Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    14-08-2023 18:06

General

  • Target

    xuYU9brmxCHX.exe

  • Size

    478KB

  • MD5

    b42aeffda940fb929770f7fac1d151f8

  • SHA1

    bcebf4d8c90294ccd6abde7eb9185ab30fba0f1a

  • SHA256

    4f138cd5c06d63316037e0622fa6c9e91a6798c78a45730777296c332dc4b98c

  • SHA512

    4a9eef7f337efda5b782704e44c673b1ac888bea3ea27f01d36bc086087249f6d39b25d3856354251bb6a4d0814109de2e3745124eea2813928169b1d874a43f

  • SSDEEP

    6144:61EwL0xQk9VdeLuVnQs8QLgt8cBvnkCX/3Rde+A+DdsAOZZiXXPcNJ2OhX:61EZT90uNQzYgScBvnn/XpTs/ZiFOhX

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\xuYU9brmxCHX.exe
    "C:\Users\Admin\AppData\Local\Temp\xuYU9brmxCHX.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2656

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat
    Filesize

    144B

    MD5

    333173e7931dc86ec8a5615c7b25e848

    SHA1

    80fc66a0b545c307e708c3a08b18b36a1c38fdf9

    SHA256

    30d5180202222cb9229ae20467ec94ee9d76664218528afc78c77d079946772a

    SHA512

    3b07faa5b75557c95894f4d4ab9e9dbeb0032c67df860f484bb32d1cc19762c28abeaab1fe4c96a48eb98b33bed14af3d1cd4cf62e01db19768a1b4843c70fe9