Overview
overview
10Static
static
10R.E.P.O.v0...tor.js
windows7-x64
3R.E.P.O.v0...tor.js
windows10-2004-x64
3R.E.P.O.v0...ix.url
windows7-x64
6R.E.P.O.v0...ix.url
windows10-2004-x64
6R.E.P.O.v0...64.dll
windows7-x64
1R.E.P.O.v0...64.dll
windows10-2004-x64
1R.E.P.O.v0...PO.exe
windows7-x64
1R.E.P.O.v0...PO.exe
windows10-2004-x64
1R.E.P.O.v0...ss.dll
windows7-x64
1R.E.P.O.v0...ss.dll
windows10-2004-x64
1R.E.P.O.v0...rp.dll
windows7-x64
1R.E.P.O.v0...rp.dll
windows10-2004-x64
1R.E.P.O.v0...bx.dll
windows7-x64
1R.E.P.O.v0...bx.dll
windows10-2004-x64
1R.E.P.O.v0...64.dll
windows7-x64
1R.E.P.O.v0...64.dll
windows10-2004-x64
1R.E.P.O.v0...ts.dll
windows7-x64
1R.E.P.O.v0...ts.dll
windows10-2004-x64
1R.E.P.O.v0...th.dll
windows7-x64
1R.E.P.O.v0...th.dll
windows10-2004-x64
1R.E.P.O.v0...ty.dll
windows7-x64
1R.E.P.O.v0...ty.dll
windows10-2004-x64
1R.E.P.O.v0...on.dll
windows7-x64
1R.E.P.O.v0...on.dll
windows10-2004-x64
1R.E.P.O.v0...3D.dll
windows7-x64
1R.E.P.O.v0...3D.dll
windows10-2004-x64
1R.E.P.O.v0...at.dll
windows7-x64
1R.E.P.O.v0...at.dll
windows10-2004-x64
1R.E.P.O.v0...me.dll
windows7-x64
1R.E.P.O.v0...me.dll
windows10-2004-x64
1R.E.P.O.v0...es.dll
windows7-x64
1R.E.P.O.v0...es.dll
windows10-2004-x64
1Analysis
-
max time kernel
146s -
max time network
184s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15/03/2025, 22:49
Behavioral task
behavioral1
Sample
R.E.P.O.v0.1.2-0xdeadc0de/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
R.E.P.O.v0.1.2-0xdeadc0de/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
R.E.P.O.v0.1.2-0xdeadc0de/OnlineFix.url
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
R.E.P.O.v0.1.2-0xdeadc0de/OnlineFix.url
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
R.E.P.O.v0.1.2-0xdeadc0de/OnlineFix64.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
R.E.P.O.v0.1.2-0xdeadc0de/OnlineFix64.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Assembly-CSharp.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Assembly-CSharp.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Autodesk.Fbx.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Autodesk.Fbx.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/FbxBuildTestAssets.dll
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/FbxBuildTestAssets.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Klattersynth.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Klattersynth.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Mono.Security.dll
Resource
win7-20250207-en
Behavioral task
behavioral22
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Mono.Security.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Newtonsoft.Json.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Photon3Unity3D.dll
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Photon3Unity3D.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/PhotonChat.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/PhotonChat.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/PhotonRealtime.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/PhotonRealtime.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/PhotonUnityNetworking.Utilities.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/PhotonUnityNetworking.Utilities.dll
Resource
win10v2004-20250314-en
General
-
Target
R.E.P.O.v0.1.2-0xdeadc0de/OnlineFix.url
-
Size
46B
-
MD5
59bf167dc52a52f6e45f418f8c73ffa1
-
SHA1
fa006950a6a971e89d4a1c23070d458a30463999
-
SHA256
3cb526cccccc54af4c006fff00d1f48f830d08cdd4a2f21213856065666ef38e
-
SHA512
00005820f0418d4a3b802de4a7055475c88d79c2ee3ebfa580b7ae66a12c6966e5b092a02dc0f40db0fd3b821ea28d4aec14d7d404ead4ea88dc54a1815ffe26
Malware Config
Signatures
