Analysis
-
max time kernel
49s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 06:26
Static task
static1
Behavioral task
behavioral1
Sample
591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe
Resource
win10v2004-20220414-en
General
-
Target
591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe
-
Size
62KB
-
MD5
eb5d62f37c2a7cdd355b483d06ff7278
-
SHA1
e21b853bd54e1305f3c0d0eb6f8da52b70b0d722
-
SHA256
591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b
-
SHA512
80c377cfe3f707bb118740b98f2a04f8e3700394ff7519e09f04a861a2ed91e516337d729526c4203f41c87ffd2de9f6542a9f0986d73f7fec4e32740adfc4b3
Malware Config
Extracted
C:\MSOCache\YOUR_FILES_ARE_ENCRYPTED.TXT
Extracted
C:\Users\Admin\AppData\Local\Temp\readme.hta
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\UseRename.tif => C:\Users\Admin\Pictures\UseRename.tif.FIXT 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File renamed C:\Users\Admin\Pictures\BackupGroup.raw => C:\Users\Admin\Pictures\BackupGroup.raw.FIXT 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File renamed C:\Users\Admin\Pictures\ExitTest.crw => C:\Users\Admin\Pictures\ExitTest.crw.FIXT 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File renamed C:\Users\Admin\Pictures\StepUse.crw => C:\Users\Admin\Pictures\StepUse.crw.FIXT 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\S: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\U: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\J: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\I: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\L: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\Q: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\R: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\T: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\V: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\Z: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\H: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\B: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\D: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\G: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\K: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\M: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\P: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\X: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\A: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\Y: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\F: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\O: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\W: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\E: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1988 1664 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe 29 PID 1664 wrote to memory of 1988 1664 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe 29 PID 1664 wrote to memory of 1988 1664 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe 29 PID 1664 wrote to memory of 1988 1664 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe"C:\Users\Admin\AppData\Local\Temp\591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\mshta.exemshta.exe C:\Users\Admin\AppData\Local\Temp\readme.hta2⤵
- Modifies Internet Explorer settings
PID:1988
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5648ec33ca711ee08410f0cdbbc60325e
SHA17dd2e502ca3366e090b08565c879371bbb6af028
SHA25683760bdab06a2b3214871d736e8c0705818fc0f668e294d5d0aa3ca1e6ae426b
SHA5123a77d9ac2629bf4c524f8f0178620bda5cc5a1c814a17a6db4a4d8eb5c43c141762204fe593fdb54fe4405f052143c69e8bbc178db9c7846d8ec7b0fe36fe2c8