Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/01/2025, 19:16

General

  • Target

    03318fc8ac8ebfc2f093c64f02c4eaef2cb9c886270d04fac120d21005020d16.exe

  • Size

    92KB

  • MD5

    55e784c5be50ae7c1049bc0fe346fa42

  • SHA1

    6d45524919344c8ddde7851373c55474f4361c6a

  • SHA256

    03318fc8ac8ebfc2f093c64f02c4eaef2cb9c886270d04fac120d21005020d16

  • SHA512

    93fdc88eb4dbbe13636c44423169a7d6f420106285ea75b03f8b322af259e6ae8f69601c467ba212795ee99c67358822fff73fec4ee255222fc832ee2b447b89

  • SSDEEP

    1536:mBwl+KXpsqN5vlwWYyhY9S4AC7ZoqfmlZG1ZlKqPVERK+W9WS1DE:Qw+asqN5aW/hL4lo81TTeALfDE

Malware Config

Extracted

Path

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

Ransom Note
We downloaded to our servers and encrypted all your databases and personal information! If you do not write to us within 24 hours, we will start publishing and selling your data on the darknet on hacker sites and offer the information to your competitors email us: [email protected] YOUR ID If you haven't heard back within 24 hours, write to this email: [email protected] IMPORTANT INFORMATION! Keep in mind that once your data appears on our leak site,it could be bought by your competitors at any second, so don't hesitate for a long time.The sooner you pay the ransom, the sooner your company will be safe.. Guarantee:If we don't provide you with a decryptor or delete your data after you pay,no one will pay us in the future. We value our reputation. Guarantee key:To prove that the decryption key exists, we can test the file (not the database and backup) for free. Do not try to decrypt your data using third party software, it may cause permanent data loss. Don't go to recovery companies - they are essentially just middlemen.Decryption of your files with the help of third parties may cause increased price (they add their fee to our) we're the only ones who have the decryption keys.

Signatures

  • Dharma

    Dharma is a ransomware that uses security software installation to hide malicious activities.

  • Dharma family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (516) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\03318fc8ac8ebfc2f093c64f02c4eaef2cb9c886270d04fac120d21005020d16.exe
    "C:\Users\Admin\AppData\Local\Temp\03318fc8ac8ebfc2f093c64f02c4eaef2cb9c886270d04fac120d21005020d16.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3616
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Windows\system32\mode.com
        mode con cp select=1251
        3⤵
          PID:2664
        • C:\Windows\system32\vssadmin.exe
          vssadmin delete shadows /all /quiet
          3⤵
          • Interacts with shadow copies
          PID:5420
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5500
        • C:\Windows\system32\mode.com
          mode con cp select=1251
          3⤵
            PID:7932
          • C:\Windows\system32\vssadmin.exe
            vssadmin delete shadows /all /quiet
            3⤵
            • Interacts with shadow copies
            PID:9068
        • C:\Windows\System32\mshta.exe
          "C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"
          2⤵
            PID:9172
          • C:\Windows\System32\mshta.exe
            "C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"
            2⤵
              PID:7960
          • C:\Windows\system32\vssvc.exe
            C:\Windows\system32\vssvc.exe
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3940

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.id-6072A2EC.[[email protected]].2023

            Filesize

            2.7MB

            MD5

            d75ef3bde0992f01191b2ece9133816e

            SHA1

            0a2af59ea4cfc2bd8188643646772555320557f7

            SHA256

            897a0aac17144a4c768f96d4cb4ea3034f3e611a1793884337da6474affc9c2e

            SHA512

            8ea63f132b950dc84686a528dce78d3a316517115c4647830ccfa35b47e3ff516d918f3cc3a868e0053b91f6ffff93093eb364cf2bf9d571e56f48924ed8d446

          • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

            Filesize

            7KB

            MD5

            25ced221f6fc33eb664ee00a409c7182

            SHA1

            f987f866db5cb443e9e5e8d47e3281d300f6d5f4

            SHA256

            eb9b2c2fb7e607fde5a692638f82af78c3cb3c7958f40758ab29798779b62596

            SHA512

            35c52bc62589dd487582b2aabbf0f4ac90a5a42f1a9d79cb7ea25d6b6302e6c28580e679f7a5499396649b5284b00b9cffad52ae751d31f67c1de2e308bb6a1b