| download: | /Da2dalus/The-MALWARE-Repo/raw/refs/heads/master/Ransomware/Dharma.exe |
| Full analysis: | https://app.any.run/tasks/90892e47-fc6d-4c94-920a-3b9707572341 |
| Verdict: | Malicious activity |
| Threats: | Dharma is advanced ransomware that has been observed in the wild since 2016. It is considered to be the second most profitable RaaS operation by the FBI. The malware targets hospitals and state organizations, encrypts files, and demands a payment to restore access to lost information. |
| Analysis date: | May 24, 2025, 13:35:25 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | 928E37519022745490D1AF1CE6F336F7 |
| SHA1: | B7840242393013F2C4C136AC7407E332BE075702 |
| SHA256: | 6FB303DD8BA36381948127D44BD8541E4A1AB8AF07B46526ACE08458F2498850 |
| SSDEEP: | 196608:JZnMy97vfgla5NX7YaP6uIEJsp+jb4agYSUpHm6g90MrYmhZZoG0tLzr1+W:LnMy9rfma5NrYaVzC0b4vpZZoG0tR+W |
| .exe | | | Win64 Executable (generic) (64.6) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (15.4) |
| .exe | | | Win32 Executable (generic) (10.5) |
| .exe | | | Generic Win/DOS Executable (4.6) |
| .exe | | | DOS Executable Generic (4.6) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2020:06:25 10:38:29+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14 |
| CodeSize: | 155648 |
| InitializedDataSize: | 112640 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x13c60 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 664 | C:\WINDOWS\system32\net1 start Telnet | C:\Windows\SysWOW64\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1072 | C:\WINDOWS\system32\cmd.exe /c WMIC Group Where "SID = 'S-1-5-32-544'" Get Name /Value | Find "=" | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1072 | C:\WINDOWS\system32\cmd.exe /c WMIC Group Where "SID = 'S-1-5-32-555'" Get Name /Value | Find "=" | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1072 | reg add "HKLM\system\CurrentControlSet\Control\Terminal Server" /v "AllowTSConnections" /t REG_DWORD /d 0x1 /f | C:\Windows\SysWOW64\reg.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Registry Console Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1088 | net localgroup Administrators systembackup /add | C:\Windows\SysWOW64\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1116 | "C:\Users\admin\Downloads\ac\mssql.exe" | C:\Users\admin\Downloads\ac\mssql.exe | Dharma.exe | ||||||||||||
User: admin Company: 一普明为(北京)信息技术有限公司 Integrity Level: HIGH Description: Epoolsoft Windows Information View Tools Exit code: 20 Version: 1.0.0.5 Modules
| |||||||||||||||
| 1280 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1532 | C:\WINDOWS\system32\net1 accounts /forcelogoff:no /maxpwage:unlimited | C:\Windows\SysWOW64\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1672 | "C:\Users\admin\Downloads\ac\nc123.exe" | C:\Users\admin\Downloads\ac\nc123.exe | — | Dharma.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221225786 Modules
| |||||||||||||||
| 2236 | WMIC Group Where "SID = 'S-1-5-32-555'" Get Name /Value | C:\Windows\SysWOW64\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: WMI Commandline Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (4692) Dharma.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR SFX |
| Operation: | write | Name: | ac |
Value: ac | |||
| (PID) Process: | (1116) mssql.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\mssqlaq |
| Operation: | write | Name: | Type |
Value: 1 | |||
| (PID) Process: | (1116) mssql.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\mssqlaq |
| Operation: | write | Name: | ErrorControl |
Value: 1 | |||
| (PID) Process: | (1116) mssql.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\mssqlaq |
| Operation: | write | Name: | Start |
Value: 1 | |||
| (PID) Process: | (1116) mssql.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\mssqlaq |
