Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2023 18:06
Behavioral task
behavioral1
Sample
xuYU9brmxCHX.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
xuYU9brmxCHX.exe
Resource
win10v2004-20230703-en
General
-
Target
xuYU9brmxCHX.exe
-
Size
478KB
-
MD5
b42aeffda940fb929770f7fac1d151f8
-
SHA1
bcebf4d8c90294ccd6abde7eb9185ab30fba0f1a
-
SHA256
4f138cd5c06d63316037e0622fa6c9e91a6798c78a45730777296c332dc4b98c
-
SHA512
4a9eef7f337efda5b782704e44c673b1ac888bea3ea27f01d36bc086087249f6d39b25d3856354251bb6a4d0814109de2e3745124eea2813928169b1d874a43f
-
SSDEEP
6144:61EwL0xQk9VdeLuVnQs8QLgt8cBvnkCX/3Rde+A+DdsAOZZiXXPcNJ2OhX:61EZT90uNQzYgScBvnn/XpTs/ZiFOhX
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
xuYU9brmxCHX.exepid process 1176 xuYU9brmxCHX.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\remcos\logs.datFilesize
144B
MD57b45900b99eb89dec10bd18b8e231d3a
SHA1aa732c01aaba5e450a32d5884d111abba49ad22e
SHA2561b2d7d98681a72ed70786615ee2eaa1b6cc66d79712eac75831abc19878efc09
SHA51276251bfef01991b62ecbf5755341f4c21ee18cf0e2e537b19acd58bf96ac4d4da31f17d35c23361555a51f204545274b5a30a2f010c046277ab4baf57e92f299