Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 01:23
Behavioral task
behavioral1
Sample
remcosviejo.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
remcosviejo.exe
Resource
win10v2004-20240802-en
General
-
Target
remcosviejo.exe
-
Size
483KB
-
MD5
e6ed0b450a69ad32a2cf629236265e1c
-
SHA1
c5b490ac0148705cc13e61bec49ca9d3d020cead
-
SHA256
8de4861c4aca30b32685f9a1b78c307b6faa5011551ebf689babc7c42babb720
-
SHA512
61c8dbfe1497ef9d32d4c905f2e84f69e3dcedca90f7f7f15bffc69d53088aa3fd0e3900de4b87494303b46e05a08e777ace9715430efb9cdf2f5abc3d646dc3
-
SSDEEP
6144:vXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZ5AXIcNc5Gv:vX7tPMK8ctGe4Dzl4h2QnuPs/Z55cv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcosviejo.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2520 remcosviejo.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2520 remcosviejo.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230B
MD5b4144ae0e49521937ded7ed6f4ec443c
SHA1a5f642cd4534c8b0d68e61112670c6e8dca207af
SHA256269bd6830742bb35977c970f023e6dd9065ab8786e0e17f794f8faa0e31fbfb8
SHA512bc3cf04ef2cdc08bb33311ec8171e1aa53096e8ec40b4c25c5f49e0c12b660973b7500d1c63a914f3d20753b7916959fbe8e25f8403084360d3695712cf29424