Petya/NotPetya/ExPetr | VTI by Category
Try VMRay Analyzer
VTI Information
VTI Score
100 / 100
VTI Database Version2.5
VTI Rule Match Count17
VTI Rule TypeDefault (PE, ...)
Detected Threats
ArrowAnti Analysis
Arrow
Dynamic API usage
Resolve above average number of APIs.
ArrowDevice
Arrow
Write master boot record (MBR)
Write 512 bytes to master boot record (MBR).
Arrow
Access physical drive
Access physical drive "\device\harddisk0\dr0".
ArrowFile System
Arrow
Handle with malicious files
File "c:\users\hjrd1k~1\appdata\local\temp\6b4.tmp" is a known malicious file.
Arrow
Modify operating system directory
Modify "c:\windows\dllhost.dat".
ArrowNetwork
Arrow
Connect to SMB share
Connect to a network share at \\192.168.0.1\admin$.
ArrowOS
Arrow
Use encryption API
Use above average number of encryption APIs.
ArrowPE
Arrow
Drop PE file
Drop file "c:\users\hjrd1k~1\appdata\local\temp\6b4.tmp".
Drop file "c:\windows\dllhost.dat".
Arrow
Execute dropped PE file
Execute dropped file "c:\users\hjrd1k~1\appdata\local\temp\6b4.tmp".
ArrowProcess
Arrow
Escalate Privileges
Enable critical process privilege "SeTcbPrivilege".
Enable process privilege "SeShutdownPrivilege".
Enable process privilege "SeDebugPrivilege".
Arrow
Allocate a page with write and execute permissions
Change the protection of a page from writable ("PAGE_READWRITE") to executable ("PAGE_EXECUTE_READ").
Arrow
Create process with hidden window
The process "C:\Windows\system32\cmd.exe" starts with hidden window.
The process "C:\Users\HJRD1K~1\AppData\Local\Temp\6B4.tmp" starts with hidden window.
Arrow
Read from memory of an other process
"c:\users\hjrd1k~1\appdata\local\temp\6b4.tmp" reads from "c:\windows\system32\lsass.exe".
-Browser
-Hide Tracks
-Information Stealing
-Injection
-Kernel
-Masquerade
-Persistence
-VBA Macro
-YARA
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefox with deactivated setting "security.fileuri.strict_origin_policy".


Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image