Analysis
-
max time kernel
136s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 20:11
Behavioral task
behavioral1
Sample
37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe
Resource
win10v2004-20250314-en
General
-
Target
37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe
-
Size
92KB
-
MD5
6b432fe0187a20895df23ec7d3d352bf
-
SHA1
73e8715b770b762b442e27c21da750fa6127d00d
-
SHA256
37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8
-
SHA512
809309530ea7cb6a63e4a9cd69ba044522e87514c32805304f2733cc691b2b18b87ccdca212da058a9045cad38da01ebfaa6a5e699b12ffb2d47202d45d3b5ef
-
SSDEEP
1536:ohhW0YTGZWdVseJxaM9kraLdV2QkQ1TbPX8IHOCkIsI4ESHNTh9E+JP19qkP63rv:uhzYTGWVvJ8f2v1TbPzuMsIFSHNThy+0
Malware Config
Signatures
-
Remcos family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3588 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1784 37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1784 wrote to memory of 5584 1784 37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe 86 PID 1784 wrote to memory of 5584 1784 37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe 86 PID 1784 wrote to memory of 5584 1784 37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe 86 PID 5584 wrote to memory of 3588 5584 cmd.exe 88 PID 5584 wrote to memory of 3588 5584 cmd.exe 88 PID 5584 wrote to memory of 3588 5584 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe"C:\Users\Admin\AppData\Local\Temp\37cf1e299ce987a99ecb7e1064a7460321af4f732edfe87c0ccd20405d200bb8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5584 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3588
-
-