| Operation: | write | Name: | ImagePath |
Value: \??\C:\Users\admin\Downloads\ac\mssqlaq.sys | |||
| (PID) Process: | (1116) mssql.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\mssqlaq |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (1116) mssql.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\jfaeyaynohmyjxpd |
| Operation: | write | Name: | Type |
Value: 1 | |||
| (PID) Process: | (1116) mssql.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\jfaeyaynohmyjxpd |
| Operation: | write | Name: | ErrorControl |
Value: 1 | |||
| (PID) Process: | (1116) mssql.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\jfaeyaynohmyjxpd |
| Operation: | write | Name: | Start |
Value: 1 | |||
| (PID) Process: | (1116) mssql.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\jfaeyaynohmyjxpd |
| Operation: | write | Name: | ImagePath |
Value: \??\C:\Users\admin\Downloads\ac\jfaeyaynohmyjxpd.sys | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4692 | Dharma.exe | C:\Users\admin\Downloads\ac\mssql.exe | executable | |
MD5:F6A3D38AA0AE08C3294D6ED26266693F | SHA256:C522E0B5332CAC67CDE8FC84080DB3B8F2E0FE85F178D788E38B35BBE4D464AD | |||
| 4692 | Dharma.exe | C:\Users\admin\Downloads\ac\Shadow.bat | text | |
MD5:DF8394082A4E5B362BDCB17390F6676D | SHA256:DA3F155CFB98CE0ADD29A31162D23DA7596DA44BA2391389517FE1A2790DA878 | |||
| 4692 | Dharma.exe | C:\Users\admin\Downloads\ac\unlocker.exe | executable | |
MD5:5840AA36B70B7C03C25E5E1266C5835B | SHA256:09D7FCBF95E66B242FF5D7BC76E4D2C912462C8C344CB2B90070A38D27AAEF53 | |||
| 4692 | Dharma.exe | C:\Users\admin\Downloads\ac\mssql2.exe | executable | |
MD5:F7D94750703F0C1DDD1EDD36F6D0371D | SHA256:659E441CADD42399FC286B92BBC456FF2E9ECB24984C0586ACF83D73C772B45D | |||
| 4692 | Dharma.exe | C:\Users\admin\Downloads\ac\EVER\SearchHost.exe | executable | |
MD5:8ADD121FA398EBF83E8B5DB8F17B45E0 | SHA256:35C4A6C1474EB870EEC901CEF823CC4931919A4E963C432CE9EFBB30C2D8A413 | |||
| 4692 | Dharma.exe | C:\Users\admin\Downloads\ac\nc123.exe | executable | |
MD5:597DE376B1F80C06D501415DD973DCEC | SHA256:F47E3555461472F23AB4766E4D5B6F6FD260E335A6ABC31B860E569A720A5446 | |||
| 4692 | Dharma.exe | C:\Users\admin\Downloads\ac\EVER\Everything.ini | text | |
MD5:5531BBB8BE242DFC9950F2C2C8AA0058 | SHA256:4F03AB645FE48BF3783EB58568E89B3B3401956DD17CB8049444058DAB0634D7 | |||
| 1116 | mssql.exe | C:\Users\admin\Downloads\ac\lbyceyemeoscykb.sys | executable | |
MD5:B2233D1EFB0B7A897EA477A66CD08227 | SHA256:5FD17E3B8827B5BB515343BC4066BE0814F6466FB4294501BECAC284A378C0DA | |||
| 1116 | mssql.exe | C:\Users\admin\Downloads\ac\yrilhdmgodwkxpsco.sys | executable | |
MD5:B2233D1EFB0B7A897EA477A66CD08227 | SHA256:5FD17E3B8827B5BB515343BC4066BE0814F6466FB4294501BECAC284A378C0DA | |||
| 1116 | mssql.exe | C:\Users\admin\Downloads\ac\sxywuiwuoriggrdh.sys | executable | |
MD5:B2233D1EFB0B7A897EA477A66CD08227 | SHA256:5FD17E3B8827B5BB515343BC4066BE0814F6466FB4294501BECAC284A378C0DA | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 2.16.168.114:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.219.150.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.219.150.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4068 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
4068 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 2.16.168.114:80 | crl.microsoft.com | Akamai International B.V. | RU | whitelisted |
— | — | 23.219.150.101:80 | www.microsoft.com | AKAMAI-AS | CL | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.219.150.101:80 | www.microsoft.com | AKAMAI-AS | CL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 40.126.32.138:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 2.23.77.188:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
2104 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.2:445 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |