Analysis

  • max time kernel
    10s
  • max time network
    127s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    15-05-2021 11:40

General

  • Target

    181e0c4ab2474bb337e349da7ed87fcb5ff87949768dca0a70855e0e499f4728.exe

  • Size

    147KB

  • MD5

    c13ef7d75bea7e8ca137e721b67f6e09

  • SHA1

    6f0806f831c8ba09a2ea5752267d0239f5299302

  • SHA256

    181e0c4ab2474bb337e349da7ed87fcb5ff87949768dca0a70855e0e499f4728

  • SHA512

    cb1cf7077c91dcbe22b80fdbcae7e46d44533247e34896b91f6854e5bc4eb1741b0a0a3d5b24f6d0680759bebe733c68c3dc0401d331f331d352d063468ed53c

Malware Config

Extracted

Path

C:\Users\Admin\YOUR_FILES_ARE_ENCRYPTED.TXT

Ransom Note
You became victim of the GOLDENEYE RANSOMWARE! The files on your computer have been encrypted with an military grade encryption algorithm. There is no way to restore your data without a special key. You can purchase this key on the darknet page shown in step 2. To purchase your key and restore your data, please follow these three easy steps: 1. Download the Tor Browser at "https://www.torproject.org/". If you need help, please google for "access onion page". 2. Visit one of the following pages with the Tor Browser: http://golden5a4eqranh7.onion/t7yfCKJc http://goldeny4vs3nyoht.onion/t7yfCKJc 3. Enter your personal decryption code there: t7yfCKJc78YkeNUN9XeucVMKTGmpXwTK2Aq66rMq17usJTETZ1zJMgSaQzKJigjPpa7R81iemEeDerY1WXpC1QRoqMWjvjBC
URLs

http://golden5a4eqranh7.onion/t7yfCKJc

http://goldeny4vs3nyoht.onion/t7yfCKJc

Signatures

  • Seon

    The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\181e0c4ab2474bb337e349da7ed87fcb5ff87949768dca0a70855e0e499f4728.exe
    "C:\Users\Admin\AppData\Local\Temp\181e0c4ab2474bb337e349da7ed87fcb5ff87949768dca0a70855e0e499f4728.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\AppData\Roaming\{21b813b4-cf48-4863-96e7-c492cb4e2e8c}\rekeywiz.exe
      "C:\Users\Admin\AppData\Roaming\{21b813b4-cf48-4863-96e7-c492cb4e2e8c}\rekeywiz.exe"
      2⤵
      • Executes dropped EXE
      PID:2476

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1808-115-0x0000000000430000-0x000000000057A000-memory.dmp

    Filesize

    1.3MB

  • memory/1808-114-0x0000000000430000-0x000000000057A000-memory.dmp

    Filesize

    1.3MB

  • memory/2476-120-0x0000000000550000-0x000000000069A000-memory.dmp

    Filesize

    1.3MB

  • memory/2476-119-0x0000000000550000-0x000000000069A000-memory.dmp

    Filesize

    1.3MB