General
-
Target
65ac9daf3070161ac996fb8946632599547f1c9450d7dcd0f8dc1c85b4e8b3b7.zip
-
Size
149KB
-
Sample
250309-vfyv2swtay
-
MD5
e32c2b2810fdf8d277b9e9f95b273042
-
SHA1
4382a3a1e6965f4e0bea5200a4d5d8e92c083e06
-
SHA256
591c9b81e7db60504efbdd41d6c6f67c62f6782bb514b7d80feaf36193be365c
-
SHA512
63d0505d864fc4246e0afcd825696ed6862f624ae8ff50661b77b0cdcefb08c5c135cab012bef8832f7f38859c0747cd056f4d9460777c7eef79216f32c39490
-
SSDEEP
3072:WALVDe5HbpF3fWOptj5x7UwIGbhDjXXRrFGvkBYo96hDHwk3cApi:WwDiT355UUbhXRxUaYo96hhMB
Static task
static1
Behavioral task
behavioral1
Sample
65ac9daf3070161ac996fb8946632599547f1c9450d7dcd0f8dc1c85b4e8b3b7.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
65ac9daf3070161ac996fb8946632599547f1c9450d7dcd0f8dc1c85b4e8b3b7.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Targets
-
-
Target
65ac9daf3070161ac996fb8946632599547f1c9450d7dcd0f8dc1c85b4e8b3b7.exe
-
Size
243KB
-
MD5
f3c11989987acee8b271f571cdc7757c
-
SHA1
50a191d53bc397ce08af356a224135488ed23619
-
SHA256
65ac9daf3070161ac996fb8946632599547f1c9450d7dcd0f8dc1c85b4e8b3b7
-
SHA512
27e9690090d4d928140b0c6b34205371bd2c8cce8423308fff0fdbd1ebfec9b4b50538a226de73145598aa4f7d9153db67a21cebed00808466cf2a93b697a119
-
SSDEEP
3072:X9As+JFTpwVwFVSY9QziR0BEchY/VMaFWfC2UdG8zeIw0fuZb56RxokMUuncB:NAxFTpwCFkxBYRW3sZ33eYAk4Q
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (313) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
System Binary Proxy Execution: Regsvcs/Regasm
Abuse Regasm to proxy execution of malicious code.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
2System Binary Proxy Execution
1Regsvcs/Regasm
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1