Overview
overview
10Static
static
10R.E.P.O.v0...tor.js
windows7-x64
3R.E.P.O.v0...tor.js
windows10-2004-x64
3R.E.P.O.v0...ix.url
windows7-x64
6R.E.P.O.v0...ix.url
windows10-2004-x64
7R.E.P.O.v0...64.dll
windows7-x64
1R.E.P.O.v0...64.dll
windows10-2004-x64
1R.E.P.O.v0...PO.exe
windows7-x64
1R.E.P.O.v0...PO.exe
windows10-2004-x64
1R.E.P.O.v0...ss.dll
windows7-x64
1R.E.P.O.v0...ss.dll
windows10-2004-x64
1R.E.P.O.v0...rp.dll
windows7-x64
1R.E.P.O.v0...rp.dll
windows10-2004-x64
1R.E.P.O.v0...bx.dll
windows7-x64
1R.E.P.O.v0...bx.dll
windows10-2004-x64
1R.E.P.O.v0...64.dll
windows7-x64
1R.E.P.O.v0...64.dll
windows10-2004-x64
1R.E.P.O.v0...ts.dll
windows7-x64
1R.E.P.O.v0...ts.dll
windows10-2004-x64
1R.E.P.O.v0...th.dll
windows7-x64
1R.E.P.O.v0...th.dll
windows10-2004-x64
1R.E.P.O.v0...ty.dll
windows7-x64
1R.E.P.O.v0...ty.dll
windows10-2004-x64
1R.E.P.O.v0...on.dll
windows7-x64
1R.E.P.O.v0...on.dll
windows10-2004-x64
1R.E.P.O.v0...3D.dll
windows7-x64
1R.E.P.O.v0...3D.dll
windows10-2004-x64
1R.E.P.O.v0...at.dll
windows7-x64
1R.E.P.O.v0...at.dll
windows10-2004-x64
1R.E.P.O.v0...me.dll
windows7-x64
1R.E.P.O.v0...me.dll
windows10-2004-x64
1R.E.P.O.v0...es.dll
windows7-x64
1R.E.P.O.v0...es.dll
windows10-2004-x64
1Analysis
-
max time kernel
838s -
max time network
851s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/03/2025, 19:37
Behavioral task
behavioral1
Sample
R.E.P.O.v0.1.2-0xdeadc0de/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
R.E.P.O.v0.1.2-0xdeadc0de/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
R.E.P.O.v0.1.2-0xdeadc0de/OnlineFix.url
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
R.E.P.O.v0.1.2-0xdeadc0de/OnlineFix.url
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
R.E.P.O.v0.1.2-0xdeadc0de/OnlineFix64.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
R.E.P.O.v0.1.2-0xdeadc0de/OnlineFix64.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Assembly-CSharp.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Assembly-CSharp.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Autodesk.Fbx.dll
Resource
win7-20250207-en
Behavioral task
behavioral14
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Autodesk.Fbx.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/FbxBuildTestAssets.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/FbxBuildTestAssets.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Klattersynth.dll
Resource
win7-20250207-en
Behavioral task
behavioral20
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Klattersynth.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Mono.Security.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Mono.Security.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Newtonsoft.Json.dll
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Newtonsoft.Json.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Photon3Unity3D.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Photon3Unity3D.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/PhotonChat.dll
Resource
win7-20250207-en
Behavioral task
behavioral28
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/PhotonChat.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/PhotonRealtime.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/PhotonRealtime.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/PhotonUnityNetworking.Utilities.dll
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/PhotonUnityNetworking.Utilities.dll
Resource
win10v2004-20250313-en
General
-
Target
R.E.P.O.v0.1.2-0xdeadc0de/OnlineFix.url
-
Size
46B
-
MD5
59bf167dc52a52f6e45f418f8c73ffa1
-
SHA1
fa006950a6a971e89d4a1c23070d458a30463999
-
SHA256
3cb526cccccc54af4c006fff00d1f48f830d08cdd4a2f21213856065666ef38e
-
SHA512
00005820f0418d4a3b802de4a7055475c88d79c2ee3ebfa580b7ae66a12c6966e5b092a02dc0f40db0fd3b821ea28d4aec14d7d404ead4ea88dc54a1815ffe26
Malware Config
Signatures
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 40 discord.com 44 discord.com 45 discord.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "104" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1016" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "150" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "1016" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "448316007" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "40" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "40" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04c4f9fab96db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "89" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "12" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "104" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "118" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "1016" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002a86230af4783e47bee55c38e92c134400000000020000000000106600000001000020000000ea184bb43e6c1613c7b4184dd6b7480089d12856f50cdd1ce8c26cf4b01a4822000000000e800000000200002000000081731662ba66d3bf1a3d435b3ca547a88143512ba9fb1caa841919bad77c84a420000000a44e75c2fb74b098fcaf0f1ebddebebebc559b70e19086cae6cb598f527cf64f40000000b4d91ea86b894915fcf7aeab6a9d044903750ffc5a74fc96e40c3af3709d77f44e6c9be5f3709a4b382c69a8dc8bcfe648214fe2844871c958849afa5a6318b2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "850" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "12" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "61" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "89" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "850" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002a86230af4783e47bee55c38e92c134400000000020000000000106600000001000020000000bd37d6db37bb02436ccdff79b670eec65dab04e654996787061c65f4c0ac457f000000000e8000000002000020000000b299187360a03a7c7e754c490281ad2abd2e68df2195de29320afbc418c8ac6490000000f8700f0b3d6f12034b56c63986214ccea00d8b00d29c2673b1b8ca062bcf513a47f06321729569553ee271e6e3788de76b3f31d10aee7df1a87781ebf6572d6a19c5f5d5df8180b7106f5d34ce5f4efe81c7f5715e9fdc3d7ab9c337d5fd161c7cbb0de75b13c1c5612dc9fbb2328dae8222516de5348c90eb77aac8b2745b8ca5d4d1b7ffee9c26d2bc852cff0760a440000000a2bdc9df9c9af223a8d54050981d1c80d55a30a8f727ded4d3c812629f778e974443e599863cc988741cfdd708e3b97f1ae64438f7259f41d54372ceee40214f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C5C55691-029E-11F0-9FB8-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "850" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "150" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "118" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "12" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "89" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\R.E.P.O.v0.1.2-0xdeadc0de\OnlineFix.url:favicon IEXPLORE.EXE File created C:\Users\Admin\AppData\Local\Temp\www2EFE.tmp\:favicon:$DATA IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1868 iexplore.exe 1868 iexplore.exe 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2260 1868 iexplore.exe 32 PID 1868 wrote to memory of 2260 1868 iexplore.exe 32 PID 1868 wrote to memory of 2260 1868 iexplore.exe 32 PID 1868 wrote to memory of 2260 1868 iexplore.exe 32
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\R.E.P.O.v0.1.2-0xdeadc0de\OnlineFix.url1⤵
- Checks whether UAC is enabled
PID:2324
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD51337f8b5c92d794f86138ebb5e3dae13
SHA16a64581dd7416befa2f9d0e647d56763299a5f51
SHA256b49dbfa4d1109e11099de2e1f5f1f6c103b204f1f979e2a568b01bd304089fcd
SHA512c4f36d501d9608304b67fe45fc7617906b63469cb0595b7ee4af24951e8ca5d1e311b7a2ff6baa33a3ecba4d48eb2f4d6d501d0e3c6234817dccbbb37c47f5d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ca2c8f63a9e70df28b199ecade25e2a
SHA1ab1ae9c95b713721c4e43783bf5f95ad454d3d06
SHA256e3cf170eef43787c0b2f6b647cd7ffbfd33340da3217efb5a720cda3703fc274
SHA512d13c67fac76a72848626296b12c03263fbce8e5b4dc2867b38c7ad506a03110295addfdaf1a699f2e7f9f5b6ffef85a564ef4651fa81c47030a14126aeb77327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d767df9d60b5876cf4a7a934618bcc9
SHA10ae1f7208a0d9e9079c72eaeabce3878fa666075
SHA2567cf16ee137c3a7c2b5ebae902de12c507d71d9a891f2a32ee2c55901843e6d4e
SHA5126f17868d5d4c47d0fc590986bc9ffa3211a1448470350afecb0ee17cbf5d153a8656650d7a4326aa836d8ec2d1679a093b3138eef0f47d9bdc2af42355d781ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5340e872483b17dffc7203651d44404f5
SHA10ec2dc6b8f13043b28f8401c6d39b03103ad6377
SHA256ed9fe9e8eec256ebe7d465f25ba9d82f113770f2fd828b106ddd38378f44fd32
SHA51240a0133cb92209779967dc0dd26fb841bd4845d1f746b5250eab188f526b2357a23d719a298f6e6641c7e27894c00aa5e5027c83c972aefc62dd16c0569f8373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51076e3fe160fe82cee5d0dbcf5f7e243
SHA1a955edaedc580fd6b312e4656b23fc436950c722
SHA25618408f6dd9e65c93e1fa3a43bdcabfd51964bfb156398e1fe9fadd3a5a966fd3
SHA512363fdaba54178ccc80b9785b994c63a37fa6090665485e5779bd1d19fea2c6dd976a4af42a3b878be1aaf11a0c1f42ad41250834e5904b199b3d8fd9fdd00ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5325cb68c7b44da2314b7f3352f6406c7
SHA11138e106101596846707b497c10db7a314eebfa5
SHA256b65792ac4bd5a27d890174cff42e43b6ac7d5fc6734574af5bb5f5d1b45d5fc5
SHA512c1f3eac53cd23bfd3fe4c4ca491fbe81ca03228e131d109d68b04c14ab464ade4d3e129c98e68ebb910681dbf12b2ba9f72c01fce559098eaf3844ef3c5e2b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540e6fd9fb47b9fddd0a01fc542bad0c1
SHA123c562d59a119eb3eae0b6af2a23ea9152ae1644
SHA2560affd092ad1a9305f47722e12e1fd56ee0da8383908fe3e13dd39b3d41db616b
SHA5124047069b65a8f10ce30eeb5ca940041760b0b4d4d5e4c557c1ceb26344eee03ff4cad685468b6a06d3ac61a1de7627e931501270d97b9401c41d93e2ce64fad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2691ae64589307fde0e64b2107b749f
