Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    16/03/2024, 09:05

General

  • Target

    cda8200019a81510328408e8a75949bd.exe

  • Size

    137KB

  • MD5

    cda8200019a81510328408e8a75949bd

  • SHA1

    7db2c6da2dc1ac2608af06b7e262bd5ff0ba59fa

  • SHA256

    d94b482329b31cc52a7262afc09a005b8f3923a719821c7d6febeb477431e1d8

  • SHA512

    9c9602e3d8b0bc656e9c725e59f084bf9f55a7d1cab2b543334abcfde9530570e9edb5b9c3d6a14e87de7fe22cb714f8838ac88fd2395f0353472794e8395351

  • SSDEEP

    3072:IpWC4YgBPlGiyllnpWC4YgBPlGiyllfpWC4YgBPlGiyll6:2WC4YgB9GiyxWC4YgB9GiypWC4YgB9Gu

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 45 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 38 IoCs
  • Drops file in Windows directory 24 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 30 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cda8200019a81510328408e8a75949bd.exe
    "C:\Users\Admin\AppData\Local\Temp\cda8200019a81510328408e8a75949bd.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3048
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2476
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1828
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:308
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3044
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2800
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1812
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2916
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2092
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:900
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        PID:1272
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2984
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2672
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:320
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1660
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:940
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2576
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2664
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2508
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1736
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:884
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:2512
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2564
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2460
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2752
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1684
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2080
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:2516
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2780
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2456
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    f588bb27dd84d3c279b958862f452054

    SHA1

    053e98cc607c3f18461444571dad90b6c9149440

    SHA256

    bbf451420b6344ea56937b2e77634e5f3cca645c9a7481cd3cf7f5b8e6b36e83

    SHA512

    ed9a996865327bbfae7e62b08912a4e3a1c30c5ceabdf8bb17abdc70291cc37f4b067e606e57e15e2181138530898a0cc0c08b4ef87bd2ced1bb01330a04a4b2

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    8b7a4a4d910383c2cb227d0a10056f7f

    SHA1

    faf75384e97a9ac9d9cf0ffd925511eaf77f051e

    SHA256

    8ee9312d84567741f2a9434ecfa5c4fc60cca4b185d462f75ffd4d06c996a237

    SHA512

    c7728981ed1236a08a2391a992b157a0ef808d99b1b506368ef7fed8c3bc89720fae065c4af1028124f25e31ce287917bad002c1515f48a42fadf382f4d527d7

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    619f10830cde309a56819bc7c61fb0fe

    SHA1

    ebe8eaea47274c57fd5b692aeb1ac1d3eac2c6c1

    SHA256

    72b4c68530c0e5ffd66e98cdac9e76a7311868458c5742164c1c07582d5c4f11

    SHA512

    a77e01263473e684a596e5aef37c36861000446cd1795a6ca07ba563101dad467a3a16bf0431fc2f1d92843aae9ecd9f6fc777a630b0a1cb3876ecdf014b8d51

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    137KB

    MD5

    fdbbbb3182e5d1acdfdbd6063d64598f

    SHA1

    df5e78bbf5ac5badaded72fe94dcb7e8833c1bb1

    SHA256

    bcdc5f6f31e8cdd85ee7d213f3883a576081c02eeacb105843d1dbfe9c01a37a

    SHA512

    a82a630ee2c066ca1f75165020e41b1d4c5507206357a20acd651b8fdae3e9aa411ca3590602e3621bfd01e34df6ab43d28869c28bf5054cacc7542cd5726aa7

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    137KB

    MD5

    7b3fbf16e7f88f4424198edac282f80d

    SHA1

    90e5a9005f227a5f7f22dbe3e0ab60a90488e2dd

    SHA256

    3fb96ea5c6d1cc70dba03adfbdcd96ec56b1bfa84dd9f9251ce9c50498c90eac

    SHA512

    0d29f531df84010130061dc54084363a707d61569a50418537f1199b01056663a6f73ed569ff5211b75d2f4e6585a0419a0abd296cb60005617df25e7846eb31

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    137KB

    MD5

    94c26555b2ec1bbe3b8242d4e1b42467

    SHA1

    5d663423372b73bb2ac941c0bd245f4ac49367bb

    SHA256

    cdd534e393280ae1254bf214fd0941a74afc42e4772de832c46f2a55366685ff

    SHA512

    64b5f8457965625d5e43b3a9ceba55050dda4ee59311cd9b64720e1bcd10b1c5c66e472b824f2ece9487eae315ca41679ee0bac7e9f4cfe589bede9b675b85d9

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    137KB

    MD5

    18b856cb235ba24933294c5dc1ce30df

    SHA1

    1e160c651eff9f2b6a45df71f4cd1d0e47c23633

    SHA256

    2dbc6521734e835d430dbb3c1ad2d662816a25aa5c97e3859864144e556a10bb

    SHA512

    5e1a167d3119ad1961cfcaa12db60eb5f7f06531a4aab58fc1279e25fa93e855fbc3144db3d60fec03c41c5cbd9ca3c747fd945f420a543125ee6e05871da059

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    137KB

    MD5

    90b8c08a757bae8b49ae6b004a4ff0a4

    SHA1

    1b5f6c7f988cb6a1f5325f83d16f866b14a95789

    SHA256

    a2fffa0d375e274298669d20977c1f207c512e3caab8e8a28e1bf064a524b9e3

    SHA512

    d3d1996a4eddfd4edf1c4ef1a37a7a057621b6188ec09a3a7f7b10d4ffd179e35a4775cbd910a821475a12a56553549b3b23debe3501c22a7ca07357675b6d6c

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    137KB

    MD5

    cda8200019a81510328408e8a75949bd

    SHA1

    7db2c6da2dc1ac2608af06b7e262bd5ff0ba59fa

    SHA256

    d94b482329b31cc52a7262afc09a005b8f3923a719821c7d6febeb477431e1d8

    SHA512

    9c9602e3d8b0bc656e9c725e59f084bf9f55a7d1cab2b543334abcfde9530570e9edb5b9c3d6a14e87de7fe22cb714f8838ac88fd2395f0353472794e8395351

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    137KB

    MD5

    6f44cfb2916e821a0f56f892aa110e21

    SHA1

    719caec94c764396337174d0cf7b1548540c0f5a

    SHA256

    a49a77b7fa09ce60e2f388f631702e88aedb55823d2798b1c87362a8071de003

    SHA512

    98a39ffd096f29f69f60c8e39386f04820ef15079802826885578e27afc24ed1d21778212fc215f203ead5ff26ceecaf6c186738df0896e0400aba7e4ea8d32e

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    137KB

    MD5

    9d1f4c10bcdfa309a8f6ee0162ac38f8

    SHA1

    551bc5d99382ed3c961138a784071ec9e9c55f74

    SHA256

    738eb538efa29337e67694f16896c679c49a118d4b5b8eca8276aa5d3c04fa88

    SHA512

    774e9daa7b036b553ec0cdd572b47de11c860f7b8da40dd78eb9e8c6a9908663df1e15d38978731713781e334033df4a3a7ec75a2b47408b5033de804e9efc4c

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    137KB

    MD5

    a5de665354cdb01fa466f2c4937abd26

    SHA1

    0e25cc48151298cb1183e8f39b017f8c62e569fb

    SHA256

    7b883ea7e0c3ab105c2dee6d6101c8964905729ab7ef3291b9d409e40520afa3

    SHA512

    1fe4ae3bc3c3e275541120650c7401276e3b13effad9e91a3c489cc9f734e407229e989b7eff03bd4f24941864b48842f4210f5af680cdce003f2a0ed0ac6ca0

