Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 01:02

General

  • Target

    05d0e1d9ef7d6eedb53e964344ca53153b5adcd1ebe1b0e646266567741d325e.exe

  • Size

    482KB

  • MD5

    966ba9f9b6de97788ca46e93cc158b4a

  • SHA1

    a428d700769c14ee8a2f53cbd3a05672ae9e4e12

  • SHA256

    05d0e1d9ef7d6eedb53e964344ca53153b5adcd1ebe1b0e646266567741d325e

  • SHA512

    91b606120e81a3d38e7ee98e7fb373c4698b42056de1c497466ff24042ab496bf6539f705f0bcea0b036c0e79f150d04eb584888a451f23d960996af191c561f

  • SSDEEP

    6144:7Tz+c6KHYBhDc1RGJPv//NkUn+N5Bkf/0TELRvIZPjbsAOZZmAX4crtT4:7TlrYw1RU33NFn+N5WfIQIjbs/Zm6T4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05d0e1d9ef7d6eedb53e964344ca53153b5adcd1ebe1b0e646266567741d325e.exe
    "C:\Users\Admin\AppData\Local\Temp\05d0e1d9ef7d6eedb53e964344ca53153b5adcd1ebe1b0e646266567741d325e.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    7be2ddca0f0a7865b8ee12cc281b2141

    SHA1

    fdc5c2dd9c0c74b8289bcb15cd45618e9012fb4f

    SHA256

    0c091c5658be396f6d7b625d8feee0e25c0db99de51dfc6c800323166b704dcf

    SHA512

    7fe12b067f628aa94f0557c3438a99e5da483f85af520ed4e601c16e5ecc7950d4a13acfd3062e68cf0f1cfac9eb20f81a9e45ed061dcc86f7cd21a0c91540f7