Analysis
-
max time kernel
94s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/02/2025, 16:07
Static task
static1
Behavioral task
behavioral1
Sample
ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe
Resource
win7-20240903-en
General
-
Target
ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe
-
Size
79KB
-
MD5
7d578c616e075d7c5b1939a5a00a5b3d
-
SHA1
548b72daea1294f665a6bcebcb7e8b274fb7a8a5
-
SHA256
ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f
-
SHA512
0f9e5c7dd126b3b48e596247a053f6896f4d38ac4812d908cf87c9df592b02960e4ce6a6ab82854f920c46f9c4543e8b17c785bf469b5b71623af2616329e65d
-
SSDEEP
1536:/tUknV9M6+ygXCNoNGtmFWZPhV8owtnMQPo9NSw249gdhwA2jeddCL:fCygXkoNGtmQZ5wbAzSm9gdhj2aML
Malware Config
Extracted
C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/t3oeuyY8
http://goldeny4vs3nyoht.onion/t3oeuyY8
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Seon family
-
Renames multiple (883) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 2892 LaunchTM.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LaunchTM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2892 2336 ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe 82 PID 2336 wrote to memory of 2892 2336 ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe 82 PID 2336 wrote to memory of 2892 2336 ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe"C:\Users\Admin\AppData\Local\Temp\ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Roaming\{902ee964-7302-4567-95c9-7ec9aa334bf3}\LaunchTM.exe"C:\Users\Admin\AppData\Roaming\{902ee964-7302-4567-95c9-7ec9aa334bf3}\LaunchTM.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD57d578c616e075d7c5b1939a5a00a5b3d
SHA1548b72daea1294f665a6bcebcb7e8b274fb7a8a5
SHA256ec4f0c6f7901565b034991547d42de6f8afd71695fd28a15a4199e72575a8b0f
SHA5120f9e5c7dd126b3b48e596247a053f6896f4d38ac4812d908cf87c9df592b02960e4ce6a6ab82854f920c46f9c4543e8b17c785bf469b5b71623af2616329e65d
-
Filesize
778B
MD55a54b549921613c46771b25f6b1af16f
SHA172df4543c72b3d51380e9c568d1e70cfda23cefc
SHA256687f5a1f3c43fee7c3b0d3cc84c2a8881c775d32c885b11c72a04b69bf112000
SHA51284be80ecf0f91c5e8c5b78861cdfb55e6661bcf36f646c408b5637b7e4a0b026a11f55e7a30e292907807cbc200d246e1c4f718d6a182ace73975c01b715f7e9