131e0878...49af | Files
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification:
Wiper
Worm
Ransomware
...
Threat Names:
WannaCry
Gen:Variant.MSILPerseus.226862
Mal/Generic-S
Filters:
Filename Category Type Severity Actions
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\DaVinci.exe Sample File Binary
Malicious
»
Mime Type application/vnd.microsoft.portable-executable
File Size 98.00 KB
MD5 e3ad4136679055f898d6f8dcfeee0782 Copy to Clipboard
SHA1 f3eb83c2bb97d47bc4959f495b9eaf67d67ce478 Copy to Clipboard
SHA256 131e0878cc308e8e6f3d9b0b53f492f62268ae9b4b98243c9aacf7126c8c49af Copy to Clipboard
SSDeep 1536:701R3JzDwX4iLRiqat4i8yRGOLa6v13fYA4CYxk/zWYjzG+Pi72V1:70zJw9LR7CVW6d3fDpxa27 Copy to Clipboard
ImpHash f34d5f2d4577ed6d9ceec516c1f5a744 Copy to Clipboard
File Reputation Information
»
Severity
Blacklisted
Names Mal/Generic-S
PE Information
»
Image Base 0x400000
Entry Point 0x41901a
Size Of Code 0x17200
Size Of Initialized Data 0x1400
File Type FileType.executable
Subsystem Subsystem.windows_gui
Machine Type MachineType.i386
Compile Timestamp 2038-08-17 04:00:07+00:00
Version Information (11)
»
Assembly Version 1.0.0.0
Comments -
CompanyName -
FileDescription DaVinci
FileVersion 1.0.0.0
InternalName DaVinci.exe
LegalCopyright Copyright © 2020
LegalTrademarks -
OriginalFilename DaVinci.exe
ProductName DaVinci
ProductVersion 1.0.0.0
Sections (3)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x402000 0x17020 0x17200 0x200 IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ 7.2
.rsrc 0x41a000 0x1100 0x1200 0x17400 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 5.09
.reloc 0x41c000 0xc 0x200 0x18600 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ 0.1
Imports (1)
»
mscoree.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
_CorExeMain 0x0 0x402000 0x18ff0 0x171f0 0x0
Memory Dumps (10)
»
Name Process ID Start VA End VA Dump Reason PE Rebuild Bitness Entry Point AV YARA Actions
davinci.exe 1 0x01330000 0x0134DFFF Relevant Image True 64-bit - False True
buffer 1 0x7FF000DB000 0x7FF000DBFFF First Execution False 64-bit 0x7FF000DB000 False False
buffer 1 0x7FF001AE000 0x7FF001AEFFF First Execution False 64-bit 0x7FF001AE000 False False
buffer 1 0x7FF001AF000 0x7FF001AFFFF First Execution False 64-bit 0x7FF001AF040 False False
buffer 1 0x7FF001C0000 0x7FF001CFFFF First Execution False 64-bit 0x7FF001C0080 False False
buffer 1 0x7FF001C0000 0x7FF001CFFFF Content Changed False 64-bit 0x7FF001C1040 False False
buffer 1 0x7FF001AE000 0x7FF001AEFFF Content Changed False 64-bit 0x7FF001AEF60 False False
buffer 1 0x7FF000DB000 0x7FF000DBFFF Content Changed False 64-bit 0x7FF000DBE60 False False
buffer 1 0x7FF001AF000 0x7FF001AFFFF Content Changed False 64-bit 0x7FF001AF820 False False
davinci.exe 1 0x01330000 0x0134DFFF Final Dump True 64-bit - False True
Local AV Matches (1)
»
Threat Name Severity
Gen:Variant.MSILPerseus.226862
Malicious
YARA Matches (1)
»
Rule Name Rule Description Classification Score Actions
ransomware_windows_wannacry WannaCry / WannaCryptor ransomware Worm, Ransomware
5/5
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\GDIPFONTCACHEV1.DAT Modified File Stream
Unknown
»
Mime Type application/octet-stream
File Size 106.27 KB
MD5 92e128dcb152d05f07faf5da64bd1c91 Copy to Clipboard
SHA1 2174814ca563fc2b9679fffbf1b40bdf3ac9abec Copy to Clipboard
SHA256 11437a99f5f9c0a6df09c64abc8828ad3ecd8cf4fa601340ded86b8945edff43 Copy to Clipboard
SSDeep 768:i8HrbdvVyZHgTl7ho5sZWN/Ys9byFRQ+AwqGuGyZoVyOF7rrlqTIyMnm:/pVyZHgTl7h6tKR7AwqlGyZQVO1Mnm Copy to Clipboard
ImpHash -
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image