Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 02:01

General

  • Target

    007d411eddc2950c3ffe59f7ef44a0b090f423e3d0f17e01170891fa74f901ce.exe

  • Size

    483KB

  • MD5

    d564d91500255ddb6dc57044594c2bc9

  • SHA1

    a12cc4d170fba25130cfe2d18722ab363f3915b0

  • SHA256

    007d411eddc2950c3ffe59f7ef44a0b090f423e3d0f17e01170891fa74f901ce

  • SHA512

    697d6513ac041b8098c74e679e794921c8ae78644a7e04bd191c2e0f29e42f24e43017567e086e58edb29d4ccb948031d043c01cbd3c5f11f9444ebdb2046ee6

  • SSDEEP

    6144:G5zY+w1LqZBCxKedv//NEUn+N5hkf/0TE7RvIZ/jbsAORZzAXMcrOA4:G5k+Yqaxrh3Nln+N52fIA4jbsvZzlA4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\007d411eddc2950c3ffe59f7ef44a0b090f423e3d0f17e01170891fa74f901ce.exe
    "C:\Users\Admin\AppData\Local\Temp\007d411eddc2950c3ffe59f7ef44a0b090f423e3d0f17e01170891fa74f901ce.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    bea3fc6f70bbe29ec903d663491fe85b

    SHA1

    4256d2281ac984570a69fbe064e1fa872c4671ef

    SHA256

    835f17b19a299648b6520ab7bbeef834fb4eeeaadb8362ae9bc606f7c3be55c5

    SHA512

    82f9bd10e19011293d874df427953a4df80fc8e2f923f222de510d3600049cf4d857150d7ddaee12ff4a757f7bcec6dc91fa357010056714a9d101586bc2a730