Analysis

  • max time kernel
    1s
  • max time network
    54s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-03-2024 04:49

General

  • Target

    ransomwares/JanusPetya/JanusPetya.exe

  • Size

    22KB

  • MD5

    d99988fafeda4bf3b6c509cf3e955b44

  • SHA1

    dc32834e410febfb32cba8e2e036e214a04b0172

  • SHA256

    68e126f148ef6f94e73222d8703d719d03558f1330711705b08b654eb95ca794

  • SHA512

    fd4bbd33491fcf48b10e78465b5094c87c9a8792df02a6b89dd9acfe2166c7d6dd235065b161919280dd988c7e297b0a93217c63623cf2ffba101170f052c983

  • SSDEEP

    384:cjrKzK7DGRmhXM1YfjwTJ3b/Vj8CzpDMl+MpK/ckbyy7d+3GM3JcT/r:2eISRm3bwTZB8yJlMuxbyy7d+3R5cLr

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ransomwares\JanusPetya\JanusPetya.exe
    "C:\Users\Admin\AppData\Local\Temp\ransomwares\JanusPetya\JanusPetya.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of AdjustPrivilegeToken
    PID:2472

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2472-0-0x0000000000830000-0x0000000000848000-memory.dmp
    Filesize

    96KB