Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2024 01:23

General

  • Target

    remcosviejo.exe

  • Size

    483KB

  • MD5

    e6ed0b450a69ad32a2cf629236265e1c

  • SHA1

    c5b490ac0148705cc13e61bec49ca9d3d020cead

  • SHA256

    8de4861c4aca30b32685f9a1b78c307b6faa5011551ebf689babc7c42babb720

  • SHA512

    61c8dbfe1497ef9d32d4c905f2e84f69e3dcedca90f7f7f15bffc69d53088aa3fd0e3900de4b87494303b46e05a08e777ace9715430efb9cdf2f5abc3d646dc3

  • SSDEEP

    6144:vXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZ5AXIcNc5Gv:vX7tPMK8ctGe4Dzl4h2QnuPs/Z55cv

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\remcosviejo.exe
    "C:\Users\Admin\AppData\Local\Temp\remcosviejo.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    230B

    MD5

    b58dcb61f5c0820bb866db8b7089c387

    SHA1

    f3b1e1243d31c918f05b3d584a79074ad6d0a89c

    SHA256

    d59db5a227ddf68e7db1187552737a7b83c09894f932b4e9bd2ed35e0cd4ec7e

    SHA512

    84105408f2d0a1a813205c3e0fd1783d5a9d71744af10133066d95b0b0bac57ff1f207f5e0592a6a22db7af62f1c90a96099dd7a1eaac59902480d54741bb77b