Analysis
-
max time kernel
10s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
15-05-2021 17:52
Static task
static1
Behavioral task
behavioral1
Sample
ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c.exe
Resource
win10v20210410
General
-
Target
ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c.exe
-
Size
80KB
-
MD5
bb346e1f39341855261b4b66a8536370
-
SHA1
9b14ff82649e7e410deb715e3a440797ddd0bb99
-
SHA256
ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c
-
SHA512
6328f5219e2a78a2d04a34ecde75e2423c158f3ae8aa9c6facf1ab3cab5d0409dfbebca783647f467c314c5c85b1c5a22740a6c8a2509ecad1611c1dc3e2e4f5
Malware Config
Extracted
C:\Users\Admin\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/qNLb1Gxx
http://goldeny4vs3nyoht.onion/qNLb1Gxx
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Executes dropped EXE 1 IoCs
pid Process 3400 shutdown.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2232 wrote to memory of 3400 2232 ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c.exe 77 PID 2232 wrote to memory of 3400 2232 ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c.exe 77 PID 2232 wrote to memory of 3400 2232 ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c.exe"C:\Users\Admin\AppData\Local\Temp\ba8695d76cbb3b8b6ef1b6a40c8991f5ce2197af6a5c7ac10c08b5de91b56b6c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Roaming\{e1ba2bbf-13d9-46f1-b849-4fd8b63648fc}\shutdown.exe"C:\Users\Admin\AppData\Roaming\{e1ba2bbf-13d9-46f1-b849-4fd8b63648fc}\shutdown.exe"2⤵
- Executes dropped EXE
PID:3400
-