Analysis
-
max time kernel
140s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2023 17:06
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exe
-
Size
173KB
-
MD5
d8f76885ca9af651befe9d9e2d00d340
-
SHA1
2ce43bf640a3abe3d840ec77d6342c3c141bd74b
-
SHA256
4a4c61d929d49cd5fce4872754993a9bd570566ca2b16d114f3664d86e09eb50
-
SHA512
664d62084bf14b877fe97257c11aebbfaece26dd9053c190eda59bf25b9c01b5b97763a4d157946cdabdaaeecedb8f67c2e7b763190fbd973a342a50fa81b643
-
SSDEEP
3072:C9dUEfLpw3gCjYbUIazrdwheg+NrXJmT69qz5DcMP9vYw:C9d/w3gaYbUDzrA0dmT6SD/
Malware Config
Extracted
C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/xQsN7xb9
http://goldeny4vs3nyoht.onion/xQsN7xb9
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Renames multiple (736) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
Processes:
eventvwr.exepid process 2772 eventvwr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exedescription pid process target process PID 3516 wrote to memory of 2772 3516 NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exe eventvwr.exe PID 3516 wrote to memory of 2772 3516 NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exe eventvwr.exe PID 3516 wrote to memory of 2772 3516 NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exe eventvwr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d8f76885ca9af651befe9d9e2d00d340_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Roaming\{f0f50074-c2a7-4f4e-914b-7489d0e958ff}\eventvwr.exe"C:\Users\Admin\AppData\Roaming\{f0f50074-c2a7-4f4e-914b-7489d0e958ff}\eventvwr.exe"2⤵
- Executes dropped EXE
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD5d8f76885ca9af651befe9d9e2d00d340
SHA12ce43bf640a3abe3d840ec77d6342c3c141bd74b
SHA2564a4c61d929d49cd5fce4872754993a9bd570566ca2b16d114f3664d86e09eb50
SHA512664d62084bf14b877fe97257c11aebbfaece26dd9053c190eda59bf25b9c01b5b97763a4d157946cdabdaaeecedb8f67c2e7b763190fbd973a342a50fa81b643
-
Filesize
173KB
MD5d8f76885ca9af651befe9d9e2d00d340
SHA12ce43bf640a3abe3d840ec77d6342c3c141bd74b
SHA2564a4c61d929d49cd5fce4872754993a9bd570566ca2b16d114f3664d86e09eb50
SHA512664d62084bf14b877fe97257c11aebbfaece26dd9053c190eda59bf25b9c01b5b97763a4d157946cdabdaaeecedb8f67c2e7b763190fbd973a342a50fa81b643
-
Filesize
173KB
MD5d8f76885ca9af651befe9d9e2d00d340
SHA12ce43bf640a3abe3d840ec77d6342c3c141bd74b
SHA2564a4c61d929d49cd5fce4872754993a9bd570566ca2b16d114f3664d86e09eb50
SHA512664d62084bf14b877fe97257c11aebbfaece26dd9053c190eda59bf25b9c01b5b97763a4d157946cdabdaaeecedb8f67c2e7b763190fbd973a342a50fa81b643
-
Filesize
778B
MD5ad36f0aeb91deb04cc9c4cb53036fe84
SHA1733801fe7735315731a95171f23acb5b050d2ccc
SHA256465792e723f4f7fc2b0b272edf85262e8d95a2ffe5e8b541ad3fbb42ca08c215
SHA5127df2fd538fd8f75974505ca228bba905d9aa82d6dd5b74f8a9740bec48ca373377e80790de006379daaa206cb32a2305918cb6d273b31153650ce6552ffae4a0