CryptoWire Claims to be WanaCry4 | VTI by Category
Try VMRay Analyzer
VTI Information
VTI Score
100 / 100
VTI Database Version 2.6
VTI Rule Match Count 19
VTI Rule Type Default (PE, ...)
Detected Threats
Arrow Anti Analysis
Arrow
Try to detect debugger
Check via API "IsDebuggerPresent".
Arrow
Dynamic API usage
Resolve above average number of APIs.
Arrow Device
Arrow
Write master boot record (MBR)
Write 512 bytes to master boot record (MBR).
Arrow OS
Arrow
Disable system tool
Disable startup repair by executing "C:\Windows\system32\cmd.exe /C title 9538298|bcdedit /set {default} recoveryenabled No".
Disable startup repair by executing "C:\Windows\system32\cmd.exe /C title 8997147|bcdedit /set {default} bootstatuspolicy ignoreallfailures".
Arrow File System
Arrow
Encrypt content of user files
Encrypt the content of multiple user files. This is an indicator for ransomware.
Arrow
Handle with malicious files
File "c:\progra~1\common~1\wanacry6.malware.exe" is a known malicious file.
Arrow
Modify operating system directory
Modify "c:\windows\system32\spp\store\2.0\data.dat.tmp".
Modify "c:\windows\system32\spp\store\2.0\data.dat.bak".
Modify "c:\windows\system32\spp\store\2.0\data.dat".
Arrow
Create many files
Create above average number of files.
Arrow Kernel
Arrow
Execute code with kernel privileges
Execute code with kernel privileges.
Arrow Network
Arrow
Download data
Url "blockchain.info/tobtc?currency=USD&value=1500".
Arrow
Connect to HTTP server
Remote address "blockchain.info/tobtc?currency=USD&value=1500".
Arrow Persistence
Arrow
Install system service
Install service "3123635631" by using the sc.exe utility.
Arrow Process
Arrow
Create process with hidden window
The process "C:\Windows\system32\cmd.exe /c schtasks /create /sc onlogon /tn 3123635631 /rl highest /tr C:\PROGRA~1\COMMON~1\WANACR~1.EXE" starts with hidden window.
The process "C:\Windows\system32\cmd.exe /C title 4180649|vssadmin.exe Delete Shadows /All /Quiet" starts with hidden window.
The process "C:\Windows\system32\cmd.exe /C title 9538298|bcdedit /set {default} recoveryenabled No" starts with hidden window.
The process "C:\Windows\system32\cmd.exe /C title 8997147|bcdedit /set {default} bootstatuspolicy ignoreallfailures" starts with hidden window.
- Browser
- Hide Tracks
- Information Stealing
- Injection
- Masquerade
- PE
- User
- VBA Macro
- YARA
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefox with deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image