Analysis

  • max time kernel
    149s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2024 10:09

General

  • Target

    1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe

  • Size

    481KB

  • MD5

    2b2449e65ec9cd99f537fb5b936f4dc1

  • SHA1

    59e3d847c809d62b6fc854adca1ca6e781946e60

  • SHA256

    1420aa908caddc9d320757e24efda5a971c717334ea88a194366c114ebbede00

  • SHA512

    029dc4ee0eb0576ac983480cfb54d1eec5461347ab8b08357c64d7fc425af114e89908f4710b4fcd1ec3afc642a6ca6d9eab24744c8189756769cd0baaa30bf6

  • SSDEEP

    12288:nuD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZDSS+DY:a09AfNIEYsunZvZ19Zxs

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe
    "C:\Users\Admin\AppData\Local\Temp\1733479268bef4923665f47803580ac81a0b879268a546c8c91763e06ee07a9566a58cd1ec966.dat-decoded.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    6cf1f5b6937251b75724febca0531ee0

    SHA1

    12ace263e105c00b5442d5a4fbea3b64f0822133

    SHA256

    12624dd36de0cab6816f039077d75273d003db4d53d9cf955df2d401c203d703

    SHA512

    3f31c668b019bce0363a7c96d77ae57a680bf5b86131bce6d60e951a7769a3e6ab18901e90b29352782030abe7056526c26c24c068c195d7a1225cf771dbbdca