General
-
Target
S1_E2_animation OG.txt
-
Size
3KB
-
Sample
240718-rf8tgasakl
-
MD5
a306a7a50aa416c57cddef28ad6f85e8
-
SHA1
740abe46c4c4fd8ed03942ab76aba8eb7953124b
-
SHA256
cd0f51bb462adbc4295c75acada5f398b8f044ffb04f14796cf3b95a4b94ad8e
-
SHA512
c2f0b9d30a9036d73f6678e7b59daaeaa2395731df34c6ed274261f2a7ca3f0a812d2fb4e08bfd4d98630b5248dd28e87df8daaf5ba391fed51b11dafd4302ec
Static task
static1
Behavioral task
behavioral1
Sample
S1_E2_animation OG.txt
Resource
win11-20240709-en
Malware Config
Targets
-
-
Target
S1_E2_animation OG.txt
-
Size
3KB
-
MD5
a306a7a50aa416c57cddef28ad6f85e8
-
SHA1
740abe46c4c4fd8ed03942ab76aba8eb7953124b
-
SHA256
cd0f51bb462adbc4295c75acada5f398b8f044ffb04f14796cf3b95a4b94ad8e
-
SHA512
c2f0b9d30a9036d73f6678e7b59daaeaa2395731df34c6ed274261f2a7ca3f0a812d2fb4e08bfd4d98630b5248dd28e87df8daaf5ba391fed51b11dafd4302ec
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Modifies WinLogon for persistence
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (592) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
4