General
-
Target
Petya.A.zip
-
Size
133KB
-
Sample
230202-dlzwvsee69
-
MD5
82e7fcb4516fe8aa646853a3dd996b52
-
SHA1
548f18a1d50b0a0eb38a4a7d5e31212e423071c1
-
SHA256
373c74b50f3db82289c7d04e2ae5b49af8a4f0f5aef2ebd62dd633dc16f76306
-
SHA512
687560aaa21657bd00b0dafb0efc43cc23a3451f04c874bcdf1e369a4495bea92da0d8674efcb188857735e49127530aca8ae7b69f9d0c4d0580d3223bf98119
-
SSDEEP
3072:pxTRgFloaoWrgdNHWkw1SBq25tdRRBXQmEZP6u3OP9HCmeDuqJkBgtBI38Etu8q5:HTRgFloQDuqJegtBI38EY8qiy1v+m//Z
Static task
static1
Behavioral task
behavioral1
Sample
Petya.A.zip
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Petya.A.zip
Resource
win10v2004-20221111-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@Please_Read_Me@.txt
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Targets
-
-
Target
Petya.A.zip
-
Size
133KB
-
MD5
82e7fcb4516fe8aa646853a3dd996b52
-
SHA1
548f18a1d50b0a0eb38a4a7d5e31212e423071c1
-
SHA256
373c74b50f3db82289c7d04e2ae5b49af8a4f0f5aef2ebd62dd633dc16f76306
-
SHA512
687560aaa21657bd00b0dafb0efc43cc23a3451f04c874bcdf1e369a4495bea92da0d8674efcb188857735e49127530aca8ae7b69f9d0c4d0580d3223bf98119
-
SSDEEP
3072:pxTRgFloaoWrgdNHWkw1SBq25tdRRBXQmEZP6u3OP9HCmeDuqJkBgtBI38Etu8q5:HTRgFloQDuqJegtBI38EY8qiy1v+m//Z
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Initial Access
Lateral Movement
Persistence
Privilege Escalation