Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/02/2025, 14:48
Static task
static1
Behavioral task
behavioral1
Sample
c5f08d2817646649d149abcaa60c8e3eb9d28100f4633c0c015ad14282e7184bN.exe
Resource
win7-20241010-en
General
-
Target
c5f08d2817646649d149abcaa60c8e3eb9d28100f4633c0c015ad14282e7184bN.exe
-
Size
79KB
-
MD5
2697ae10cca38a1a00a4a68c19cc8790
-
SHA1
3b9925f871fdaeab32ee58979d68c0ee63070070
-
SHA256
c5f08d2817646649d149abcaa60c8e3eb9d28100f4633c0c015ad14282e7184b
-
SHA512
d78692a5808262c2f1ffde68ce3c96ac6bdeb5b2db279d0173059951f951ceecf7188042ab3345e6c594f36123b8708ccce845b229f69beb9a27d9c848ad266a
-
SSDEEP
1536:/tUknV9M6+ygXCNoNGtmFWZPhV8owtnMQPo9NSw249gdhwA2jeddMJ:fCygXkoNGtmQZ5wbAzSm9gdhj2a6J
Malware Config
Extracted
C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/nQDuNjnP
http://goldeny4vs3nyoht.onion/nQDuNjnP
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Seon family
-
Renames multiple (881) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 1640 regedit.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5f08d2817646649d149abcaa60c8e3eb9d28100f4633c0c015ad14282e7184bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe -
Runs regedit.exe 1 IoCs
pid Process 1640 regedit.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2844 wrote to memory of 1640 2844 c5f08d2817646649d149abcaa60c8e3eb9d28100f4633c0c015ad14282e7184bN.exe 82 PID 2844 wrote to memory of 1640 2844 c5f08d2817646649d149abcaa60c8e3eb9d28100f4633c0c015ad14282e7184bN.exe 82 PID 2844 wrote to memory of 1640 2844 c5f08d2817646649d149abcaa60c8e3eb9d28100f4633c0c015ad14282e7184bN.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5f08d2817646649d149abcaa60c8e3eb9d28100f4633c0c015ad14282e7184bN.exe"C:\Users\Admin\AppData\Local\Temp\c5f08d2817646649d149abcaa60c8e3eb9d28100f4633c0c015ad14282e7184bN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Roaming\{521a331c-c065-45f7-a2ce-be33d459363a}\regedit.exe"C:\Users\Admin\AppData\Roaming\{521a331c-c065-45f7-a2ce-be33d459363a}\regedit.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Runs regedit.exe
PID:1640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD52697ae10cca38a1a00a4a68c19cc8790
SHA13b9925f871fdaeab32ee58979d68c0ee63070070
SHA256c5f08d2817646649d149abcaa60c8e3eb9d28100f4633c0c015ad14282e7184b
SHA512d78692a5808262c2f1ffde68ce3c96ac6bdeb5b2db279d0173059951f951ceecf7188042ab3345e6c594f36123b8708ccce845b229f69beb9a27d9c848ad266a
-
Filesize
79KB
MD5887610fd895a808af74462290cb920f3
SHA17ef5a4d5d6cf2dd1228ef253034eecb1f43686ea
SHA256176c4e9599a72bf1c9160298f63ec6c4216ea5c5feda032b51ea6def5e6153d1
SHA512cc192125af26dda33a3fcf337f85ec7e7dab0583d1557be6523f0f5b58adac4964180c10df897c336e610f3c1070f50cc97064eda636ec6e14cd890b6a9c4eb7
-
Filesize
778B
MD504cd268a7ce17376ae989587702a727f
SHA10d08dcf0e4793b8419fc16cfde642b086fb354c8
SHA256ba56de0bfee36b644d4002640e4fb5f9de8435fca260e4d1c169d6139792824c
SHA5120d188bb72dffd257107cd4ee08883d29b0285ed16fcfb138d7180d3fdbb57d3026251d6cdc8928fd84456936ffb5332c719da6e920806bc3967fa3ac35e1cda9