| File name: | CoronaVirus.exe |
| Full analysis: | https://app.any.run/tasks/5e05d215-8e82-4d19-88a8-287dd73c9c90 |
| Verdict: | Malicious activity |
| Threats: | Dharma is advanced ransomware that has been observed in the wild since 2016. It is considered to be the second most profitable RaaS operation by the FBI. The malware targets hospitals and state organizations, encrypts files, and demands a payment to restore access to lost information. |
| Analysis date: | May 16, 2025, 16:27:35 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections |
| MD5: | 055D1462F66A350D9886542D4D79BC2B |
| SHA1: | F1086D2F667D807DBB1AA362A7A809EA119F2565 |
| SHA256: | DDDF7894B2E6AAFA1903384759D68455C3A4A8348A7E2DA3BD272555EBA9BEC0 |
| SSDEEP: | 49152:NAVLvJGpQ1+M8bmNaG4VjxziKFx63HIIq1u2/xlIj4OTxXuKO29/:NAHqVj5iKFzI2/wj5d |
| .exe | | | Win64 Executable (generic) (64.6) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (15.4) |
| .exe | | | Win32 Executable (generic) (10.5) |
| .exe | | | Generic Win/DOS Executable (4.6) |
| .exe | | | DOS Executable Generic (4.6) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2020:02:12 23:09:33+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14 |
| CodeSize: | 577024 |
| InitializedDataSize: | 484864 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x15e1c |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.7.38.662 |
| ProductVersionNumber: | 1.7.38.662 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| FileDescription: | Epershand Sbrnes Validation Purely |
| LegalTrademarks: | Compass Copyright © 2016 All rights reserved. |
| CompanyName: | Compass |
| LegalCopyright: | Compass Copyright © 2016 All rights reserved. |
| FileVersion: | 1.7.38.662 |
| ProductName: | Crpratin Forwarding |
| ProductVersion: | 1.7.38.662 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 780 | vssadmin delete shadows /all /quiet | C:\Windows\System32\vssadmin.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Command Line Interface for Microsoft® Volume Shadow Copy Service Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1020 | vssadmin delete shadows /all /quiet | C:\Windows\System32\vssadmin.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Command Line Interface for Microsoft® Volume Shadow Copy Service Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1276 | "C:\Users\admin\AppData\Local\Temp\CoronaVirus.exe" | C:\Users\admin\AppData\Local\Temp\CoronaVirus.exe | explorer.exe | ||||||||||||
User: admin Company: Compass Integrity Level: MEDIUM Description: Epershand Sbrnes Validation Purely Exit code: 0 Version: 1.7.38.662 Modules
| |||||||||||||||
| 1328 | vssadmin delete shadows /all /quiet | C:\Windows\System32\vssadmin.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Command Line Interface for Microsoft® Volume Shadow Copy Service Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2088 | "C:\WINDOWS\system32\cmd.exe" | C:\Windows\System32\cmd.exe | — | CoronaVirus.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3008 | C:\WINDOWS\system32\vssvc.exe | C:\Windows\System32\VSSVC.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft® Volume Shadow Copy Service Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3784 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4428 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | — | SppExtComObj.Exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5968 | "C:\WINDOWS\system32\cmd.exe" | C:\Windows\System32\cmd.exe | — | CoronaVirus.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6132 | mode con cp select=1251 | C:\Windows\System32\mode.com | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: DOS Device MODE Utility Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (1276) CoronaVirus.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | CoronaVirus.exe |
Value: C:\Users\admin\AppData\Roaming\CoronaVirus.exe | |||
| (PID) Process: | (7152) CoronaVirus.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | CoronaVirus.exe |
Value: C:\WINDOWS\System32\CoronaVirus.exe | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1276 | CoronaVirus.exe | C:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini | — | |
MD5:— | SHA256:— | |||
| 7152 | CoronaVirus.exe | C:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1000\desktop.ini | — | |
MD5:— | SHA256:— | |||
| 7152 | CoronaVirus.exe | C:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-500\desktop.ini | — | |
MD5:— | SHA256:— | |||
| 7152 | CoronaVirus.exe | C:\$Recycle.Bin\S-1-5-18\desktop.ini | — | |
MD5:— | SHA256:— | |||
| 7152 | CoronaVirus.exe | C:\BOOTNXT | — | |
MD5:— | SHA256:— | |||
| 7152 | CoronaVirus.exe | C:\$WinREAgent\Rollback.xml | — | |
MD5:— | SHA256:— | |||
| 7152 | CoronaVirus.exe | C:\$WinREAgent\RollbackInfo.ini | — | |
MD5:— | SHA256:— | |||
| 7152 | CoronaVirus.exe | C:\$WinREAgent\Backup\Winre.wim.id-26B799FA.[coronavirus@qq.com].ncov | — | |
MD5:— | SHA256:— | |||
| 7152 | CoronaVirus.exe | C:\$WinREAgent\Backup\location.txt | — | |
MD5:— | SHA256:— | |||
| 7152 | CoronaVirus.exe | C:\$WinREAgent\Scratch\update.wim.id-26B799FA.[coronavirus@qq.com].ncov | — | |
MD5:— | SHA256:— | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2104 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2112 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2104 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |