Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2025, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe
Resource
win7-20240708-en
General
-
Target
964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe
-
Size
79KB
-
MD5
322d73ea4ce5be6637f635125abee0d3
-
SHA1
7f6f6c2813768a8df111aad1ebec01b43a6517d3
-
SHA256
964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d
-
SHA512
27bebd8c71ac842146c8a599e23f76b7b648e59ee1df951e577a15ff8b40140a109566f66efa40e2465fd29a20a89f450404ec0b3a4c253dbf564fbbace1d1ad
-
SSDEEP
1536:/tUknV9M6+ygXCNoNGtmFWZPhV8owtnMQPo9NSw249gdhwA2jeddBu:fCygXkoNGtmQZ5wbAzSm9gdhj2aPu
Malware Config
Extracted
C:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXT
http://golden5a4eqranh7.onion/s15r6kX6
http://goldeny4vs3nyoht.onion/s15r6kX6
Signatures
-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Seon family
-
Renames multiple (854) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 4760 label.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language label.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3688 wrote to memory of 4760 3688 964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe 87 PID 3688 wrote to memory of 4760 3688 964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe 87 PID 3688 wrote to memory of 4760 3688 964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe"C:\Users\Admin\AppData\Local\Temp\964b5abe3924a2efc07a955cce450291d880fe57be49018446143f9f3dcf0d7d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Roaming\{38905584-e1cd-4c09-917d-3d1be6754a79}\label.exe"C:\Users\Admin\AppData\Roaming\{38905584-e1cd-4c09-917d-3d1be6754a79}\label.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD553d5c3fb96bf1c5d27a45ca35faae395
SHA1767be78e5519f51a333460540501db06f2456624
SHA256ebf3825ecbc6b4f63f042dfb040e82b3abed954d71f527e80ab092692f325fbe
SHA512a371920b3e1f47d1249741a3d46b56238932855c8b87f454fb6946021f9dca551c53037dcf70d6d2081f189f01cd9aa3f4bdc2132fa99471da5a794d78b25e81
-
Filesize
778B
MD5384d1c60a9a425df067e75da3f792ce2
SHA1e265e9c239dc48c44f12a431ac9603e3a561e5f4
SHA2560d5710ec4fc82189b224e4db154dc1f2185e43259297cc6522efb46d92131905
SHA5126f9b2af7e7470c129d96df3a85b9d71e896270b1c555ff53e94f0d9ed9dfff019acbd8c43a3d781129a320254549a2462ffe9bf170d4fb7b25b5fad5ade22aa4