Analysis
-
max time kernel
16s -
max time network
41s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
15/05/2021, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
fec02d2f54f1d7421f44ad9cafe2649259e144dc5fcb5bc88a52943362e5b267.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
fec02d2f54f1d7421f44ad9cafe2649259e144dc5fcb5bc88a52943362e5b267.exe
Resource
win10v20210410
General
-
Target
fec02d2f54f1d7421f44ad9cafe2649259e144dc5fcb5bc88a52943362e5b267.exe
-
Size
147KB
-
MD5
c3d390ed9736f3b0e358d25132f0170e
-
SHA1
1d9ba08d7cc917287c52540e173f4ddcc34566be
-
SHA256
fec02d2f54f1d7421f44ad9cafe2649259e144dc5fcb5bc88a52943362e5b267
-
SHA512
5221a2e3dc5324ca553383b4d4621f13b74f8d5cefa29fa4bdcfd448e7092d70ddf63d943f42d525971325f738a8b6bda6afa2af14803e4dbd4fe7478c9a4eed
Malware Config
Extracted
C:\Users\Admin\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/nTv99py2
http://goldeny4vs3nyoht.onion/nTv99py2
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Executes dropped EXE 1 IoCs
pid Process 1420 dialer.exe -
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ResumeConnect.png => C:\Users\Admin\Pictures\ResumeConnect.png.nTv99py2 dialer.exe File renamed C:\Users\Admin\Pictures\DebugExpand.raw => C:\Users\Admin\Pictures\DebugExpand.raw.nTv99py2 dialer.exe File renamed C:\Users\Admin\Pictures\InstallFind.raw => C:\Users\Admin\Pictures\InstallFind.raw.nTv99py2 dialer.exe File opened for modification C:\Users\Admin\Pictures\ProtectRequest.tiff dialer.exe File renamed C:\Users\Admin\Pictures\ProtectRequest.tiff => C:\Users\Admin\Pictures\ProtectRequest.tiff.nTv99py2 dialer.exe File renamed C:\Users\Admin\Pictures\RegisterUpdate.raw => C:\Users\Admin\Pictures\RegisterUpdate.raw.nTv99py2 dialer.exe -
Loads dropped DLL 2 IoCs
pid Process 748 fec02d2f54f1d7421f44ad9cafe2649259e144dc5fcb5bc88a52943362e5b267.exe 748 fec02d2f54f1d7421f44ad9cafe2649259e144dc5fcb5bc88a52943362e5b267.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 748 wrote to memory of 1420 748 fec02d2f54f1d7421f44ad9cafe2649259e144dc5fcb5bc88a52943362e5b267.exe 29 PID 748 wrote to memory of 1420 748 fec02d2f54f1d7421f44ad9cafe2649259e144dc5fcb5bc88a52943362e5b267.exe 29 PID 748 wrote to memory of 1420 748 fec02d2f54f1d7421f44ad9cafe2649259e144dc5fcb5bc88a52943362e5b267.exe 29 PID 748 wrote to memory of 1420 748 fec02d2f54f1d7421f44ad9cafe2649259e144dc5fcb5bc88a52943362e5b267.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\fec02d2f54f1d7421f44ad9cafe2649259e144dc5fcb5bc88a52943362e5b267.exe"C:\Users\Admin\AppData\Local\Temp\fec02d2f54f1d7421f44ad9cafe2649259e144dc5fcb5bc88a52943362e5b267.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Roaming\{d93c1918-e9a0-46af-afa8-1b23579f54bb}\dialer.exe"C:\Users\Admin\AppData\Roaming\{d93c1918-e9a0-46af-afa8-1b23579f54bb}\dialer.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
PID:1420
-