Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
51.exe
Resource
win7-20240903-en
General
-
Target
51.exe
-
Size
147KB
-
MD5
171c41627cf09743d62c82b5ed02eadd
-
SHA1
c7185b62b71c292aee70a4b482f3c0c530c1e7d5
-
SHA256
9f345814f1c436cee84bfc91536dee4c85081f11f49cf5623708d77c76aea8d7
-
SHA512
5e162774bd69a98acab13ad4b85a181e113e1afc015e629d6659c2dcfdfa3739948cf37f79bf78b60ca37daaf2b2f1e8239b4aaaa5fb4e2e508f1f64c525c7a2
-
SSDEEP
3072:P9dUEfLpw3gCjYbUIazrdwheg+NrXJmT69dz5wkbar4b:P9d/w3gaYbUDzrA0dmT6LZ
Malware Config
Extracted
C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/uGB6C8mb
http://goldeny4vs3nyoht.onion/uGB6C8mb
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Renames multiple (220) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 2700 CertEnrollCtrl.exe -
Loads dropped DLL 1 IoCs
pid Process 2688 51.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2700 2688 51.exe 31 PID 2688 wrote to memory of 2700 2688 51.exe 31 PID 2688 wrote to memory of 2700 2688 51.exe 31 PID 2688 wrote to memory of 2700 2688 51.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\51.exe"C:\Users\Admin\AppData\Local\Temp\51.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Roaming\{f1dc91f4-ce35-4e3f-b5f0-5ef51f7527d0}\CertEnrollCtrl.exe"C:\Users\Admin\AppData\Roaming\{f1dc91f4-ce35-4e3f-b5f0-5ef51f7527d0}\CertEnrollCtrl.exe"2⤵
- Executes dropped EXE
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147KB
MD5171c41627cf09743d62c82b5ed02eadd
SHA1c7185b62b71c292aee70a4b482f3c0c530c1e7d5
SHA2569f345814f1c436cee84bfc91536dee4c85081f11f49cf5623708d77c76aea8d7
SHA5125e162774bd69a98acab13ad4b85a181e113e1afc015e629d6659c2dcfdfa3739948cf37f79bf78b60ca37daaf2b2f1e8239b4aaaa5fb4e2e508f1f64c525c7a2
-
Filesize
778B
MD51797062e626855d5223fdd2e3a942949
SHA1487469fabf7a1134fc19a9287dd3048218d887bf
SHA256a2dfb7b1958215dca6069553edc27c77ed1f7f4364df907ca39a0ecb16afd533
SHA5120953b3f0c9764fca4f8ce13136d3a32473c1864bbc09a7467c6dae8a46df4079d9b3ca9138a7b4b2d21ee4608c0a688cb87eb133ab851de4c605faabf60d0d04