Overview
overview
10Static
static
10R.E.P.O.v0...tor.js
windows7-x64
3R.E.P.O.v0...tor.js
windows10-2004-x64
3R.E.P.O.v0...ix.url
windows7-x64
6R.E.P.O.v0...ix.url
windows10-2004-x64
7R.E.P.O.v0...64.dll
windows7-x64
1R.E.P.O.v0...64.dll
windows10-2004-x64
1R.E.P.O.v0...PO.exe
windows7-x64
1R.E.P.O.v0...PO.exe
windows10-2004-x64
1R.E.P.O.v0...ss.dll
windows7-x64
1R.E.P.O.v0...ss.dll
windows10-2004-x64
1R.E.P.O.v0...rp.dll
windows7-x64
1R.E.P.O.v0...rp.dll
windows10-2004-x64
1R.E.P.O.v0...bx.dll
windows7-x64
1R.E.P.O.v0...bx.dll
windows10-2004-x64
1R.E.P.O.v0...64.dll
windows7-x64
1R.E.P.O.v0...64.dll
windows10-2004-x64
1R.E.P.O.v0...ts.dll
windows7-x64
1R.E.P.O.v0...ts.dll
windows10-2004-x64
1R.E.P.O.v0...th.dll
windows7-x64
1R.E.P.O.v0...th.dll
windows10-2004-x64
1R.E.P.O.v0...ty.dll
windows7-x64
1R.E.P.O.v0...ty.dll
windows10-2004-x64
1R.E.P.O.v0...on.dll
windows7-x64
1R.E.P.O.v0...on.dll
windows10-2004-x64
1R.E.P.O.v0...3D.dll
windows7-x64
1R.E.P.O.v0...3D.dll
windows10-2004-x64
1R.E.P.O.v0...at.dll
windows7-x64
1R.E.P.O.v0...at.dll
windows10-2004-x64
1R.E.P.O.v0...me.dll
windows7-x64
1R.E.P.O.v0...me.dll
windows10-2004-x64
1R.E.P.O.v0...es.dll
windows7-x64
1R.E.P.O.v0...es.dll
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 23:02
Behavioral task
behavioral1
Sample
R.E.P.O.v0.1.2-0xdeadc0de/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
R.E.P.O.v0.1.2-0xdeadc0de/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
R.E.P.O.v0.1.2-0xdeadc0de/OnlineFix.url
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
R.E.P.O.v0.1.2-0xdeadc0de/OnlineFix.url
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
R.E.P.O.v0.1.2-0xdeadc0de/OnlineFix64.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
R.E.P.O.v0.1.2-0xdeadc0de/OnlineFix64.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Assembly-CSharp.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Assembly-CSharp.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Autodesk.Fbx.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Autodesk.Fbx.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/FbxBuildTestAssets.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/FbxBuildTestAssets.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Klattersynth.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Klattersynth.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Mono.Security.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Mono.Security.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Newtonsoft.Json.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Photon3Unity3D.dll
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/Photon3Unity3D.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/PhotonChat.dll
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/PhotonChat.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/PhotonRealtime.dll
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/PhotonRealtime.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/PhotonUnityNetworking.Utilities.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
R.E.P.O.v0.1.2-0xdeadc0de/REPO_Data/Managed/PhotonUnityNetworking.Utilities.dll
Resource
win10v2004-20250313-en
General
-
Target
R.E.P.O.v0.1.2-0xdeadc0de/OnlineFix.url
-
Size
46B
-
MD5
59bf167dc52a52f6e45f418f8c73ffa1
-
SHA1
fa006950a6a971e89d4a1c23070d458a30463999
-
SHA256
3cb526cccccc54af4c006fff00d1f48f830d08cdd4a2f21213856065666ef38e
-
SHA512
00005820f0418d4a3b802de4a7055475c88d79c2ee3ebfa580b7ae66a12c6966e5b092a02dc0f40db0fd3b821ea28d4aec14d7d404ead4ea88dc54a1815ffe26
Malware Config
Signatures
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 35 discord.com 39 discord.com 40 discord.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "40" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "118" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "118" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "104" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "1007" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{429DC761-0772-11F0-B2DF-CE4C848A0699} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "9" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "104" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "1007" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000596298383b88f045b768ac3737055a0400000000020000000000106600000001000020000000af0c1588681aa1f2b12e2ea95a73389327bc2d5934a6297c6ae1784d66f4d653000000000e80000000020000200000008b9befd10a30f17efa8c102128c8cdbb1447db8c59d574bbd9fd64b71be590f320000000653313a6b7226789a326942e071e345ab134e91f45608512b6c3d24080b7b4f4400000006b79ed22a34f704ce6d77bae1b61f072ded087f76e632bf11f3f017a0599567a8233ae045be7705bc30248ccf1d2ad6bf79be45adbd9a839331bcf42d61b0f4f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "40" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "150" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "12" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "118" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "871" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "150" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1007" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "40" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "89" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "89" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "448846645" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "61" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "104" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "871" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "150" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "12" IEXPLORE.EXE -
NTFS ADS 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\R.E.P.O.v0.1.2-0xdeadc0de\OnlineFix.url:favicon IEXPLORE.EXE File created C:\Users\Admin\AppData\Local\Temp\www48B6.tmp\:favicon:$DATA IEXPLORE.EXE File created C:\Users\Admin\AppData\Local\Temp\R.E.P.O.v0.1.2-0xdeadc0de\OnlineFix.url\:favicon:$DATA IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2448 1724 iexplore.exe 32 PID 1724 wrote to memory of 2448 1724 iexplore.exe 32 PID 1724 wrote to memory of 2448 1724 iexplore.exe 32 PID 1724 wrote to memory of 2448 1724 iexplore.exe 32
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\R.E.P.O.v0.1.2-0xdeadc0de\OnlineFix.url1⤵
- Checks whether UAC is enabled
PID:2756
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5866558ca31175749d1da2ea1411ace7a
SHA10a7e79886c731e58c3f0b702f97d2c81c6baefb1
SHA2561163db190a532aaf15edb3a70e8650dc69fe08ee4e8e8c03d16514096c905dc2
SHA512cbc8e528bea0c2095ffb0769d2ade0aa24a8c1c4c344af2b605ee870272578b5159bee7a6758d821b3daea807b13e484c5dd906103b2f8d86ae1e8d676df11df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55402fd310b75525208cdf31a1ef9e5ea
SHA1e13ee9ee90ba35d49f7dc85ddd01143d7c9aa1d5
SHA2564ecea03cde66520aa29880a82f79b4c4a2a877f9e8e8c06c05c3a523cf4d76c2
SHA512ff49991cc9bedb7850f14ead01593d3f905cddf644bf967fdd9033f97aa66ac687a70142933ada439146524f3de656525c8864707dbe1f1afcb7bb93813b1923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4c4cf53b4e2ee822841827b17dc85c7
SHA1149d5aad75c479aa2f569a2346c627c184d2040c
SHA2567b57f2b619f23ef45662130780e7318c716d71094ed03387e61ebd408e5f3009
SHA512b3cfe542e35076ce32a2ad2577722190db1bb3e790036a7f1513b294c2fd470dcc5efacf7647a8f087ae0f02a4f0c01882633060d6afb5808daaebcbc863b51f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528f8deca3d2aa81612af656737c174ce
SHA19194576f263145a08ba544b8e7d9be7502a1ec78
SHA256504a2c27c386010162405009a34a9076e0aaa5e37bfa5813c6c70a24c2168317
SHA51249a8719377a5b7a430d0bdfddca9823e6bd8fd6ce65204c9272124941630aa1b71ef5def7e91dc11262eb301ed05d2c859d6fd5bfd1a81b6f1ba96472c6df6df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a470e74a88b20ec993804bb51e112f30
SHA1770b12ce3783d1e77bb20bdf97a73fa975e21660
SHA256533f2e2b560d595e12ac17aca3cccea44edb2e4a158822f761515dbb97e75da8
SHA512e753f5c57ac0be20ff78c8d353630247ce12c9ba685b57b9110f57e591af6042934ae67f7901005eb10107e4252a8b2736134a7e97443e0cd077d93fce386383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e986c028937ffd6cc79cf1ff7f0257f0
SHA198a0e2040731a397eda870a927a8db06992d06e0
SHA2565b309691bbf20fdde0efd29567e2414358e16c3d53f372c44e584877753ce675
SHA51283c794a140088b843527dacd2db9dab42a15acde6d9249d6df1c3a9a4fc368a68d3aee32825d0812a13e2dee249409df92b1cd992aae5ed83ac48e41d8923115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fda82d56034d770054fccf528f769f1
SHA1c085f85701b0af5243deed9e8f12ae33e23b59cc
SHA256df8ee8372d81e84a97418211da344bba96226550244142d210cd0bc560506ef6
SHA512552fa356885e1790d2cb31a4da4a08af4c280c2ea08ec7df16189e4a887f457c02de99eb14b25a93969c3df751cd8f9c799c8165802b5afdd1cddc33ab527fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8d18dd5af635d48f37bb25d19d9e005
SHA1c676a6c626055b6c5f8b9fd1671b8864add9b502
SHA256f90d5352ac116085669df2e3d80bb27405dbe6df335311f2dce9a951f2455f06
SHA51226b8d313312bced9fe05290fd9b3e2e0cd17211a9480fb9866b937325714e5b7ea162d1a427583cd88b5b9d1b50e614197221340cca7f8f992eae864cc9b39d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503b665c9c17a3bd04e7e9f83d7bb98f1
SHA10ff5e499fde718ee14a06f8501619647c99bfad1
SHA256b66f496b378ffef57c3aec19e56fd3b147d5bc1e0eecfbd2ea5013200df5fdfc
SHA512ecaa1e0ea8813c87ab1a36b58353c7395030ee446773cab4709e639f2b6a3cda887e3ad197cadf79454110f2aafe8920ef6f6add1bf95ade77628c6586db5a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b37a9035b807996919c9d627f515c8fd
