Analysis
-
max time kernel
13s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 21:01
Static task
static1
Behavioral task
behavioral1
Sample
CoronaVirus.exe
Resource
win10v2004-20241007-en
General
-
Target
CoronaVirus.exe
-
Size
1.0MB
-
MD5
055d1462f66a350d9886542d4d79bc2b
-
SHA1
f1086d2f667d807dbb1aa362a7a809ea119f2565
-
SHA256
dddf7894b2e6aafa1903384759d68455c3a4a8348a7e2da3bd272555eba9bec0
-
SHA512
2c5e570226252bdb2104c90d5b75f11493af8ed1be8cb0fd14e3f324311a82138753064731b80ce8e8b120b3fe7009b21a50e9f4583d534080e28ab84b83fee1
-
SSDEEP
24576:FRYz/ERA0eMuWfHvgPw/83JI8CorP9qY0:FE/yADMuYvgP93JIc2
Malware Config
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CoronaVirus.exe CoronaVirus.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CoronaVirus.exe = "C:\\Windows\\System32\\CoronaVirus.exe" CoronaVirus.exe -
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-2045521122-590294423-3465680274-1000\desktop.ini CoronaVirus.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2045521122-590294423-3465680274-1000\desktop.ini CoronaVirus.exe File opened for modification C:\Program Files\desktop.ini CoronaVirus.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\CoronaVirus.exe CoronaVirus.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\co.txt.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVManifest.dll CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.hash.id-553F4051.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\7-Zip\Lang\da.txt.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-convert-l1-1-0.dll CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities.json CoronaVirus.exe File opened for modification C:\Program Files\dotnet\LICENSE.txt.id-553F4051.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.vi-vn.dll.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\Microsoft.WindowsDesktop.App.deps.json.id-553F4051.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\7-Zip\Lang\ba.txt.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-file-l2-1-0.dll CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt CoronaVirus.exe File created C:\Program Files\7-Zip\Lang\nl.txt.id-553F4051.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ar-sa.dll.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.el-gr.dll.id-553F4051.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pl-pl.dll.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sk-sk.dll CoronaVirus.exe File opened for modification C:\Program Files\Common Files\System\msadc\adcjavas.inc CoronaVirus.exe File opened for modification C:\Program Files\Crashpad\settings.dat.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\VisualElements\LogoBeta.png.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\ExportBackup.cr2 CoronaVirus.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe.id-553F4051.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\7-Zip\Lang\es.txt.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-file-l1-2-0.dll.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RHeartbeatConfig.xml CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad.xml CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hwrenclm.dat CoronaVirus.exe File created C:\Program Files\dotnet\ThirdPartyNotices.txt.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt CoronaVirus.exe File opened for modification C:\Program Files\Common Files\DESIGNER\MSADDNDR.OLB.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt.id-553F4051.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\7-Zip\Lang\zh-cn.txt.id-553F4051.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\default_apps\external_extensions.json.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\VisualElements\Logo.png.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-utility-l1-1-0.dll.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.da-dk.dll.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Extensions\external_extensions.json.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsptb.xml CoronaVirus.exe File created C:\Program Files\desktop.ini.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-xstate-l2-1-0.dll CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ko-kr.dll.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\descript.ion.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt CoronaVirus.exe File created C:\Program Files\7-Zip\Lang\ku-ckb.txt.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.cs-cz.dll.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe.id-553F4051.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\7-Zip\Lang\ko.txt.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pt-pt.dll.id-553F4051.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\v8_context_snapshot.bin.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-localization-l1-2-0.dll.id-553F4051.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt CoronaVirus.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CoronaVirus.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 21676 vssadmin.exe 21716 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1972 CoronaVirus.exe 1972 CoronaVirus.exe 1972 CoronaVirus.exe 1972 CoronaVirus.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1972 wrote to memory of 8 1972 CoronaVirus.exe 88 PID 1972 wrote to memory of 8 1972 CoronaVirus.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\CoronaVirus.exe"C:\Users\Admin\AppData\Local\Temp\CoronaVirus.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:8
-
C:\Windows\system32\mode.commode con cp select=12513⤵PID:19452
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:21716
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:22024
-
C:\Windows\system32\mode.commode con cp select=12513⤵PID:21700
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:21676
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:21892
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:21884
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:21316
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\f292d1237a1747aebe0acb5862697330 /t 21896 /p 218921⤵PID:13892
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\84a3025c3bc7449287d2b8df20345374 /t 21876 /p 218841⤵PID:13840
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\FILES ENCRYPTED.txt1⤵PID:20716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.id-553F4051.[[email protected]].ncov
Filesize2.7MB
MD5ba02e956b128e191a6283c5db904fd58
SHA1acfe2db83005fc806d23ee9b1d30c0123c424844
SHA2569036d4953ebf80ca2b80634261c7d5596a957d249c54bf3011d137329a3ae5bf
SHA5127d66bde5a5180db14b5c00621d80b47e7d931aee2b6cb32fe76ac15b471e7db3879bdca9c61da7ab92876508fd8dfadcfe2542873a21d481c57341a68ba38918
-
Filesize
13KB
MD59756ab424c3ff7493b3423cfcd07e2b4
SHA18469708fe75216b4bb653484bc57ef14d6f9e30b
SHA2569d10f7124c03a7c7c984a5fe6ddb5003c9526bccd19fdaae7ba0113acb2c8ec9
SHA5124dd7e3e478c00a96b1216ec1311a987c669f1ad8965c23bc9ff78cd0b2c19c8f036a38f53dff2d24e3f61cde5e6694080b67717beea854efaea8c615df2be702
-
Filesize
170B
MD521539971cae3b6278ce678b16b3f2643
SHA1f4357280ca6838b0b62e610c6ffc24d1ab615e37
SHA256b386715edcdb5fbb762f2308d588c5a67bfe65745105b87228596885e4715045
SHA51243f07a7df1bf14f76f60424219f00c051f4097f222f3b453cd208449f30e4915745300ad89f45a738bd828c7691fe97c0a16fa58115057d4ccf0e1784b46a7db