Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-09-2024 08:29

General

  • Target

    51.exe

  • Size

    147KB

  • MD5

    171c41627cf09743d62c82b5ed02eadd

  • SHA1

    c7185b62b71c292aee70a4b482f3c0c530c1e7d5

  • SHA256

    9f345814f1c436cee84bfc91536dee4c85081f11f49cf5623708d77c76aea8d7

  • SHA512

    5e162774bd69a98acab13ad4b85a181e113e1afc015e629d6659c2dcfdfa3739948cf37f79bf78b60ca37daaf2b2f1e8239b4aaaa5fb4e2e508f1f64c525c7a2

  • SSDEEP

    3072:P9dUEfLpw3gCjYbUIazrdwheg+NrXJmT69dz5wkbar4b:P9d/w3gaYbUDzrA0dmT6LZ

Malware Config

Extracted

Path

C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT

Ransom Note
You became victim of the GOLDENEYE RANSOMWARE! The files on your computer have been encrypted with an military grade encryption algorithm. There is no way to restore your data without a special key. You can purchase this key on the darknet page shown in step 2. To purchase your key and restore your data, please follow these three easy steps: 1. Download the Tor Browser at "https://www.torproject.org/". If you need help, please google for "access onion page". 2. Visit one of the following pages with the Tor Browser: http://golden5a4eqranh7.onion/rvXEVbLA http://goldeny4vs3nyoht.onion/rvXEVbLA 3. Enter your personal decryption code there: rvXEVbLA5CPmx4DcNaGRVV1cLzbPpUHCHjQ5Y1RwxDv99sShqu4fhTcE2geJePeEmEXJL1ey1DQ5sFqtN1LmhokHGcK6irXQ
URLs

http://golden5a4eqranh7.onion/rvXEVbLA

http://goldeny4vs3nyoht.onion/rvXEVbLA

Signatures

  • Seon

    The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.

  • Renames multiple (235) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51.exe
    "C:\Users\Admin\AppData\Local\Temp\51.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Users\Admin\AppData\Roaming\{39b2d428-7364-4799-a952-8965dbb8cc06}\cliconfg.exe
      "C:\Users\Admin\AppData\Roaming\{39b2d428-7364-4799-a952-8965dbb8cc06}\cliconfg.exe"
      2⤵
      • Executes dropped EXE
      PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT

    Filesize

    778B

    MD5

    4963dc98e81896c4fcae08f7f9b3457c

    SHA1

    9f69609821ffdecdee64172a53b9be331d1307b5

    SHA256

    1aafe7b6cbd5c37d452b6651f756e2f55fb0d144d93ca95ecffcf5781b0701db

    SHA512

    6fd73e2d0c75235157e93537b5f259ab75f33977113a520697a4a8360158efb79dde13e3c0195c4b8a85ab4b715d6d13cdf7567255587de7db37f9e5dc3e8ab2

  • \Users\Admin\AppData\Roaming\{39b2d428-7364-4799-a952-8965dbb8cc06}\cliconfg.exe

    Filesize

    147KB

    MD5

    171c41627cf09743d62c82b5ed02eadd

    SHA1

    c7185b62b71c292aee70a4b482f3c0c530c1e7d5

    SHA256

    9f345814f1c436cee84bfc91536dee4c85081f11f49cf5623708d77c76aea8d7

    SHA512

    5e162774bd69a98acab13ad4b85a181e113e1afc015e629d6659c2dcfdfa3739948cf37f79bf78b60ca37daaf2b2f1e8239b4aaaa5fb4e2e508f1f64c525c7a2

  • memory/2088-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2088-1-0x0000000000230000-0x000000000023C000-memory.dmp

    Filesize

    48KB

  • memory/2088-2-0x0000000000240000-0x0000000000251000-memory.dmp

    Filesize

    68KB

  • memory/2088-15-0x0000000000240000-0x0000000000251000-memory.dmp

    Filesize

    68KB

  • memory/2088-14-0x0000000000230000-0x000000000023C000-memory.dmp

    Filesize

    48KB

  • memory/2748-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2748-17-0x00000000002B0000-0x00000000002BC000-memory.dmp

    Filesize

    48KB

  • memory/2748-18-0x00000000002C0000-0x00000000002D1000-memory.dmp

    Filesize

    68KB

  • memory/2748-19-0x00000000002C0000-0x00000000002D1000-memory.dmp

    Filesize

    68KB

  • memory/2748-495-0x00000000002C0000-0x00000000002D1000-memory.dmp

    Filesize

    68KB