Analysis
-
max time kernel
104s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 09:55
Behavioral task
behavioral1
Sample
2025-04-06_d57afb1834c5046f5a234bf564e89cac_amadey_black-basta_cobalt-strike_luca-stealer_remcos.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-06_d57afb1834c5046f5a234bf564e89cac_amadey_black-basta_cobalt-strike_luca-stealer_remcos.exe
-
Size
482KB
-
MD5
d57afb1834c5046f5a234bf564e89cac
-
SHA1
945b9d22548b74c7c4e2be974d1aeb57eafc47b6
-
SHA256
3a60ea23a438118ff5d721d6fcec1372934a9cd543e07e6e665e077b47c4a8d8
-
SHA512
b68bfcee45c87f128f5218029ca0e18431c45a247713daf1767f0a3c8d3a50db9707dbd2af366ea23f724aa932a5ae57d686c84bc1f5604d7f2f2649b8532935
-
SSDEEP
12288:xVV3e1PvGw/FvJGEXNzbxq4pefbsvZI5S:rV3e1PvF/BS4peGZS
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1588 1368 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_d57afb1834c5046f5a234bf564e89cac_amadey_black-basta_cobalt-strike_luca-stealer_remcos.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_d57afb1834c5046f5a234bf564e89cac_amadey_black-basta_cobalt-strike_luca-stealer_remcos.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_d57afb1834c5046f5a234bf564e89cac_amadey_black-basta_cobalt-strike_luca-stealer_remcos.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 5442⤵
- Program crash
PID:1588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1368 -ip 13681⤵PID:1944