Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 01:23
Behavioral task
behavioral1
Sample
remcosviejo.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
remcosviejo.exe
Resource
win10v2004-20240802-en
General
-
Target
remcosviejo.exe
-
Size
483KB
-
MD5
e6ed0b450a69ad32a2cf629236265e1c
-
SHA1
c5b490ac0148705cc13e61bec49ca9d3d020cead
-
SHA256
8de4861c4aca30b32685f9a1b78c307b6faa5011551ebf689babc7c42babb720
-
SHA512
61c8dbfe1497ef9d32d4c905f2e84f69e3dcedca90f7f7f15bffc69d53088aa3fd0e3900de4b87494303b46e05a08e777ace9715430efb9cdf2f5abc3d646dc3
-
SSDEEP
6144:vXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZ5AXIcNc5Gv:vX7tPMK8ctGe4Dzl4h2QnuPs/Z55cv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcosviejo.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1348 remcosviejo.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1348 remcosviejo.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230B
MD5b58dcb61f5c0820bb866db8b7089c387
SHA1f3b1e1243d31c918f05b3d584a79074ad6d0a89c
SHA256d59db5a227ddf68e7db1187552737a7b83c09894f932b4e9bd2ed35e0cd4ec7e
SHA51284105408f2d0a1a813205c3e0fd1783d5a9d71744af10133066d95b0b0bac57ff1f207f5e0592a6a22db7af62f1c90a96099dd7a1eaac59902480d54741bb77b