Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
137s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
16/05/2021, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
3d8c03ffa5fb4a6eef11b131a267b2208193f531fd1d0d2cabc392852e9e5289.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
3d8c03ffa5fb4a6eef11b131a267b2208193f531fd1d0d2cabc392852e9e5289.exe
Resource
win10v20210408
General
-
Target
3d8c03ffa5fb4a6eef11b131a267b2208193f531fd1d0d2cabc392852e9e5289.exe
-
Size
147KB
-
MD5
b9426017b811a9d3f54171882c63535e
-
SHA1
dd8ff3a8521f910b31214e08ee438addeae22358
-
SHA256
3d8c03ffa5fb4a6eef11b131a267b2208193f531fd1d0d2cabc392852e9e5289
-
SHA512
d92b5e14f2095bccafafbb6d2fc3c0a1140bc5ac729c1dbe06d31180ed6f6fd326b77f7cf1a91778db7cfee1058d1cd127d44700d541f4eedb7c5e3559e4e06e
Malware Config
Extracted
C:\Users\Admin\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/nRhAUTwV
http://goldeny4vs3nyoht.onion/nRhAUTwV
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Executes dropped EXE 1 IoCs
pid Process 3664 MuiUnattend.exe -
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\HideGrant.raw => C:\Users\Admin\Pictures\HideGrant.raw.nRhAUTwV MuiUnattend.exe File renamed C:\Users\Admin\Pictures\MoveOpen.raw => C:\Users\Admin\Pictures\MoveOpen.raw.nRhAUTwV MuiUnattend.exe File renamed C:\Users\Admin\Pictures\ResizeWrite.raw => C:\Users\Admin\Pictures\ResizeWrite.raw.nRhAUTwV MuiUnattend.exe File renamed C:\Users\Admin\Pictures\DismountFind.png => C:\Users\Admin\Pictures\DismountFind.png.nRhAUTwV MuiUnattend.exe File renamed C:\Users\Admin\Pictures\EnterCopy.crw => C:\Users\Admin\Pictures\EnterCopy.crw.nRhAUTwV MuiUnattend.exe File renamed C:\Users\Admin\Pictures\LimitPing.png => C:\Users\Admin\Pictures\LimitPing.png.nRhAUTwV MuiUnattend.exe File renamed C:\Users\Admin\Pictures\ResetCompress.png => C:\Users\Admin\Pictures\ResetCompress.png.nRhAUTwV MuiUnattend.exe File renamed C:\Users\Admin\Pictures\CheckpointClear.png => C:\Users\Admin\Pictures\CheckpointClear.png.nRhAUTwV MuiUnattend.exe File renamed C:\Users\Admin\Pictures\JoinPush.crw => C:\Users\Admin\Pictures\JoinPush.crw.nRhAUTwV MuiUnattend.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4656 wrote to memory of 3664 4656 3d8c03ffa5fb4a6eef11b131a267b2208193f531fd1d0d2cabc392852e9e5289.exe 75 PID 4656 wrote to memory of 3664 4656 3d8c03ffa5fb4a6eef11b131a267b2208193f531fd1d0d2cabc392852e9e5289.exe 75 PID 4656 wrote to memory of 3664 4656 3d8c03ffa5fb4a6eef11b131a267b2208193f531fd1d0d2cabc392852e9e5289.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d8c03ffa5fb4a6eef11b131a267b2208193f531fd1d0d2cabc392852e9e5289.exe"C:\Users\Admin\AppData\Local\Temp\3d8c03ffa5fb4a6eef11b131a267b2208193f531fd1d0d2cabc392852e9e5289.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Roaming\{b5c09c36-2729-4b0a-bd52-b68be25214cc}\MuiUnattend.exe"C:\Users\Admin\AppData\Roaming\{b5c09c36-2729-4b0a-bd52-b68be25214cc}\MuiUnattend.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
PID:3664
-