Resubmissions

23/03/2025, 10:00

250323-l1t8xszqy9 10

23/03/2025, 09:50

250323-ltz6lawwft 10

Analysis

  • max time kernel
    10s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20241010-de
  • resource tags

    arch:x64arch:x86image:win7-20241010-delocale:de-deos:windows7-x64systemwindows
  • submitted
    23/03/2025, 09:50

Errors

Reason
Machine shutdown

General

  • Target

    R.E.P.O/OnlineFix.url

  • Size

    46B

  • MD5

    59bf167dc52a52f6e45f418f8c73ffa1

  • SHA1

    fa006950a6a971e89d4a1c23070d458a30463999

  • SHA256

    3cb526cccccc54af4c006fff00d1f48f830d08cdd4a2f21213856065666ef38e

  • SHA512

    00005820f0418d4a3b802de4a7055475c88d79c2ee3ebfa580b7ae66a12c6966e5b092a02dc0f40db0fd3b821ea28d4aec14d7d404ead4ea88dc54a1815ffe26

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\R.E.P.O\OnlineFix.url
    1⤵
    • Checks whether UAC is enabled
    PID:2896
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • NTFS ADS
      • Suspicious use of SetWindowsHookEx
      PID:3032
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2600
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1544

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\N1YTDW5L\online-fix[1].xml

        Filesize

        13B

        MD5

        c1ddea3ef6bbef3e7060a1a9ad89e4c5

        SHA1

        35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

        SHA256

        b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

        SHA512

        6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\N1YTDW5L\online-fix[1].xml

        Filesize

        355B

        MD5

        82d5fc44ae854759220818e91ca36a8c

        SHA1

        c5692470613c3f3a3bf317d77a4041c63089e39c

        SHA256

        e1e6df3491798d49987730e56a1971b66da130da3ad37ea1a9fcc23000b94d4d

        SHA512

        ef2d4752b4f80f8e24498b6bd430fd1282795683d71268ba27c40b4b965fabe9c1c774b8c074e83ccbfcaccfb07369d84642126e505c8ffa6fb4fc54fea19e23

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\N1YTDW5L\online-fix[1].xml

        Filesize

        355B

        MD5

        d5f7a3b73b3eb4c6aa4aa6cb968a8b0f

        SHA1

        c7689d3a2e4562f67462017b2a8b1924d0d23a98

        SHA256

        1d3e13c62336b807249d987563392a68d54fa48f7ba172209d1aba3e02ec0379

        SHA512

        4e62221285c6ecd570fc8b35a5605cf34e8dd6a9aad5676bb35b894a0e6fac139773c5145992a7afffb779efbf20887756bcb3f64e6986eb08298ddd9b2b19cd

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\N1YTDW5L\online-fix[1].xml

        Filesize

        1KB

        MD5

        5d9491e4868bbd5faa2a6c75106b391d

        SHA1

        b2093327b0be739e232e79ecd43e224cc303888a

        SHA256

        363d94fe11d03b14e250e63acb3996f979bd547c9401db7067840da55c293277

        SHA512

        c2b364bb0e22a250503721dfb8309f2e017aeafcfdbb87514eda9343d46aaa0d710f02d92ebed88c8fb2dfe357ec4f6c4cf83e59ece2dc759a03587992f068c8

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\z8d0nzh\imagestore.dat

        Filesize

        1KB

        MD5

        f4b1e1f99ce592a86da12aace203ff2a

        SHA1

        dc2b922f52455afd8136272539352830292274e8

        SHA256

        2658a0b44ecb98210f8ceedd55d1f99cdb4f7069eb61ebf14c3a8941fe450670

        SHA512

        1fcac24eaaf7f41fd2dfd094ddbe810f933f1ada6e6d32558c338433fcbfa92575483ae49f833b01c48d853a31656c3faa1ade89ff4bb822aa7650d8ef1b0ee3

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K0PVW9XR\favicon-16x16[1].png

        Filesize

        1KB

        MD5

        89db4cf9f3e2951f677919931ae16d12

        SHA1

        c52a7d97ac4cc838ed54ee9d2a682c9305a675c6

        SHA256

        c1fff90e1a74d5b51203f2a7b60270db5a105741217a3ce1d1a220504e43e96b

        SHA512

        5c7f06bbe108ac5915c303e32253ccdc78690f81c096568234a6a1f4c7ed8d2171266eec91139820bcf9222268ab90a9c79882b10a2a190ab81eadb5d61e7d7d

      • C:\Users\Admin\AppData\Local\Temp\CabD826.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\R.E.P.O\OnlineFix.url

        Filesize

        111B

        MD5

        57c7beeea7204bcbb6560fbbcb44d76d

        SHA1

        d1caa04c49c7ab6b43bbcbfada38bfa67622a02f

        SHA256

        c500ffd86849146462693e9c890cfe78b0170c0c8d97dfc6ea13d5eb5da518c9

        SHA512

        99d7ca8873703764cfd8be7da7699c4f77afb8c20d34c820651ebbd0b37c2293e40de1427f1ff82bd5b9af576d47858f7d92b05052c3e5a8f05fb45f7030fed1

      • C:\Users\Admin\AppData\Local\Temp\wwwE14E.tmp

        Filesize

        46B

        MD5

        59bf167dc52a52f6e45f418f8c73ffa1

        SHA1

        fa006950a6a971e89d4a1c23070d458a30463999

        SHA256

        3cb526cccccc54af4c006fff00d1f48f830d08cdd4a2f21213856065666ef38e

        SHA512

        00005820f0418d4a3b802de4a7055475c88d79c2ee3ebfa580b7ae66a12c6966e5b092a02dc0f40db0fd3b821ea28d4aec14d7d404ead4ea88dc54a1815ffe26

      • memory/1544-336-0x0000000002B40000-0x0000000002B41000-memory.dmp

        Filesize

        4KB

      • memory/2600-335-0x0000000002E20000-0x0000000002E21000-memory.dmp

        Filesize

        4KB

      • memory/2896-0-0x0000000000160000-0x0000000000170000-memory.dmp

        Filesize

        64KB