MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 07c44729e2c570b37db695323249474831f5861d45318bf49ccf5d2f5c8ea1cd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



WannaCry


Vendor detections: 6


Intelligence 6 IOCs YARA 2 File information Comments

SHA256 hash: 07c44729e2c570b37db695323249474831f5861d45318bf49ccf5d2f5c8ea1cd
SHA3-384 hash: ece7d3aa21641cef2ba34423647f849ba2d3a329aa4c81765c5e405e4bb71645fd80c9b39b6fc976e841079d1db540f9
SHA1 hash: 3b669778698972c402f7c149fc844d0ddb3a00e8
MD5 hash: d724d8cc6420f06e8a48752f0da11c66
humanhash: floor-blue-glucose-november
File name:mssecsvc.exe
Download: download sample
Signature WannaCry
File size:3'723'264 bytes
First seen:2020-04-30 07:35:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9ecee117164e0b870a53dd187cdd7174 (82 x WannaCry, 1 x Worm.Virut)
ssdeep 98304:Z8qPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2HI:Z8qPe1Cxcxk3ZAEUadzR8yc4HI
Threatray 28 similar samples on MalwareBazaar
TLSH 30063394612CB2FCF0440EB44463896AB7B33C69A7BA5E1F9BC086670D53F5BAFD0641
Reporter jarumlus
Tags:WannaCry

Intelligence


File Origin
# of uploads :
1
# of downloads :
2'804
Origin country :
n/a
Vendor Threat Intelligence
Result
Threat name:
Wannacry
Detection:
malicious
Classification:
rans.expl.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Gathering data
Threat name:
Win32.Trojan.CVE-2017-0147
Status:
Malicious
First seen:
2017-05-14 13:47:48 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
44 of 47 (93.62%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:WannaCry_Ransomware
Author:Florian Roth (with the help of binar.ly)
Description:Detects WannaCry Ransomware
Reference:https://goo.gl/HG2j5T
Rule name:WannaCry_Ransomware_Gen
Author:Florian Roth (based on rule by US CERT)
Description:Detects WannaCry Ransomware
Reference:https://www.us-cert.gov/ncas/alerts/TA17-132A

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WININET.dll::InternetCloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::GetStartupInfoA
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileA
KERNEL32.dll::MoveFileExA
WIN_CRYPT_APIUses Windows Crypt APIADVAPI32.dll::CryptAcquireContextA
ADVAPI32.dll::CryptGenRandom
WIN_SVC_APICan Manipulate Windows ServicesADVAPI32.dll::ChangeServiceConfig2A
ADVAPI32.dll::CreateServiceA
ADVAPI32.dll::OpenSCManagerA
ADVAPI32.dll::OpenServiceA
ADVAPI32.dll::RegisterServiceCtrlHandlerA
ADVAPI32.dll::StartServiceA

Comments