Analysis
-
max time kernel
11s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
26-05-2022 13:49
Static task
static1
Behavioral task
behavioral1
Sample
Petya.exe
Resource
win7-20220414-en
General
-
Target
Petya.exe
-
Size
266KB
-
MD5
505e38e344f45ea9ff9c9b560d851c1e
-
SHA1
c5e934de62fbbad105eef0ec1b533ca00aba05b0
-
SHA256
4d8e5e85b3d49509eab8e7ffebad940147ed950fcddab60e8a13409dfc2b8fc5
-
SHA512
6dcc186c7e71fbd104eb0c29777525e59c43aaa6a6e6a439ae2805e1f8d1589c200ce7b5cb622519b9ad8f4480615e8e980132b617e944c3017462a411898689
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
Petya.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" Petya.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 1 IoCs
Processes:
Petya.exepid process 1668 Petya.exe -
Loads dropped DLL 2 IoCs
Processes:
Petya.exepid process 1852 Petya.exe 1852 Petya.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Petya.exedescription ioc process File opened for modification \??\PhysicalDrive0 Petya.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Petya.exedescription ioc process File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe Petya.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE Petya.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe Petya.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE Petya.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe Petya.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE Petya.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE Petya.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe Petya.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE Petya.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE Petya.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE Petya.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE Petya.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe Petya.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe Petya.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe Petya.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe Petya.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE Petya.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE Petya.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE Petya.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE Petya.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE Petya.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE Petya.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE Petya.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE Petya.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE Petya.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE Petya.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE Petya.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE Petya.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE Petya.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE Petya.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE Petya.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe Petya.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe Petya.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE Petya.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE Petya.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE Petya.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe Petya.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE Petya.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE Petya.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE Petya.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE Petya.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE Petya.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe Petya.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe Petya.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE Petya.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE Petya.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE Petya.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe Petya.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE Petya.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe Petya.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE Petya.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE Petya.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE Petya.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE Petya.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE Petya.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe Petya.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe Petya.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE Petya.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE Petya.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe Petya.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE Petya.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe Petya.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE Petya.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE Petya.exe -
Drops file in Windows directory 1 IoCs
Processes:
Petya.exedescription ioc process File opened for modification C:\Windows\svchost.com Petya.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
Petya.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" Petya.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Petya.exedescription pid process Token: SeShutdownPrivilege 1668 Petya.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Petya.exedescription pid process target process PID 1852 wrote to memory of 1668 1852 Petya.exe Petya.exe PID 1852 wrote to memory of 1668 1852 Petya.exe Petya.exe PID 1852 wrote to memory of 1668 1852 Petya.exe Petya.exe PID 1852 wrote to memory of 1668 1852 Petya.exe Petya.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Petya.exe"C:\Users\Admin\AppData\Local\Temp\Petya.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\Petya.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\Petya.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225KB
MD5af2379cc4d607a45ac44d62135fb7015
SHA139b6d40906c7f7f080e6befa93324dddadcbd9fa
SHA25626b4699a7b9eeb16e76305d843d4ab05e94d43f3201436927e13b3ebafa90739
SHA51269899c47d0b15f92980f79517384e83373242e045ca696c6e8f930ff6454219bf609e0d84c2f91d25dfd5ef3c28c9e099c4a3a918206e957be806a1c2e0d3e99
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
225KB
MD5af2379cc4d607a45ac44d62135fb7015
SHA139b6d40906c7f7f080e6befa93324dddadcbd9fa
SHA25626b4699a7b9eeb16e76305d843d4ab05e94d43f3201436927e13b3ebafa90739
SHA51269899c47d0b15f92980f79517384e83373242e045ca696c6e8f930ff6454219bf609e0d84c2f91d25dfd5ef3c28c9e099c4a3a918206e957be806a1c2e0d3e99