCloseKey
- RegQueryValueExA
- RegCloseKey
System API calls used
- LdrGetDllHandle
- LdrLoadDll
- IsDebuggerPresent
- LdrGetProcedureAddress
- SetWindowsHookExA
- NtDelayExecution
- LdrGetProcedureAddress
Filesystem API calls used
- FindFirstFileExW
- NtQueryDirectoryFile
- NtOpenFile
- NtQueryInformationFile
- NtCreateFile
- NtDeviceIoControlFile
- NtDeviceIoControlFile
DLL related data Number of DLL's imported = 1
Domains: DNS Request: HTTP Request: Network
UDP source >> destination - 192.168.30.254 >> 192.168.30.9
- 192.168.30.9 >> 192.168.30.255
TCP source >> destination - 192.168.30.9 >> 192.168.30.254
VirusTotal
- Scans show 30 positive out of 61 scanners
|