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 48 discord.com 51 discord.com 52 discord.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "40" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "12" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "118" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "118" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "61" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "104" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1006" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "89" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "1006" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "9" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90a58b7dfd95db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "40" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "150" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "1006" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "12" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "40" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "862" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "12" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "104" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "862" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dbcf1240aa9140489e7e87e4b3885fb400000000020000000000106600000001000020000000eaa1beec33adafab895d976aaa5de6d18cf50719cf0780cba39a9a60c03b9c7a000000000e80000000020000200000003e269faaea18b57ffa3a2c3a5bf1c4a07cfa0e5ee16221767498ae30f8e1a930200000003e1dcc0ef0c2d97d59c6f5dea4cb4951fae9cc361460bd07e79e31ac7fc8f316400000002c16bc50200f7c3008a33cda09203d28d03397e57a12751182a53d4654f3ad0a5a31437dcecfaccaba885af8bf275a6d6615ad53d3ea22ffde13c34e3b4f670b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "150" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "89" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "862" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "118" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "104" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A4C944F1-01F0-11F0-A276-7E6174361434} = "0" iexplore.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\www591C.tmp\:favicon:$DATA IEXPLORE.EXE File created C:\Users\Admin\AppData\Local\Temp\R.E.P.O.v0.1.2-0xdeadc0de\OnlineFix.url:favicon IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 iexplore.exe 3036 iexplore.exe 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2896 3036 iexplore.exe 30 PID 3036 wrote to memory of 2896 3036 iexplore.exe 30 PID 3036 wrote to memory of 2896 3036 iexplore.exe 30 PID 3036 wrote to memory of 2896 3036 iexplore.exe 30
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\R.E.P.O.v0.1.2-0xdeadc0de\OnlineFix.url1⤵
- Checks whether UAC is enabled
PID:2872
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d211d7b924697459325b05f259443818
SHA10f2f9bc5f2c9eb278de67d4a9a0e10a49a2c3b75
SHA256f86526c29523255ff144349f61ba852c8ea590f9b236485e47a5f6379aa403e4
SHA51271fe01c409f3151946ebc0139345c886cc00ef6ff4b99548dccbb247e838083e14cf9908b81415eaacce8fe8b85088687a48608e8d1e489e89fded8c01c8db9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6196aa9208587991f84e74226df01dc
SHA19a024bab86d3b798ee9384505dd76a9513be16b2
SHA256747f488ba113417799b5367889cd56204f7e749c065bbe079cba46579633362c
SHA5127029eb63136eca10f47a27a4d56b0f0fb858c03576c1c98af5d1377bc6a5bc603c6267773f265d4e0adae2c24b658e9542788d607c31f9bbeba7b4951b84310f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bc28ac8ed62923ead29c2cc5af4893b
SHA1bf38ac9b60d3a2e05297e524bdb251ba72e6f68e
SHA256d938e85d871239bd90c5dabc6fc1c4b93e68e1f116cdb5f7de09b9de940d5d44
SHA5128a9e6d142adb62b9ae4ffcaede29ec1f30ae98f7e8192b7ca76d0ffdad49aa9006b34c39b429ebf48fcecc5661342a6021a5cdd68ad082254422913663bbdb93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589434875d7ad25370ec3b79ea07d702a
SHA1914e6f6fc0f0a9e319701c23e06437c45f4422da
SHA25653920a128e5f2297baf2d4aa37d7bdbb0e3faad9492c0c8bd51ac94e48a55446
SHA512776143f31c4e2d1502bfeebd0463bfef32e1201efc515112a533efa59156a57ed7386eed6993cfae42b5797d7ee35d53455bf735ce0ad11266d3240f9b51e3a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a0388e7a20b2a27a47a12ce56f1f819
SHA1f4469cbaf2625988620d41854ac770b66aba12b4
SHA256b16a99767afe70ad569921d2bd664a703c2458a5442c3c73b3b2136480713236
SHA512ffee98c692a8fb30149e82d562c300211c8d28b110d173481179e5f2bb1e478f72c71358c106f75c24802d71a6acb6bd430283cf04869680df63ab019853663d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597972ecaff26e5cc27330cebd0f256a1
