Analysis
-
max time kernel
65s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2024, 12:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/fabrimagic72/malware-samples/blob/master/Ransomware/NotPetya/027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745-20170707033827.zip
Resource
win10v2004-20240221-en
General
-
Target
https://github.com/fabrimagic72/malware-samples/blob/master/Ransomware/NotPetya/027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745-20170707033827.zip
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 60 raw.githubusercontent.com 61 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1790404759-2178872477-2616469472-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4576 msedge.exe 4576 msedge.exe 4952 msedge.exe 4952 msedge.exe 2364 identity_helper.exe 2364 identity_helper.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 3120 4952 msedge.exe 68 PID 4952 wrote to memory of 3120 4952 msedge.exe 68 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 2296 4952 msedge.exe 86 PID 4952 wrote to memory of 4576 4952 msedge.exe 87 PID 4952 wrote to memory of 4576 4952 msedge.exe 87 PID 4952 wrote to memory of 1224 4952 msedge.exe 88 PID 4952 wrote to memory of 1224 4952 msedge.exe 88 PID 4952 wrote to memory of 1224 4952 msedge.exe 88 PID 4952 wrote to memory of 1224 4952 msedge.exe 88 PID 4952 wrote to memory of 1224 4952 msedge.exe 88 PID 4952 wrote to memory of 1224 4952 msedge.exe 88 PID 4952 wrote to memory of 1224 4952 msedge.exe 88 PID 4952 wrote to memory of 1224 4952 msedge.exe 88 PID 4952 wrote to memory of 1224 4952 msedge.exe 88 PID 4952 wrote to memory of 1224 4952 msedge.exe 88 PID 4952 wrote to memory of 1224 4952 msedge.exe 88 PID 4952 wrote to memory of 1224 4952 msedge.exe 88 PID 4952 wrote to memory of 1224 4952 msedge.exe 88 PID 4952 wrote to memory of 1224 4952 msedge.exe 88 PID 4952 wrote to memory of 1224 4952 msedge.exe 88 PID 4952 wrote to memory of 1224 4952 msedge.exe 88 PID 4952 wrote to memory of 1224 4952 msedge.exe 88 PID 4952 wrote to memory of 1224 4952 msedge.exe 88 PID 4952 wrote to memory of 1224 4952 msedge.exe 88 PID 4952 wrote to memory of 1224 4952 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/fabrimagic72/malware-samples/blob/master/Ransomware/NotPetya/027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745-20170707033827.zip1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb581d46f8,0x7ffb581d4708,0x7ffb581d47182⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,15272683397711141724,18102619736558787603,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,15272683397711141724,18102619736558787603,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,15272683397711141724,18102619736558787603,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15272683397711141724,18102619736558787603,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15272683397711141724,18102619736558787603,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,15272683397711141724,18102619736558787603,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,15272683397711141724,18102619736558787603,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2140,15272683397711141724,18102619736558787603,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15272683397711141724,18102619736558787603,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2140,15272683397711141724,18102619736558787603,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:4992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3196