SHA1f3ce2910282a18f3821c3408670de89ec71a0784
SHA2565c6e18212db9830fcff837f6324b08af1106f2133e1a7d443c9f4f3c1e8bd497
SHA5127a2c59ba30588627c8b42aaa96b400b2a5fad26c6578b5f7e6e391c4a0f8f63059103852b1d157566a8e5b79e8d03440c8aafe450a7f191894475bb4df84b49c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b89e60bd52cdb4fdc5251d26d0a345fc
SHA15d5d1ade6cc3f741dd4876e5ebbcbd5322e5261b
SHA256fc4cb438ad7908df9f4cd6fe74ee096bf14a3345ccc2d6184ac19aa4e6211e75
SHA51249f26a8f27d57353dd99bffaab982cad91f6be29a5495644ea6262fd153d13c48d07268990b63f397bbf5f62db15733e2b8399f117c0f84ea994d0c49a516d1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebf2e61953691a3c7258616c0ae30979
SHA17d41342950396fc79a99d04b7a44b4823196ff69
SHA256ddf05cf6d51cdd6610599eb4299ecd4486022e7a83c6a02181140970cf535af7
SHA5120b5963b7aee11cf276431603eba10b8172e3cdd2bbb5e4b45fea1a8a8f5a91eb04c1b05dddeed33bbee7ecfe5218d4815f769b7dc8f044cf92eab742caa63f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51559ab3d8de25aabf2250f67e6278cfe
SHA111451a79f15554655c73fd62b24a5772dcc5abb5
SHA2560c933fc57f697bb7463f8d130fd38a13e5218b66fa0c98a64e4d92e1c38a65ad
SHA5120be9598740fdba4df890aa6f3e713f963de1376a07f2f188d9a0614ac0c9312f1fce83adbb21882ebb07729af8610306d067df9f76d91d01e0e1ffc50763806d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5294fd052c584c11eee9177722e38c448
SHA12ae23c87801444c94c8f1a58e56d0fbe974d5d75
SHA256c1ad96e0cca6565820d6b88bfbad06830555659e1284582100d4b75920d054e5
SHA51283fc000ceeac3522b13e67f12ec4ac7dc1f8991aa524ebc19fcc6a12890e767d87af653b75c4885881b30c2d5847999ea49308c84d6ce48d53b27f2a3d4d53db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ba71aacaa6eec90f62d048007ad7df7
SHA1d78967fe1cd423e7b0f48b5b6cacbced3c8fbb5d
SHA256f5c867d3e9f3128f1820677bdc9f835543993d0e4a2b55855c21baceb1a94f1e
SHA5125531b5f330708016abc6d27f2c0a3769294a8d8ded3c61dc08893833f71a1ed8ac875db0bb0089929f4e4a8cbdbe4141503418bfa8459fdc51f536192718272f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cc7dfd1d592cb30b634c6db698523b0
SHA13ddda08d884456ab85867603eebeddd608ce3b75
SHA256cf5dc65f9ba431a8c3ad0c99bd965c26d045a9059aec604cd729ad1cb2e2e5f0
SHA5122c546ad77a0b328d7cc3a38fd5bc291e53a1f680d97c0a78e800cbc48a379fab82b6832fb41196baf9c5413e119c9ce4be5a7ace7f18f889653b4758345c8b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567f7c844bb415d6d89d97d08be30b281
SHA1f412cd09bf9a2a4b452ea0b6ec460d22974501d2
SHA2565b89c9a26c8bcddbecdb71761eb646b008465398c216161bdd39df1e66a058ed
SHA5121f51011e583101fdaa22753edaa82b9cb7251f59775803c723b2eca55d06a229c3fac8af4d09afac72bdf11b310cfce188ece988d6a3f0699bfeb0d3bcad03ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bbed89b8ab2881ab44cb3751837bcf8
SHA1d90adfeacf4ba3b8b0333cfc13126947be79f91a
SHA2560235b7c66d2d34fbb0cbf6f394c055629335ebe4e5d6509a9616b55328da1601
SHA512dddab55548b09044048d147ebf3e7bae74443db2a5031178281dc7e78964829b7f4dfe80b382ff05715b2ebb14daf66963c37ad5be9c3d3efd0dcc83520d980e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ddb549aac7ac08fc48b961b8624eac2
SHA124e3e23414e8a7d6c0fb5f0e069107211bf20723
