Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
14-08-2023 18:06
Behavioral task
behavioral1
Sample
xuYU9brmxCHX.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
xuYU9brmxCHX.exe
Resource
win10v2004-20230703-en
General
-
Target
xuYU9brmxCHX.exe
-
Size
478KB
-
MD5
b42aeffda940fb929770f7fac1d151f8
-
SHA1
bcebf4d8c90294ccd6abde7eb9185ab30fba0f1a
-
SHA256
4f138cd5c06d63316037e0622fa6c9e91a6798c78a45730777296c332dc4b98c
-
SHA512
4a9eef7f337efda5b782704e44c673b1ac888bea3ea27f01d36bc086087249f6d39b25d3856354251bb6a4d0814109de2e3745124eea2813928169b1d874a43f
-
SSDEEP
6144:61EwL0xQk9VdeLuVnQs8QLgt8cBvnkCX/3Rde+A+DdsAOZZiXXPcNJ2OhX:61EZT90uNQzYgScBvnn/XpTs/ZiFOhX
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
xuYU9brmxCHX.exepid process 2656 xuYU9brmxCHX.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\remcos\logs.datFilesize
144B
MD5333173e7931dc86ec8a5615c7b25e848
SHA180fc66a0b545c307e708c3a08b18b36a1c38fdf9
SHA25630d5180202222cb9229ae20467ec94ee9d76664218528afc78c77d079946772a
SHA5123b07faa5b75557c95894f4d4ab9e9dbeb0032c67df860f484bb32d1cc19762c28abeaab1fe4c96a48eb98b33bed14af3d1cd4cf62e01db19768a1b4843c70fe9