Analysis

  • max time kernel
    9s
  • max time network
    27s
  • platform
    windows7_x64
  • resource
    win7-20240903-de
  • resource tags

    arch:x64arch:x86image:win7-20240903-delocale:de-deos:windows7-x64systemwindows
  • submitted
    18/03/2025, 22:53

Errors

Reason
Machine shutdown

General

  • Target

    R.E.P.O/OnlineFix.url

  • Size

    46B

  • MD5

    59bf167dc52a52f6e45f418f8c73ffa1

  • SHA1

    fa006950a6a971e89d4a1c23070d458a30463999

  • SHA256

    3cb526cccccc54af4c006fff00d1f48f830d08cdd4a2f21213856065666ef38e

  • SHA512

    00005820f0418d4a3b802de4a7055475c88d79c2ee3ebfa580b7ae66a12c6966e5b092a02dc0f40db0fd3b821ea28d4aec14d7d404ead4ea88dc54a1815ffe26

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\R.E.P.O\OnlineFix.url
    1⤵
    • Checks whether UAC is enabled
    PID:2672
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • NTFS ADS
      • Suspicious use of SetWindowsHookEx
      PID:2868
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2796
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1956

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\APBAVCOZ\online-fix[1].xml

        Filesize

        13B

        MD5

        c1ddea3ef6bbef3e7060a1a9ad89e4c5

        SHA1

        35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

        SHA256

        b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

        SHA512

        6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\APBAVCOZ\online-fix[1].xml

        Filesize

        355B

        MD5

        8baf20d174feb4974ea046e848df0db0

        SHA1

        a06ef49e13d7820f5838075a6a2189303fcd9359

        SHA256

        3ac1e9240bb37232455518755bef4a177b41f0b3c277166c3b174118a72c9d8a

        SHA512

        5952897f7e7d34c05624353662b052b18178d09d6dfe3b769def19c6f2b1205e0f9a984e7cdcaa386204728956efbc180ba5a7dc37577d996ccadda2ca42e57c

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\APBAVCOZ\online-fix[1].xml

        Filesize

        431B

        MD5

        3b24ca5154580dbac097388d4ee856b1

        SHA1

        4cb807fd36b3b6e458a82c7a9373ed6b365c476c

        SHA256

        12480f94ded68a28b31ade173c4f16d434783904a924c5803abcd9dafb5ba1c9

        SHA512

        74653da9aacabd4802f69ad8aac3cbcee293137d141af7670d6aa416a0dcb7d1f15bca3c693b0a399e2a8411fddb732f77b022f2cb526ac12d195178b8b1568d

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\APBAVCOZ\online-fix[1].xml

        Filesize

        1KB

        MD5

        f5aa0bc42a710ef4d209540c09af4325

        SHA1

        600122235075385d53ce075b63a43517141ee73f

        SHA256

        7bb007d7e7e526cdfe4772b4fc1e1ba2eb97028ada99b6462c2aacedfa6de5d1

        SHA512

        e06334a5d4651bc534e9cb85b66d3ea5e181c50ea52e6fe15d3073831c067512a1ad583ef594029d74fd18d3d5a3c6393e2e0cad66f2a4f939c71c519ed213e0

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\yiu0yt6\imagestore.dat

        Filesize

        1KB

        MD5

        f658f8d691da0dc1a03448e087ff14e2

        SHA1

        9d585f727365c429f71fb77cdf4058e9e281798f

        SHA256

        fb8c453a89e550f3b67174f954d5a73e5169b7619373acac8ffa26f716c60522

        SHA512

        8fa94cfd17096654cbce827045673a5228a0ec57714574691a1783231cf2e3d60cc4a853e11d339600b743f1255209c4a30c99659c50efb2fa92889cfbe64e8f

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F91VN88R\favicon-16x16[1].png

        Filesize

        1KB

        MD5

        89db4cf9f3e2951f677919931ae16d12

        SHA1

        c52a7d97ac4cc838ed54ee9d2a682c9305a675c6

        SHA256

        c1fff90e1a74d5b51203f2a7b60270db5a105741217a3ce1d1a220504e43e96b

        SHA512

        5c7f06bbe108ac5915c303e32253ccdc78690f81c096568234a6a1f4c7ed8d2171266eec91139820bcf9222268ab90a9c79882b10a2a190ab81eadb5d61e7d7d

      • C:\Users\Admin\AppData\Local\Temp\R.E.P.O\OnlineFix.url

        Filesize

        111B

        MD5

        57c7beeea7204bcbb6560fbbcb44d76d

        SHA1

        d1caa04c49c7ab6b43bbcbfada38bfa67622a02f

        SHA256

        c500ffd86849146462693e9c890cfe78b0170c0c8d97dfc6ea13d5eb5da518c9

        SHA512

        99d7ca8873703764cfd8be7da7699c4f77afb8c20d34c820651ebbd0b37c2293e40de1427f1ff82bd5b9af576d47858f7d92b05052c3e5a8f05fb45f7030fed1

      • C:\Users\Admin\AppData\Local\Temp\wwwC045.tmp

        Filesize

        46B

        MD5

        59bf167dc52a52f6e45f418f8c73ffa1

        SHA1

        fa006950a6a971e89d4a1c23070d458a30463999

        SHA256

        3cb526cccccc54af4c006fff00d1f48f830d08cdd4a2f21213856065666ef38e

        SHA512

        00005820f0418d4a3b802de4a7055475c88d79c2ee3ebfa580b7ae66a12c6966e5b092a02dc0f40db0fd3b821ea28d4aec14d7d404ead4ea88dc54a1815ffe26

      • memory/1956-332-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

        Filesize

        4KB

      • memory/2672-0-0x00000000002D0000-0x00000000002E0000-memory.dmp

        Filesize

        64KB

      • memory/2796-331-0x0000000002E20000-0x0000000002E21000-memory.dmp

        Filesize

        4KB