Analysis

  • max time kernel
    94s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2024 14:14

General

  • Target

    51.exe

  • Size

    147KB

  • MD5

    171c41627cf09743d62c82b5ed02eadd

  • SHA1

    c7185b62b71c292aee70a4b482f3c0c530c1e7d5

  • SHA256

    9f345814f1c436cee84bfc91536dee4c85081f11f49cf5623708d77c76aea8d7

  • SHA512

    5e162774bd69a98acab13ad4b85a181e113e1afc015e629d6659c2dcfdfa3739948cf37f79bf78b60ca37daaf2b2f1e8239b4aaaa5fb4e2e508f1f64c525c7a2

  • SSDEEP

    3072:P9dUEfLpw3gCjYbUIazrdwheg+NrXJmT69dz5wkbar4b:P9d/w3gaYbUDzrA0dmT6LZ

Malware Config

Extracted

Path

C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT

Ransom Note
You became victim of the GOLDENEYE RANSOMWARE! The files on your computer have been encrypted with an military grade encryption algorithm. There is no way to restore your data without a special key. You can purchase this key on the darknet page shown in step 2. To purchase your key and restore your data, please follow these three easy steps: 1. Download the Tor Browser at "https://www.torproject.org/". If you need help, please google for "access onion page". 2. Visit one of the following pages with the Tor Browser: http://golden5a4eqranh7.onion/tHHui5yw http://goldeny4vs3nyoht.onion/tHHui5yw 3. Enter your personal decryption code there: tHHui5ywFT7zo75ojnRSDJnwFW7uEok763VGgqpnJR8fzNFBURxEkShbRCuBTU4HSgLe8W5D9AvFNHrCexhgaA7XBsmqRRYg
URLs

http://golden5a4eqranh7.onion/tHHui5yw

http://goldeny4vs3nyoht.onion/tHHui5yw

Signatures

  • Seon

    The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.

  • Renames multiple (877) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51.exe
    "C:\Users\Admin\AppData\Local\Temp\51.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4988
    • C:\Users\Admin\AppData\Roaming\{d9366a7c-49ea-44ae-9f6c-e9c434dd3579}\tcmsetup.exe
      "C:\Users\Admin\AppData\Roaming\{d9366a7c-49ea-44ae-9f6c-e9c434dd3579}\tcmsetup.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\{d9366a7c-49ea-44ae-9f6c-e9c434dd3579}\tcmsetup.exe

    Filesize

    147KB

    MD5

    f1604147b6a560a5ce6313d3149bf2ef

    SHA1

    40f6ab30ee97abc8342b3bd5ff517b0b37190411

    SHA256

    e6d2b0d8fa1ff2535df70a838c02c160337ce392271bc8ca0118870791887dce

    SHA512

    b2197c942d2a8878794eed75d560f664a8e38b263a981e273008924880d2179a9462bab1877173d82f5276f4d7d0accceaed580e0253c445bbfabb6b69b05ab4

  • C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT

    Filesize

    778B

    MD5

    6de6b3cd74dfc1a1efd697de94fd7ee8

    SHA1

    47661eff40f92dc1cb408498e383b84c2da1b9cd

    SHA256

    165e424ec031b7c9cf42e4cf1c425be093b71a1180f942dab5da264598d452ab

    SHA512

    04fd673431224652db2601c338940dc4fc5a0346aeaa8a1684ab542bf109eb05074f13542e2ff5a4ad80fa67510e7b5c6d70a81427b321f40432f8f31227c1b7

  • memory/740-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/740-15-0x0000000000510000-0x000000000051C000-memory.dmp

    Filesize

    48KB

  • memory/740-16-0x00000000005B0000-0x00000000005C1000-memory.dmp

    Filesize

    68KB

  • memory/740-17-0x00000000005B0000-0x00000000005C1000-memory.dmp

    Filesize

    68KB

  • memory/740-1777-0x00000000005B0000-0x00000000005C1000-memory.dmp

    Filesize

    68KB

  • memory/740-1778-0x00000000005B0000-0x00000000005C1000-memory.dmp

    Filesize

    68KB

  • memory/4988-2-0x00000000009F0000-0x0000000000A01000-memory.dmp

    Filesize

    68KB

  • memory/4988-12-0x00000000009F0000-0x0000000000A01000-memory.dmp

    Filesize

    68KB

  • memory/4988-11-0x00000000009E0000-0x00000000009EC000-memory.dmp

    Filesize

    48KB

  • memory/4988-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4988-1-0x00000000009E0000-0x00000000009EC000-memory.dmp

    Filesize

    48KB