Analysis
-
max time kernel
10s -
max time network
127s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
15-05-2021 11:40
Static task
static1
Behavioral task
behavioral1
Sample
181e0c4ab2474bb337e349da7ed87fcb5ff87949768dca0a70855e0e499f4728.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
181e0c4ab2474bb337e349da7ed87fcb5ff87949768dca0a70855e0e499f4728.exe
Resource
win10v20210410
General
-
Target
181e0c4ab2474bb337e349da7ed87fcb5ff87949768dca0a70855e0e499f4728.exe
-
Size
147KB
-
MD5
c13ef7d75bea7e8ca137e721b67f6e09
-
SHA1
6f0806f831c8ba09a2ea5752267d0239f5299302
-
SHA256
181e0c4ab2474bb337e349da7ed87fcb5ff87949768dca0a70855e0e499f4728
-
SHA512
cb1cf7077c91dcbe22b80fdbcae7e46d44533247e34896b91f6854e5bc4eb1741b0a0a3d5b24f6d0680759bebe733c68c3dc0401d331f331d352d063468ed53c
Malware Config
Extracted
C:\Users\Admin\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/t7yfCKJc
http://goldeny4vs3nyoht.onion/t7yfCKJc
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Executes dropped EXE 1 IoCs
pid Process 2476 rekeywiz.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2476 1808 181e0c4ab2474bb337e349da7ed87fcb5ff87949768dca0a70855e0e499f4728.exe 78 PID 1808 wrote to memory of 2476 1808 181e0c4ab2474bb337e349da7ed87fcb5ff87949768dca0a70855e0e499f4728.exe 78 PID 1808 wrote to memory of 2476 1808 181e0c4ab2474bb337e349da7ed87fcb5ff87949768dca0a70855e0e499f4728.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\181e0c4ab2474bb337e349da7ed87fcb5ff87949768dca0a70855e0e499f4728.exe"C:\Users\Admin\AppData\Local\Temp\181e0c4ab2474bb337e349da7ed87fcb5ff87949768dca0a70855e0e499f4728.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Roaming\{21b813b4-cf48-4863-96e7-c492cb4e2e8c}\rekeywiz.exe"C:\Users\Admin\AppData\Roaming\{21b813b4-cf48-4863-96e7-c492cb4e2e8c}\rekeywiz.exe"2⤵
- Executes dropped EXE
PID:2476
-