Analysis
-
max time kernel
101s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
05/02/2025, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797.exe
Resource
win7-20241010-en
General
-
Target
7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797.exe
-
Size
79KB
-
MD5
0ebc107a0fb56d77759a635e9d043228
-
SHA1
ec7a1e7132f5c3140ff06c542782388576a128f8
-
SHA256
7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797
-
SHA512
794eda52f2ff8b10518f59963ce6018b1b954a65bbe662d1b5db761f1ec9828cbdbcdff079fb39f08cf2ae151cdb3cc90c422501ace427637d20f502bffab9fe
-
SSDEEP
1536:/tUknV9M6+ygXCNoNGtmFWZPhV8owtnMQPo9NSw249gdhwA2jeddMB:fCygXkoNGtmQZ5wbAzSm9gdhj2a6B
Malware Config
Extracted
C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/wm9hbfMQ
http://goldeny4vs3nyoht.onion/wm9hbfMQ
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Seon family
-
Renames multiple (811) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 4968 dtdump.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtdump.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4156 wrote to memory of 4968 4156 7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797.exe 86 PID 4156 wrote to memory of 4968 4156 7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797.exe 86 PID 4156 wrote to memory of 4968 4156 7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797.exe"C:\Users\Admin\AppData\Local\Temp\7ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Roaming\{da84c856-e996-41d5-8b56-a05c0f0a224a}\dtdump.exe"C:\Users\Admin\AppData\Roaming\{da84c856-e996-41d5-8b56-a05c0f0a224a}\dtdump.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD50ebc107a0fb56d77759a635e9d043228
SHA1ec7a1e7132f5c3140ff06c542782388576a128f8
SHA2567ba9adc6a0d487a4748d1a1474b07d359f4695d41841dfc920ff4eada910d797
SHA512794eda52f2ff8b10518f59963ce6018b1b954a65bbe662d1b5db761f1ec9828cbdbcdff079fb39f08cf2ae151cdb3cc90c422501ace427637d20f502bffab9fe
-
Filesize
79KB
MD5352fcd550dc1914cc824354b9e26a8ae
SHA179d2c760c65fd98c41e854d2a87ab2285f4c530d
SHA256f721f57ca5130b8967dd75aed5808d252e7f85a6e3a2fdeb8da8ada717583754
SHA512ee26593f12cd2e6f203e9237d9d0a8ffad0647b4536df4f0abb53f58aaed9324a29e8eabf12a327ea6904f53c9b896cd47abf524f8003949d8c9a4956eec3d00
-
Filesize
778B
MD5b94243aca0de3355fb94911221bdb983
SHA1844516af10ca6f6faceb2d75135cb7ea8ece2d32
SHA2566e784461881188dcce09036c25dcb42bb34eaf64337e865a31c410077d8adf72
SHA5121eb06660a19098cb457afb4ae2642e28e20ece8f9fad013eb18573022dbe59ecc7ecfc612fa3de87196a67e993d411d63365e30dd5e1da9083c2c61b0d69a532