Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 17:42
Behavioral task
behavioral1
Sample
17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe
Resource
win7-20240708-en
General
-
Target
17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe
-
Size
469KB
-
MD5
7f2ebe83b860a8de1f3ce798c79b5935
-
SHA1
3fbea97a5aa637271311851fd152ee37e813c44f
-
SHA256
fd125d03b2bc8512a9a5dcc6df9ca5045208442bc047af50b5f0a359103c1ba8
-
SHA512
38645cfa1e5826f06c21c09ba3a3fd11447abea0e66bd281722e9987ea501848086a87e327f689e1282b8532589c75fab182a6777f286030dd5231627038555c
-
SSDEEP
12288:umnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSln9:WiLJbpI7I2WhQqZ7l9
Malware Config
Signatures
-
Remcos family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2976 17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe"C:\Users\Admin\AppData\Local\Temp\17334752451c3a43189360a7e5b86f13b5ea7a6044304256a8f4c49ad5d5bd4831e72ee12e792.dat-decoded.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD52bea06e8f9ffd206b84e7d4040eafc66
SHA177d93c1d633ef51b40a60e8c2e591201ede69e36
SHA256b4d6bc73bd0eeb2d3233d51ce85cdf7605a97cb1a31e49c866d5de0347d0e78a
SHA51212a63a0253b1af1ab82e6c483ef517e8b659462ec5ec29fb34c89b649365deda4ee92e8fc7df39e9ee6a293ecc13ea73d997caad6fb39568c70694db08b20215