analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

89583b4e7d88aa33f3d5f300c5271c5c61fd6ea4f8910289f1eb4083bf44527094711ff30b760ec8001c577e46b1e0c4100d9f4ddd919eab8fb536fe16298783

Full analysis: https://app.any.run/tasks/3b990b14-2ae4-4180-bdb0-77e83e77d50f
Verdict: Malicious activity
Threats:

Dharma is advanced ransomware that has been observed in the wild since 2016. It is considered to be the second most profitable RaaS operation by the FBI. The malware targets hospitals and state organizations, encrypts files, and demands a payment to restore access to lost information.

Analysis date: October 05, 2022, 07:45:36
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
dharma
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

B56F8983427DF33C3D50C97407DBEF8E

SHA1:

275ADE619ACF47E84DC2406E082E3C54B33A8780

SHA256:

49C56E5D45BB55760E0BCA8E551133B21656E0E213DCF2F1A4FB22EB575D01CD

SSDEEP:

24576:PdCGjg5mPsWCmFg3EqthzMjMNGaHMRbRVew0RJaES/UVGlesXUiKSqY9TPiir5VV:PdCGjg5cCmqUqthrciw0Rgi8kiqMjiiR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Dharma/Crysis is detected

      • WinRAR.exe (PID: 3104)
  • SUSPICIOUS

    • Reads Internet Settings

      • WinRAR.exe (PID: 3104)
  • INFO

    • Reads the computer name

      • WinRAR.exe (PID: 3104)
    • Process checks LSA protection

      • WinRAR.exe (PID: 3104)
    • Reads the machine GUID from the registry

      • WinRAR.exe (PID: 3104)
    • Checks supported languages

      • WinRAR.exe (PID: 3104)
    • Creates files in the user directory

      • WinRAR.exe (PID: 3104)
    • Creates a file in a temporary directory

      • WinRAR.exe (PID: 3104)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3104)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3104)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #DHARMA winrar.exe

Process information

PID
CMD
Path
Indicators
Parent process
3104"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\89583b4e7d88aa33f3d5f300c5271c5c61fd6ea4f8910289f1eb4083bf44527094711ff30b760ec8001c577e46b1e0c4100d9f4ddd919eab8fb536fe16298783.rar"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Total events
1 408
Read events
1 380
Write events
28
Delete events
0

Modification events

(PID) Process:(3104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3104) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(3104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\89583b4e7d88aa33f3d5f300c5271c5c61fd6ea4f8910289f1eb4083bf44527094711ff30b760ec8001c577e46b1e0c4100d9f4ddd919eab8fb536fe16298783.rar
(PID) Process:(3104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3104) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
5
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3104.16143\STOP RANSOM.exeexecutable
MD5:9F566B7CBFA1CDF326A58A73F36BC74C
SHA256:970A7F3A8E1CAF695DFF4A62F2C9DA51289F3EEA0C7F534DCFCB6CD403F1684B
3104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3104.16143\FREYA.exeexecutable
MD5:60FA17BEB53BCDE9CBFF22D88DC94EBA
SHA256:8CBB55FCA2E9518391C95A2F6307EFB895533A20C9F1248A947CDA16771C9346
3104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3104.16143\conti.exeexecutable
MD5:58AEA2AAC89947773DFAE8E3859E20B0
SHA256:39B74B2FB057E8C78A2BA6639CF3D58AE91685E6AC13B57B70D2AFB158CF742D
3104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3104.16143\dharma.exeexecutable
MD5:BA67DD5AB7D6061704F2903573CEC303
SHA256:6B1F4DF924FB0E5067DF18DFC5063D409F3BF2EE0D14B381B3F583E0D0DA3AE5
3104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3104.16143\RECNYC.exeexecutable
MD5:D7CC6C987C68A88DEFDAB3A59070777E
SHA256:15CC3CAD7AEC406A9EC93554C9EAF0BFBCC740BEF9D52DBC32BF559E90F53FEE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info