Overview
overview
10Static
static
10Tear.exe
windows7-x64
10adochi.exe
windows7-x64
7autoit.exe
windows7-x64
10autoit2.exe
windows7-x64
10autoit3.exe
windows7-x64
10deviation.exe
windows7-x64
8encoder.exe
windows7-x64
10encoder2.exe
windows7-x64
9encoder3.exe
windows7-x64
10encoder4.exe
windows7-x64
5encoder5.exe
windows7-x64
10erebus.exe
windows7-x64
9myxaha.exe
windows7-x64
7$LOCALAPPD...er.exe
windows7-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows7-x64
7$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...om.dll
windows7-x64
5trucry.exe
windows7-x64
10wlock.exe
windows7-x64
3wlock2.exe
windows7-x64
8Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 00:15
Behavioral task
behavioral1
Sample
Tear.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
adochi.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
autoit.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
autoit2.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
autoit3.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
deviation.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
encoder.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
encoder2.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
encoder3.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
encoder4.exe
Resource
win7-20241023-en
Behavioral task
behavioral11
Sample
encoder5.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
erebus.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
myxaha.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$LOCALAPPDATA/ConduitInstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/md5dll.dll
Resource
win7-20241023-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win7-20241010-en
Behavioral task
behavioral21
Sample
trucry.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
wlock.exe
Resource
win7-20241010-en
Behavioral task
behavioral23
Sample
wlock2.exe
Resource
win7-20240903-en
General
-
Target
encoder5.exe
-
Size
62KB
-
MD5
1a6820fec1c45cd9c928533090e7908d
-
SHA1
9df9d1e4579a0f759db01951ff616019c6c9196e
-
SHA256
a89591555b9acb65353c2b854e582bc41db2fbc0eda2210b89a877d1862084df
-
SHA512
c6eed68a0fbdb05bf504676e1c0816660f856ae768b7340678b9d84d909fce267066b2e314148521563309c466fdec7d74f00d1addb1a14abe15163d2203a81a
-
SSDEEP
768:hK3mGmDuuNXM1KPptWOahoICS4AIA4DZqB87pdMFtb8cmY11f3qrVBUoxygse3l:hK3UDugp88ICS4AR4tA8lCFtb8If6
Malware Config
Extracted
C:\MSOCache\All Users\YOUR_FILES_ARE_ENCRYPTED.TXT
Extracted
C:\Users\Admin\AppData\Local\Temp\readme.hta
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Seon family
-
Renames multiple (244) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
encoder5.exedescription ioc process File opened (read-only) \??\F: encoder5.exe File opened (read-only) \??\H: encoder5.exe File opened (read-only) \??\Q: encoder5.exe File opened (read-only) \??\S: encoder5.exe File opened (read-only) \??\U: encoder5.exe File opened (read-only) \??\X: encoder5.exe File opened (read-only) \??\D: encoder5.exe File opened (read-only) \??\E: encoder5.exe File opened (read-only) \??\L: encoder5.exe File opened (read-only) \??\M: encoder5.exe File opened (read-only) \??\T: encoder5.exe File opened (read-only) \??\V: encoder5.exe File opened (read-only) \??\Y: encoder5.exe File opened (read-only) \??\B: encoder5.exe File opened (read-only) \??\I: encoder5.exe File opened (read-only) \??\J: encoder5.exe File opened (read-only) \??\K: encoder5.exe File opened (read-only) \??\N: encoder5.exe File opened (read-only) \??\O: encoder5.exe File opened (read-only) \??\P: encoder5.exe File opened (read-only) \??\R: encoder5.exe File opened (read-only) \??\A: encoder5.exe File opened (read-only) \??\G: encoder5.exe File opened (read-only) \??\W: encoder5.exe File opened (read-only) \??\Z: encoder5.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
encoder5.exemshta.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language encoder5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
mshta.exepid process 2172 mshta.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
mshta.exepid process 2172 mshta.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
encoder5.exedescription pid process target process PID 1800 wrote to memory of 2172 1800 encoder5.exe mshta.exe PID 1800 wrote to memory of 2172 1800 encoder5.exe mshta.exe PID 1800 wrote to memory of 2172 1800 encoder5.exe mshta.exe PID 1800 wrote to memory of 2172 1800 encoder5.exe mshta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\encoder5.exe"C:\Users\Admin\AppData\Local\Temp\encoder5.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\mshta.exemshta.exe C:\Users\Admin\AppData\Local\Temp\readme.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
413B
MD5ad9a93a93a3c387f3f63a97a9d927481
SHA18891ead23e82e15cf283b37a801b44fe2f718fe5
SHA2563a678365cacdb73695b3df18c743b340c6ad801f4caee7985c06798d3894edb4
SHA512dd87fa36210b9053d4b87b7aaf35767619c50700a6e57f5316cc1659711c3ab13736b486727e9fd63be500e27528839274f2f44ec4d0df8b711ebe5bc8decc62
-
Filesize
16KB
MD5648ec33ca711ee08410f0cdbbc60325e
SHA17dd2e502ca3366e090b08565c879371bbb6af028
SHA25683760bdab06a2b3214871d736e8c0705818fc0f668e294d5d0aa3ca1e6ae426b
SHA5123a77d9ac2629bf4c524f8f0178620bda5cc5a1c814a17a6db4a4d8eb5c43c141762204fe593fdb54fe4405f052143c69e8bbc178db9c7846d8ec7b0fe36fe2c8