Analysis
-
max time kernel
14s -
max time network
129s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
26-07-2021 12:59
Static task
static1
Behavioral task
behavioral1
Sample
1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe.sample.exe
Resource
win10v20210410
General
-
Target
1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe.sample.exe
-
Size
150KB
-
MD5
a60b3d8e48f36a9084658fa35a03247e
-
SHA1
a69e8d4a4f6904d1604d77a0eabf224a8421cc0e
-
SHA256
1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe
-
SHA512
d36c5e354bf22a21e52ada0d747418e223a343a14c4bc68e9dad0ac0dbca15e2ad82b395b9fc5792bc3eb673fd3efd5c1b4796b13cdfb99bd0600fca75b83678
Malware Config
Extracted
C:\Users\Admin\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/xZ4abKxo
http://goldeny4vs3nyoht.onion/xZ4abKxo
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Executes dropped EXE 1 IoCs
pid Process 2816 EhStorAuthn.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3368 wrote to memory of 2816 3368 1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe.sample.exe 78 PID 3368 wrote to memory of 2816 3368 1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe.sample.exe 78 PID 3368 wrote to memory of 2816 3368 1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe.sample.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe.sample.exe"C:\Users\Admin\AppData\Local\Temp\1c1768c6fa0a08f053da6a0dedd5cff04471eddb02b4934f280c1d78d61076fe.sample.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Roaming\{e13e457b-abcd-450f-afdf-74e26890829a}\EhStorAuthn.exe"C:\Users\Admin\AppData\Roaming\{e13e457b-abcd-450f-afdf-74e26890829a}\EhStorAuthn.exe"2⤵
- Executes dropped EXE
PID:2816
-