Overview
overview
10Static
static
10R.E.P.O.v0...ME.rar
windows7-x64
1R.E.P.O.v0...ME.rar
windows10-2004-x64
1R.E.P.O/RE...In.dll
windows7-x64
1R.E.P.O/RE...In.dll
windows10-2004-x64
1R.E.P.O/RE...pv.dll
windows7-x64
1R.E.P.O/RE...pv.dll
windows10-2004-x64
1R.E.P.O/RE...ne.dll
windows7-x64
1R.E.P.O/RE...ne.dll
windows10-2004-x64
1R.E.P.O/RE...me.dll
windows7-x64
1R.E.P.O/RE...me.dll
windows10-2004-x64
1R.E.P.O/RE...64.dll
windows7-x64
1R.E.P.O/RE...64.dll
windows10-2004-x64
1R.E.P.O/RE...io.dll
windows7-x64
1R.E.P.O/RE...io.dll
windows10-2004-x64
1R.E.P.O/RE...ources
windows7-x64
1R.E.P.O/RE...ources
windows10-2004-x64
1R.E.P.O/RE..._extra
windows7-x64
1R.E.P.O/RE..._extra
windows10-2004-x64
1R.E.P.O/RE...s.json
windows7-x64
3R.E.P.O/RE...s.json
windows10-2004-x64
3R.E.P.O/RE...s.json
windows7-x64
3R.E.P.O/RE...s.json
windows10-2004-x64
3R.E.P.O/RE...p.info
windows7-x64
3R.E.P.O/RE...p.info
windows10-2004-x64
3R.E.P.O/RE...config
windows7-x64
3R.E.P.O/RE...config
windows10-2004-x64
3R.E.P.O/RE...nagers
windows7-x64
1R.E.P.O/RE...nagers
windows10-2004-x64
1R.E.P.O/RE...assets
windows7-x64
3R.E.P.O/RE...assets
windows10-2004-x64
3R.E.P.O/RE...s.ress
windows7-x64
3R.E.P.O/RE...s.ress
windows10-2004-x64
3Analysis
-
max time kernel
719s -
max time network
746s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
24/03/2025, 16:39
Behavioral task
behavioral1
Sample
R.E.P.O.v0.1.2-OFME.rar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
R.E.P.O.v0.1.2-OFME.rar
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
R.E.P.O/REPO_Data/Plugins/x86_64/AudioIn.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
R.E.P.O/REPO_Data/Plugins/x86_64/AudioIn.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
R.E.P.O/REPO_Data/Plugins/x86_64/opus_egpv.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
R.E.P.O/REPO_Data/Plugins/x86_64/opus_egpv.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral7
Sample
R.E.P.O/REPO_Data/Plugins/x86_64/overtone.dll
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
R.E.P.O/REPO_Data/Plugins/x86_64/overtone.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
R.E.P.O/REPO_Data/Plugins/x86_64/overtoneruntime.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
R.E.P.O/REPO_Data/Plugins/x86_64/overtoneruntime.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
R.E.P.O/REPO_Data/Plugins/x86_64/steam_api64.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
R.E.P.O/REPO_Data/Plugins/x86_64/steam_api64.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
R.E.P.O/REPO_Data/Plugins/x86_64/webrtc-audio.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
R.E.P.O/REPO_Data/Plugins/x86_64/webrtc-audio.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
R.E.P.O/REPO_Data/Resources/unity default resources
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
R.E.P.O/REPO_Data/Resources/unity default resources
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
R.E.P.O/REPO_Data/Resources/unity_builtin_extra
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
R.E.P.O/REPO_Data/Resources/unity_builtin_extra
Resource
win10v2004-20250313-en
Behavioral task
behavioral19
Sample
R.E.P.O/REPO_Data/RuntimeInitializeOnLoads.json
Resource
win7-20250207-en
Behavioral task
behavioral20
Sample
R.E.P.O/REPO_Data/RuntimeInitializeOnLoads.json
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
R.E.P.O/REPO_Data/ScriptingAssemblies.json
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
R.E.P.O/REPO_Data/ScriptingAssemblies.json
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
R.E.P.O/REPO_Data/app.info
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
R.E.P.O/REPO_Data/app.info
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
R.E.P.O/REPO_Data/boot.config
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
R.E.P.O/REPO_Data/boot.config
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
R.E.P.O/REPO_Data/globalgamemanagers
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
R.E.P.O/REPO_Data/globalgamemanagers
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
R.E.P.O/REPO_Data/globalgamemanagers.assets
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
R.E.P.O/REPO_Data/globalgamemanagers.assets
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
R.E.P.O/REPO_Data/globalgamemanagers.assets.ress
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
R.E.P.O/REPO_Data/globalgamemanagers.assets.ress
Resource
win10v2004-20250314-en
General
-
Target
R.E.P.O/REPO_Data/boot.config
-
Size
164B
-
MD5
2bef265e5d91fffe55351a810fab3389
-
SHA1
1d64f1852a675ee4a770b50158934d8b72a5ec55
-
SHA256
23daea2865dfecba70fa0d5b156fed27a3ebbc3a12fd25af8130ee5bfb2771b7
-
SHA512
b25b83e5869d5bfa951a5cd06a225c484e6fdf26ed80a6c34cd38e87e11138bcf2f719220aad05890cc7f776dabf8351d69bc927530ca64a24d9debd6fd42567
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\config_auto_file\shell\Read cmd.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\config_auto_file\shell cmd.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\.config\ = "config_auto_file" cmd.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\config_auto_file\shell\Read\command cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\config_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" cmd.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\config_auto_file cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\config_auto_file\ cmd.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_CLASSES\.config cmd.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 844 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 844 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 844 AcroRd32.exe 844 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 844 1712 cmd.exe 32 PID 1712 wrote to memory of 844 1712 cmd.exe 32 PID 1712 wrote to memory of 844 1712 cmd.exe 32 PID 1712 wrote to memory of 844 1712 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\R.E.P.O\REPO_Data\boot.config1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\R.E.P.O\REPO_Data\boot.config"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5be901aa5ee125c33f57a4d0a3576e275
SHA1cd16911815ab7f213cb42268420c2f594624c372
SHA256ae4b7f0ba01828bedcbe707570fd296967dd54f72430c89534962a999bc7c5fc
SHA512f68e68a902f179f497654c8cfb8fdecf0a916a5f8e814ce16bb14bb821ce3ab8961e4add4e8a8bf9eb2fcbcdbb326802b1c5b6cc691e5012c79d27eafbf1b3a2