Analysis

  • max time kernel
    94s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2024 08:29

General

  • Target

    51.exe

  • Size

    147KB

  • MD5

    171c41627cf09743d62c82b5ed02eadd

  • SHA1

    c7185b62b71c292aee70a4b482f3c0c530c1e7d5

  • SHA256

    9f345814f1c436cee84bfc91536dee4c85081f11f49cf5623708d77c76aea8d7

  • SHA512

    5e162774bd69a98acab13ad4b85a181e113e1afc015e629d6659c2dcfdfa3739948cf37f79bf78b60ca37daaf2b2f1e8239b4aaaa5fb4e2e508f1f64c525c7a2

  • SSDEEP

    3072:P9dUEfLpw3gCjYbUIazrdwheg+NrXJmT69dz5wkbar4b:P9d/w3gaYbUDzrA0dmT6LZ

Malware Config

Extracted

Path

C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT

Ransom Note
You became victim of the GOLDENEYE RANSOMWARE! The files on your computer have been encrypted with an military grade encryption algorithm. There is no way to restore your data without a special key. You can purchase this key on the darknet page shown in step 2. To purchase your key and restore your data, please follow these three easy steps: 1. Download the Tor Browser at "https://www.torproject.org/". If you need help, please google for "access onion page". 2. Visit one of the following pages with the Tor Browser: http://golden5a4eqranh7.onion/uq5FqYsR http://goldeny4vs3nyoht.onion/uq5FqYsR 3. Enter your personal decryption code there: uq5FqYsRNgEsWKFcZ59oz68nwfFMH81Dg82egrmUK8iZNhvDuaZfVp6Z6zvNDj26wni9H1evj4fyWrZ473Xjzn7YWtR3NzGR
URLs

http://golden5a4eqranh7.onion/uq5FqYsR

http://goldeny4vs3nyoht.onion/uq5FqYsR

Signatures

  • Seon

    The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.

  • Renames multiple (875) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51.exe
    "C:\Users\Admin\AppData\Local\Temp\51.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3116
    • C:\Users\Admin\AppData\Roaming\{4b7ece04-34cc-48af-bf33-c75db5fa4bd3}\diskpart.exe
      "C:\Users\Admin\AppData\Roaming\{4b7ece04-34cc-48af-bf33-c75db5fa4bd3}\diskpart.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\{4b7ece04-34cc-48af-bf33-c75db5fa4bd3}\diskpart.exe

    Filesize

    147KB

    MD5

    82541ce506d2c44e7c86fd7cde484eb1

    SHA1

    703bc799406b0ff58d45f868752a5cce20822ab7

    SHA256

    3cd7069058861a040a21ed8580e5176b67f57e03b8db9fe5e493a56512f76f74

    SHA512

    9d4a1d73694e3104dbaa1b68f0f2cc912ab5622b4e416387b5c4a266382522454cb0d534d1545a9ac21d3de5eab9eea6aed47112dc580b3ef968681f8d962b7b

  • C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT

    Filesize

    778B

    MD5

    269f79d4859d6f7651fb3cf473659a5c

    SHA1

    f3e0905fdd5203969e7ce70babdfb2f4566f70ac

    SHA256

    d875beb5158cd42495afba26e4543ddcd8ef1733bde1341c069fe63373682f63

    SHA512

    bf3fe5f9a10692ac8e14723a359c23f2110274134121c5d16ddf0251461e6f09cf6d6180258df6c029f80d451b759330a9894250abf875c4ae928627e45b96e8

  • memory/3116-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3116-1-0x0000000000480000-0x000000000048C000-memory.dmp

    Filesize

    48KB

  • memory/3116-2-0x0000000000A10000-0x0000000000A21000-memory.dmp

    Filesize

    68KB

  • memory/3116-12-0x0000000000A10000-0x0000000000A21000-memory.dmp

    Filesize

    68KB

  • memory/3116-11-0x0000000000480000-0x000000000048C000-memory.dmp

    Filesize

    48KB

  • memory/4288-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4288-15-0x00000000006A0000-0x00000000006AC000-memory.dmp

    Filesize

    48KB

  • memory/4288-16-0x00000000008B0000-0x00000000008C1000-memory.dmp

    Filesize

    68KB

  • memory/4288-17-0x00000000008B0000-0x00000000008C1000-memory.dmp

    Filesize

    68KB

  • memory/4288-1773-0x00000000008B0000-0x00000000008C1000-memory.dmp

    Filesize

    68KB