  • C:\Windows\tiwi.exe

    Filesize

    137KB

    MD5

    5d03f5f16f9ea00338a7c0f1add45e4a

    SHA1

    5eb0da30ffcc1a9381514ba954b16b60f1346212

    SHA256

    5f9cfb13076093641dfe564b42cd2970cb2be40fd4428d5f2c1775c89faf7a40

    SHA512

    b94e94d8edee4a2100bd1641865abb5aeb60d2d5163840ecdaa1e47cb84706253d65c59e7660be702be38ce67d2ba77dac9a9512feccffab85f26dafbdee4bcb

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    137KB

    MD5

    89a1ccdaef26b7a9ecbc7d2c49e5a154

    SHA1

    9efc9c1ddc6cc8a0d74481dfdc034c50026e86dd

    SHA256

    c4a15e7beb22b6f84bc22e2db638f9e69da2c2d05c707fe5112b73d22705b939

    SHA512

    1383e3d6600f393ef033c9680e5cd1f444aa806d80eb08e15143fc9a6dc643f9e5c811335816f87188f0792d8c52d6b69b84bde390440c5c69334512b5f8ee7e

  • C:\tiwi.exe

    Filesize

    137KB

    MD5

    a43d73a04e07a81824094235679f4986

    SHA1

    f40cd5168ff1f71dbbf9f8f73ae35aaf3af05b0d

    SHA256

    bc12fb60836c6fe70844311948ab909b1ee030f5d785016eeead872ece59878b

    SHA512

    4ef5f539107cb4c5f7bffe3d154fa2cf6b47143f8174c444c0eee87a8435875526e029789b7c70097b489ae2160183410a0d5a4939c68dd92732b75c03c97bcb

  • C:\tiwi.exe

    Filesize

    137KB

    MD5

    3308dc46b2fbe148da5aac0d60d59d4d

    SHA1

    ac800b4bb707b3a7e494fcb2c834130899ab3c95

    SHA256

    f3db120ad70fb8e3db7feb238745980239db74685da7bc79d5ec8da394111d4e

    SHA512

    c2f7b966d249ccecfc89656dd61e9eba7f8532adb3cc9adbd34228da325381bcba06172b11f4db379513741de3f55c75b811913eb49f845a51613f371b966bf2

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • \Users\Admin\AppData\Local\WINDOWS\imoet.exe

    Filesize

    137KB

    MD5

    ed752e575ed485cf198381f4095d2358

    SHA1

    3385a4335207469a580e0d0d9fe8bb7a5c5b9a31

    SHA256

    2658f5c1f479d21c4882b5134d05bfbca4e68b60fe77430307b83dc1fc58e42d

    SHA512

    9249eaeef2c8b7955d61fda9db466e633b7bd2eb856d98d0b310a30f98ac0618ef165269ecb3919b5595d722dc65783d228b5d94fb8eb9256f3da67454a85574

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    137KB

    MD5

    e1ece78f62cc4fb828b01ffbdd437450

    SHA1

    ba1a999778fff2e221c1b98b2ece113d72064375

    SHA256

    c84af01e1eba54353928951d68fc038aef6168551f14f79ab4e55d304584d4d8

    SHA512

    7f44d75e5a7173f3135317812ecd8cad2fa04fbf54bdee9f5cdd024a2036f91310f8e13794d1295277da00645817cd955208035d95abd3f582620e771449308e

  • memory/308-221-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/320-329-0x0000000001CF0000-0x0000000001D1B000-memory.dmp

    Filesize

    172KB

  • memory/320-266-0x0000000001CF0000-0x0000000001D1B000-memory.dmp

    Filesize

    172KB

  • memory/320-385-0x0000000001CF0000-0x0000000001D1B000-memory.dmp

    Filesize

    172KB

  • memory/320-437-0x0000000001CF0000-0x0000000001D1B000-memory.dmp

    Filesize

    172KB

  • memory/320-408-0x0000000001CF0000-0x0000000001D1B000-memory.dmp

    Filesize

    172KB

  • memory/320-421-0x0000000001CF0000-0x0000000001D1B000-memory.dmp

    Filesize

    172KB

  • memory/320-424-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/320-225-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/320-389-0x0000000001CF0000-0x0000000001D1B000-memory.dmp

    Filesize

    172KB

  • memory/320-430-0x0000000001CF0000-0x0000000001D1B000-memory.dmp

    Filesize

    172KB

  • memory/884-355-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/900-332-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/940-380-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1272-334-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1660-276-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1660-325-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1684-327-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1684-426-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1684-366-0x00000000003D0000-0x00000000003FB000-memory.dmp

    Filesize

    172KB

  • memory/1684-145-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1684-429-0x00000000003D0000-0x00000000003FB000-memory.dmp

    Filesize

    172KB

  • memory/1684-344-0x00000000003D0000-0x00000000003FB000-memory.dmp

    Filesize

    172KB

  • memory/1684-428-0x00000000003D0000-0x00000000003FB000-memory.dmp

    Filesize

    172KB

  • memory/1684-311-0x00000000003D0000-0x00000000003FB000-memory.dmp

    Filesize

    172KB

  • memory/1736-394-0x00000000025C0000-0x00000000025EB000-memory.dmp

    Filesize

    172KB

  • memory/1736-309-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1736-390-0x00000000025C0000-0x00000000025EB000-memory.dmp

    Filesize

    172KB

  • memory/1736-425-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1736-438-0x00000000025C0000-0x00000000025EB000-memory.dmp

    Filesize

    172KB

  • memory/1736-343-0x00000000025C0000-0x00000000025EB000-memory.dmp

    Filesize

    172KB

  • memory/1736-345-0x00000000025C0000-0x00000000025EB000-memory.dmp

    Filesize

    172KB

  • memory/1812-359-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1828-182-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1828-187-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2080-351-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2092-291-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2092-277-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2456-406-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2460-416-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2476-192-0x0000000000710000-0x000000000073B000-memory.dmp

    Filesize

    172KB

  • memory/2476-386-0x0000000000710000-0x000000000073B000-memory.dmp

    Filesize

    172KB

  • memory/2476-102-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2476-340-0x0000000000710000-0x000000000073B000-memory.dmp

    Filesize

    172KB

  • memory/2476-422-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2476-331-0x0000000000710000-0x000000000073B000-memory.dmp

    Filesize

    172KB

  • memory/2476-143-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2476-330-0x0000000000710000-0x000000000073B000-memory.dmp

    Filesize

    172KB

  • memory/2476-339-0x0000000000710000-0x000000000073B000-memory.dmp

    Filesize

    172KB

  • memory/2476-263-0x0000000000710000-0x000000000073B000-memory.dmp

    Filesize

    172KB

  • memory/2476-229-0x0000000000710000-0x000000000073B000-memory.dmp

    Filesize

    172KB

  • memory/2508-419-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2512-396-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2516-381-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2544-412-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2564-398-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2576-382-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2664-418-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2672-414-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2752-420-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2780-393-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2800-326-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2800-292-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2916-410-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/2916-190-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2916-392-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/2916-112-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2916-341-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/2916-423-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2984-342-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2984-391-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3044-246-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3048-138-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3048-129-0x0000000002410000-0x000000000243B000-memory.dmp

    Filesize

    172KB

  • memory/3048-110-0x0000000002410000-0x000000000243B000-memory.dmp

    Filesize

    172KB

  • memory/3048-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3048-104-0x0000000002410000-0x000000000243B000-memory.dmp

    Filesize

    172KB

  • memory/3048-148-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3048-100-0x0000000002410000-0x000000000243B000-memory.dmp

    Filesize

    172KB

  • memory/3048-98-0x0000000002410000-0x000000000243B000-memory.dmp

    Filesize

    172KB