Overview
overview
10Static
static
3Virus/000.exe
windows10-1703-x64
Virus/Bonzify.exe
windows10-1703-x64
8Virus/MEMZ.bat
windows10-1703-x64
7Virus/MEMZ.exe
windows10-1703-x64
7Virus/NoEscape.exe
windows10-1703-x64
Virus/Petya.exe
windows10-1703-x64
6Virus/Vine...al.exe
windows10-1703-x64
8Virus/WannaCry.exe
windows10-1703-x64
10Virus/WinX...p).exe
windows10-1703-x64
10Resubmissions
22-02-2024 15:00
240222-sdrylsbh25 10Analysis
-
max time kernel
2s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
22-02-2024 15:00
Static task
static1
Behavioral task
behavioral1
Sample
Virus/000.exe
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
Virus/Bonzify.exe
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
Virus/MEMZ.bat
Resource
win10-20240221-en
Behavioral task
behavioral4
Sample
Virus/MEMZ.exe
Resource
win10-20240221-en
Behavioral task
behavioral5
Sample
Virus/NoEscape.exe
Resource
win10-20240221-en
Behavioral task
behavioral6
Sample
Virus/Petya.exe
Resource
win10-20240221-en
Behavioral task
behavioral7
Sample
Virus/VineMEMZ-Original.exe
Resource
win10-20240221-en
Behavioral task
behavioral8
Sample
Virus/WannaCry.exe
Resource
win10-20240221-en
Behavioral task
behavioral9
Sample
Virus/WinXP.Horror.Destructive (Created By WobbyChip).exe
Resource
win10-20240221-en
General
-
Target
Virus/Petya.exe
-
Size
225KB
-
MD5
af2379cc4d607a45ac44d62135fb7015
-
SHA1
39b6d40906c7f7f080e6befa93324dddadcbd9fa
-
SHA256
26b4699a7b9eeb16e76305d843d4ab05e94d43f3201436927e13b3ebafa90739
-
SHA512
69899c47d0b15f92980f79517384e83373242e045ca696c6e8f930ff6454219bf609e0d84c2f91d25dfd5ef3c28c9e099c4a3a918206e957be806a1c2e0d3e99
-
SSDEEP
6144:DCyjXhd1mialK+qoNr8PxtZE6x5v+k6f:rjXhd8ZlKOrMZE6x5b6f
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Petya.exedescription ioc process File opened for modification \??\PhysicalDrive0 Petya.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Petya.exedescription pid process Token: SeShutdownPrivilege 3724 Petya.exe