Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 08:29
Static task
static1
Behavioral task
behavioral1
Sample
51.exe
Resource
win7-20240903-en
General
-
Target
51.exe
-
Size
147KB
-
MD5
171c41627cf09743d62c82b5ed02eadd
-
SHA1
c7185b62b71c292aee70a4b482f3c0c530c1e7d5
-
SHA256
9f345814f1c436cee84bfc91536dee4c85081f11f49cf5623708d77c76aea8d7
-
SHA512
5e162774bd69a98acab13ad4b85a181e113e1afc015e629d6659c2dcfdfa3739948cf37f79bf78b60ca37daaf2b2f1e8239b4aaaa5fb4e2e508f1f64c525c7a2
-
SSDEEP
3072:P9dUEfLpw3gCjYbUIazrdwheg+NrXJmT69dz5wkbar4b:P9d/w3gaYbUDzrA0dmT6LZ
Malware Config
Extracted
C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/uq5FqYsR
http://goldeny4vs3nyoht.onion/uq5FqYsR
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Renames multiple (875) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 4288 diskpart.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language diskpart.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3116 wrote to memory of 4288 3116 51.exe 82 PID 3116 wrote to memory of 4288 3116 51.exe 82 PID 3116 wrote to memory of 4288 3116 51.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\51.exe"C:\Users\Admin\AppData\Local\Temp\51.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Roaming\{4b7ece04-34cc-48af-bf33-c75db5fa4bd3}\diskpart.exe"C:\Users\Admin\AppData\Roaming\{4b7ece04-34cc-48af-bf33-c75db5fa4bd3}\diskpart.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147KB
MD582541ce506d2c44e7c86fd7cde484eb1
SHA1703bc799406b0ff58d45f868752a5cce20822ab7
SHA2563cd7069058861a040a21ed8580e5176b67f57e03b8db9fe5e493a56512f76f74
SHA5129d4a1d73694e3104dbaa1b68f0f2cc912ab5622b4e416387b5c4a266382522454cb0d534d1545a9ac21d3de5eab9eea6aed47112dc580b3ef968681f8d962b7b
-
Filesize
778B
MD5269f79d4859d6f7651fb3cf473659a5c
SHA1f3e0905fdd5203969e7ce70babdfb2f4566f70ac
SHA256d875beb5158cd42495afba26e4543ddcd8ef1733bde1341c069fe63373682f63
SHA512bf3fe5f9a10692ac8e14723a359c23f2110274134121c5d16ddf0251461e6f09cf6d6180258df6c029f80d451b759330a9894250abf875c4ae928627e45b96e8