The Little Ransomware That Couldn’t (Dharma) - The DFIR Report By editor Published: 2020-06-16 · Archived: 2026-04-05 13:15:14 UTC Ransomware continues unabated in the year of continually mounting pressure. But for every big game actor out there compromising Fortune listed companies there are the little guys that maybe just aren’t as skilled. Initial access: Threat actor logged in from 217.138.202.116 as a local admin at 0858 UTC. Reconnaissance: The threat actor brought their own enumeration and pivoting tool set NS.exe. We’ve seen this tool used time and time again to scan and map file shares. Executed at 0936 UTC.  %USERPROFILE%\Desktop\Oc\NS.exe Action on Objectives: First was the execution of a bat file called shadow.bat, which deletes shadow files https://thedfirreport.com/2020/06/16/the-little-ransomware-that-couldnt-dharma/ Page 1 of 9 vssadmin delete shadows /all Seconds later logdelete.bat is run which clears all log files. Following this, closeapps.bat was run which loops through various common applications to try to prevent open file lockouts keeping critical files from being encrypted. https://thedfirreport.com/2020/06/16/the-little-ransomware-that-couldnt-dharma/ Page 2 of 9 Registry run keys and two startup folders were then created for the primary ransomware file 1pgp.exe. https://thedfirreport.com/2020/06/16/the-little-ransomware-that-couldnt-dharma/ Page 3 of 9 C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1pgp.exe C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\1pgp.exe HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1pgp.exe Finally the ransomware executed and locked up the system. This ransomware can be linked to the Dharma/Crysis family of ransomware based on the pdb path present in the file strings. A rather sparse ransom note was left behind. Lateral Movement Even though the threat actor was running as a domain administrator they did not attempt to move laterally or spread their ransomware. IOC’s MISPPriv 5ee3822c-6828-418c-b619-62de950d210f and 68219. 1pgp.exe|1ebb6bb49ac1077c5e7eba4d56f6a3a1 1ebb6bb49ac1077c5e7eba4d56f6a3a1 1a37bb789c7bdda44330fd55aa292f5f76dada5d 2f2e75affe9217c7211043936678fb1777e2db4a8f1986b8805ddb1e84e9e99b closeapps.bat|9b0d6df42f879ba969f82c7a0ab48bc6 9b0d6df42f879ba969f82c7a0ab48bc6 b5d6f94f270a02abedc7484dc7214d15d2cee99e e25245f98a23596e03e51535beb0f73c000de63e473580c4c26e7b8b01b4e593 Everything.exe|8add121fa398ebf83e8b5db8f17b45e0 8add121fa398ebf83e8b5db8f17b45e0 c8107e5c5e20349a39d32f424668139a36e6cfd0 https://thedfirreport.com/2020/06/16/the-little-ransomware-that-couldnt-dharma/ Page 4 of 9 35c4a6c1474eb870eec901cef823cc4931919a4e963c432ce9efbb30c2d8a413 LogDelete.bat|fb9c610ba195f9b18a96b84c5e755df7 fb9c610ba195f9b18a96b84c5e755df7 5e4f2074850cce0eab4d6165807e86c88b5b8c0b e17ca6c764352c0a74e1e6b80278bb4395588df4bed64833b1b127ea2ca5c5fd NS.exe|597de376b1f80c06d501415dd973dcec 597de376b1f80c06d501415dd973dcec 629c9649ced38fd815124221b80c9d9c59a85e74 f47e3555461472f23ab4766e4d5b6f6fd260e335a6abc31b860e569a720a5446 Shadow.bat|df8394082a4e5b362bdcb17390f6676d df8394082a4e5b362bdcb17390f6676d 5750248ff490ceec03d17ee9811ac70176f46614 da3f155cfb98ce0add29a31162d23da7596da44ba2391389517fe1a2790da878 217.138.202.116 YARA /* YARA Rule Set Author: DFIR Report Date: 2020-06-12 Identifier: dharma-06-12-20 Reference: https://thedfirreport.com/ */ /* Rule Set ----------------------------------------------------------------- */ import "pe" rule vssadmin_Shadow_bat { meta: description = "dharma-06-12-20 - file Shadow.bat" author = "DFIR Report" reference = "https://thedfirreport.com/" date = "2020-06-12" hash1 = "da3f155cfb98ce0add29a31162d23da7596da44ba2391389517fe1a2790da878" strings: $s1 = "vssadmin delete shadows /all" fullword ascii condition: uint16(0) == 0x7376 and filesize < 1KB and all of them } https://thedfirreport.com/2020/06/16/the-little-ransomware-that-couldnt-dharma/ Page 5 of 9 rule Network_Scanner_post_exploit_enumeration { meta: description = "dharma-06-12-20 - file NS.exe" author = "DFIR Report" reference = "https://thedfirreport.com/" date = "2020-06-12" hash1 = "f47e3555461472f23ab4766e4d5b6f6fd260e335a6abc31b860e569a720a5446" strings: $s1 = "CreateMutex error: %d" fullword ascii $s2 = "--Error mount \\\\%s\\%s Code: %d" fullword wide $s3 = "-Found share \\\\%s\\%s" fullword wide $s4 = "--Share \\\\%s\\%s successfully mounted" fullword wide $s5 = "host %s is up" fullword ascii $s6 = "Get ip: %s and mask: %s" fullword wide $s7 = "GetAdaptersInfo failed with error: %d" fullword wide $s8 = "# Network scan and mount include chek for unmounted local volumes. #" fullword wide $s9 = "####################################################################" fullword wide /* $s10 = "Share %s successfully mounted" fullword wide $s11 = "Error mount %s %d" fullword wide $s12 = "Failed to create thread." fullword ascii $s13 = " start scan for shares. " fullword wide $s14 = "# '98' was add for standalone usage! #" fullword wide $s15 = "Error, wrong value." fullword wide $s16 = "QueryDosDeviceW failed with error code %d" fullword wide $s17 = "FindFirstVolumeW failed with error code %d" fullword wide $s18 = "FindNextVolumeW failed with error code %d" fullword wide $s19 = "SetVolumeMountPointW failed with error code %d" fullword wide $s20 = "| + scan local volumes for unmounted drives. |" fullword wide condition: uint16(0) == 0x5a4d and filesize < 400KB and ( pe.imphash() == "0b0d8152ea7241cce613146b80a998fd" or 8 of them ) } rule Dharma_ransomware_1pgp { meta: description = "dharma-06-12-20 - file 1pgp.exe" author = "DFIR Report" reference = "https://thedfirreport.com/" date = "2020-06-12" hash1 = "2f2e75affe9217c7211043936678fb1777e2db4a8f1986b8805ddb1e84e9e99b" strings: $x1 = "C:\\crysis\\Release\\PDB\\payload.pdb" fullword ascii $s2 = "sssssbsss" fullword ascii $s3 = "sssssbs" fullword ascii $s4 = "9c%Q%f" fullword ascii $s5 = "jNYZO\\" fullword ascii $s6 = "RSDS%~m" fullword ascii https://thedfirreport.com/2020/06/16/the-little-ransomware-that-couldnt-dharma/ Page 6 of 9 $s7 = "xy ?*5" fullword ascii $s8 = "