Analysis
-
max time kernel
11s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
16-05-2021 04:46
Static task
static1
Behavioral task
behavioral1
Sample
2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe
Resource
win10v20210410
General
-
Target
2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe
-
Size
80KB
-
MD5
c6c826418defa98a9da4d42922f05ff5
-
SHA1
56dfab44b3cbdb510a6c5c439466a18100456dc5
-
SHA256
2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b
-
SHA512
fda229805746c60dd38b3d9c8be2f2e0e4585bb5e585217660cfbbb5a5952581908e4031b34d3e47bebac2df951710274d1b4ada59474582961cb326281d5d60
Malware Config
Extracted
C:\Users\Admin\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/oczcz5Ex
http://goldeny4vs3nyoht.onion/oczcz5Ex
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Executes dropped EXE 1 IoCs
pid Process 2848 dtdump.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3988 wrote to memory of 2848 3988 2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe 78 PID 3988 wrote to memory of 2848 3988 2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe 78 PID 3988 wrote to memory of 2848 3988 2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe"C:\Users\Admin\AppData\Local\Temp\2b71bdf234f7031f5ddec877413081be39f01241595c4781798f850598b7965b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Roaming\{7a6e0c85-60e4-4ab9-b507-4c4471231b4b}\dtdump.exe"C:\Users\Admin\AppData\Roaming\{7a6e0c85-60e4-4ab9-b507-4c4471231b4b}\dtdump.exe"2⤵
- Executes dropped EXE
PID:2848
-