| File name: | Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.7z |
| Full analysis: | https://app.any.run/tasks/5eaf4ed7-4c51-4f3b-9938-0c3d08616394 |
| Verdict: | Malicious activity |
| Threats: | Dharma is advanced ransomware that has been observed in the wild since 2016. It is considered to be the second most profitable RaaS operation by the FBI. The malware targets hospitals and state organizations, encrypts files, and demands a payment to restore access to lost information. |
| Analysis date: | May 02, 2025, 21:40:54 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-7z-compressed |
| File info: | 7-zip archive data, version 0.4 |
| MD5: | 5CB427C9ADD7FB6BC4D45B2B529DCA6F |
| SHA1: | 97A455E4423AB0D4EC0EC2FF68187734FC001A41 |
| SHA256: | 609C976F42C395500EA292568E94BF111390A99D49EC1403FE2663BB1E3100D4 |
| SSDEEP: | 12288:n2iDaVzNq/h8RwvWzbd8T3lRjUQjzGOtij+unr89z/fSp:2iDAzNqqRwvW/d8T3llUuGOtij+u49zO |
| .7z | | | 7-Zip compressed archive (v0.4) (57.1) |
|---|---|---|
| .7z | | | 7-Zip compressed archive (gen) (42.8) |
| FileVersion: | 7z v0.04 |
|---|---|
| ModifyDate: | 2019:11:20 19:53:44+00:00 |
| ArchivedFileName: | Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 984 | "C:\Windows\system32\cmd.exe" | C:\Windows\System32\cmd.exe | — | Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1548 | "C:\Users\admin\Desktop\Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.exe" | C:\Users\admin\Desktop\Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.exe | explorer.exe | ||||||||||||
User: admin Company: CloneDVD Studio. Integrity Level: HIGH Description: Directives Pipelined Switches Imultiple Francis Privilege Exit code: 0 Version: 7.6.3.3 Modules
| |||||||||||||||
| 2412 | C:\Users\admin\Desktop\Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.exe | C:\Users\admin\Desktop\Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.exe | Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.exe | ||||||||||||
User: admin Company: CloneDVD Studio. Integrity Level: HIGH Description: Directives Pipelined Switches Imultiple Francis Privilege Version: 7.6.3.3 Modules
| |||||||||||||||
| 2448 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.7z | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
| 2544 | mode con cp select=1251 | C:\Windows\System32\mode.com | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: DOS Device MODE Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3080 | vssadmin delete shadows /all /quiet | C:\Windows\System32\vssadmin.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Command Line Interface for Microsoft® Volume Shadow Copy Service Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3312 | C:\Windows\system32\vssvc.exe | C:\Windows\System32\VSSVC.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft® Volume Shadow Copy Service Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip | |||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.7z | |||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (2448) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2412 | Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.exe | C:\$Recycle.Bin\S-1-5-21-1302019708-1500728564-335382590-500\desktop.ini | — | |
MD5:— | SHA256:— | |||
| 2412 | Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.exe | C:\$Recycle.Bin\S-1-5-21-1302019708-1500728564-335382590-1000\desktop.ini | — | |
MD5:— | SHA256:— | |||
| 2412 | Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.exe | C:\config.sys | — | |
MD5:— | SHA256:— | |||
| 2412 | Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.exe | C:\autoexec.bat | — | |
MD5:— | SHA256:— | |||
| 2412 | Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.exe | C:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\AccessMUI.xml | — | |
MD5:— | SHA256:— | |||
| 2412 | Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.exe | C:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\AccLR.cab.id-C4BA3647.[admin@fentex.net].money | — | |
MD5:— | SHA256:— | |||
| 2412 | Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.exe | C:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\Setup.xml | — | |
MD5:— | SHA256:— | |||
| 2412 | Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.exe | C:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\branding.xml | — | |
MD5:— | SHA256:— | |||
| 2412 | Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.exe | C:\MSOCache\All Users\{90140000-0015-040C-0000-0000000FF1CE}-C\AccessMUI.xml | — | |
MD5:— | SHA256:— | |||
| 2412 | Trojan-Ransom.Win32.Crusis.drt-95fab2c98cea2e2e587b6807f64151d2e8acc90ab4c5be176199af57dba9bcd8.exe | C:\MSOCache\All Users\{90140000-0015-0410-0000-0000000FF1CE}-C\AccessMUI.xml | — | |
MD5:— | SHA256:— | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 224.0.0.252:5355 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |