Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 05:16
Static task
static1
Behavioral task
behavioral1
Sample
Ransomware.NotPetya.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Ransomware.NotPetya.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ayonigga.cmd
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ayonigga.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
www.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
www.exe
Resource
win10v2004-20241007-en
General
-
Target
www.exe
-
Size
10.5MB
-
MD5
48c751e8db4122d77c35ad934f8306b9
-
SHA1
7434cdd1e6a6264f5e4454400cbeccbc67584189
-
SHA256
4ce828743cb99446fb7db04f52972177af9e6df98e1b2e82755e9b504fe68bac
-
SHA512
084a3c7d70694960c80a329f829d20d34c05fcdc9586ffbae5c1a630e4806774ce4eb33feeb3f2d469ccfef80606526682fc2d5169838ae9c91a8133f62cda5c
-
SSDEEP
196608:Mt3x/ZKPvtubFVPOyBK13wv2obzhPuEBlWcR/piuFM+/juZuOx2Da+:CxiPSK13wvTzhXPn7Wyj4uO2D
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
www.exepid Process 2508 www.exe -
Loads dropped DLL 2 IoCs
Processes:
www.exewww.exepid Process 1708 www.exe 2508 www.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
www.exedescription pid Process procid_target PID 1708 wrote to memory of 2508 1708 www.exe 32 PID 1708 wrote to memory of 2508 1708 www.exe 32 PID 1708 wrote to memory of 2508 1708 www.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\www.exe"C:\Users\Admin\AppData\Local\Temp\www.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\onefile_1708_133772445784156000\www.exeC:\Users\Admin\AppData\Local\Temp\www.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD5166cc2f997cba5fc011820e6b46e8ea7
SHA1d6179213afea084f02566ea190202c752286ca1f
SHA256c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546
SHA51249d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb
-
Filesize
14.5MB
MD55ff92691ce8919b8ad899ce7d7dcecc5
SHA105255658f0340905f753b9a96fe6303196cb1f7f
SHA2563140e5d3820e3e40957e4e638ffabea93d61994cf00f17f976e353ccf7c15930
SHA512c1f2a96a8241e57669e2b8c8844799db5c944b8c82eea802c370a86c6b90c7e0ea45f33a007460872fd1fd83f7f0250b10e97f78d879f2530c1df1e0298f5548