Overview
overview
10Static
static
10PlutoReaperV2.rar
windows7-x64
3PlutoReaperV2.rar
windows10-2004-x64
1PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...n.html
windows7-x64
6PlutoReape...n.html
windows10-2004-x64
6PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...e.html
windows7-x64
3PlutoReape...e.html
windows10-2004-x64
3PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...n.html
windows7-x64
3PlutoReape...n.html
windows10-2004-x64
3PlutoReape...ics.js
windows7-x64
3PlutoReape...ics.js
windows10-2004-x64
3PlutoReape...rap.js
windows7-x64
3PlutoReape...rap.js
windows10-2004-x64
3PlutoReape...ery.js
windows7-x64
3PlutoReape...ery.js
windows10-2004-x64
3PlutoReape...002.js
windows7-x64
3PlutoReape...002.js
windows10-2004-x64
3PlutoReape...003.js
windows7-x64
3PlutoReape...003.js
windows10-2004-x64
3PlutoReape...004.js
windows7-x64
3PlutoReape...004.js
windows10-2004-x64
3PlutoReape...005.js
windows7-x64
3PlutoReape...005.js
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 20:06
Behavioral task
behavioral1
Sample
PlutoReaperV2.rar
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
PlutoReaperV2.rar
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/cryptocurrency/login.html
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/cryptocurrency/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/devianart/login.html
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/devianart/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/dropbox/login.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/dropbox/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/facebook/login.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/facebook/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/facebook/mobile.html
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/facebook/mobile.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/github/login.html
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/github/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/google/login.html
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/google/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login.html
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/analytics.js
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/analytics.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/bootstrap.js
Resource
win7-20250207-en
Behavioral task
behavioral22
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/bootstrap.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_002.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_002.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_003.js
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_003.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_004.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_004.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_005.js
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/instafollowers/login_files/jquery_005.js
Resource
win10v2004-20250217-en
General
-
Target
PlutoReaper/PlutoReaperV2/PROGRAMS/PHISHING/facebook/login.html
-
Size
398KB
-
MD5
dae741701bcfb2cf53f8a7f84b469c17
-
SHA1
af15ff21fc5b63ae5d2a7aaf37cea44fde111006
-
SHA256
1db4924a7408e2f5b755185a81bc3f181141e6767144089d9ece8a226ef78658
-
SHA512
985e18511085e06a0288b6b2dea54a064361b75884c70c2422549baa1e8be557d463ef5d28c1a3c6ec88069e90fdb45371fb54e33f2ea76e449e4f34c177d383
-
SSDEEP
3072:0T7LB+wkce0gcYSLyCw9riAw1RTDMgrA8GfLcmLdC+BC:0t1kc1LyRWL11MgkYqBC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{83167D51-F9FD-11EF-9109-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "447367140" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ebe85b0a8edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000089f8a42c7fc7d45b143cdd937d2b36100000000020000000000106600000001000020000000291f68841d522a0502f60f415832734fe4f72bde575eadd37fa90a0cc197b859000000000e8000000002000020000000da8e43a5897f85c88367b1fe3170cd3685d8e444198ba277dc2bcbe838bf05f7200000007416defa020de1d2259e30ec60ce270270055b3915b29bbffffd098dc1ca81ce40000000cab9f5d67ecea7ff794a20308af97871550b25f77aef2db24165ecf70fa36d546bbe26d3c5617422ea066ead516c8885f255742fecd0e35d2386cf89b62559bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2256 2420 iexplore.exe 30 PID 2420 wrote to memory of 2256 2420 iexplore.exe 30 PID 2420 wrote to memory of 2256 2420 iexplore.exe 30 PID 2420 wrote to memory of 2256 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\PlutoReaper\PlutoReaperV2\PROGRAMS\PHISHING\facebook\login.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5af06aa8382cd898fc0fd9358388752e1
SHA1bf5077b61e850346f51ff21e4684b3205189767a
SHA25670c90612a38c16ae2d72aadeb08490534e47e0533195340bfd097653a1b39d35
SHA5121f19416dc3e19304838d2abf47d032b10ce7a67d35c232bcc7f04c4935ce4271419975a0fbea3a70e8dd310e1c1487c1e073ae33a26307a71b044e86d52f7aa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576979f8840387bdb0e5b6b0c475b8c89
SHA1c67f1f74ab51ecd5627a54a427b3cc9504a9d904
SHA2564b8b44aa408f28203b81502b105f9a6270f85b7780c5ac884b913628b47a28bc
SHA5129395891951300946d00848cf32d4a446702b1a135c786db00c01eae4318ccefd78fda67c7ada75961a8423d36090e25c9cf2cf38803d76139b58ae5b9c545db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8d81292c4851a93842c0e774a700e37
SHA141b9d3ac2303e10b9176204f135a49d9f943a5fc
SHA2568231c51296ee0a18edfeec5f81567a8307d1c5440d49bd5b958eb9a0a007a8a7
SHA51288a9120f8110da01f134afa2140a0743025f9e833765d5b2df78f2b800329a61bad7118004765ba6dc67fa72b86b5f09612333a8d9a6b08ee854580f3b0eebf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7303c526bca67144f408906b9f1e2b6
SHA1a5e80e6ab5362a97f0f66803829b07e635e37a18
SHA25611a3b4ad3c33665c53ec1ac3c4e26bb30f72b462084431da83ce46d024400657
SHA51274953b08d6fc55f912043302f97ef40ef6d55ebf87787de3bbafbb363fcab7085bde58e5e5235b54eac76447153a040fa127556c78f00e0e24b865999d60e2ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD528efd3e89b659ebc92755858ef25ca85
SHA1ea215e9919d56b7554d10d6ebb2fd8357f5c1813
SHA256f8195d1be90a703927f04ca3cbdd3e38c77834a340908794790be57224ac9add
SHA512565aeb2ccb05b68279e1ed3dfd2a35037a8232669e96db3f9fcac2366f66fd88250787694b0c71b200f9ffe8cb9c543053aae9af611637132d6fdb87bbff7022
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc