Analysis
-
max time kernel
2s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 05:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe
-
Size
92KB
-
MD5
0197eb32a39518adbc118ec0559a395c
-
SHA1
c81f411cb16e5692f7ea92eebb7f4120e4ad4129
-
SHA256
5e75ef02517afd6e8ba6462b19217dc4a5a574abb33d10eb0f2bab49d8d48c22
-
SHA512
97402aa309817bb12aa016b5d151158d3ea6bd5aee153ac726e66fda25f61e4dd6ae9a1274daba4eaab0a253bad3d38af2a04012cba0bdb9af0ef5ce209559d5
-
SSDEEP
1536:mBwl+KXpsqN5vlwWYyhY9S4AR2DAQHPPyHn2OzT3R46F7pcwwTXO:Qw+asqN5aW/hL+v+Xl7l
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
aerossh@cock.li
aerossh@proton.me
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe = "C:\\Windows\\System32\\2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe" 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe -
Drops desktop.ini file(s) 4 IoCs
Processes:
2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exedescription ioc process File opened for modification C:\Program Files\desktop.ini 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1168293393-3419776239-306423207-1000\desktop.ini 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1168293393-3419776239-306423207-1000\desktop.ini 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe -
Drops file in System32 directory 1 IoCs
Processes:
2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exedescription ioc process File created C:\Windows\System32\2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe -
Drops file in Program Files directory 64 IoCs
Processes:
2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exedescription ioc process File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Diagnostics.Tools.dll 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.IO.Compression.Brotli.dll.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.Excel.Excel.x-none.msi.16.x-none.xml.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-black_scale-180.png 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File created C:\Program Files\Java\jre-1.8\legal\javafx\glib.md.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\api-ms-win-crt-private-l1-1-0.dll.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Corbel.xml.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\casual.dotx.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\images\default\linkedin_ghost_profile_large.png.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Marquee.xml 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Dynamic.Runtime.dll 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ClientOSub_eula.txt.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Reflection.DispatchProxy.dll.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-black_scale-180.png 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\clrjit.dll.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\unicode.md.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadco.dll 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-processthreads-l1-1-1.dll 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\VSTOInstallerUI.dll.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Grayscale.xml 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\javafx\webkit.md.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Diagnostics.Tools.dll.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\hive.xsl.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Core.dll 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File created C:\Program Files\7-Zip\Lang\hr.txt.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Red Violet.xml 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File created C:\Program Files\Microsoft Office\root\Office16\ExcelCtxUIFormulaBarModel.bin.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\vk_swiftshader_icd.json.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-040C-1000-0000000FF1CE.xml 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\zlib.md.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\centered.dotx 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\javafx\mesa3d.md.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ko-KR\tipresx.dll.mui 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\splash_11@2x-lic.gif.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPP.HTM.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\MSQRY32.CHM 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-black_scale-80.png.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\jopt-simple.md.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mshwgst.dll 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Median.xml 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.IO.Compression.ZipFile.dll.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.contrast-black_scale-180.png.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\msdaremr.dll.mui 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\WORD_WHATSNEW.XML.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.contrast-white_scale-140.png.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.fr-fr.dll 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jvmticmlr.h 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Text.Json.dll 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\minimalist.dotx.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File created C:\Program Files\7-Zip\Lang\he.txt.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File created C:\Program Files\7-Zip\Lang\kaa.txt.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Ion Boardroom.thmx.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\bcel.md 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\as80.xsl.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File created C:\Program Files\7-Zip\Lang\cs.txt.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File created C:\Program Files\Microsoft Office\root\fre\StartMenu_Win7.wmv.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-black_scale-140.png.id-C0905367.[aerossh@nerdmail.co].AeR 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 6716 vssadmin.exe 6080 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exepid process 768 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe 768 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe 768 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe 768 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe 768 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe 768 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe 768 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe 768 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe 768 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe 768 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe 768 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.execmd.exedescription pid process target process PID 768 wrote to memory of 4840 768 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe cmd.exe PID 768 wrote to memory of 4840 768 2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe cmd.exe PID 4840 wrote to memory of 928 4840 cmd.exe mode.com PID 4840 wrote to memory of 928 4840 cmd.exe mode.com PID 4840 wrote to memory of 6716 4840 cmd.exe vssadmin.exe PID 4840 wrote to memory of 6716 4840 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_0197eb32a39518adbc118ec0559a395c_crysis_dharma.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mode.commode con cp select=12513⤵
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
-
C:\Windows\system32\mode.commode con cp select=12511⤵
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet1⤵
- Interacts with shadow copies
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe.id-C0905367.[aerossh@nerdmail.co].AeRMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.htaFilesize
4KB
MD520a69f1a6d158008842397905e9ea5e2
SHA135050d5a90e0b15863874f0b3ea54c725a13067e
SHA2566a82ec020929c089dae8c2961ad0d435925824f26d5a7a988c86931e7271fd2e
SHA51237e9ab15ee4c0643c744207d8c79a603693133fd78a9de29f8abd4c25beb4efa23f1f9f857ca2abc52fd9df918ef24fd8b7221897c8cccd4b6dff64c46ec5969