Analysis
-
max time kernel
193s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2022 13:20
Static task
static1
Behavioral task
behavioral1
Sample
dharma.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dharma.exe
Resource
win10v2004-20220812-en
General
-
Target
dharma.exe
-
Size
92KB
-
MD5
ba67dd5ab7d6061704f2903573cec303
-
SHA1
f7ca4a5d4c8d24083b86ff0a5b102ad68e0c9e34
-
SHA256
6b1f4df924fb0e5067df18dfc5063d409f3bf2ee0d14b381b3f583e0d0da3ae5
-
SHA512
291ab3acb7e7619243baced30ceed24b65f76a7edc9e2d1eb875ebdf590b3321c40ec1a3d44c109ab6a8a29ad43268780fcdd0448227f8f0c62ba7bbaadc7452
-
SSDEEP
1536:mBwl+KXpsqN5vlwWYyhY9S4AaEsY/ZlZI7teK7FiuiqhxVXf8lvLte23q9AH2:Qw+asqN5aW/hLnsqfcteK7VJAztb3qs
Malware Config
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
bitpandacom@qq.com
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
dharma.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\DisableSelect.tiff dharma.exe File opened for modification C:\Users\Admin\Pictures\GrantTest.tiff dharma.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
dharma.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation dharma.exe -
Drops startup file 5 IoCs
Processes:
dharma.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini dharma.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta dharma.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dharma.exe dharma.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
dharma.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" dharma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" dharma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dharma.exe = "C:\\Windows\\System32\\dharma.exe" dharma.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
dharma.exedescription ioc process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini dharma.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini dharma.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini dharma.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini dharma.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2891029575-1462575-1165213807-1000\desktop.ini dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI dharma.exe File opened for modification C:\Program Files (x86)\desktop.ini dharma.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini dharma.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini dharma.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini dharma.exe File opened for modification C:\Users\Public\Desktop\desktop.ini dharma.exe File opened for modification C:\Users\Public\Libraries\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini dharma.exe File opened for modification C:\Users\Admin\Music\desktop.ini dharma.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini dharma.exe File opened for modification C:\Users\Admin\Videos\desktop.ini dharma.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini dharma.exe File opened for modification C:\Users\Public\Documents\desktop.ini dharma.exe File opened for modification C:\Program Files\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini dharma.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini dharma.exe File opened for modification C:\Users\Public\Pictures\desktop.ini dharma.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini dharma.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini dharma.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini dharma.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini dharma.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini dharma.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini dharma.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini dharma.exe File opened for modification C:\Users\Admin\Links\desktop.ini dharma.exe File opened for modification C:\Users\Admin\Searches\desktop.ini dharma.exe File opened for modification C:\Users\Public\Videos\desktop.ini dharma.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini dharma.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini dharma.exe File opened for modification C:\Users\Admin\Documents\desktop.ini dharma.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini dharma.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini dharma.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini dharma.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini dharma.exe File opened for modification C:\Users\Public\Music\desktop.ini dharma.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini dharma.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini dharma.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini dharma.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini dharma.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini dharma.exe -
Drops file in System32 directory 2 IoCs
Processes:
dharma.exedescription ioc process File created C:\Windows\System32\dharma.exe dharma.exe File created C:\Windows\System32\Info.hta dharma.exe -
Drops file in Program Files directory 64 IoCs
Processes:
dharma.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\es-es\ui-strings.js.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\ROMAN.TXT.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail-ul-phn.xrm-ms dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART12.BDR.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailMediumTile.scale-200.png dharma.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\vlc.mo dharma.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\libblendbench_plugin.dll.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\MediaInkToolbar.xbf dharma.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxOutlook.Resources.dll dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_SubTest2-pl.xrm-ms.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\WorldClockSmallTile.contrast-white_scale-125.png dharma.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-attach_zh_CN.jar.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libcolorthres_plugin.dll.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\es-ES\MSFT_PackageManagement.schema.mfl.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\104.0.1293.47\identity_proxy\identity_helper.Sparse.Beta.msix.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClient.man dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\tracedefinition130.xml dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\tmpersistence_xl.dll.