Analysis
-
max time kernel
277s -
max time network
291s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-03-2024 19:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/fabrimagic72/malware-samples/tree/master/Ransomware/NotPetya
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
https://github.com/fabrimagic72/malware-samples/tree/master/Ransomware/NotPetya
Resource
win11-20240221-en
General
-
Target
https://github.com/fabrimagic72/malware-samples/tree/master/Ransomware/NotPetya
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1308 msedge.exe 1308 msedge.exe 3268 msedge.exe 3268 msedge.exe 3124 identity_helper.exe 3124 identity_helper.exe 2032 msedge.exe 2032 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1308 wrote to memory of 4868 1308 msedge.exe 80 PID 1308 wrote to memory of 4868 1308 msedge.exe 80 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 1508 1308 msedge.exe 81 PID 1308 wrote to memory of 3268 1308 msedge.exe 82 PID 1308 wrote to memory of 3268 1308 msedge.exe 82 PID 1308 wrote to memory of 4116 1308 msedge.exe 83 PID 1308 wrote to memory of 4116 1308 msedge.exe 83 PID 1308 wrote to memory of 4116 1308 msedge.exe 83 PID 1308 wrote to memory of 4116 1308 msedge.exe 83 PID 1308 wrote to memory of 4116 1308 msedge.exe 83 PID 1308 wrote to memory of 4116 1308 msedge.exe 83 PID 1308 wrote to memory of 4116 1308 msedge.exe 83 PID 1308 wrote to memory of 4116 1308 msedge.exe 83 PID 1308 wrote to memory of 4116 1308 msedge.exe 83 PID 1308 wrote to memory of 4116 1308 msedge.exe 83 PID 1308 wrote to memory of 4116 1308 msedge.exe 83 PID 1308 wrote to memory of 4116 1308 msedge.exe 83 PID 1308 wrote to memory of 4116 1308 msedge.exe 83 PID 1308 wrote to memory of 4116 1308 msedge.exe 83 PID 1308 wrote to memory of 4116 1308 msedge.exe 83 PID 1308 wrote to memory of 4116 1308 msedge.exe 83 PID 1308 wrote to memory of 4116 1308 msedge.exe 83 PID 1308 wrote to memory of 4116 1308 msedge.exe 83 PID 1308 wrote to memory of 4116 1308 msedge.exe 83 PID 1308 wrote to memory of 4116 1308 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/fabrimagic72/malware-samples/tree/master/Ransomware/NotPetya1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd58b33cb8,0x7ffd58b33cc8,0x7ffd58b33cd82⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,6128735212156075168,6573131799434494061,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1880,6128735212156075168,6573131799434494061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1880,6128735212156075168,6573131799434494061,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2568 /prefetch:82⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,6128735212156075168,6573131799434494061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,6128735212156075168,6573131799434494061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1880,6128735212156075168,6573131799434494061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1880,6128735212156075168,6573131799434494061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,6128735212156075168,6573131799434494061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,6128735212156075168,6573131799434494061,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,6128735212156075168,6573131799434494061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,6128735212156075168,6573131799434494061,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,6128735212156075168,6573131799434494061,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5caaacbd78b8e7ebc636ff19241b2b13d
SHA14435edc68c0594ebb8b0aa84b769d566ad913bc8
SHA256989cc6f5cdc43f7bac8f6bc10624a47d46cbc366c671c495c6900eabc5276f7a
SHA512c668a938bef9bbe432af676004beb1ae9c06f1ba2f154d1973e691a892cb39c345b12265b5996127efff3258ebba333847df09238f69e95f2f35879b5db7b7fc
-
Filesize
152B
MD57c194bbd45fc5d3714e8db77e01ac25a
SHA1e758434417035cccc8891d516854afb4141dd72a
SHA256253f8f4a60bdf1763526998865311c1f02085388892f14e94f858c50bf6e53c3
SHA512aca42768dcc4334e49cd6295bd563c797b11523f4405cd5b4aeb41dec9379d155ae241ce937ec55063ecbf82136154e4dc5065afb78d18b42af86829bac6900d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5ef7964ca8a1c0c7b28ee8c0f02c0908b
SHA1c0d24f2ef92a98380cb41c3f2326d8a39b11ea21
SHA256d15e140d299cdd347a04e9dc67a4c2a0bdbb793867841b556be2b8d41dc6f02a
SHA512a7e33a8c0929cc6affbac7dab20dfe64637293ba2e040de9e17f48ab29fa6a27d645d34c81f441267e24165df5e8cf6919cf6e9d18d2b3f93e7ffc6fabb82607
-
Filesize
496B
MD55760b7dffb8e58306c53414558155a22
SHA1742020b1ba3d0aaea7c0b9767ebca81ee2e7d9cb
SHA2563f623f00ff0c445cfdb7d3858755ff615a4b00123b05a364c2ec253621b0eb72
SHA512c53684e05514b6a8f6b1689429cb25beb82af91e3abd3d72962cd11dd0d4698f47047562087cef2b6c9e4e6134dabc90604ffa75ec8930f7b187f0341de4b842
-
Filesize
5KB
MD508034ff40a8c7a48af65d6508f2ff540
SHA124527eed41e0419415cb0ebd687f3f13d058f758
SHA2569feae036f188f49ccbe36a611b1f2a6e38694a980679e203afbe0ed4871dc02a
SHA5120793e31baa8e51cdc178f91ccff32e124cc027cc4b4dd1442ad7d15e7e69aa4ddfd7cdbf9a6bd73520899c619331ddd4c466c2d6a44aaf9b0a9987a7724e0b25
-
Filesize
6KB
MD50878309eda03276caf2443fb3dd65ba4
SHA1b272a1332bd27ba635cce77c5892fa9b7e6c77b6
SHA256ca9e33992f3f03562edb5fb0e41eaa4518b40a74fc8460ce48d458d78c44d3e9
SHA5120134cc817c6e20e16239ad1b3bf49f08661e16880d59ef0e9e7a8650f2ceef84ccc6c7435e8671910ee404a7f551026fc5c23ef2ecd0c1d73b07be9d64ff1fe1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5108c8cb04427e460afff593ffb98d418
SHA1a9038d3b4d74aa16be546fd6291ea09fae2efa06
SHA25676e3ea595a28d86811dd92327d2c960a2889dddf0888e119a2045a56cc3d98ce
SHA5129950a454643c4dd991a18b7636474c86c4247979d5ac9845ca38d715e16b8b107c622632631bc194d3eac3bdfe6202f5dc4f9a2185facc6fb1a9ca658b279dc6