Analysis
-
max time kernel
136s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 20:11
Behavioral task
behavioral1
Sample
37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe
Resource
win10v2004-20250314-en
General
-
Target
37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe
-
Size
92KB
-
MD5
6b432fe0187a20895df23ec7d3d352bf
-
SHA1
73e8715b770b762b442e27c21da750fa6127d00d
-
SHA256
37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8
-
SHA512
809309530ea7cb6a63e4a9cd69ba044522e87514c32805304f2733cc691b2b18b87ccdca212da058a9045cad38da01ebfaa6a5e699b12ffb2d47202d45d3b5ef
-
SSDEEP
1536:ohhW0YTGZWdVseJxaM9kraLdV2QkQ1TbPX8IHOCkIsI4ESHNTh9E+JP19qkP63rv:uhzYTGWVvJ8f2v1TbPzuMsIFSHNThy+0
Malware Config
Signatures
-
Remcos family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1628 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1084 37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1084 wrote to memory of 2312 1084 37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe 30 PID 1084 wrote to memory of 2312 1084 37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe 30 PID 1084 wrote to memory of 2312 1084 37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe 30 PID 1084 wrote to memory of 2312 1084 37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe 30 PID 2312 wrote to memory of 1628 2312 cmd.exe 32 PID 2312 wrote to memory of 1628 2312 cmd.exe 32 PID 2312 wrote to memory of 1628 2312 cmd.exe 32 PID 2312 wrote to memory of 1628 2312 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe"C:\Users\Admin\AppData\Local\Temp\37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1628
-
-