Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2025 02:43

General

  • Target

    88058b77035a018b3582136f073a1fc44eee203786b76890b53ca22c090ae5d0.exe

  • Size

    481KB

  • MD5

    636e91c12e393d1ea1d07c9970de9cf7

  • SHA1

    9b4d1af92501bda15857bc286aad9a40e918259a

  • SHA256

    88058b77035a018b3582136f073a1fc44eee203786b76890b53ca22c090ae5d0

  • SHA512

    58ec575c6f2da8d76ecefd4df76bae19fa0c1b8b073ac5d93d099d383901e8b48e85e11de36a62861b18c9348cb671cfaaafe6136462fd7d5469720cf2205896

  • SSDEEP

    12288:/9PgP3HAMwIGjY4vce6lnBthn5HSRVMf139F5woxr+IwtHwBtFhCsvZD5x+P32:d43HfwIGYMcn5PJrZj+

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88058b77035a018b3582136f073a1fc44eee203786b76890b53ca22c090ae5d0.exe
    "C:\Users\Admin\AppData\Local\Temp\88058b77035a018b3582136f073a1fc44eee203786b76890b53ca22c090ae5d0.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    54396b1f2f287d354fb00e1ddb93e5c0

    SHA1

    c7c96eecd53d4b1d8b18ea89a00f6cd3a2e55702

    SHA256

    13fde60037e6ae0ad5eadd10794d58e72bad6e9782d2fc47ab6691b4c1627475

    SHA512

    b4893a5d2de1e04164163641d0a78903ef705cfa8c33bc7b8530c2f876c72243e5ec75ba550f744200506c2f174cbdcea911c450771097ff62aa06bc2cdf8bb5