Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/02/2025, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe
Resource
win7-20240708-en
General
-
Target
964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe
-
Size
79KB
-
MD5
322d73ea4ce5be6637f635125abee0d3
-
SHA1
7f6f6c2813768a8df111aad1ebec01b43a6517d3
-
SHA256
964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d
-
SHA512
27bebd8c71ac842146c8a599e23f76b7b648e59ee1df951e577a15ff8b40140a109566f66efa40e2465fd29a20a89f450404ec0b3a4c253dbf564fbbace1d1ad
-
SSDEEP
1536:/tUknV9M6+ygXCNoNGtmFWZPhV8owtnMQPo9NSw249gdhwA2jeddBu:fCygXkoNGtmQZ5wbAzSm9gdhj2aPu
Malware Config
Extracted
C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/t9ehgJ9b
http://goldeny4vs3nyoht.onion/t9ehgJ9b
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Seon family
-
Renames multiple (184) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 2796 regedit.exe -
Loads dropped DLL 1 IoCs
pid Process 1904 964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe -
Runs regedit.exe 1 IoCs
pid Process 2796 regedit.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2796 1904 964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe 31 PID 1904 wrote to memory of 2796 1904 964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe 31 PID 1904 wrote to memory of 2796 1904 964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe 31 PID 1904 wrote to memory of 2796 1904 964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe 31 PID 1904 wrote to memory of 2796 1904 964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe 31 PID 1904 wrote to memory of 2796 1904 964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe 31 PID 1904 wrote to memory of 2796 1904 964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe"C:\Users\Admin\AppData\Local\Temp\964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Roaming\{21f23e3f-f75d-4816-9dce-8bb9522d6b78}\regedit.exe"C:\Users\Admin\AppData\Roaming\{21f23e3f-f75d-4816-9dce-8bb9522d6b78}\regedit.exe"2⤵
- Executes dropped EXE
- Runs regedit.exe
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5322d73ea4ce5be6637f635125abee0d3
SHA17f6f6c2813768a8df111aad1ebec01b43a6517d3
SHA256964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d
SHA51227bebd8c71ac842146c8a599e23f76b7b648e59ee1df951e577a15ff8b40140a109566f66efa40e2465fd29a20a89f450404ec0b3a4c253dbf564fbbace1d1ad
-
Filesize
778B
MD59ed5cd06f2509506d7ece523e0e301a7
SHA1ece3d1edcb7d8f6f5bb890e56c6d63dd332b9527
SHA256d22f3339f69253cfc02d71bbc79fc519c39850ede340de3dc59cf381d6f5fc8b
SHA51223775c1f110803e37ea5a40280643d464476d4eedecd3a52a3f9ef5e320bf7f73b0fa1bb6563d22c7135adfca43d048be4370503a74dfb481af7a0255982f7c5