SHA2560fafbc21784b2875fe6cfbd9cd220d144c1517ee2d97da803540b48bcbee4109
SHA512116870a6f3b72717aec88f2b9f788dfd31c79e851ad3d324fce2d430a4447b87a7fcbc6e0433b6c40c11551b4486bb10139b7ff80d49bade66c7f5d64764e041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a018ff53ca331881b69f3f32264f9c84
SHA103ee0fd0a971b886a44541d5b866a90ffd8df001
SHA25699ee213a1df71ac867246fed08de338947fc208840b4adb42615031549b4df4c
SHA512bb5d7c94ab6cd86b4ce0de9d286b2ac9385ec115cadbf19e86866a6c6a7806855ca22e1458829b93d00f00e342a808835d5fdef57e29b6b2f950e94d82464e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c37386ccac6934cb1d5af858e8aa8733
SHA1427d755ec2696fb51ede13b1fe58b8126ac2e3a8
SHA256254009380a2b4e3b9899634621dd8b5060baebfb1a4a3916d96c368b50a467dd
SHA512a809b0869e8c3756f7cd405cfe0567e8004bef61126a98f5875128152f6b47e4a84ee4bb20c6e1038dc3823c2273fe776da3ee4c424215faaf1882d7744f50e1
-
Filesize
254B
MD5b23fd79e1031b52ec3864b184656924e
SHA1e70f9a1616a9d375ee0a2e6190664c1c44cfeaa7
SHA256153c3cc7e2955a74a18f408d36119badde5efaf9f35abcd6be136aca3e4a090d
SHA5125ba61acc54443c7cfaae88c5205851c6c3b0a1d06c125395a39377a2c6393d9bb20197febf1c6a21f790fdfc1bc21c802ef04eea9599a6b88f4793ac4c384811
-
Filesize
352B
MD57f521608701bf9351791be76877d3515
SHA1fcfaa0b313c1315fdcb8979ebdd9abbea4c508e0
SHA256474299b7486cfe1370f99746143ec7b42859bb1930cb9e53beb09d6b8492a73d
SHA51200176acf5027b6cf7ead986de99dd8adc52da5bdbc558934687a6e1cf388b0479d656ac198d93acf04b12f0ca9ccd6a141160c3168b5d2863125c7687632132e
-
Filesize
1KB
MD5e6857ff0e08c1c7ee9c774f2522f00e7
SHA12f0f497c131bd2b46c32b9a69351e6c41a219027
SHA2562c798b2d7fee263dca6d5c37beacfc1712ffc100ba39009f4f9dfd88687a2337
SHA512cc0c2be37cf881c3819cce59a482636833bc3ee0bea80bb2e96bc69adc7723a77cb8f42c269c2abb745c20838aa0189cd8bf4bce829e848fcf6654cc573267b9
-
Filesize
2KB
MD5745477770de0f577c84715aa40217926
SHA1cf5d5790d4439bcc3f3ae801186183b9b5dccba0
SHA256bef8a813067c2c8930ef04688618291fe9d7f502c954d014e3ea0235a9e56c74
SHA512b2169a686f22f3a762f5d2539421bf10308b623f1272a606d31ecf52bf96e872ca0012239cc6ffec4f7cc8091cd6a2e04ab2e1c1e9063b4227d74e5a749254fb
-
Filesize
1KB
MD5f752f18eb11a5a2cf164e0d10eba10d3
SHA19e71c95c6a5e84a7b49ab92df82b0846364ab8df
SHA256f1e05b2e3591fc9a33855ed15b16c50e35d1c2f9938b0895e214b0326b279dfc
SHA5128cf8c4ab45856b4899dd10619feadbb9afcc6a4b8e69694156f8247e2323dfd2650251f7a6ab57a177d09a81a962b658be88f5639eacfb6dd7c2e1f80f652d7d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FN7UQQ6Z\favicon-16x16[1].png
Filesize1KB
MD589db4cf9f3e2951f677919931ae16d12
SHA1c52a7d97ac4cc838ed54ee9d2a682c9305a675c6
SHA256c1fff90e1a74d5b51203f2a7b60270db5a105741217a3ce1d1a220504e43e96b
SHA5125c7f06bbe108ac5915c303e32253ccdc78690f81c096568234a6a1f4c7ed8d2171266eec91139820bcf9222268ab90a9c79882b10a2a190ab81eadb5d61e7d7d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
111B
MD557c7beeea7204bcbb6560fbbcb44d76d
SHA1d1caa04c49c7ab6b43bbcbfada38bfa67622a02f
SHA256c500ffd86849146462693e9c890cfe78b0170c0c8d97dfc6ea13d5eb5da518c9
SHA51299d7ca8873703764cfd8be7da7699c4f77afb8c20d34c820651ebbd0b37c2293e40de1427f1ff82bd5b9af576d47858f7d92b05052c3e5a8f05fb45f7030fed1