Static task
static1
Behavioral task
behavioral1
Sample
hack-petya-win64.zip
Resource
win10v2004-20231020-en
Behavioral task
behavioral2
Sample
hack-petya.exe
Resource
win10v2004-20231023-en
General
-
Target
hack-petya-win64.zip
-
Size
1.1MB
-
MD5
dd3cfe94b30b4e62906dddc72b60e77e
-
SHA1
d10e2adb2e827033e5fc85e735d4a09fa644e193
-
SHA256
d22cda736f59fb2b7308862e3fe001ba0406a8c5e7f7a338c3688e1214ee6f89
-
SHA512
eb894e360f17c39c4dcd64c50d8652d9827563789b881cc288d63c4388a261e2819f920919ecd792a817a384e8ee486d949644d77f2beab20cb0ba76c282f3a5
-
SSDEEP
24576:bWNLDkx+LtKQwSX0aWwHIMh2fR7cjr3qtOq1vla/DeMfAywCdLlfoxEdEJA:bADhBPwSXzHIMcZAjzqtd1vyKSn2xwEW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/hack-petya.exe
Files
-
hack-petya-win64.zip.zip
-
hack-petya.exe.exe windows:4 windows x64
31419132d7c994569ec9a2ef2ea53e76
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
CryptAcquireContextW
CryptGenRandom
CryptReleaseContext
ntdll
NtWaitForSingleObject
ws2_32
WSAGetOverlappedResult
kernel32
AddVectoredExceptionHandler
CloseHandle
CreateEventA
CreateThread
CreateWaitableTimerA
DuplicateHandle
ExitProcess
FreeEnvironmentStringsW
GetConsoleMode
GetEnvironmentStringsW
GetProcAddress
GetProcessAffinityMask
GetQueuedCompletionStatus
GetStdHandle
GetSystemInfo
GetThreadContext
LoadLibraryW
LoadLibraryA
ResumeThread
SetConsoleCtrlHandler
SetErrorMode
SetEvent
SetProcessPriorityBoost
SetThreadPriority
SetUnhandledExceptionFilter
SetWaitableTimer
SuspendThread
VirtualAlloc
VirtualFree
WaitForSingleObject
WriteConsoleW
WriteFile
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 85KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/4 Size: 512B - Virtual size: 255B
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/18 Size: 122KB - Virtual size: 121KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/30 Size: 124KB - Virtual size: 123KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/43 Size: 507KB - Virtual size: 506KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/55 Size: 147KB - Virtual size: 147KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/71 Size: 46KB - Virtual size: 46KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/87 Size: 512B - Virtual size: 48B
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.symtab Size: 212KB - Virtual size: 212KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