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\selection-actions2x.png.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_filter-default_32.svg dharma.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\ja-JP\PSGet.Resource.psd1 dharma.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\lb.pak dharma.exe File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\mpvis.dll.mui dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Grace-ppd.xrm-ms.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\StoreMedTile.scale-100.png dharma.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\LinkedInboxWideTile.scale-200.png dharma.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libtrivial_channel_mixer_plugin.dll dharma.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-applemenu.xml.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-30_altform-unplated_contrast-white.png dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSO.FRAMEPROTOCOLWIN32.DLL dharma.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\IC_WelcomeBanner.scale-150.png dharma.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\ja-JP\MSFT_PackageManagementSource.strings.psd1 dharma.exe File opened for modification C:\Program Files\HideResolve.csv dharma.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-print_zh_CN.jar.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\CancelFluent.White@3x.png.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Square44x44Logo.targetsize-60.png dharma.exe File created C:\Program Files\Mozilla Firefox\dependentlibs.list.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\nl-nl\ui-strings.js dharma.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxSignature.p7x dharma.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\Default.dotx.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\locale\org-openide-util-lookup_ja.jar.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File created C:\Program Files\VideoLAN\VLC\plugins\access\libfilesystem_plugin.dll.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\104.0.1293.47\VisualElements\LogoCanary.png.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\msdaprsr.dll.mui dharma.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-core-execution.jar.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_filter-disabled_32.svg.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\pdf-ownership-rdr-ja_jp.gif dharma.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-api-annotations-common_zh_CN.jar dharma.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageAppList.targetsize-16.png dharma.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\npt.dll.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.diagnostic.ja_5.5.0.165303.jar.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\wmpnssui.dll.mui dharma.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\selection-action-plugins\epdf\plugin.js dharma.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\pl.pak.DATA.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\office.x-none.msi.16.x-none.boot.tree.dat.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteNotebookMedTile.scale-150.png dharma.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\OutlookMailBadge.scale-400.png dharma.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\da-dk\ui-strings.js dharma.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\nl-nl\ui-strings.js dharma.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-awt.xml.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\MANIFEST.MF.id-EB7AA214.[bitpandacom@qq.com].combo dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\offsymk.ttf dharma.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 4616 vssadmin.exe 3140 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
dharma.exepid process 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe 2636 dharma.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 4572 vssvc.exe Token: SeRestorePrivilege 4572 vssvc.exe Token: SeAuditPrivilege 4572 vssvc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
dharma.execmd.execmd.exedescription pid process target process PID 2636 wrote to memory of 2896 2636 dharma.exe cmd.exe PID 2636 wrote to memory of 2896 2636 dharma.exe cmd.exe PID 2896 wrote to memory of 1088 2896 cmd.exe mode.com PID 2896 wrote to memory of 1088 2896 cmd.exe mode.com PID 2896 wrote to memory of 4616 2896 cmd.exe vssadmin.exe PID 2896 wrote to memory of 4616 2896 cmd.exe vssadmin.exe PID 2636 wrote to memory of 4248 2636 dharma.exe cmd.exe PID 2636 wrote to memory of 4248 2636 dharma.exe cmd.exe PID 4248 wrote to memory of 4412 4248 cmd.exe mode.com PID 4248 wrote to memory of 4412 4248 cmd.exe mode.com PID 4248 wrote to memory of 3140 4248 cmd.exe vssadmin.exe PID 4248 wrote to memory of 3140 4248 cmd.exe vssadmin.exe PID 2636 wrote to memory of 4556 2636 dharma.exe mshta.exe PID 2636 wrote to memory of 4556 2636 dharma.exe mshta.exe PID 2636 wrote to memory of 2536 2636 dharma.exe mshta.exe PID 2636 wrote to memory of 2536 2636 dharma.exe mshta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dharma.exe"C:\Users\Admin\AppData\Local\Temp\dharma.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mode.commode con cp select=12513⤵
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mode.commode con cp select=12513⤵
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.htaFilesize
13KB
MD58c896d6b23c023e48c6c5c0ac87de4e0
SHA19542db1bc0501de1ace5f50dd2916b03cb4359aa
SHA256cc48adafb266121fb99fe481f18b79f51c069125e0850f277f47a641ac18483d
SHA5127770ac9d5b75b99e06a9a5d03569db82ffbba29198a34733d4adefc96520c1c0b56d105db84973df8e4ab60335458203ce154a102e6f834fc944b846b14d81ad
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.htaFilesize
13KB
MD58c896d6b23c023e48c6c5c0ac87de4e0
SHA19542db1bc0501de1ace5f50dd2916b03cb4359aa
SHA256cc48adafb266121fb99fe481f18b79f51c069125e0850f277f47a641ac18483d
SHA5127770ac9d5b75b99e06a9a5d03569db82ffbba29198a34733d4adefc96520c1c0b56d105db84973df8e4ab60335458203ce154a102e6f834fc944b846b14d81ad
-
memory/1088-133-0x0000000000000000-mapping.dmp
-
memory/2536-139-0x0000000000000000-mapping.dmp
-
memory/2896-132-0x0000000000000000-mapping.dmp
-
memory/3140-137-0x0000000000000000-mapping.dmp
-
memory/4248-135-0x0000000000000000-mapping.dmp
-
memory/4412-136-0x0000000000000000-mapping.dmp
-
memory/4556-138-0x0000000000000000-mapping.dmp
-
memory/4616-134-0x0000000000000000-mapping.dmp