Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2024 23:07

General

  • Target

    1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe

  • Size

    481KB

  • MD5

    a7ee819bfb900ad6d20ebe4d1da8af4c

  • SHA1

    b50f78b7447b040f57d115c70c5fb4e62cac70f3

  • SHA256

    b6331431d23acf4528527316a993890117bac208c604b054622efee21cbffcf5

  • SHA512

    2683efbd00d03bc838e65b8bcc0640faabfbc63e9055b5b81aa42f338b25cf5998271df877fdf5f8fe4a13a0f3d93cdbf0ae71261753333702a79a824f5685e8

  • SSDEEP

    12288:3uD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZDST+DY:q09AfNIEYsunZvZ19ZAs

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe
    "C:\Users\Admin\AppData\Local\Temp\1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:692
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\qznyntabwbfepukflpbryosnjzbzan.vbs"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\registros.dat

    Filesize

    144B

    MD5

    24446f68421e42c426b9776918c0a3f2

    SHA1

    4c6183055d3919503994a0b77ca2001856371f52

    SHA256

    c1176c3074b59bc8094ae748faab17bd158f5e7f15f2e54e9716de9b07ed83fd

    SHA512

    d6f484a0b4c4004772ede37c5f858352bc52c00fc56f476192e9b79b2b50e5d25c2721cc7606fbbbe21961a543145e9c6aac1887451af79acf9d2ff15b3b8b85

  • C:\Users\Admin\AppData\Local\Temp\qznyntabwbfepukflpbryosnjzbzan.vbs

    Filesize

    828B

    MD5

    fd4d288901413e8d992e3382e6a80e00

    SHA1

    df54ad1fda8372c8b3a5273203b3ec9a8e0107a0

    SHA256

    7610f747ba60dd471083b15d25eb6321c3983836bbe390e4c197124a6f243b90

    SHA512

    e556e74fc662eebb496eeac1ebee4e3c7af089ae2743905ba66841f72f28a3f95327a23af47f7d3c1b334af41fb49f819589ccb0195aa8f409d8e67bf20b6163