Analysis

  • max time kernel
    147s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2024 19:04

General

  • Target

    007d411eddc2950c3ffe59f7ef44a0b090f423e3d0f17e01170891fa74f901ce.exe

  • Size

    483KB

  • MD5

    d564d91500255ddb6dc57044594c2bc9

  • SHA1

    a12cc4d170fba25130cfe2d18722ab363f3915b0

  • SHA256

    007d411eddc2950c3ffe59f7ef44a0b090f423e3d0f17e01170891fa74f901ce

  • SHA512

    697d6513ac041b8098c74e679e794921c8ae78644a7e04bd191c2e0f29e42f24e43017567e086e58edb29d4ccb948031d043c01cbd3c5f11f9444ebdb2046ee6

  • SSDEEP

    6144:G5zY+w1LqZBCxKedv//NEUn+N5hkf/0TE7RvIZ/jbsAORZzAXMcrOA4:G5k+Yqaxrh3Nln+N52fIA4jbsvZzlA4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\007d411eddc2950c3ffe59f7ef44a0b090f423e3d0f17e01170891fa74f901ce.exe
    "C:\Users\Admin\AppData\Local\Temp\007d411eddc2950c3ffe59f7ef44a0b090f423e3d0f17e01170891fa74f901ce.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    da04fc0383a98f199123f1964402dab7

    SHA1

    941d1318484ab0aeb4dad166d9a4322a102cb005

    SHA256

    03e331c69ed0515472281213ed36592f4de186e1f31f498b0b3ca782e313e200

    SHA512

    23e5f3c7a15dcd69548eadf5930dce73da02f7f9c80c3526cd606aab91247f438d4d721d08dc5afb4efc08735e28c854949220e221ec82a704549ef4fc6fdf56