SHA1b6c7a6ec14c810a8754c01402aa4b385c370ba36
SHA256c89ad8dd6e04f443f1bf6d78072973c2fee90f71e715dcd83220c949eb2dda95
SHA512cf420092856a901930d42c30ea07c264594371480b07a4eb5c339ae873fe5a02e48c80cbc221f0625673e51623309ea64b8dfa284f07df3c4b5c04e6155dd336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7d113fa7348128cd30366a168eb4204
SHA1ad36907b148abe73d28759afc69bcb4f4618fa41
SHA25602946b8fb8e56e03969063401e92b93161dbebd2794f16628c16af241bfeb80b
SHA512eded41f65e7e312ffaaa3990b96b9f2f4a41d0f86352d2b4ba4566c454723c2140559495f1a2cf2b236efd0bf0f086f7738d6545eb377984795b4aad7ec3b542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590c316b1a76b9f8fa6b10885178b6fab
SHA153e5fb3662783571cd4d3f7f3610395be436488d
SHA256d748c449e9151c65bd8308d5811bb2b1aeecd66d41b13ce86759175dc8836605
SHA512aa3310a542f6c967258586b9b82d33afd6f093911cfb849cc89e30c3af008a3a579c6eeb7cbb14f11c0ad1f0725ccaf99e812bddde7e63a146a964da006ccaf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e7bb0e560214c8ce795c637c44d51a1
SHA1a2454a6cef2e94ef63b32892466d3b158941f048
SHA256c7f4ab161e0fe06b715561736b48e9713a99678a9ee77df73cab03d32a69533f
SHA5126341fa3e44e58e4d9385da65632109c05b6c2b6deea054b26b5bc0db73c9c5c38eed67d15604b6b26026cd5dec1a3d06b701b0ed54720a6b5ec83c7d89547403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a65ea4c5c10f98345d04626e1609a268
SHA19a7c529e6b08bc8fd7a2c26cbcac2fb1d4d19834
SHA256bfbfc58c3b63bf3cfb7e3362f0e4d80fb6a561d5cab9f8e0d69a43b484eaf273
SHA5128fe189616bcb5476b6ae93c610d6c2bdac2f98545c1f73b81aaa63c20a3eeffa61ce74f16820f40df7ab9ccf30ef2d6c46cca1c15860303164f6250d2a42a297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544d2bc86be94bed42a607650e94ca660
SHA12d7029fa8d0c9922b952842ebd398482a32ea91c
SHA2561110015ff81747b6743cf95b80a3167ffe004f2dbac85b2048385ca2dc336d84
SHA51205805de50d5a5f49b4e6b7e35fc82494b9a80b3447a8ea05835e0fd89d437434708ac7de82fed7247f9223aa0955feb6af917f329631594a697313ce77c70459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553035fa946b057a3888b8a11fb432ef7
SHA1478d3a8b0e0734f15ffb267cc8e92dcc3b75b101
SHA25661512884bb30818bcc3faf999c9bc0c37237c95c471fa38d0a598ff7ef4f783f
SHA512fbdfc6549e89090d70ff207bb9b4d632835197987dbdecdfa84de6690da8a6121e3bf0eebcf824a5c47889c3e7a619d54d6e0110c2f3a952e6c79df5c5b6f41e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580b4d8baa3e624fb406f3d10388b6950
SHA134f1a683e589f4695e55443f91ae31bcfaa54abd
SHA256ffebe97444f587aee6aad05f76823744f5e9582e23434675668196b9bcd3aec1
SHA512072e6826a597e350d528d72fb868e037e849c313c1604277211383b62d94292f83e2d75f7bc906798af562c1997f84f98d388a5c81a93263c84904f062771212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c83ffe6ea8ec43d2e17d3d0a0c51acc
SHA12521a6e9859ad5b6978fbd30f73de17ec9bf87fc
SHA256eaad991335430acc9d99228a1a40a2c83b465b0620379db337816789bf13e7e9
SHA512b74dbec22f107a79f0c8a2a8e84d14141db3a7c21b05db951a2713bca315ad97f91654af9c2d9420df82ec6cca5ad0a6f5778d057a404c6f67db33116e9d0179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500f0f8129d89f9e731122759cc10d2d5
SHA100c5f26e3fbe7e074acf26a60ffdd4a854cdfbc4
