Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    09-02-2025 12:12

General

  • Target

    1739035683bb745b973d30867bec8f04e7176c1b6d5799ad5c0e259d00c1ac421be77948ab119.dat-decoded.exe

  • Size

    482KB

  • MD5

    ef0f88fe50dc034216f999a8c71ba701

  • SHA1

    69ca773f209f8801376d0fff284fc5c043ae413c

  • SHA256

    a20d7061a30536071c865bb1304a2930106f3c37b4f7f5c3a2eaf283ec1b7fff

  • SHA512

    d25cc710b2fd373fabd77912108e2d33c66c73cbcd31d619819a2177dae89bc366390e2ae4a6e6fe372788fefc848bb4773b1d4cbe39e5e38f6991abacb61a2e

  • SSDEEP

    12288:x13ak/mBXTG4/1v08KI7ZnMEF76JqmsvZQcS:jak/mBXTV/R0nEF76gFZP

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1739035683bb745b973d30867bec8f04e7176c1b6d5799ad5c0e259d00c1ac421be77948ab119.dat-decoded.exe
    "C:\Users\Admin\AppData\Local\Temp\1739035683bb745b973d30867bec8f04e7176c1b6d5799ad5c0e259d00c1ac421be77948ab119.dat-decoded.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    9f6833530c0ff01308453d55c64538ca

    SHA1

    adbe799b80a7a7c35a9ee191f2668f13b2222aef

    SHA256

    a3746b32347bccad12ad7b4bf1c1b0f3ee8ae3bd4184374c0ddfda3b5fa1a201

    SHA512

    c409aff332fb4647dab8a67345962b8375863334f1a7af6c1c6f6285279fe1e175f80971cd8ac71e77967caf1984c73f9132a3f594d7372a2e714821dffb8c1e