Analysis
-
max time kernel
9s -
max time network
123s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
16-05-2021 04:46
Static task
static1
Behavioral task
behavioral1
Sample
2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe
Resource
win10v20210410
General
-
Target
2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe
-
Size
80KB
-
MD5
c6c826418defa98a9da4d42922f05ff5
-
SHA1
56dfab44b3cbdb510a6c5c439466a18100456dc5
-
SHA256
2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b
-
SHA512
fda229805746c60dd38b3d9c8be2f2e0e4585bb5e585217660cfbbb5a5952581908e4031b34d3e47bebac2df951710274d1b4ada59474582961cb326281d5d60
Malware Config
Extracted
C:\Users\Admin\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/rKvSZU2H
http://goldeny4vs3nyoht.onion/rKvSZU2H
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Executes dropped EXE 1 IoCs
pid Process 1516 tasklist.exe -
Loads dropped DLL 1 IoCs
pid Process 1056 2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1516 tasklist.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1056 wrote to memory of 1516 1056 2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe 29 PID 1056 wrote to memory of 1516 1056 2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe 29 PID 1056 wrote to memory of 1516 1056 2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe 29 PID 1056 wrote to memory of 1516 1056 2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe"C:\Users\Admin\AppData\Local\Temp\2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Roaming\{5f31f8c5-2e51-4285-b413-c75f2f031d77}\tasklist.exe"C:\Users\Admin\AppData\Roaming\{5f31f8c5-2e51-4285-b413-c75f2f031d77}\tasklist.exe"2⤵
- Executes dropped EXE
- Enumerates processes with tasklist
PID:1516
-