Analysis
-
max time kernel
15s -
max time network
42s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
15-05-2021 17:52
Static task
static1
Behavioral task
behavioral1
Sample
ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c.exe
Resource
win10v20210410
General
-
Target
ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c.exe
-
Size
80KB
-
MD5
bb346e1f39341855261b4b66a8536370
-
SHA1
9b14ff82649e7e410deb715e3a440797ddd0bb99
-
SHA256
ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c
-
SHA512
6328f5219e2a78a2d04a34ecde75e2423c158f3ae8aa9c6facf1ab3cab5d0409dfbebca783647f467c314c5c85b1c5a22740a6c8a2509ecad1611c1dc3e2e4f5
Malware Config
Extracted
C:\Users\Admin\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/qVgxyw9j
http://goldeny4vs3nyoht.onion/qVgxyw9j
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Executes dropped EXE 1 IoCs
pid Process 1640 verclsid.exe -
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\OptimizeMerge.crw => C:\Users\Admin\Pictures\OptimizeMerge.crw.qVgxyw9j verclsid.exe File opened for modification C:\Users\Admin\Pictures\RemoveResolve.tiff verclsid.exe File renamed C:\Users\Admin\Pictures\RemoveResolve.tiff => C:\Users\Admin\Pictures\RemoveResolve.tiff.qVgxyw9j verclsid.exe File renamed C:\Users\Admin\Pictures\RenamePublish.png => C:\Users\Admin\Pictures\RenamePublish.png.qVgxyw9j verclsid.exe File renamed C:\Users\Admin\Pictures\BackupDisconnect.raw => C:\Users\Admin\Pictures\BackupDisconnect.raw.qVgxyw9j verclsid.exe -
Loads dropped DLL 1 IoCs
pid Process 1840 ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1840 wrote to memory of 1640 1840 ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c.exe 29 PID 1840 wrote to memory of 1640 1840 ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c.exe 29 PID 1840 wrote to memory of 1640 1840 ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c.exe 29 PID 1840 wrote to memory of 1640 1840 ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c.exe"C:\Users\Admin\AppData\Local\Temp\ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Roaming\{7ac6e4c1-aabc-4b1c-b0a1-7428e746d03b}\verclsid.exe"C:\Users\Admin\AppData\Roaming\{7ac6e4c1-aabc-4b1c-b0a1-7428e746d03b}\verclsid.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
PID:1640
-