Analysis
-
max time kernel
102s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
05/02/2025, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8abN.exe
Resource
win7-20240903-en
General
-
Target
8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8abN.exe
-
Size
79KB
-
MD5
a8f66777bacc19d0ec304b2a5a5e69f0
-
SHA1
f0805638985fde45bb8024ea1cbd727747d666ea
-
SHA256
8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8ab
-
SHA512
90691c21d028f50f854b3ba10ba24523b43f256c45522ba22ff7eabeab430e1b554a800c844fe0357158f21694548184217d0486dcd7f2d370afa4b133006c25
-
SSDEEP
1536:/tUknV9M6+ygXCNoNGtmFWZPhV8owtnMQPo9NSw249gdhwA2jeddCj:fCygXkoNGtmQZ5wbAzSm9gdhj2aMj
Malware Config
Extracted
C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/pGRuG5hc
http://goldeny4vs3nyoht.onion/pGRuG5hc
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Seon family
-
Renames multiple (847) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 4008 getmac.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8abN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language getmac.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4732 wrote to memory of 4008 4732 8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8abN.exe 86 PID 4732 wrote to memory of 4008 4732 8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8abN.exe 86 PID 4732 wrote to memory of 4008 4732 8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8abN.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8abN.exe"C:\Users\Admin\AppData\Local\Temp\8421ee120052d1929b0f23bc01d4f14a6f215c53859666596478f64a240dd8abN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Roaming\{fc6f6a2b-0864-4a96-a444-ebda6075a439}\getmac.exe"C:\Users\Admin\AppData\Roaming\{fc6f6a2b-0864-4a96-a444-ebda6075a439}\getmac.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5e848f9a37f0269e1885694f656f8432b
SHA173fe6975fe98774ffbb6ad43b70f4e80122522b9
SHA256ff3f3f62b0bfd77d16848ca8c26156309dfbd5de6c3752ca19fdb70e839e60ef
SHA512bc9aad92e3c29b3145e5b277f5546296f4d01e1d523ade82463c438a5e770f747219e5af9e92d4718b2e67a90fe52e76671b043e1c94345539ba0a3edeac2112
-
Filesize
778B
MD50fea7f4145e965dedfa5dd8f81108139
SHA170b039036747a07fb66ce82580ed3bc4661ee6ad
SHA2568f056c36a4d29ab763dcdd777c0346306c894160b6494c4fc54dfa5002eb8d00
SHA5125d9efadd198fa20ab24f850bbd0d372875773772746da8945ad07818208c0b6f8ad0fe252d07f6f84a5df2e67a736a2c8d519b83eff23e2069596508ea5e2549