Overview
overview
3Static
static
3PetyaDecryptor.rar
windows10-1703-x64
3PetyaDecryptor.rar
windows10-2004-x64
3PetyaDecryptor.rar
windows11-21h2-x64
3PetyaDecry...aw.txt
windows10-1703-x64
1PetyaDecry...aw.txt
windows10-2004-x64
1PetyaDecry...aw.txt
windows11-21h2-x64
3PetyaDecry..._1.dll
windows10-1703-x64
3PetyaDecry..._1.dll
windows10-2004-x64
3PetyaDecry..._1.dll
windows11-21h2-x64
3PetyaDecry...20.dll
windows10-1703-x64
3PetyaDecry...20.dll
windows10-2004-x64
3PetyaDecry...20.dll
windows11-21h2-x64
3PetyaDecry...ey.exe
windows10-1703-x64
1PetyaDecry...ey.exe
windows10-2004-x64
1PetyaDecry...ey.exe
windows11-21h2-x64
1Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
31/05/2024, 21:39
Static task
static1
Behavioral task
behavioral1
Sample
PetyaDecryptor.rar
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
PetyaDecryptor.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
PetyaDecryptor.rar
Resource
win11-20240508-en
Behavioral task
behavioral4
Sample
PetyaDecryptor/id_raw.txt
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
PetyaDecryptor/id_raw.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
PetyaDecryptor/id_raw.txt
Resource
win11-20240508-en
Behavioral task
behavioral7
Sample
PetyaDecryptor/libcrypto-1_1.dll
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
PetyaDecryptor/libcrypto-1_1.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
PetyaDecryptor/libcrypto-1_1.dll
Resource
win11-20240426-en
Behavioral task
behavioral10
Sample
PetyaDecryptor/msvcr120.dll
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
PetyaDecryptor/msvcr120.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
PetyaDecryptor/msvcr120.dll
Resource
win11-20240508-en
Behavioral task
behavioral13
Sample
PetyaDecryptor/petya_key.exe
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
PetyaDecryptor/petya_key.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
PetyaDecryptor/petya_key.exe
Resource
win11-20240426-en
General
-
Target
PetyaDecryptor/libcrypto-1_1.dll
-
Size
2.0MB
-
MD5
6f52970d7a41141d3c93b3937bd6b84c
-
SHA1
bd94dcb31ff9e64b187af8f2361ec688bf5bb91d
-
SHA256
81e7e8206cf46c7aa3abb69a2a2dac8371bf5eea137df1901a84a5b7388fe768
-
SHA512
71b8da11ddb181a1864ca83e4a2d9a5e13948c372d7ea2d4fb5bb5e0acf957c039bd5456ad16c08dd2e18ef252ee492b01c84ecf748afdb616d5496faeca4437
-
SSDEEP
49152:T6kvSjcvQ/qpyr0kou74WAdvHoU6U1CPwDv3uFV0cSWPWb:2kvCcvQ/qpyr0koW6oUh1CPwDv3uFV0
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3912 1892 WerFault.exe 77 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4648 wrote to memory of 1892 4648 rundll32.exe 77 PID 4648 wrote to memory of 1892 4648 rundll32.exe 77 PID 4648 wrote to memory of 1892 4648 rundll32.exe 77
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\PetyaDecryptor\libcrypto-1_1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\PetyaDecryptor\libcrypto-1_1.dll,#12⤵PID:1892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 4923⤵
- Program crash
PID:3912
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1892 -ip 18921⤵PID:3368