Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2025 03:09

General

  • Target

    9fb29a4b049bf0752b4c116c4efa91625507e13ca3bc0a8eb68ee9d2347e487b.exe

  • Size

    482KB

  • MD5

    5f49176119a0e39f1bae05724fa95f6a

  • SHA1

    f62771c553419d590195dc7867d11622fefbab88

  • SHA256

    9fb29a4b049bf0752b4c116c4efa91625507e13ca3bc0a8eb68ee9d2347e487b

  • SHA512

    bbde3b8e0ec4667dc2c3ce4acf3c8114290d0a5a4f5d860c0f99e8c48a2f2c11500c5240142e4de14fad374a893109ac27ba404b9fc175604e1e0bf00ebc3398

  • SSDEEP

    12288:x13ak/mBXTG4/1v08KI7ZnMEF76JqmsvZQVRS:jak/mBXTV/R0nEF76gFZSR

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9fb29a4b049bf0752b4c116c4efa91625507e13ca3bc0a8eb68ee9d2347e487b.exe
    "C:\Users\Admin\AppData\Local\Temp\9fb29a4b049bf0752b4c116c4efa91625507e13ca3bc0a8eb68ee9d2347e487b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:4444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    fd1cf01f2e690d597df9d56aae514535

    SHA1

    23e7eda0c137306c9ccee9a035ff2fc155d86416

    SHA256

    fee5c2f72874d035c87d63d2e4ab622177d3292e8e5657856d92667b76dd1214

    SHA512

    6309387a3d54e673d629366000e1eaf41cd2762b37f8555d18777d4eb58e128042daf8c27ac363afd896b2125f7473d40b2f2db30be4d135f717a8c1c79b444b