Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2024 01:16

General

  • Target

    372cbc51a06856ab5865659790ec01821c095afda53e177256eebe1ae4af5b6a.exe

  • Size

    469KB

  • MD5

    af9d6cdc4ff098c170ad543c236e6e0a

  • SHA1

    eb3dd66a5e96512f94fd29b07d2ac277d66b30b6

  • SHA256

    372cbc51a06856ab5865659790ec01821c095afda53e177256eebe1ae4af5b6a

  • SHA512

    3e7eb91299ed161c395a750783e91237eaf53e070b224ecf9bab120720b1a093c38faf3507cfd908c0e88ab59c5af03b248bfc8856de8a68f290ded5880eb4c8

  • SSDEEP

    12288:umnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSAn9:WiLJbpI7I2WhQqZ7A9

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\372cbc51a06856ab5865659790ec01821c095afda53e177256eebe1ae4af5b6a.exe
    "C:\Users\Admin\AppData\Local\Temp\372cbc51a06856ab5865659790ec01821c095afda53e177256eebe1ae4af5b6a.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    1cdfefec7178da307c891fb448e25986

    SHA1

    a511c0b4b6674e3ea75b3d3a9f7a19843ee611d8

    SHA256

    df29a64c50cfb9ccee1dee0aba6bbe54c698ef3774d1738c748aec6ed16c9301

    SHA512

    df8e0e3f96eec8b33cf546b4493de9172f65b99a93e91c17b02e1b49db4eb06d8d16ea49385ccb7c82e9d0aaff8a5261430b9b48fcc061f8bafe54a6925bf3ba