Overview
overview
10Static
static
1034c392448f...ea.exe
windows7-x64
1034c392448f...ea.exe
windows7-x64
1034c392448f...ea.exe
windows10-2004-x64
1034c392448f...ea.exe
windows10-ltsc_2021-x64
1034c392448f...ea.exe
windows11-21h2-x64
1037d8add251...4c.exe
windows10-2004-x64
837d8add251...4c.exe
windows7-x64
1037d8add251...4c.exe
windows10-2004-x64
837d8add251...4c.exe
windows10-ltsc_2021-x64
837d8add251...4c.exe
windows11-21h2-x64
83a72653053...59.exe
windows11-21h2-x64
103a72653053...59.exe
windows7-x64
103a72653053...59.exe
windows10-2004-x64
103a72653053...59.exe
windows10-ltsc_2021-x64
103a72653053...59.exe
windows11-21h2-x64
1049aca08f5b...24.exe
windows11-21h2-x64
1049aca08f5b...24.exe
windows7-x64
1049aca08f5b...24.exe
windows10-2004-x64
1049aca08f5b...24.exe
windows10-ltsc_2021-x64
1049aca08f5b...24.exe
windows11-21h2-x64
104a2ad49c93...9f.exe
windows10-2004-x64
34a2ad49c93...9f.exe
windows7-x64
34a2ad49c93...9f.exe
windows10-2004-x64
34a2ad49c93...9f.exe
windows10-ltsc_2021-x64
34a2ad49c93...9f.exe
windows11-21h2-x64
35199b64b50...3c.exe
windows7-x64
5199b64b50...3c.exe
windows7-x64
5199b64b50...3c.exe
windows10-2004-x64
5199b64b50...3c.exe
windows10-ltsc_2021-x64
5199b64b50...3c.exe
windows11-21h2-x64
1Resubmissions
25/03/2025, 13:12
250325-qfl42aznw9 1025/03/2025, 13:09
250325-qdtq4aznv6 1025/03/2025, 13:05
250325-qbtcjszns3 1025/03/2025, 13:01
250325-p9k86awxat 1025/03/2025, 12:55
250325-p58tnawwe1 1025/03/2025, 12:51
250325-p3txqazmt6 1005/02/2025, 11:16
250205-ndjvsavrdm 1016/07/2024, 08:54
240716-kt64gavakp 10Analysis
-
max time kernel
1s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe
Resource
win11-20250313-en
Behavioral task
behavioral6
Sample
37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe
Resource
win11-20250314-en
Behavioral task
behavioral11
Sample
3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe
Resource
win11-20250313-en
Behavioral task
behavioral12
Sample
3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe
Resource
win7-20250207-en
Behavioral task
behavioral13
Sample
3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral15
Sample
3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe
Resource
win11-20250313-en
Behavioral task
behavioral16
Sample
49aca08f5b259860364fc224601a944aa17161bb1da688e24621038457472d24.exe
Resource
win11-20250313-en
Behavioral task
behavioral17
Sample
49aca08f5b259860364fc224601a944aa17161bb1da688e24621038457472d24.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
49aca08f5b259860364fc224601a944aa17161bb1da688e24621038457472d24.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
49aca08f5b259860364fc224601a944aa17161bb1da688e24621038457472d24.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral20
Sample
49aca08f5b259860364fc224601a944aa17161bb1da688e24621038457472d24.exe
Resource
win11-20250313-en
Behavioral task
behavioral21
Sample
4a2ad49c934f9ae6ca6b5d0c7cc34f5e12d349640012fa8cf8eb7e2d3acd6c9f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral22
Sample
4a2ad49c934f9ae6ca6b5d0c7cc34f5e12d349640012fa8cf8eb7e2d3acd6c9f.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
4a2ad49c934f9ae6ca6b5d0c7cc34f5e12d349640012fa8cf8eb7e2d3acd6c9f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral24
Sample
4a2ad49c934f9ae6ca6b5d0c7cc34f5e12d349640012fa8cf8eb7e2d3acd6c9f.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral25
Sample
4a2ad49c934f9ae6ca6b5d0c7cc34f5e12d349640012fa8cf8eb7e2d3acd6c9f.exe
Resource
win11-20250313-en
Behavioral task
behavioral26
Sample
5199b64b50f678d75f85cb0c3ac97d7df67f23471815e21236b1a790d008fe3c.exe
Resource
win7-20241010-en
Behavioral task
behavioral27
Sample
5199b64b50f678d75f85cb0c3ac97d7df67f23471815e21236b1a790d008fe3c.exe
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
5199b64b50f678d75f85cb0c3ac97d7df67f23471815e21236b1a790d008fe3c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
5199b64b50f678d75f85cb0c3ac97d7df67f23471815e21236b1a790d008fe3c.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral30
Sample
5199b64b50f678d75f85cb0c3ac97d7df67f23471815e21236b1a790d008fe3c.exe
Resource
win11-20250313-en
General
-
Target
34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe
-
Size
92KB
-
MD5
21c2b2d0bfc15b3d4bc72263f9db5547
-
SHA1
9f65f98ae2b418425a1d98b8d86bef88edab4d7c
-
SHA256
34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea
-
SHA512
aeeb64dc1130f6e5ccf6ab9abedf01e2a59e149f4897a44b02c32f816ddd1d1698a59447f7ce03dab966972f7714977b49f4b7e0fd258b0bedd936ac1926060a
-
SSDEEP
1536:lBwl+KXpsqN5vlwWYyhY9S4AE4SLlaSXrgKcQ48bcWHpOZ2yr+e72eIGZZyb1j:vw+asqN5aW/hL6dhamQoBU4yTi17j
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe = "C:\\Windows\\System32\\34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe" 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe -