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53bde7b7b0c0c9c66bdd8e3f712bd71eb
SHA1266bd462e249f029df05311255a15c8f42719acc
SHA2562ccd4a1b56206faa8f6482ce7841636e7bb2192f4cf5258d47e209953a77a01a
SHA5125fab7a83d86d65e7c369848c5a7d375d9ad132246b57653242c7c7d960123a50257c9e8c4c9a8f22ee861fce357b018236ac877b96c03990a88de4ddb9822818
-
Filesize
152B
MD59cafa4c8eee7ab605ab279aafd19cc14
SHA1e362e5d37d1a79e7b4a8642b068934e4571a55f1
SHA256d0817f51aa2fb8c3cae18605dbfd6ec21a6ff3f953171e7ac064648ffdee1166
SHA512eefd65ffcfb98ac8c3738eb2b3f4933d5bc5b992a1d465b8424903c8f74382ec2c95074290ddbb1001204843bfef59a32b868808a6bee4bc41ee9571515bbac6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5e02c64443bbccbc01dc437f2f7cb54bc
SHA183e09c316b6e95a529390567fe508d40533b3b1b
SHA25632439d13d38f1f816ed6eb44b1fbff87b8809ea3d52fd94e8a336bf7220810ba
SHA512fedfc8152eab5b902bdcc24be7d7a32198d38caf146f8c559faa9c3f5748bb212c0e2ffe07caace45f63748c395c58ec0252f8804e982ec385cbbbf39ad70e33
-
Filesize
579B
MD546fa4f5f7344089589d117bd7599b3a9
SHA1b6cc1fe19e527d4a372c97e4d195ed94eee40030
SHA256223280d95a13f1af6af06459bbf230874500c212a2e16f63914eff3f22e8b57a
SHA5126b680aedde7e806802652aab9ab31cb21438bc8756b063955e6f03bbbdf1273f7d47c40ec1a19fe27537afeb8d6cc219a246d31f7c6822b481649fe296e2a45c
-
Filesize
6KB
MD5fb62b9e357a6d06a80d1ddb142664d61
SHA1b86f88105eed0af0fc5c126d795f5a85b10a830e
SHA2566cedb855733beba7483b3f4f42124fe0b3360f8653c483b1a4e2d66da360788a
SHA512b6490675857e81f776f8fa460415a2d36ef465b6491598158b70491a3532a1a7a1a591f200e8d6bd5f080d08e0545b72dd3901f03ff3cd07fe56b16bac04ddc1
-
Filesize
7KB
MD55c216d83fb7aee98c267f124cb99940a
SHA1195dc0ce5d75deec74df9f9219cdbd515b3bf079
SHA256c4eba0ec8e62b653022681036fecf953decfdb2fa583c35d697eba61eaba348c
SHA51204284caf183f4b32f57c496ae31ab6b3050aea08a5099f1005d341745e5b84f59c310dc203f116482f0fbba96a563691a97f44c89fb2ab1b7db2c230ce5448a2
-
Filesize
6KB
MD566ff40454d2e6aa483f96ec7355e3a63
SHA1c7b510be521328064392ffa1dc41dbe12e7af869
SHA2560b9d6d03e44a75ab3c2699dbcc39513075d98a058e18412abb4832c83da82aab
SHA5129e6186b4f7b85e2845f60ab0a1b7da9badc1e3d31245f6282f36a2c81188f68b6bcb51c2667fee306c1da32dffedde34d90ab48be40f8f9c82ae4c3a73b2b1da
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f149382b67ff80c965e228fd4cb2887e
SHA136602c766aed31cfb5e73b0b9edc834dcdc6f290
SHA2560380700277e8d01a6e8e587dee40c6ce090cbebf4ae355f149f32cac157628c0
SHA512d359fd2a9efbe8a78a940a3e06824c7b469064e7b02d85e0a982bc381c4d70d1c0d1b628ca5bb7919aca3a7e229dc8a77c4d1ba52a61212c1fa1df3669fb2c30
-
Filesize
11KB
MD585a33de262754ae6122bcbe297bfce6b
SHA1fe33c1e71bd905758aaed53436b7340293bc6b13
SHA256f686ba91499abf646ca8bcefb7cbac6cc36c7a47a51a023beaedf119d74499df
SHA51266568d761ede1c0b70e6fc7450a716c214e08b62874227d75791b99988c0316357fca332bb118cb7779df32060368650b7c14e0423d333520d2aecc5345826ea
-
C:\Users\Admin\Downloads\027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745-20170707033827.zip
Filesize306KB
MD5f865edbb0f45c47b5c85ebd796290b51
SHA1b87f83bef23cccdf8b1bdc456c11bca523de4edf
SHA2562416260eadf0d674f89097a2d29083d7db3fcd2ed6758849c984cc325baaa0a8
SHA51295a6e4d46efa085f8534820088cac57546da81e8819f921cc0c2fe1a7cd78a56f841acc60004627774f4f311ff7bd786fc3c5bc6a7cbf818e9aa10a965cdd34a