Overview
overview
10Static
static
3WannaCry2.0-main.zip
windows11-21h2-x64
1WannaCry2....ignore
windows11-21h2-x64
3WannaCry2....s.json
windows11-21h2-x64
3WannaCry2....ICENSE
windows11-21h2-x64
1WannaCry2....DME.md
windows11-21h2-x64
3WannaCry2....ry.zip
windows11-21h2-x64
1ed01ebfbc9...aa.exe
windows11-21h2-x64
10WannaCry2....aCry.c
windows11-21h2-x64
3Resubmissions
16/03/2025, 11:14
250316-nb82wsspy4 316/03/2025, 10:39
250316-mp3xcssks8 1016/03/2025, 10:38
250316-mpmkdasks3 10Analysis
-
max time kernel
103s -
max time network
107s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/03/2025, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
WannaCry2.0-main.zip
Resource
win11-20250314-en
Behavioral task
behavioral2
Sample
WannaCry2.0-main/.gitignore
Resource
win11-20250313-en
Behavioral task
behavioral3
Sample
WannaCry2.0-main/.vscode/c_cpp_properties.json
Resource
win11-20250313-en
Behavioral task
behavioral4
Sample
WannaCry2.0-main/LICENSE
Resource
win11-20250314-en
Behavioral task
behavioral5
Sample
WannaCry2.0-main/README.md
Resource
win11-20250313-en
Behavioral task
behavioral6
Sample
WannaCry2.0-main/Ransomware.WannaCry.zip
Resource
win11-20250314-en
Behavioral task
behavioral7
Sample
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Resource
win11-20250313-en
Behavioral task
behavioral8
Sample
WannaCry2.0-main/WannaCry.c
Resource
win11-20250314-en
General
-
Target
WannaCry2.0-main/WannaCry.c
-
Size
560KB
-
MD5
0382eb93cc232c460995c50e8abd4a27
-
SHA1
a9e2a40f8f6c748f4f548e5dce3a2ee93c7d923a
-
SHA256
c65c31e80a61833efcff9da579a82e52f4a4286be2790e875acfd07cb89f1349
-
SHA512
9184513150d3c9292edeba4df9570bdff82416d5cf6eaea6b7503d00049686463a03a235e3793c18d2b2aff8503d052dd790125e399ed862c02113c06c745924
-
SSDEEP
6144:SxPiam1KCILCw40qCbiWjEtHvJ+wCXCqPGlV2OwUJfa:S2KL40vbY+wCXJPSV2OpJfa
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3112 OpenWith.exe