Analysis
-
max time kernel
188s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 06:26
Static task
static1
Behavioral task
behavioral1
Sample
591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe
Resource
win10v2004-20220414-en
General
-
Target
591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe
-
Size
62KB
-
MD5
eb5d62f37c2a7cdd355b483d06ff7278
-
SHA1
e21b853bd54e1305f3c0d0eb6f8da52b70b0d722
-
SHA256
591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b
-
SHA512
80c377cfe3f707bb118740b98f2a04f8e3700394ff7519e09f04a861a2ed91e516337d729526c4203f41c87ffd2de9f6542a9f0986d73f7fec4e32740adfc4b3
Malware Config
Extracted
C:\odt\YOUR_FILES_ARE_ENCRYPTED.TXT
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Modifies extensions of user files 14 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\UseUnblock.tiff => C:\Users\Admin\Pictures\UseUnblock.tiff.FIXT 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened for modification C:\Users\Admin\Pictures\AssertJoin.tiff 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened for modification C:\Users\Admin\Pictures\UseUnblock.tiff 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File renamed C:\Users\Admin\Pictures\BlockResume.crw => C:\Users\Admin\Pictures\BlockResume.crw.FIXT 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File renamed C:\Users\Admin\Pictures\CloseBackup.tif => C:\Users\Admin\Pictures\CloseBackup.tif.FIXT 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File renamed C:\Users\Admin\Pictures\CompleteUnprotect.png => C:\Users\Admin\Pictures\CompleteUnprotect.png.FIXT 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File renamed C:\Users\Admin\Pictures\ReceiveInvoke.tif => C:\Users\Admin\Pictures\ReceiveInvoke.tif.FIXT 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File renamed C:\Users\Admin\Pictures\ConfirmTest.raw => C:\Users\Admin\Pictures\ConfirmTest.raw.FIXT 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File renamed C:\Users\Admin\Pictures\SuspendCompare.crw => C:\Users\Admin\Pictures\SuspendCompare.crw.FIXT 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened for modification C:\Users\Admin\Pictures\UndoUpdate.tiff 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File renamed C:\Users\Admin\Pictures\AssertJoin.tiff => C:\Users\Admin\Pictures\AssertJoin.tiff.FIXT 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File renamed C:\Users\Admin\Pictures\UndoUpdate.tiff => C:\Users\Admin\Pictures\UndoUpdate.tiff.FIXT 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File renamed C:\Users\Admin\Pictures\UnprotectClose.raw => C:\Users\Admin\Pictures\UnprotectClose.raw.FIXT 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File renamed C:\Users\Admin\Pictures\WatchPing.crw => C:\Users\Admin\Pictures\WatchPing.crw.FIXT 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\M: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\T: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\U: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\G: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\J: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\X: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\Y: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\A: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\B: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\K: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\L: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\N: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\P: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\S: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\V: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\E: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\F: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\H: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\I: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\O: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\Q: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\R: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\W: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe File opened (read-only) \??\Z: 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 532 wrote to memory of 4656 532 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe 89 PID 532 wrote to memory of 4656 532 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe 89 PID 532 wrote to memory of 4656 532 591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe"C:\Users\Admin\AppData\Local\Temp\591e7f5eb141c22919a406508f63a558e3bd732fe38844cedbbea938d666e78b.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\mshta.exemshta.exe C:\Users\Admin\AppData\Local\Temp\readme.hta2⤵PID:4656
-