Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 08:29
Static task
static1
Behavioral task
behavioral1
Sample
51.exe
Resource
win7-20240903-en
General
-
Target
51.exe
-
Size
147KB
-
MD5
171c41627cf09743d62c82b5ed02eadd
-
SHA1
c7185b62b71c292aee70a4b482f3c0c530c1e7d5
-
SHA256
9f345814f1c436cee84bfc91536dee4c85081f11f49cf5623708d77c76aea8d7
-
SHA512
5e162774bd69a98acab13ad4b85a181e113e1afc015e629d6659c2dcfdfa3739948cf37f79bf78b60ca37daaf2b2f1e8239b4aaaa5fb4e2e508f1f64c525c7a2
-
SSDEEP
3072:P9dUEfLpw3gCjYbUIazrdwheg+NrXJmT69dz5wkbar4b:P9d/w3gaYbUDzrA0dmT6LZ
Malware Config
Extracted
C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/rvXEVbLA
http://goldeny4vs3nyoht.onion/rvXEVbLA
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Renames multiple (235) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 2748 cliconfg.exe -
Loads dropped DLL 1 IoCs
pid Process 2088 51.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2748 2088 51.exe 30 PID 2088 wrote to memory of 2748 2088 51.exe 30 PID 2088 wrote to memory of 2748 2088 51.exe 30 PID 2088 wrote to memory of 2748 2088 51.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\51.exe"C:\Users\Admin\AppData\Local\Temp\51.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Roaming\{39b2d428-7364-4799-a952-8965dbb8cc06}\cliconfg.exe"C:\Users\Admin\AppData\Roaming\{39b2d428-7364-4799-a952-8965dbb8cc06}\cliconfg.exe"2⤵
- Executes dropped EXE
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
778B
MD54963dc98e81896c4fcae08f7f9b3457c
SHA19f69609821ffdecdee64172a53b9be331d1307b5
SHA2561aafe7b6cbd5c37d452b6651f756e2f55fb0d144d93ca95ecffcf5781b0701db
SHA5126fd73e2d0c75235157e93537b5f259ab75f33977113a520697a4a8360158efb79dde13e3c0195c4b8a85ab4b715d6d13cdf7567255587de7db37f9e5dc3e8ab2
-
Filesize
147KB
MD5171c41627cf09743d62c82b5ed02eadd
SHA1c7185b62b71c292aee70a4b482f3c0c530c1e7d5
SHA2569f345814f1c436cee84bfc91536dee4c85081f11f49cf5623708d77c76aea8d7
SHA5125e162774bd69a98acab13ad4b85a181e113e1afc015e629d6659c2dcfdfa3739948cf37f79bf78b60ca37daaf2b2f1e8239b4aaaa5fb4e2e508f1f64c525c7a2