Analysis
-
max time kernel
5s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
23-05-2022 21:07
Static task
static1
Behavioral task
behavioral1
Sample
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe
Resource
win10v2004-20220414-en
General
-
Target
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe
-
Size
290KB
-
MD5
dc942bea79a81738046c66c1e5add4aa
-
SHA1
c2755f5165c93acb708e8e485fcfbadd1125049e
-
SHA256
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c
-
SHA512
bb067c86eb1abff78d0e207da4de4aad80314410021e52d148d01491b85ca3da5f40c294a8bcbec6d2dad6f5395fc5fe4e29fd6a820bdf8398d1012749b12e54
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe = "C:\\Windows\\System32\\18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe" 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe -
Drops desktop.ini file(s) 3 IoCs
Processes:
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\desktop.ini 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\desktop.ini 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe -
Drops file in System32 directory 1 IoCs
Processes:
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exedescription ioc process File created C:\Windows\System32\18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe -
Drops file in Program Files directory 64 IoCs
Processes:
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exedescription ioc process File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Month_Calendar.emf 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\7-Zip\7z.exe.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwresmlm.dat 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\7zG.exe.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Sand_Paper.jpg 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\7-Zip\Lang\sv.txt.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-correct.avi 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\Alphabet.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-delete.avi 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsnld.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\FlickLearningWizard.exe.mui 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_VideoInset.png 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\7-Zip\Lang\is.txt.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\oskpredbase.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\desktop.ini.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\join.avi 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-phonetic.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\mip.exe.mui 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\desktop.ini.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\btn-back-static.png 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\7-Zip\Lang\ky.txt.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\pushplaysubpicture.png 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\7-Zip\Lang\io.txt.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\TipRes.dll.mui 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\7-Zip\7z.sfx.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\7-Zip\7zG.exe.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InkObj.dll.mui 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipssve.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\System\ado\adovbs.inc 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_SelectionSubpicture.png 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\7-Zip\Lang\el.txt.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\InputPersonalization.exe.mui 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\InputPersonalization.exe.mui 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsnor.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\OrangeCircles.jpg 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\DisableReset.txt 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DissolveAnother.png 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-image-mask.png 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\Bear_Formatted_MATTE2_PAL.wmv 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationLeft_SelectionSubpicture.png 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipscat.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\7-Zip\readme.txt.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\auxbase.xml 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\1047x576black.png 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\mshwLatin.dll.mui 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\7-Zip\7-zip.dll.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe File created C:\Program Files\7-Zip\7zCon.sfx.id-5600A7E0.[[email protected]].money 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1492 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exepid process 1892 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 1892 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe 1892 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1932 vssvc.exe Token: SeRestorePrivilege 1932 vssvc.exe Token: SeAuditPrivilege 1932 vssvc.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.execmd.exedescription pid process target process PID 1892 wrote to memory of 876 1892 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe cmd.exe PID 1892 wrote to memory of 876 1892 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe cmd.exe PID 1892 wrote to memory of 876 1892 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe cmd.exe PID 1892 wrote to memory of 876 1892 18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe cmd.exe PID 876 wrote to memory of 2028 876 cmd.exe mode.com PID 876 wrote to memory of 2028 876 cmd.exe mode.com PID 876 wrote to memory of 2028 876 cmd.exe mode.com PID 876 wrote to memory of 1492 876 cmd.exe vssadmin.exe PID 876 wrote to memory of 1492 876 cmd.exe vssadmin.exe PID 876 wrote to memory of 1492 876 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe"C:\Users\Admin\AppData\Local\Temp\18ba862c1a283c5038b02bbe84b904930ccb8d7a168f20d40b4ce5ed5427635c.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:876
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet1⤵
- Interacts with shadow copies
PID:1492
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
C:\Windows\system32\mode.commode con cp select=12511⤵PID:2028