Analysis
-
max time kernel
94s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240708-en -
resource tags
arch:x64arch:x86image:win10v2004-20240708-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 20:47
Static task
static1
Behavioral task
behavioral1
Sample
2dbea739ec5c54b1a3bcebcd138d50be_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2dbea739ec5c54b1a3bcebcd138d50be_JaffaCakes118.exe
Resource
win10v2004-20240708-en
General
-
Target
2dbea739ec5c54b1a3bcebcd138d50be_JaffaCakes118.exe
-
Size
78KB
-
MD5
2dbea739ec5c54b1a3bcebcd138d50be
-
SHA1
8983c117646ced45f438e7b5e862e3a4c725edca
-
SHA256
5b60c68944368c9b21e4333f3f289152f15e69ce2a4ff387fb7a0005cb990bfb
-
SHA512
0027b04b3f7fa337e7956ac226fd34c7344d0c7a2a32ae58fe730870b7e812a098a3fe713d5fdcf0d797254d4497d3e2511ed09227d308fa671231c0f0f047e4
-
SSDEEP
1536:JtUknV9M6+ygXCNoNGtmFWZPhV8owtnMQPo9NSw249gdhwA2jeddm0cW:VCygXkoNGtmQZ5wbAzSm9gdhj2aI0cW
Malware Config
Extracted
C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/pf3zApGB
http://goldeny4vs3nyoht.onion/pf3zApGB
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Renames multiple (885) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 940 GameBarPresenceWriter.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1388 wrote to memory of 940 1388 2dbea739ec5c54b1a3bcebcd138d50be_JaffaCakes118.exe 82 PID 1388 wrote to memory of 940 1388 2dbea739ec5c54b1a3bcebcd138d50be_JaffaCakes118.exe 82 PID 1388 wrote to memory of 940 1388 2dbea739ec5c54b1a3bcebcd138d50be_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dbea739ec5c54b1a3bcebcd138d50be_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2dbea739ec5c54b1a3bcebcd138d50be_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Roaming\{08d4fa83-f22a-4c97-a9bc-7898e87eafe9}\GameBarPresenceWriter.exe"C:\Users\Admin\AppData\Roaming\{08d4fa83-f22a-4c97-a9bc-7898e87eafe9}\GameBarPresenceWriter.exe"2⤵
- Executes dropped EXE
PID:940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5fe431146775461bbb823c54dae5bee09
SHA17f2c2be3fd644e75cbaa8a5f7e8152314a5f8278
SHA256675b2dce3a34ed9ee3794c9e590b5491b12bb90e828115b9eadf7bf98cf8d9bb
SHA512c4fef9bb184e250dbe17d27d1ec74bc00eb638e3d83a9568d931531258d29ff3b610914641901687c8573e09f82ec817c1e360d69d85ba9644f3b07a05b7c559
-
Filesize
778B
MD54d982d0651c96b6d17b136970f4da3b0
SHA1e20fa3343c3ae1c2c8d89538a434514d8fd80af6
SHA256aaca607aebe8c46e6d2367d1a4127a5014143d590f30bcc5a2dd053ce8f40fff
SHA512b28c311d6f8366850225826261236b683b52ade6ba07cf39a60afee01708e3a95eada93aeaca8479ecb7a1bb737a4e38b67c3a7d704074d84b7ee646b5dd4e04