Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/02/2025, 16:07
Static task
static1
Behavioral task
behavioral1
Sample
ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe
Resource
win7-20240903-en
General
-
Target
ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe
-
Size
79KB
-
MD5
7d578c616e075d7c5b1939a5a00a5b3d
-
SHA1
548b72daea1294f665a6bcebcb7e8b274fb7a8a5
-
SHA256
ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f
-
SHA512
0f9e5c7dd126b3b48e596247a053f6896f4d38ac4812d908cf87c9df592b02960e4ce6a6ab82854f920c46f9c4543e8b17c785bf469b5b71623af2616329e65d
-
SSDEEP
1536:/tUknV9M6+ygXCNoNGtmFWZPhV8owtnMQPo9NSw249gdhwA2jeddCL:fCygXkoNGtmQZ5wbAzSm9gdhj2aML
Malware Config
Extracted
C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/nU6bstiu
http://goldeny4vs3nyoht.onion/nU6bstiu
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Seon family
-
Renames multiple (262) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 2172 wuapp.exe -
Loads dropped DLL 1 IoCs
pid Process 2072 ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2172 2072 ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe 30 PID 2072 wrote to memory of 2172 2072 ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe 30 PID 2072 wrote to memory of 2172 2072 ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe 30 PID 2072 wrote to memory of 2172 2072 ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe"C:\Users\Admin\AppData\Local\Temp\ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Roaming\{ada16c03-0e3c-4a92-8a0e-6bcb443c4ba1}\wuapp.exe"C:\Users\Admin\AppData\Roaming\{ada16c03-0e3c-4a92-8a0e-6bcb443c4ba1}\wuapp.exe"2⤵
- Executes dropped EXE
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
778B
MD5976e3a3598f20b6acab6252261902bea
SHA1dbcb6f3a3456b33a2be18b4dd83506a092f99567
SHA25670e32b7555763b4066a4c9658ff7dd574176497e53620a05a046017996c6fde5
SHA512f24c0370c7059f186f52b36ed24e729ce868e1033f5821b94b0cb42fe10fd26275d9fa0e171054fe63f0d32228ca9c84205edc645453e2e4ca3a0b035b447cb9
-
Filesize
79KB
MD57d578c616e075d7c5b1939a5a00a5b3d
SHA1548b72daea1294f665a6bcebcb7e8b274fb7a8a5
SHA256ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f
SHA5120f9e5c7dd126b3b48e596247a053f6896f4d38ac4812d908cf87c9df592b02960e4ce6a6ab82854f920c46f9c4543e8b17c785bf469b5b71623af2616329e65d