Analysis
-
max time kernel
141s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2023 12:12
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exe
-
Size
173KB
-
MD5
d8f76885ca9af651befe9d9e2d00d340
-
SHA1
2ce43bf640a3abe3d840ec77d6342c3c141bd74b
-
SHA256
4a4c61d929d49cd5fce4872754993a9bd570566ca2b16d114f3664d86e09eb50
-
SHA512
664d62084bf14b877fe97257c11aebbfaece26dd9053c190eda59bf25b9c01b5b97763a4d157946cdabdaaeecedb8f67c2e7b763190fbd973a342a50fa81b643
-
SSDEEP
3072:C9dUEfLpw3gCjYbUIazrdwheg+NrXJmT69qz5DcMP9vYw:C9d/w3gaYbUDzrA0dmT6SD/
Malware Config
Extracted
C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/s35o62cJ
http://goldeny4vs3nyoht.onion/s35o62cJ
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Renames multiple (867) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 4704 poqexec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2120 wrote to memory of 4704 2120 NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exe 85 PID 2120 wrote to memory of 4704 2120 NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exe 85 PID 2120 wrote to memory of 4704 2120 NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Roaming\{94b5e318-cf2c-45a5-95a0-afc4f62b2814}\poqexec.exe"C:\Users\Admin\AppData\Roaming\{94b5e318-cf2c-45a5-95a0-afc4f62b2814}\poqexec.exe"2⤵
- Executes dropped EXE
PID:4704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD5d8f76885ca9af651befe9d9e2d00d340
SHA12ce43bf640a3abe3d840ec77d6342c3c141bd74b
SHA2564a4c61d929d49cd5fce4872754993a9bd570566ca2b16d114f3664d86e09eb50
SHA512664d62084bf14b877fe97257c11aebbfaece26dd9053c190eda59bf25b9c01b5b97763a4d157946cdabdaaeecedb8f67c2e7b763190fbd973a342a50fa81b643
-
Filesize
173KB
MD5d8f76885ca9af651befe9d9e2d00d340
SHA12ce43bf640a3abe3d840ec77d6342c3c141bd74b
SHA2564a4c61d929d49cd5fce4872754993a9bd570566ca2b16d114f3664d86e09eb50
SHA512664d62084bf14b877fe97257c11aebbfaece26dd9053c190eda59bf25b9c01b5b97763a4d157946cdabdaaeecedb8f67c2e7b763190fbd973a342a50fa81b643
-
Filesize
173KB
MD5d8f76885ca9af651befe9d9e2d00d340
SHA12ce43bf640a3abe3d840ec77d6342c3c141bd74b
SHA2564a4c61d929d49cd5fce4872754993a9bd570566ca2b16d114f3664d86e09eb50
SHA512664d62084bf14b877fe97257c11aebbfaece26dd9053c190eda59bf25b9c01b5b97763a4d157946cdabdaaeecedb8f67c2e7b763190fbd973a342a50fa81b643
-
Filesize
778B
MD5d4e06762515380109e95dbad1c484a5f
SHA1e3aa4f60881298fb6c7e733df7e2f9f6b0619d73
SHA256423d2ff5cf6b3603f9fd8454e84525883921f8546c8f31a4583125af6dbdf303
SHA5121c00d97162202f0483db1f33e43d49cfd6b40cdc6854dab5582ea7ce4e6d9e496f5d5350a2ccc4283f31738705e1be1a2494c6903e97708b0a9397945e50a8cc