Resubmissions

20-10-2023 17:06

231020-vms85sed8t 10

20-10-2023 12:12

231020-pdg7macc75 10

Analysis

  • max time kernel
    138s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2023 17:06

General

  • Target

    NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exe

  • Size

    173KB

  • MD5

    d8f76885ca9af651befe9d9e2d00d340

  • SHA1

    2ce43bf640a3abe3d840ec77d6342c3c141bd74b

  • SHA256

    4a4c61d929d49cd5fce4872754993a9bd570566ca2b16d114f3664d86e09eb50

  • SHA512

    664d62084bf14b877fe97257c11aebbfaece26dd9053c190eda59bf25b9c01b5b97763a4d157946cdabdaaeecedb8f67c2e7b763190fbd973a342a50fa81b643

  • SSDEEP

    3072:C9dUEfLpw3gCjYbUIazrdwheg+NrXJmT69qz5DcMP9vYw:C9d/w3gaYbUDzrA0dmT6SD/

Malware Config

Extracted

Path

C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT

Ransom Note
You became victim of the GOLDENEYE RANSOMWARE! The files on your computer have been encrypted with an military grade encryption algorithm. There is no way to restore your data without a special key. You can purchase this key on the darknet page shown in step 2. To purchase your key and restore your data, please follow these three easy steps: 1. Download the Tor Browser at "https://www.torproject.org/". If you need help, please google for "access onion page". 2. Visit one of the following pages with the Tor Browser: http://golden5a4eqranh7.onion/wXbEXz8v http://goldeny4vs3nyoht.onion/wXbEXz8v 3. Enter your personal decryption code there: wXbEXz8vq1XjW4qi3vLMTnh2i1yLWix5LG1ZGgJLApxQYnXoohQevJJhyUmgTasWF7NHoASNGVMv9KCurZ9cJG5CVHbYdvV9
URLs

http://golden5a4eqranh7.onion/wXbEXz8v

http://goldeny4vs3nyoht.onion/wXbEXz8v

Signatures

  • Seon

    The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.

  • Renames multiple (197) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 3 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\AppData\Roaming\{77a1645b-c6ba-48c7-8bd3-8e50cc4fe291}\gpupdate.exe
      "C:\Users\Admin\AppData\Roaming\{77a1645b-c6ba-48c7-8bd3-8e50cc4fe291}\gpupdate.exe"
      2⤵
      • Executes dropped EXE
      PID:2008
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\YOUR_FILES_ARE_ENCRYPTED.TXT
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:2720
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\DisconnectStop.iso.wXbEXz8v
    1⤵
    • Modifies registry class
    PID:2544
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\SkipHide.bmp.wXbEXz8v
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2388
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\ConfirmInvoke.tiff.wXbEXz8v
    1⤵
    • Modifies registry class
    PID:1568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\{77a1645b-c6ba-48c7-8bd3-8e50cc4fe291}\gpupdate.exe

    Filesize

    173KB

    MD5

    50b3c5f8423d2d1c89c4f97e951a5a38

    SHA1

    386ec52dcdb9c7061decb17fc1895a26d962ae18

    SHA256

    f1925b9d4f0f05f0af82bb9cf36dd415639116cc84643a82089e3eb423d0bad1

    SHA512

    a94a2543689a310d0d4fe6d473186e0bfc918af1ddad186782c43e254fc09576a80c126bb5c316bf6e452458180a03490b28155d285343476beedc918f2f42a1

  • C:\Users\Admin\Desktop\YOUR_FILES_ARE_ENCRYPTED.TXT

    Filesize

    778B

    MD5

    ab682ace457bb6caa820cac20fa96f48

    SHA1

    bf2ed357c5cfbfd48211570e2811bac4f3685998

    SHA256

    b94160a47525aae851ba7aa20049df02525391fe33c37a313010af54d9730ef8

    SHA512

    2e74ab44acbe0e08f95b3ff357871b8a0d399008d04ba1d268e9915e9e7c2c3b5b05c80d4a6afc4c4be049003ebc8ae665dbbfb82e5c384426b650c9fb16879d

  • C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT

    Filesize

    778B

    MD5

    ab682ace457bb6caa820cac20fa96f48

    SHA1

    bf2ed357c5cfbfd48211570e2811bac4f3685998

    SHA256

    b94160a47525aae851ba7aa20049df02525391fe33c37a313010af54d9730ef8

    SHA512

    2e74ab44acbe0e08f95b3ff357871b8a0d399008d04ba1d268e9915e9e7c2c3b5b05c80d4a6afc4c4be049003ebc8ae665dbbfb82e5c384426b650c9fb16879d

  • \Users\Admin\AppData\Roaming\{77a1645b-c6ba-48c7-8bd3-8e50cc4fe291}\gpupdate.exe

    Filesize

    173KB

    MD5

    50b3c5f8423d2d1c89c4f97e951a5a38

    SHA1

    386ec52dcdb9c7061decb17fc1895a26d962ae18

    SHA256

    f1925b9d4f0f05f0af82bb9cf36dd415639116cc84643a82089e3eb423d0bad1

    SHA512

    a94a2543689a310d0d4fe6d473186e0bfc918af1ddad186782c43e254fc09576a80c126bb5c316bf6e452458180a03490b28155d285343476beedc918f2f42a1

  • memory/1900-0-0x0000000000230000-0x000000000023C000-memory.dmp

    Filesize

    48KB

  • memory/1900-1-0x0000000000240000-0x0000000000251000-memory.dmp

    Filesize

    68KB

  • memory/1900-12-0x0000000000230000-0x000000000023C000-memory.dmp

    Filesize

    48KB

  • memory/2008-13-0x00000000001D0000-0x00000000001DC000-memory.dmp

    Filesize

    48KB

  • memory/2008-14-0x00000000001E0000-0x00000000001F1000-memory.dmp

    Filesize

    68KB

  • memory/2008-414-0x00000000001E0000-0x00000000001F1000-memory.dmp

    Filesize

    68KB

  • memory/2008-415-0x00000000001E0000-0x00000000001F1000-memory.dmp

    Filesize

    68KB