SHA2568439d02f23b1bc5d6587ec5eda7754cbb6215d11d532d1984c147c6928ac78b3
SHA512766bce7be97ad315585d889b2d3fb1d0a610a7f921886be7cdf6f69fc54d902db0c7ca31fe5731617d957c9bd92843cc842daf1860d9d3e1b1bdc149794193d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fea42a38358e8c1ee3f6198a602d7c8a
SHA1a238034c1ec8a5a11c258d86803a92b04c515d37
SHA256e12d7be16a87609853e00a5add91b36e8622a79533718c28ec1d2198a9c4f4a7
SHA512a521c70369dc0f224e816776aab70bb709f51c0767e3a7dd6f8ae190235720228c36995bcb87aba9a0f5587e83cd11e573251d08c8ec0ceb403c94aba6e87d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c944985646657b3a99fb4e243be25e66
SHA1599c778265e99ce702294322ecb36ee11a926b92
SHA2565700565fc4f9aa4ecd144adeaa9edbdda5a4f4d6ccb705fd8a8a4c1d46914c54
SHA5120f37d81cfe4596105d477c4b5007bb818a522b14f49ea6851e6b8ff7a45043842d98fc64dc041f891b6a79ce17b6a658ccc2f4a5805b6493da4607f2318f095c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e568da0285e0359fe0135c2e0cebd23
SHA17aeb3d8d34ae69c7d76a0855ab9e0a7ccbd80c33
SHA25628e79a378c20f46530b0110f3050fa6375b178fb8c850af07324d1f9083f9aca
SHA51269f57daf5ec5baf334e1c2f3e65b9c37d8ce3a345f56423f89b8e2f702d668facca415d1981c95c739a4c6e1b9b86cd23a9a262a4cafa8a283059cdf7d220f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53170b3a3ef92d55f0b90f02a9ae8aac9
SHA198686fd66136af8d697b8d9283f2de48e28538cc
SHA2566f5ed912b36d3dc8a41f045a163c7c7115f5551c02bc3fba8a7be798288da5c5
SHA512a0c0be5c95b10a380ceb10ee1c0916c027cc3895b367fcae488fe184b85b0f1b8637a6320088065b03c65b52aa82538c4233110dc38ccdd5beaf371e4b35ad44
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
175B
MD542faacf10747fdfefebeedfa58c4e7a0
SHA14b62b7a6ae036ba13797866c65bc168877e9ab30
SHA256ed3572851db9bcfae1887ea04e76c67a62f47e1ba243ae425b5516208b0e93ba
SHA512beb0c1b8f61f76bedda19793309bb808cdd1e93abaec8243c1d54800a138b73c567ab81bcf1cdf73cdabf29b929b8f562a6bb9df3f859c6f49e7a727ecc43867
-
Filesize
356B
MD5c4d1a239db5da636a95aeea8dcbd6be6
SHA1dbdd98bd1e8b0aca3afc18794e0ae73b6579c364
SHA2562a56ad7f8362f88ba49a26e743ed9f25d61c5d0238cad9be741cfcc4c811167a
SHA5120a98ee0b2fe65ace0963d9afcf0e540d50443c5be64248b8ee85ef0ec2b12428efb095fc4051584faf35788b1e465bed09d11bd878b2a20d737a9d9a8e3766e5
-
Filesize
2KB
MD5e8c91ff9ca776b7f5bf367b88f737049
SHA1062d135036e698dcefb641d4ca9c7c2eac565474
SHA25636a3c81a7a74883a603c0a3a7ad8f3c098ed80ee098cfd4f1571830a510be23b
SHA5127944c721f3919525684579bae9c860c9ff26d0ae7431305ad9d67cb25895e8bc5c315c8fb6fa70eca14da5310906cda9307dd68b795bd7e101e28edf211c7b9b
-
Filesize
1KB
MD54faa19ce6ad2cebb8a98fcbbff8ebbf2
SHA1ad7a9650f32a05899cdc1e92fdfa87b089839bc9
SHA25608fde3933179ec8f7ed79501729fb411e92b14838e65e3f821b5074f9b195512
SHA512a3b819a21a3f6b297ed0e538d14c763691762579b4ad922fbca461456e1919dda9ea0da48b0bf67a874bb09af5dd0a0f3329094dac191f896d773085216c73fc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ROLMKJ86\favicon-16x16[1].png
Filesize1KB
MD589db4cf9f3e2951f677919931ae16d12
SHA1c52a7d97ac4cc838ed54ee9d2a682c9305a675c6
SHA256c1fff90e1a74d5b51203f2a7b60270db5a105741217a3ce1d1a220504e43e96b
SHA5125c7f06bbe108ac5915c303e32253ccdc78690f81c096568234a6a1f4c7ed8d2171266eec91139820bcf9222268ab90a9c79882b10a2a190ab81eadb5d61e7d7d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc