Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-09-2024 14:14

General

  • Target

    51.exe

  • Size

    147KB

  • MD5

    171c41627cf09743d62c82b5ed02eadd

  • SHA1

    c7185b62b71c292aee70a4b482f3c0c530c1e7d5

  • SHA256

    9f345814f1c436cee84bfc91536dee4c85081f11f49cf5623708d77c76aea8d7

  • SHA512

    5e162774bd69a98acab13ad4b85a181e113e1afc015e629d6659c2dcfdfa3739948cf37f79bf78b60ca37daaf2b2f1e8239b4aaaa5fb4e2e508f1f64c525c7a2

  • SSDEEP

    3072:P9dUEfLpw3gCjYbUIazrdwheg+NrXJmT69dz5wkbar4b:P9d/w3gaYbUDzrA0dmT6LZ

Malware Config

Extracted

Path

C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT

Ransom Note
You became victim of the GOLDENEYE RANSOMWARE! The files on your computer have been encrypted with an military grade encryption algorithm. There is no way to restore your data without a special key. You can purchase this key on the darknet page shown in step 2. To purchase your key and restore your data, please follow these three easy steps: 1. Download the Tor Browser at "https://www.torproject.org/". If you need help, please google for "access onion page". 2. Visit one of the following pages with the Tor Browser: http://golden5a4eqranh7.onion/uGB6C8mb http://goldeny4vs3nyoht.onion/uGB6C8mb 3. Enter your personal decryption code there: uGB6C8mbxsVu6VoB5TbL3vrKQ4yWnxXgHnVaKkdWGxfouL4WbofXXt68fNwYhUD1Ki48LRsonroxz6uLFiCvxD4Se3rGgKSU
URLs

http://golden5a4eqranh7.onion/uGB6C8mb

http://goldeny4vs3nyoht.onion/uGB6C8mb

Signatures

  • Seon

    The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.

  • Renames multiple (220) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51.exe
    "C:\Users\Admin\AppData\Local\Temp\51.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Users\Admin\AppData\Roaming\{f1dc91f4-ce35-4e3f-b5f0-5ef51f7527d0}\CertEnrollCtrl.exe
      "C:\Users\Admin\AppData\Roaming\{f1dc91f4-ce35-4e3f-b5f0-5ef51f7527d0}\CertEnrollCtrl.exe"
      2⤵
      • Executes dropped EXE
      PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\{f1dc91f4-ce35-4e3f-b5f0-5ef51f7527d0}\CertEnrollCtrl.exe

    Filesize

    147KB

    MD5

    171c41627cf09743d62c82b5ed02eadd

    SHA1

    c7185b62b71c292aee70a4b482f3c0c530c1e7d5

    SHA256

    9f345814f1c436cee84bfc91536dee4c85081f11f49cf5623708d77c76aea8d7

    SHA512

    5e162774bd69a98acab13ad4b85a181e113e1afc015e629d6659c2dcfdfa3739948cf37f79bf78b60ca37daaf2b2f1e8239b4aaaa5fb4e2e508f1f64c525c7a2

  • C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT

    Filesize

    778B

    MD5

    1797062e626855d5223fdd2e3a942949

    SHA1

    487469fabf7a1134fc19a9287dd3048218d887bf

    SHA256

    a2dfb7b1958215dca6069553edc27c77ed1f7f4364df907ca39a0ecb16afd533

    SHA512

    0953b3f0c9764fca4f8ce13136d3a32473c1864bbc09a7467c6dae8a46df4079d9b3ca9138a7b4b2d21ee4608c0a688cb87eb133ab851de4c605faabf60d0d04

  • memory/2688-1-0x0000000000230000-0x000000000023C000-memory.dmp

    Filesize

    48KB

  • memory/2688-2-0x0000000000240000-0x0000000000251000-memory.dmp

    Filesize

    68KB

  • memory/2688-15-0x0000000000240000-0x0000000000251000-memory.dmp

    Filesize

    68KB

  • memory/2688-14-0x0000000000230000-0x000000000023C000-memory.dmp

    Filesize

    48KB

  • memory/2688-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2700-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2700-18-0x0000000000260000-0x0000000000271000-memory.dmp

    Filesize

    68KB

  • memory/2700-19-0x0000000000260000-0x0000000000271000-memory.dmp

    Filesize

    68KB

  • memory/2700-17-0x0000000000230000-0x000000000023C000-memory.dmp

    Filesize

    48KB

  • memory/2700-465-0x0000000000260000-0x0000000000271000-memory.dmp

    Filesize

    68KB

  • memory/2700-466-0x0000000000260000-0x0000000000271000-memory.dmp

    Filesize

    68KB