Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 01:42
Behavioral task
behavioral1
Sample
remcosviejo.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
remcosviejo.exe
Resource
win10v2004-20240802-en
General
-
Target
remcosviejo.exe
-
Size
483KB
-
MD5
e6ed0b450a69ad32a2cf629236265e1c
-
SHA1
c5b490ac0148705cc13e61bec49ca9d3d020cead
-
SHA256
8de4861c4aca30b32685f9a1b78c307b6faa5011551ebf689babc7c42babb720
-
SHA512
61c8dbfe1497ef9d32d4c905f2e84f69e3dcedca90f7f7f15bffc69d53088aa3fd0e3900de4b87494303b46e05a08e777ace9715430efb9cdf2f5abc3d646dc3
-
SSDEEP
6144:vXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZ5AXIcNc5Gv:vX7tPMK8ctGe4Dzl4h2QnuPs/Z55cv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcosviejo.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2112 remcosviejo.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD51c9648525ffb33a5900a752a2cea33a4
SHA19b55aad969d6a9ceb445fd7ddc5e7ccbc0f7bba2
SHA256d58301168a7c4c3fe5073ee7e408a0667f0dfd4d90530786151e4db2a5cc7aa2
SHA5127eeb553f7c61403082ca3155b5b1ba6a1d1551df64fc0a228939f90ba6c985df75c5454b4ffe9d09b9a1f355177bfea1ebf8231fa73a63af09cbfc735f788af9