SHA1315fd6a5869a80124bf0be4b044f9bff776816ec
SHA25673359c5f462f6c14ae54bde0d9a457fc65be4f1f3e496f7ebbdeddbdc64c0a46
SHA512ae73d34f9b1d7a6c61b3f98da054aa58da5210797b0ba1799fd877408acd8c3444ab0280d7d94663643c9a82f572ae3beb9ba047c7cec2322885c443bbd5a210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541f7001ba667c12a792f2dca1a4cb483
SHA1605634450a6e4267b32679dbd65d89c710cf4ae9
SHA2567a17ab454f74a4ac02915128c5e5fe685936174916c8de667c6b16352447c580
SHA5121042519bd3e729155ff693fa4d164b492da8c7c8aef8373a60c45a4078e23c3de75e10a8c82cb1ac597bbe27f7fc000db4e7d7237db2b44923b1a252a75677e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dff9e741fcfda6ca738faf24b303936
SHA1c3bed2cfe3a3287f1b0275cc17ded97ee87d7f4a
SHA256da38d7d8fd2a6bf3d98348274117c1443bfabd3534822d4d516c796699a024e2
SHA5121c76b29953cf24749753346e1b040ff6e791fe2463e05d5442bd1c297bcdf42fb5d13807fca4dc1277f4097b988557f577175cb571e3b77371e93c8b8b52c6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570a06e4b84175371ac0981cc4294014f
SHA147b9a4b3f2e6c4ab732043f7b8aeb279ae8dc33d
SHA256303cfba87c44d3d8818a0d099694b4784c4653ccad050bb4d1be664c49128e5a
SHA512e50332abd1826503e686decd550e29a1457297c8f1a21f065e6e56f73566545a5f97a742a247dde954ded1f98a5842711b704eb320214e1084d968e695d0751e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576ae55b92b5f804969b6c997c82e5a5e
SHA18c3688830ce49502d7eaa3bc1f6f757130fed733
SHA256ac129b1bf958e54ff49ba8055e199354c5c9e556677e76661623141b972306b4
SHA512d1f47ce91632da62e94352831ff59df15953e4950b8aebc0a6b237b25c4e1f18dfa9d97775b095414bec4632cb9a02720c853ba80247c9c3becdba5c271cbc0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567e5d39fd149390376a516b698ec275a
SHA1ef6c73e392cee86662103ff4644919e356d8496d
SHA256c3042a6bfaf5e535423f3f047f18abf3a6b61b6346c01adc25b0ad7de26170f2
SHA5125b803f2ea6df0a0fe098ce95a7d8002cf54eac18f6321c899bd8a95972158ae2c7855ad4f8d505f4c309143a3e8adfdecec854b6bcbad677176d2dcc2c84ca2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d548ba0c026ab790d85b6d86d381e553
SHA17cf6592a3478769b0864dde3448b7e177f61e871
SHA256662ab7221c3caba876235910dfbe24e0225555efaffc080d507addff65261e53
SHA512355d9e47e48350e84158fdcc683e6a963e855e4954d8b03ac4ab9f9ca6aa1c549ac0b850c1f02656ba9fdb049149c6cb9c32fd7779bc0bce7a3fb93d1f4c3e50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c370dcbce635bb48bdbcaf2a937286e1
SHA1e8c41689a5d51b978513b9c0c57a110f5d359532
SHA25686520e3c8f6c8ab06ea4559fd6879442d57dfb4f8b4c2e71a979722503af0a18
SHA512c726c819777fc04b34d9ecc55b371581e3bc583ba6d62007ae876e7de1c7b4f332edf4f6de1dba9ae3a1326eaa018fb06b04d23dc046eed15a5c90bbf15804e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD52c8641a623a41c2a41a396e381f76af9
SHA1a1f02202af8943ba21f02cec7aca638ebf0f581a
SHA256f5ee239036e0e71fd06597543f9f439a382fc13d6aad15cf6b4e682922069f24
SHA5128808dd3a1c6038bedbb17775444fb67e3ab3cb893ad1e104a5dccfdf168c3c79e50d4a52971da0528457bdc52d70d58465be92af4ebaf7fff697f62efd76131c
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
2KB
MD52a720640ab5abf7f60b87842b6999384
SHA118d8e930ae413e20d9ed38b3e8d7fc95ba9f63c9
SHA256044d1d0c0507573c4c900a9eab1ab7440917030980ed7b65fce32bdfe8d50772
SHA5126d5fa6dfac4add14f8e1a359d087956995ab40e5f8dd1340de69ab409f5cabb914d8a68f6f86b3406dc37c45d2941667ac8f2133684b74954b3ff715fa1a8a4e
-
Filesize
1KB
MD569502431c38afb8083e50cd339f5c476
SHA16683a6be869e57a621bd0fb4bad5b1adda55eb07
SHA25651986f605d6f00e3a741f7c5d3d14126a8b1a559c00239b41ca41fa775378462
SHA5120899b4c8af6ca061a3d7fcac0dff741163e9741a75d910571d199d87fc13ea25c016ad0ecfb734995605832cc39471a2dda4fa0c9716fd25f5cadf632bab1482
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7BCOPU31\favicon-16x16[1].png
Filesize1KB
MD589db4cf9f3e2951f677919931ae16d12
SHA1c52a7d97ac4cc838ed54ee9d2a682c9305a675c6
SHA256c1fff90e1a74d5b51203f2a7b60270db5a105741217a3ce1d1a220504e43e96b
SHA5125c7f06bbe108ac5915c303e32253ccdc78690f81c096568234a6a1f4c7ed8d2171266eec91139820bcf9222268ab90a9c79882b10a2a190ab81eadb5d61e7d7d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc