Analysis

  • max time kernel
    106s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2024 10:50

General

  • Target

    56.exe

  • Size

    147KB

  • MD5

    691bc42ad3905fa13d1f088e1aaf07c8

  • SHA1

    4747422f504a5b8638a53255905bc759316cdf45

  • SHA256

    640d57062a58daf8cde747d115085e323923d5f297fe6e76960c0953a1c75139

  • SHA512

    18ec42ef13042539460e20f339a0495c1d87ff3764476fd5dd53197788df4a233879a9c8f709a89915a0f9bca46a3af85cd7b0b7426c2f89620b10ffee506431

  • SSDEEP

    3072:U9dUEfLpw3gCidSMFztbGw9Pz5DHrN+Ch:U9d/w3gN/pZH

Malware Config

Extracted

Path

C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT

Ransom Note
You became victim of the GOLDENEYE RANSOMWARE! The files on your computer have been encrypted with an military grade encryption algorithm. There is no way to restore your data without a special key. You can purchase this key on the darknet page shown in step 2. To purchase your key and restore your data, please follow these three easy steps: 1. Download the Tor Browser at "https://www.torproject.org/". If you need help, please google for "access onion page". 2. Visit one of the following pages with the Tor Browser: http://golden5a4eqranh7.onion/xxPnrTJW http://goldeny4vs3nyoht.onion/xxPnrTJW 3. Enter your personal decryption code there: xxPnrTJWyVeCT852bL5BdaemxwdGxxNxJGgeCvxGFEg8irh3HNdWU1ZK2q2n8w5aFtfEvkAnRzgK2X77zTULkCZvGx6kSV6H
URLs

http://golden5a4eqranh7.onion/xxPnrTJW

http://goldeny4vs3nyoht.onion/xxPnrTJW

Signatures

  • Seon

    The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.

  • Renames multiple (866) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56.exe
    "C:\Users\Admin\AppData\Local\Temp\56.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4188
    • C:\Users\Admin\AppData\Roaming\{fa250dd2-8bdb-4132-a32d-6183e46de707}\mfpmp.exe
      "C:\Users\Admin\AppData\Roaming\{fa250dd2-8bdb-4132-a32d-6183e46de707}\mfpmp.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\{fa250dd2-8bdb-4132-a32d-6183e46de707}\mfpmp.exe

    Filesize

    147KB

    MD5

    4a56d2fedcfe10e75a032d4703298717

    SHA1

    5d1d471086fcd6690ef056da6cf11f00291cf96e

    SHA256

    21c58f80d49a4abe1ad32f9c7596b41ce11b80cfe40f644feef9c599cdb5f382

    SHA512

    c3db1b46f8f1a68004d50aa56fb0fdcc1de40ee65414118e6e0df2f249b93b0818ace80fe870b15f7cff2ad027133236092ec6cc331fb181925397b107ea4ecd

  • C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT

    Filesize

    778B

    MD5

    87861be6657b71dec54a25d4ec315d81

    SHA1

    120d281ad57e7d9e8f0f6e725aa41e0d6e358156

    SHA256

    da4b8d9c4bf49268e90ddf0ee3f23c46dd57c349eb31803e3fc1513466d47b5a

    SHA512

    935e34c2a4e45c2c48f3a9727e9cd8315cbfd01e51121651ee34ad464d3c2c756e4b077542b8ec264a742be15aa0f1cf25faaaca45f9b3bb5d2f516920e32447

  • memory/1344-14-0x00000000005A0000-0x00000000005B1000-memory.dmp

    Filesize

    68KB

  • memory/1344-13-0x0000000000540000-0x000000000054C000-memory.dmp

    Filesize

    48KB

  • memory/1344-15-0x00000000005A0000-0x00000000005B1000-memory.dmp

    Filesize

    68KB

  • memory/1344-1753-0x00000000005A0000-0x00000000005B1000-memory.dmp

    Filesize

    68KB

  • memory/4188-0-0x0000000000430000-0x000000000043C000-memory.dmp

    Filesize

    48KB

  • memory/4188-1-0x0000000000440000-0x0000000000451000-memory.dmp

    Filesize

    68KB

  • memory/4188-11-0x0000000000440000-0x0000000000451000-memory.dmp

    Filesize

    68KB

  • memory/4188-10-0x0000000000430000-0x000000000043C000-memory.dmp

    Filesize

    48KB