Analysis
-
max time kernel
44s -
max time network
137s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
16-05-2021 01:32
Static task
static1
Behavioral task
behavioral1
Sample
3d8c03ffa5fb4a6eef11b131a267b2208193f531fd1d0d2cabc392852e9e5289.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
3d8c03ffa5fb4a6eef11b131a267b2208193f531fd1d0d2cabc392852e9e5289.exe
Resource
win10v20210408
General
-
Target
3d8c03ffa5fb4a6eef11b131a267b2208193f531fd1d0d2cabc392852e9e5289.exe
-
Size
147KB
-
MD5
b9426017b811a9d3f54171882c63535e
-
SHA1
dd8ff3a8521f910b31214e08ee438addeae22358
-
SHA256
3d8c03ffa5fb4a6eef11b131a267b2208193f531fd1d0d2cabc392852e9e5289
-
SHA512
d92b5e14f2095bccafafbb6d2fc3c0a1140bc5ac729c1dbe06d31180ed6f6fd326b77f7cf1a91778db7cfee1058d1cd127d44700d541f4eedb7c5e3559e4e06e
Malware Config
Extracted
C:\Users\Admin\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/nRhAUTwV
http://goldeny4vs3nyoht.onion/nRhAUTwV
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Executes dropped EXE 1 IoCs
Processes:
MuiUnattend.exepid Process 3664 MuiUnattend.exe -
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
MuiUnattend.exedescription ioc Process File renamed C:\Users\Admin\Pictures\HideGrant.raw => C:\Users\Admin\Pictures\HideGrant.raw.nRhAUTwV MuiUnattend.exe File renamed C:\Users\Admin\Pictures\MoveOpen.raw => C:\Users\Admin\Pictures\MoveOpen.raw.nRhAUTwV MuiUnattend.exe File renamed C:\Users\Admin\Pictures\ResizeWrite.raw => C:\Users\Admin\Pictures\ResizeWrite.raw.nRhAUTwV MuiUnattend.exe File renamed C:\Users\Admin\Pictures\DismountFind.png => C:\Users\Admin\Pictures\DismountFind.png.nRhAUTwV MuiUnattend.exe File renamed C:\Users\Admin\Pictures\EnterCopy.crw => C:\Users\Admin\Pictures\EnterCopy.crw.nRhAUTwV MuiUnattend.exe File renamed C:\Users\Admin\Pictures\LimitPing.png => C:\Users\Admin\Pictures\LimitPing.png.nRhAUTwV MuiUnattend.exe File renamed C:\Users\Admin\Pictures\ResetCompress.png => C:\Users\Admin\Pictures\ResetCompress.png.nRhAUTwV MuiUnattend.exe File renamed C:\Users\Admin\Pictures\CheckpointClear.png => C:\Users\Admin\Pictures\CheckpointClear.png.nRhAUTwV MuiUnattend.exe File renamed C:\Users\Admin\Pictures\JoinPush.crw => C:\Users\Admin\Pictures\JoinPush.crw.nRhAUTwV MuiUnattend.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
3d8c03ffa5fb4a6eef11b131a267b2208193f531fd1d0d2cabc392852e9e5289.exedescription pid Process procid_target PID 4656 wrote to memory of 3664 4656 3d8c03ffa5fb4a6eef11b131a267b2208193f531fd1d0d2cabc392852e9e5289.exe 75 PID 4656 wrote to memory of 3664 4656 3d8c03ffa5fb4a6eef11b131a267b2208193f531fd1d0d2cabc392852e9e5289.exe 75 PID 4656 wrote to memory of 3664 4656 3d8c03ffa5fb4a6eef11b131a267b2208193f531fd1d0d2cabc392852e9e5289.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d8c03ffa5fb4a6eef11b131a267b2208193f531fd1d0d2cabc392852e9e5289.exe"C:\Users\Admin\AppData\Local\Temp\3d8c03ffa5fb4a6eef11b131a267b2208193f531fd1d0d2cabc392852e9e5289.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Roaming\{b5c09c36-2729-4b0a-bd52-b68be25214cc}\MuiUnattend.exe"C:\Users\Admin\AppData\Roaming\{b5c09c36-2729-4b0a-bd52-b68be25214cc}\MuiUnattend.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
PID:3664
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
512caae07d19a9d368d33362c4978e25
SHA13ec7fbbe9c675e60a245cc12c149ef0767806119
SHA256547bb6a5db25c6a19588d67eda572bf6fd6076064ab3bad945833f3a6db9f135
SHA5125ced9699cb67f69edc48c752be1afc2bf9ca84efce47d6fc077f35b0ebc2bf6355197a9e6217d40c350a974ed0a88d856dca990c0176b7e599a6c3d8101f5bc7
-
MD5
512caae07d19a9d368d33362c4978e25
SHA13ec7fbbe9c675e60a245cc12c149ef0767806119
SHA256547bb6a5db25c6a19588d67eda572bf6fd6076064ab3bad945833f3a6db9f135
SHA5125ced9699cb67f69edc48c752be1afc2bf9ca84efce47d6fc077f35b0ebc2bf6355197a9e6217d40c350a974ed0a88d856dca990c0176b7e599a6c3d8101f5bc7