Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-09-2024 11:32

General

  • Target

    979645cb3ebaa1883b0edb4ab2d16e085b5f8206945c843de50a106a8f6f8d64.exe

  • Size

    521KB

  • MD5

    315816d740587b3e574af546df4c2106

  • SHA1

    b93a3a634d6746cfdc0e9d65e0ae865dc32d5271

  • SHA256

    979645cb3ebaa1883b0edb4ab2d16e085b5f8206945c843de50a106a8f6f8d64

  • SHA512

    d1aaa3ecbd36fb00ceea3928535698d7441c6aff3f87c354f29f1b55f23b27be31b3ae3673ea66fcc3d8a86d603ab2f700a324fd48c3a2129f3c8e0ca7f2a2ea

  • SSDEEP

    6144:fTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZBAXccr1T4:fTlrYw1RUh3NFn+N5WfIQIjbs/ZBuT4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\979645cb3ebaa1883b0edb4ab2d16e085b5f8206945c843de50a106a8f6f8d64.exe
    "C:\Users\Admin\AppData\Local\Temp\979645cb3ebaa1883b0edb4ab2d16e085b5f8206945c843de50a106a8f6f8d64.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    ed500a876193d0400f504223a447391f

    SHA1

    ed0651b5784fbdfec35d6ed369ed7900f67859ef

    SHA256

    a07e8c288009aeacefd7986feb013f684ba737a9293b94ca69a0c3793c3ac0b0

    SHA512

    3c3e5d1c4af980310970f78645fb25ebf83f5ae065c46f92421f68e7259a10c4c48667ddf0fc0fe238e6501f0208651693113c4f580d3496c2111f30a24e5931