General
-
Target
e14f32bdfbb2dc1117736029677effdedec2f570d73092261ba98f040a1b282f
-
Size
456KB
-
Sample
240624-k4fdhaxhkl
-
MD5
51d9dcc7dce74d74af3e82399f8282ee
-
SHA1
b2fc528b252e419fb9ea002931d37942108f3c29
-
SHA256
e14f32bdfbb2dc1117736029677effdedec2f570d73092261ba98f040a1b282f
-
SHA512
eb01c1f8cda35f423b7529c2c1337afd0e504c5ade1631ce31f3b589fe75bfa35777372c189772531eac37900d1de7d58bd57b8ae752049ba4abd648e72644f2
-
SSDEEP
12288:SA4jjwCzPR7cRxotdA8N5BfnR+da2GWlLJ8y:0jj60td/zpnR52Juy
Static task
static1
Behavioral task
behavioral1
Sample
e14f32bdfbb2dc1117736029677effdedec2f570d73092261ba98f040a1b282f.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e14f32bdfbb2dc1117736029677effdedec2f570d73092261ba98f040a1b282f.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\README.hta
Extracted
C:\Users\Admin\Documents\OneNote Notebooks\README.hta
Targets
-
-
Target
e14f32bdfbb2dc1117736029677effdedec2f570d73092261ba98f040a1b282f
-
Size
456KB
-
MD5
51d9dcc7dce74d74af3e82399f8282ee
-
SHA1
b2fc528b252e419fb9ea002931d37942108f3c29
-
SHA256
e14f32bdfbb2dc1117736029677effdedec2f570d73092261ba98f040a1b282f
-
SHA512
eb01c1f8cda35f423b7529c2c1337afd0e504c5ade1631ce31f3b589fe75bfa35777372c189772531eac37900d1de7d58bd57b8ae752049ba4abd648e72644f2
-
SSDEEP
12288:SA4jjwCzPR7cRxotdA8N5BfnR+da2GWlLJ8y:0jj60td/zpnR52Juy
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Contacts a large (517) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-