Overview
overview
10Static
static
3WannaCry2.0-main.zip
windows11-21h2-x64
1WannaCry2....ignore
windows11-21h2-x64
3WannaCry2....s.json
windows11-21h2-x64
3WannaCry2....ICENSE
windows11-21h2-x64
1WannaCry2....DME.md
windows11-21h2-x64
3WannaCry2....ry.zip
windows11-21h2-x64
1ed01ebfbc9...aa.exe
windows11-21h2-x64
10WannaCry2....aCry.c
windows11-21h2-x64
3Resubmissions
16/03/2025, 11:14
250316-nb82wsspy4 316/03/2025, 10:39
250316-mp3xcssks8 1016/03/2025, 10:38
250316-mpmkdasks3 10Analysis
-
max time kernel
101s -
max time network
104s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/03/2025, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
WannaCry2.0-main.zip
Resource
win11-20250314-en
Behavioral task
behavioral2
Sample
WannaCry2.0-main/.gitignore
Resource
win11-20250313-en
Behavioral task
behavioral3
Sample
WannaCry2.0-main/.vscode/c_cpp_properties.json
Resource
win11-20250313-en
Behavioral task
behavioral4
Sample
WannaCry2.0-main/LICENSE
Resource
win11-20250314-en
Behavioral task
behavioral5
Sample
WannaCry2.0-main/README.md
Resource
win11-20250313-en
Behavioral task
behavioral6
Sample
WannaCry2.0-main/Ransomware.WannaCry.zip
Resource
win11-20250314-en
Behavioral task
behavioral7
Sample
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Resource
win11-20250313-en
Behavioral task
behavioral8
Sample
WannaCry2.0-main/WannaCry.c
Resource
win11-20250314-en
General
-
Target
WannaCry2.0-main/.vscode/c_cpp_properties.json
-
Size
303B
-
MD5
e457639b6442de3a6b199e0bcf48ca61
-
SHA1
925fbb2a12c11dc8a5cb139ed9f7148bb342c5e7
-
SHA256
fdcb102f4856235745e6f824410eb411ca58681485420bd1eacb6d8f4f1b7304
-
SHA512
2ae1460488f1046c964c2c30ff0dacc554ea1de3c53fabbdf0a7b892ecef532df2af6f1f9a97a373a7da521d87148fd0ea010ec005cfe75d0008e3b73ed477fe
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1216697136-3907990103-1733992739-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1216697136-3907990103-1733992739-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 6028 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\WannaCry2.0-main\.vscode\c_cpp_properties.json1⤵
- Modifies registry class
PID:1512
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6028