Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-02-2025 16:51

General

  • Target

    17392062455c1e83f5c6ed9ebdfce45ec8b02ffc174d140891444efec70967103715e69587392.dat-decoded.exe

  • Size

    482KB

  • MD5

    29fa2ba561cabf9c84fb957ca6f143a5

  • SHA1

    35d2461d04fe47d484506f71b35ae8707ac16c8a

  • SHA256

    0c2141f3e51a86a1910e5fd5bfb0de6bb96ba633d2dd9040907d602817f2e608

  • SHA512

    177d2e7947e999838e578390b26aa26579e4b7be8f714a1e8d869927ff21f20c7132a3ae51da5471e94cf1dc0cd8f0e8841a2ec44853ee2464375274761e570f

  • SSDEEP

    12288:N13ak/mBXTG4/1v08KI7ZnMEF76JqmsvZQpS:Hak/mBXTV/R0nEF76gFZS

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17392062455c1e83f5c6ed9ebdfce45ec8b02ffc174d140891444efec70967103715e69587392.dat-decoded.exe
    "C:\Users\Admin\AppData\Local\Temp\17392062455c1e83f5c6ed9ebdfce45ec8b02ffc174d140891444efec70967103715e69587392.dat-decoded.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3300
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU1NzgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODAxNjUyMzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzIyNDMxNTkyIi8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:3904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    144B

    MD5

    22db85bfec35bf805d30976cec0a2006

    SHA1

    189ec5ad46f88ac7fe2c4b6204f3ed2bac0b4e31

    SHA256

    c9db3c2440cea513358132a86fe3a03b3270e8d71bf1aaff180e705aa0c5c5f7

    SHA512

    063ac693a2824dafd395daf4ad708cee4dd846e53b7363dd471d50e1d79e19e3a50752192c0c77f1bd4286d116d6b76c25b59441e9046690a2ba03120f405963