Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 19:08

General

  • Target

    007d411eddc2950c3ffe59f7ef44a0b090f423e3d0f17e01170891fa74f901ce.exe

  • Size

    483KB

  • MD5

    d564d91500255ddb6dc57044594c2bc9

  • SHA1

    a12cc4d170fba25130cfe2d18722ab363f3915b0

  • SHA256

    007d411eddc2950c3ffe59f7ef44a0b090f423e3d0f17e01170891fa74f901ce

  • SHA512

    697d6513ac041b8098c74e679e794921c8ae78644a7e04bd191c2e0f29e42f24e43017567e086e58edb29d4ccb948031d043c01cbd3c5f11f9444ebdb2046ee6

  • SSDEEP

    6144:G5zY+w1LqZBCxKedv//NEUn+N5hkf/0TE7RvIZ/jbsAORZzAXMcrOA4:G5k+Yqaxrh3Nln+N52fIA4jbsvZzlA4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\007d411eddc2950c3ffe59f7ef44a0b090f423e3d0f17e01170891fa74f901ce.exe
    "C:\Users\Admin\AppData\Local\Temp\007d411eddc2950c3ffe59f7ef44a0b090f423e3d0f17e01170891fa74f901ce.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    7bd59991d6b9ef7ddecad2e1822f2903

    SHA1

    e3ddc71258856e69d6069c5a9c114f4bcc88cc99

    SHA256

    0b4666b9e82ece80ad60befcf356985cae0f3ec541e9fae018b61964a3f5675b

    SHA512

    90a2910c7362c397344de34ead172c073e3c2c7c39373869122e6a548d0bc447ed53a59c4188cfab83191a3dba67923d8d5e3bf9501243f0d45d1d1e6e8912fc