Petya/NotPetya/ExPetr | VTI by Score
Try VMRay Analyzer
VTI Information
VTI Score
100 / 100
VTI Database Version2.5
VTI Rule Match Count17
VTI Rule TypeDefault (PE, ...)
Detected Threats
ArrowDeviceWrite master boot record (MBR)
Write 512 bytes to master boot record (MBR).
ArrowFile SystemHandle with malicious files
File "c:\users\hjrd1k~1\appdata\local\temp\6b4.tmp" is a known malicious file.
ArrowNetworkConnect to SMB share
Connect to a network share at \\192.168.0.1\admin$.
ArrowProcessEscalate Privileges
Enable critical process privilege "SeTcbPrivilege".
Enable process privilege "SeShutdownPrivilege".
Enable process privilege "SeDebugPrivilege".
ArrowDeviceAccess physical drive
Access physical drive "\device\harddisk0\dr0".
ArrowProcessAllocate a page with write and execute permissions
Change the protection of a page from writable ("PAGE_READWRITE") to executable ("PAGE_EXECUTE_READ").
ArrowAnti AnalysisDynamic API usage
Resolve above average number of APIs.
ArrowProcessCreate process with hidden window
The process "C:\Windows\system32\cmd.exe" starts with hidden window.
The process "C:\Users\HJRD1K~1\AppData\Local\Temp\6B4.tmp" starts with hidden window.
ArrowProcessRead from memory of an other process
"c:\users\hjrd1k~1\appdata\local\temp\6b4.tmp" reads from "c:\windows\system32\lsass.exe".
ArrowFile SystemModify operating system directory
Modify "c:\windows\dllhost.dat".
ArrowOSUse encryption API
Use above average number of encryption APIs.
ArrowPEDrop PE file
Drop file "c:\users\hjrd1k~1\appdata\local\temp\6b4.tmp".
Drop file "c:\windows\dllhost.dat".
ArrowPEExecute dropped PE file
Execute dropped file "c:\users\hjrd1k~1\appdata\local\temp\6b4.tmp".
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefox with deactivated setting "security.fileuri.strict_origin_policy".


Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image