Analysis
-
max time kernel
24s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05/02/2025, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797.exe
Resource
win7-20241010-en
General
-
Target
7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797.exe
-
Size
79KB
-
MD5
0ebc107a0fb56d77759a635e9d043228
-
SHA1
ec7a1e7132f5c3140ff06c542782388576a128f8
-
SHA256
7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797
-
SHA512
794eda52f2ff8b10518f59963ce6018b1b954a65bbe662d1b5db761f1ec9828cbdbcdff079fb39f08cf2ae151cdb3cc90c422501ace427637d20f502bffab9fe
-
SSDEEP
1536:/tUknV9M6+ygXCNoNGtmFWZPhV8owtnMQPo9NSw249gdhwA2jeddMB:fCygXkoNGtmQZ5wbAzSm9gdhj2a6B
Malware Config
Extracted
C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/x4UXrJWs
http://goldeny4vs3nyoht.onion/x4UXrJWs
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Seon family
-
Renames multiple (235) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 3000 winrs.exe -
Loads dropped DLL 1 IoCs
pid Process 2844 7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 3000 2844 7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797.exe 30 PID 2844 wrote to memory of 3000 2844 7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797.exe 30 PID 2844 wrote to memory of 3000 2844 7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797.exe 30 PID 2844 wrote to memory of 3000 2844 7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797.exe"C:\Users\Admin\AppData\Local\Temp\7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Roaming\{00ec0657-94d1-4632-ac3a-2c7ae3a85520}\winrs.exe"C:\Users\Admin\AppData\Roaming\{00ec0657-94d1-4632-ac3a-2c7ae3a85520}\winrs.exe"2⤵
- Executes dropped EXE
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
778B
MD5a3d7dfa77c9d9c6ac07fee384cde34c5
SHA1866667244f32fc3f3130d734cfd723c21de59173
SHA256ea66180e81cad244290bf356eff416c4f3b9e142b49c29bbdf50fe58ed31d360
SHA512a5513e870519079a8aede9f6e703918caa88784ef72cf458243c3d722333289272faa23ec586c784e8b1ff1ea17b88f8c0b81cb1bf0ac295076daf4da1db6946
-
Filesize
79KB
MD50ebc107a0fb56d77759a635e9d043228
SHA1ec7a1e7132f5c3140ff06c542782388576a128f8
SHA2567ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797
SHA512794eda52f2ff8b10518f59963ce6018b1b954a65bbe662d1b5db761f1ec9828cbdbcdff079fb39f08cf2ae151cdb3cc90c422501ace427637d20f502bffab9fe