Analysis
-
max time kernel
94s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
51.exe
Resource
win7-20240903-en
General
-
Target
51.exe
-
Size
147KB
-
MD5
171c41627cf09743d62c82b5ed02eadd
-
SHA1
c7185b62b71c292aee70a4b482f3c0c530c1e7d5
-
SHA256
9f345814f1c436cee84bfc91536dee4c85081f11f49cf5623708d77c76aea8d7
-
SHA512
5e162774bd69a98acab13ad4b85a181e113e1afc015e629d6659c2dcfdfa3739948cf37f79bf78b60ca37daaf2b2f1e8239b4aaaa5fb4e2e508f1f64c525c7a2
-
SSDEEP
3072:P9dUEfLpw3gCjYbUIazrdwheg+NrXJmT69dz5wkbar4b:P9d/w3gaYbUDzrA0dmT6LZ
Malware Config
Extracted
C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/tHHui5yw
http://goldeny4vs3nyoht.onion/tHHui5yw
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Renames multiple (877) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 740 tcmsetup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tcmsetup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4988 wrote to memory of 740 4988 51.exe 82 PID 4988 wrote to memory of 740 4988 51.exe 82 PID 4988 wrote to memory of 740 4988 51.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\51.exe"C:\Users\Admin\AppData\Local\Temp\51.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Roaming\{d9366a7c-49ea-44ae-9f6c-e9c434dd3579}\tcmsetup.exe"C:\Users\Admin\AppData\Roaming\{d9366a7c-49ea-44ae-9f6c-e9c434dd3579}\tcmsetup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147KB
MD5f1604147b6a560a5ce6313d3149bf2ef
SHA140f6ab30ee97abc8342b3bd5ff517b0b37190411
SHA256e6d2b0d8fa1ff2535df70a838c02c160337ce392271bc8ca0118870791887dce
SHA512b2197c942d2a8878794eed75d560f664a8e38b263a981e273008924880d2179a9462bab1877173d82f5276f4d7d0accceaed580e0253c445bbfabb6b69b05ab4
-
Filesize
778B
MD56de6b3cd74dfc1a1efd697de94fd7ee8
SHA147661eff40f92dc1cb408498e383b84c2da1b9cd
SHA256165e424ec031b7c9cf42e4cf1c425be093b71a1180f942dab5da264598d452ab
SHA51204fd673431224652db2601c338940dc4fc5a0346aeaa8a1684ab542bf109eb05074f13542e2ff5a4ad80fa67510e7b5c6d70a81427b321f40432f8f31227c1b7