Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22-09-2024 10:50

General

  • Target

    56.exe

  • Size

    147KB

  • MD5

    691bc42ad3905fa13d1f088e1aaf07c8

  • SHA1

    4747422f504a5b8638a53255905bc759316cdf45

  • SHA256

    640d57062a58daf8cde747d115085e323923d5f297fe6e76960c0953a1c75139

  • SHA512

    18ec42ef13042539460e20f339a0495c1d87ff3764476fd5dd53197788df4a233879a9c8f709a89915a0f9bca46a3af85cd7b0b7426c2f89620b10ffee506431

  • SSDEEP

    3072:U9dUEfLpw3gCidSMFztbGw9Pz5DHrN+Ch:U9d/w3gN/pZH

Malware Config

Extracted

Path

C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT

Ransom Note
You became victim of the GOLDENEYE RANSOMWARE! The files on your computer have been encrypted with an military grade encryption algorithm. There is no way to restore your data without a special key. You can purchase this key on the darknet page shown in step 2. To purchase your key and restore your data, please follow these three easy steps: 1. Download the Tor Browser at "https://www.torproject.org/". If you need help, please google for "access onion page". 2. Visit one of the following pages with the Tor Browser: http://golden5a4eqranh7.onion/tB1Yc3Ew http://goldeny4vs3nyoht.onion/tB1Yc3Ew 3. Enter your personal decryption code there: tB1Yc3EwbLHYRapG3RtrhASqXhZjHrao6sYC9i88sPL935dqYHFM3dxB6mhLrEVw2eYfxmvZsoFSaMH3uqu5tqa687iUmGTj
URLs

http://golden5a4eqranh7.onion/tB1Yc3Ew

http://goldeny4vs3nyoht.onion/tB1Yc3Ew

Signatures

  • Seon

    The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.

  • Renames multiple (243) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56.exe
    "C:\Users\Admin\AppData\Local\Temp\56.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Users\Admin\AppData\Roaming\{68cb7595-0f8f-438a-aa59-42059824f90a}\fixmapi.exe
      "C:\Users\Admin\AppData\Roaming\{68cb7595-0f8f-438a-aa59-42059824f90a}\fixmapi.exe"
      2⤵
      • Executes dropped EXE
      PID:1872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\{68cb7595-0f8f-438a-aa59-42059824f90a}\fixmapi.exe

    Filesize

    147KB

    MD5

    691bc42ad3905fa13d1f088e1aaf07c8

    SHA1

    4747422f504a5b8638a53255905bc759316cdf45

    SHA256

    640d57062a58daf8cde747d115085e323923d5f297fe6e76960c0953a1c75139

    SHA512

    18ec42ef13042539460e20f339a0495c1d87ff3764476fd5dd53197788df4a233879a9c8f709a89915a0f9bca46a3af85cd7b0b7426c2f89620b10ffee506431

  • C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT

    Filesize

    778B

    MD5

    0ece6d3662cec23334d6290b69cafbdd

    SHA1

    d54893821262a72ef95237e555bc7330a801f787

    SHA256

    f50d258a573d67445f8fd6105f322909ff9905432ed671297de762a8a3d983e5

    SHA512

    52a8046b556d1aa1c19cdd36234fcb5746b0be6353da412ea947eecac5f46d58e454f621b34cdb94b8596af8ba37f7d42a4e92e8b7dfde750cff153385ef40f0

  • memory/1872-15-0x0000000000230000-0x000000000023C000-memory.dmp

    Filesize

    48KB

  • memory/1872-16-0x0000000000280000-0x0000000000291000-memory.dmp

    Filesize

    68KB

  • memory/1872-17-0x0000000000280000-0x0000000000291000-memory.dmp

    Filesize

    68KB

  • memory/1872-509-0x0000000000280000-0x0000000000291000-memory.dmp

    Filesize

    68KB

  • memory/1872-510-0x0000000000280000-0x0000000000291000-memory.dmp

    Filesize

    68KB

  • memory/2556-0-0x0000000000230000-0x000000000023C000-memory.dmp

    Filesize

    48KB

  • memory/2556-1-0x0000000000240000-0x0000000000251000-memory.dmp

    Filesize

    68KB

  • memory/2556-14-0x0000000000240000-0x0000000000251000-memory.dmp

    Filesize

    68KB

  • memory/2556-13-0x0000000000230000-0x000000000023C000-memory.dmp

    Filesize

    48KB