Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
26-07-2021 12:59
Static task
static1
Behavioral task
behavioral1
Sample
1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe.sample.exe
Resource
win10v20210410
General
-
Target
1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe.sample.exe
-
Size
150KB
-
MD5
a60b3d8e48f36a9084658fa35a03247e
-
SHA1
a69e8d4a4f6904d1604d77a0eabf224a8421cc0e
-
SHA256
1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe
-
SHA512
d36c5e354bf22a21e52ada0d747418e223a343a14c4bc68e9dad0ac0dbca15e2ad82b395b9fc5792bc3eb673fd3efd5c1b4796b13cdfb99bd0600fca75b83678
Malware Config
Extracted
C:\Users\Admin\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/spgHwwjo
http://goldeny4vs3nyoht.onion/spgHwwjo
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Executes dropped EXE 1 IoCs
pid Process 2032 RunLegacyCPLElevated.exe -
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\UseUpdate.tiff => C:\Users\Admin\Pictures\UseUpdate.tiff.spgHwwjo RunLegacyCPLElevated.exe File renamed C:\Users\Admin\Pictures\CompressEnter.crw => C:\Users\Admin\Pictures\CompressEnter.crw.spgHwwjo RunLegacyCPLElevated.exe File renamed C:\Users\Admin\Pictures\MoveInstall.png => C:\Users\Admin\Pictures\MoveInstall.png.spgHwwjo RunLegacyCPLElevated.exe File opened for modification C:\Users\Admin\Pictures\UseUpdate.tiff RunLegacyCPLElevated.exe -
Loads dropped DLL 1 IoCs
pid Process 1672 1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe.sample.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2032 1672 1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe.sample.exe 29 PID 1672 wrote to memory of 2032 1672 1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe.sample.exe 29 PID 1672 wrote to memory of 2032 1672 1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe.sample.exe 29 PID 1672 wrote to memory of 2032 1672 1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe.sample.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe.sample.exe"C:\Users\Admin\AppData\Local\Temp\1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe.sample.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Roaming\{a22f20d7-490f-4524-871a-9a30691d5643}\RunLegacyCPLElevated.exe"C:\Users\Admin\AppData\Roaming\{a22f20d7-490f-4524-871a-9a30691d5643}\RunLegacyCPLElevated.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
PID:2032
-