Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-08-2023 18:06

General

  • Target

    xuYU9brmxCHX.exe

  • Size

    478KB

  • MD5

    b42aeffda940fb929770f7fac1d151f8

  • SHA1

    bcebf4d8c90294ccd6abde7eb9185ab30fba0f1a

  • SHA256

    4f138cd5c06d63316037e0622fa6c9e91a6798c78a45730777296c332dc4b98c

  • SHA512

    4a9eef7f337efda5b782704e44c673b1ac888bea3ea27f01d36bc086087249f6d39b25d3856354251bb6a4d0814109de2e3745124eea2813928169b1d874a43f

  • SSDEEP

    6144:61EwL0xQk9VdeLuVnQs8QLgt8cBvnkCX/3Rde+A+DdsAOZZiXXPcNJ2OhX:61EZT90uNQzYgScBvnn/XpTs/ZiFOhX

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\xuYU9brmxCHX.exe
    "C:\Users\Admin\AppData\Local\Temp\xuYU9brmxCHX.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1176

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat
    Filesize

    144B

    MD5

    7b45900b99eb89dec10bd18b8e231d3a

    SHA1

    aa732c01aaba5e450a32d5884d111abba49ad22e

    SHA256

    1b2d7d98681a72ed70786615ee2eaa1b6cc66d79712eac75831abc19878efc09

    SHA512

    76251bfef01991b62ecbf5755341f4c21ee18cf0e2e537b19acd58bf96ac4d4da31f17d35c23361555a51f204545274b5a30a2f010c046277ab4baf57e92f299