Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 08:55
Behavioral task
behavioral1
Sample
17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe
Resource
win7-20240903-en
General
-
Target
17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe
-
Size
469KB
-
MD5
7f2ebe83b860a8de1f3ce798c79b5935
-
SHA1
3fbea97a5aa637271311851fd152ee37e813c44f
-
SHA256
fd125d03b2bc8512a9a5dcc6df9ca5045208442bc047af50b5f0a359103c1ba8
-
SHA512
38645cfa1e5826f06c21c09ba3a3fd11447abea0e66bd281722e9987ea501848086a87e327f689e1282b8532589c75fab182a6777f286030dd5231627038555c
-
SSDEEP
12288:umnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSln9:WiLJbpI7I2WhQqZ7l9
Malware Config
Signatures
-
Remcos family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2320 17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe"C:\Users\Admin\AppData\Local\Temp\17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5fae4e84cceaa8c199e2ad1faa7173764
SHA123749c32b97234f7cc75963e12568fb2d92eddee
SHA2565c0162f70c80a892dcb8304fce002e3bf67c37e24fc47837b707490d33336f75
SHA512ddbaef2b681c19991c118716ba9e7534c7ac8a3dbf8276cc09d8c057da19248b954f3298bfc295fcee1db4669c895266275597bb1fca8b5c92b8f23654927eed