Analysis
-
max time kernel
13s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/02/2025, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8abN.exe
Resource
win7-20240903-en
General
-
Target
8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8abN.exe
-
Size
79KB
-
MD5
a8f66777bacc19d0ec304b2a5a5e69f0
-
SHA1
f0805638985fde45bb8024ea1cbd727747d666ea
-
SHA256
8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8ab
-
SHA512
90691c21d028f50f854b3ba10ba24523b43f256c45522ba22ff7eabeab430e1b554a800c844fe0357158f21694548184217d0486dcd7f2d370afa4b133006c25
-
SSDEEP
1536:/tUknV9M6+ygXCNoNGtmFWZPhV8owtnMQPo9NSw249gdhwA2jeddCj:fCygXkoNGtmQZ5wbAzSm9gdhj2aMj
Malware Config
Extracted
C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/nZs9ZuNv
http://goldeny4vs3nyoht.onion/nZs9ZuNv
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Seon family
-
Renames multiple (240) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 784 diskpart.exe -
Loads dropped DLL 1 IoCs
pid Process 2384 8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8abN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8abN.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 784 2384 8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8abN.exe 30 PID 2384 wrote to memory of 784 2384 8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8abN.exe 30 PID 2384 wrote to memory of 784 2384 8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8abN.exe 30 PID 2384 wrote to memory of 784 2384 8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8abN.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8abN.exe"C:\Users\Admin\AppData\Local\Temp\8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8abN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Roaming\{fbd6bded-912c-4f21-8b46-9316c95bd8cf}\diskpart.exe"C:\Users\Admin\AppData\Roaming\{fbd6bded-912c-4f21-8b46-9316c95bd8cf}\diskpart.exe"2⤵
- Executes dropped EXE
PID:784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5a8f66777bacc19d0ec304b2a5a5e69f0
SHA1f0805638985fde45bb8024ea1cbd727747d666ea
SHA2568421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8ab
SHA51290691c21d028f50f854b3ba10ba24523b43f256c45522ba22ff7eabeab430e1b554a800c844fe0357158f21694548184217d0486dcd7f2d370afa4b133006c25
-
Filesize
778B
MD5cb264056128a03108057a1bb95ec8f8b
SHA1882c3042000549827c8930a25bbe20eb2857fc37
SHA25619e023023419edd4b2bd41acd593413a0f11ac634acd9299643a985eb6b73f0c
SHA512b2f0cdf72c15827a254898d6bd9d309763bd84d2e79934ea83c57dcf31b6c656d205131a1f68cbd4ee78eb96a307d7947b3ae7a42a2b629114bc09aa4c4677b2