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-814918696-1585701690-3140955116-1000\desktop.ini 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-814918696-1585701690-3140955116-1000\desktop.ini 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\desktop.ini 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\uz.txt 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-environment-l1-1-0.dll 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.he-il.dll.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ja-jp.dll 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\msinfo32.exe.mui 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File created C:\Program Files\7-Zip\Lang\nl.txt.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClient.man 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.de-de.dll.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File created C:\Program Files\7-Zip\Lang\kk.txt.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File created C:\Program Files\7-Zip\Lang\tk.txt.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File created C:\Program Files\DismountExport.xlt.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\pkeyconfig-office.xrm-ms 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\pkeyconfig-office.xrm-ms.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.vi-vn.dll 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File created C:\Program Files\7-Zip\Lang\hu.txt.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File created C:\Program Files\7-Zip\descript.ion.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\oskmenubase.xml 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\Microsoft.WindowsDesktop.App.runtimeconfig.json 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\ShapeCollector.exe.mui 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\CompressUndo.vsx 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.hu-hu.dll 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientEventLogMessages.man.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-environment-l1-1-0.dll.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\nb-NO\tipresx.dll.mui 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\7-Zip\7z.dll.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-processthreads-l1-1-1.dll.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.tr-tr.dll.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\Microsoft.WindowsDesktop.App.runtimeconfig.json.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\concrt140.dll.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\7-Zip\Lang\uz-cyrl.txt 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\oledbjvs.inc 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\SharedPerformance.man.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\msdia90.dll 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVFileSystemMetadata.dll 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\tabskb.dll.mui 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mshwgst.dll 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-filesystem-l1-1-0.dll.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClientIsv.man.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\InputPersonalization.exe.mui 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File created C:\Program Files\7-Zip\Lang\ba.txt.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File created C:\Program Files\DisableDisconnect.mpg.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\symbase.xml 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsesp.xml 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.en-us.dll.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.th-th.dll 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File created C:\Program Files\7-Zip\Lang\th.txt.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RHeartbeatConfig.xml 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-math-l1-1-0.dll.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClient.man.id-4A7B6ACA.[[email protected]].harma 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\tipresx.dll.mui 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 5740 vssadmin.exe 10176 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1952 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe 1952 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe 1952 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe 1952 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe 1952 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe 1952 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1952 wrote to memory of 5308 1952 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe 85 PID 1952 wrote to memory of 5308 1952 34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exeC:\Users\Admin\AppData\Local\Temp\34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe bcdedit /set shutdown /r /f /t 21⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:5308
-
C:\Windows\system32\mode.commode con cp select=12513⤵PID:3236
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:5740
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵PID:3960
-
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1136
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:10176
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:7216
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:5768
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:6264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.id-4A7B6ACA.[[email protected]].harma
Filesize2.7MB
MD5554bf9f679c828845b7392f55e7bd636
SHA17632b8601be6e4531f5dc915514c3f178062b677
SHA2564cf516e0e43500b89164ffb15ed94b98bfd82f18e49b7974d9f9f6db79d84565
SHA512012b22d43c73bfb3d8f9666b1f4659e77be3f812a3613e7a00f6d85ad642d42dc476feda3685c6bd015351599de87942cee4396213286811576bc108852aecec
-
Filesize
13KB
MD5c42a8d39adebdcf43e64398286861643
SHA11c8ae2d6f44b41f386e7b322ab9d5e505114844b
SHA2563cba2bd860faacc12fe806d82f104e416c4522ac83854a98c2ba1ef2c3038843
SHA512ae30accbe334ad1326d33c050fd6fe7c618ed15c387018828eabda2411637a869e4d7bf43ac18e64065788fc209a623a3eb05bab0988a5d650f9e9e0bae40d2b