Static task
static1
Behavioral task
behavioral1
Sample
dharma.exe
Resource
win10v2004-20220812-en
General
-
Target
dharma.exe
-
Size
70KB
-
MD5
d65c7db4797b4738e91d0a24444033a6
-
SHA1
b524a9b5a3abebbc04c068897b69515e5a1f26ac
-
SHA256
883162246c3d0a2c10e5c35a2a43ff444a24dbcf9e64dc5cc09009b9cd0ab48e
-
SHA512
aee796aaea06081d45dc0495a736d697fb6bd3ed8f34ca2efb8fff6919311942db3aeb196c56276ae048a018c9c0827d66e319362e3402dfadd4558bfa2c88e3
-
SSDEEP
1536:ZkGB8nHbKUvryElSpi8jCZGcqDKlKnr8dEih+sJ0vG:ZFBMHRvrAjCZmKcnr89W
Malware Config
Signatures
Files
-
dharma.exe.exe windows x86
e6984e72559f94ba7deb365bcd2bee8a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
ws2_32
htonl
kernel32
WaitForMultipleObjects
CloseHandle
CreateThread
SetEvent
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
ResetEvent
CreateEventW
DeleteCriticalSection
CreateMutexW
CreateProcessW
GetCurrentProcess
SetHandleInformation
OpenProcess
GetLocaleInfoW
TerminateProcess
OpenMutexW
GetProcAddress
Process32FirstW
GetExitCodeThread
CreatePipe
CreateFileW
GetModuleHandleA
CreateToolhelp32Snapshot
ReleaseMutex
GetVersion
GetVolumeInformationW
ExpandEnvironmentStringsW
GetModuleFileNameW
FindClose
FindNextFileW
FindFirstFileW
SetEndOfFile
SetFilePointerEx
GetFileAttributesW
ReadFile
GetFileSizeEx
MoveFileW
DeleteFileW
SetFileAttributesW
IsDebuggerPresent
CopyFileW
Sleep
TerminateThread
HeapSize
WriteFile
GetTickCount
GetLogicalDrives
GetComputerNameW
WaitForSingleObject
LoadLibraryW
MultiByteToWideChar
RtlUnwind
Process32NextW
UnhandledExceptionFilter
GetSystemTimeAsFileTime
GetLastError
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapCreate
GetModuleHandleW
ExitProcess
DecodePointer
GetStdHandle
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
IsProcessorFeaturePresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetStringTypeW
SetUnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
user32
GetShellWindow
GetWindowThreadProcessId
advapi32
DuplicateTokenEx
CryptDecrypt
CryptDestroyKey
CryptEncrypt
CryptImportKey
CryptGenRandom
CryptSetKeyParam
CryptAcquireContextW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
GetTokenInformation
OpenProcessToken
shell32
ShellExecuteExW
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.cdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE