Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2024, 00:27

General

  • Target

    3c554ec6311d8b0f4a4119150ffaa170_NeikiAnalytics.exe

  • Size

    351KB

  • MD5

    3c554ec6311d8b0f4a4119150ffaa170

  • SHA1

    364d1636f7dad5fcdf7a11a253412982036d3a6d

  • SHA256

    bdbeefbb2571aa85acb506f00c649607cf7e90785768ec1116597d2df97c12c0

  • SHA512

    1078ea317eb5539d90db85d869301d25019776cf37a3ce8c8104396e5d599671ec5e610fe909a680c52b7edffa220fa636be6d6ba9f58ce72fba2e1fcf64296f

  • SSDEEP

    6144:V/OZpliYZplx/OZpl7/OZplx/OZplQ/OZplU:V/Miqx/M7/Mx/MQ/MU

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 53 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c554ec6311d8b0f4a4119150ffaa170_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3c554ec6311d8b0f4a4119150ffaa170_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1668
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2948
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2056
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:468
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1084
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1460
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:2444
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1584
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          PID:1500
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2156
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2124
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1272
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1540
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1160
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:1252
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:692
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2916
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2716
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1576
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      PID:2308
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2820
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1872
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:2620
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2188
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2544
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1660
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2928
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2692
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:2468
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1424
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2424
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1552
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2064
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2672
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2640
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    ed80ac6ce7751075c3277674b4427505

    SHA1

    8e2f68afd24ad6386d87bbdd64d56898de58b43f

    SHA256

    7406f45e3405be669a279552671b1f487c822a1f978ffc2c7512545f5f3ec995

    SHA512

    0b2034ff7ee415b6859f33baf783076123aee543710df70b095c05864d40ecac22a8c4c29f2597536d2017c637c671c1dfe711d1d42f277ced622a4959b58039

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    351KB

    MD5

    3709d2e4a9eaf56800b5ee7fa937f1ee

    SHA1

    23f657f9f59e885db6f42daca8076d6e2bc51acc

    SHA256

    8aef129e88cde57d3ed3df66c9a3149a08a90e25f6324f44f0c8191e2abca213

    SHA512

    461ad8c96fc3a2e09c26ae0273f8fd24471f69de77e1d30db4c6c9a18cbac1a35a803eb4b299922ff7e8d076a92427513ccbed2c7bde1b20cc59cebc54b87195

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    351KB

    MD5

    e86e2ca08c95e5e009c3caf4d7b1804b

    SHA1

    2e00e119531f2399f7ddc69cd010558fed6abe02

    SHA256

    816c15068be27c4dd3c35fe5048fd3fa94b05ef16c29736cba140532c4296ea3

    SHA512

    bc3bdeada3f1ba8bdddeb203dbaf6550f7d1659c68047307d6f1bac1641f9ee468f5f49732c65ddbf380a4705bfbe091ebfb5616d1d5e63cfd870ee80f3c0c2d

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    351KB

    MD5

    2699d1f9d0e1c4aaeb81a9529d54a589

    SHA1

    a8d44d84a4e50215cdbaac2d7035b46a2eeb5575

    SHA256

    b9e3298fae0910ca40dbff44e4a606310fa9545c9af2b4aab328038c75955cca

    SHA512

    3c3483988926deb682ea3679dc631d7ad392b8a8ced6c37ba3bb53c1fb91e8fb61bfee46b0f60d71e63635b7a93fcdd65a7f8ba4a97c3c1fe03efc111022c5ee

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    3f4e2a447155edc6349ff75256aa3340

    SHA1

    dabf8aeebd2d27def879c6dffeb4336214f666da

    SHA256

    b40da650000faad898bcbad9f9d464b8586b38aac3ffe9bf1f563416bc7981c1

    SHA512

    2e35e76574c13feca3712eef07da04c409ebdad49e113eab0f3c3aee2457901e0c5a1847f3b9bb0bc8a23369790c26bee9be0f3a8afe599d859a221f050d18e9

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    73952f57d57c440f363c8dcc19eac566

    SHA1

    0938d35302730af46964b0d47838d7024d716acc

    SHA256

    df0aac381d257eef574452dee140bddf3a141de7e975244bb06309e132c81354

    SHA512

    62b3cba2ba0f9a9fa1161aa8c3e075cced43b7743597d858102418053ca3cf22247e685f8be07390b54fbb348db34186ac2adfb2fd9722b3e217fa86fab32195

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe

    Filesize

    351KB

    MD5

    e220d4dcbdee9d0e394503b7e2dd00f5

    SHA1

    2fb9a0a07089c0f51f0e6df3e394ee6164e241a8

    SHA256

    fe33938d7c50d831c8ec79fa0da34de81110e55b9f05e6fae92e294cad80cc09

    SHA512

    105bd39768b4ac2a97abc3ea5b48132a159716935756640066f39c2e2eddc7951c281abe91f23fe91a829f3208ff98dfc95887e94093a85a53307210a6e4e9a8

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    351KB

    MD5

    75bee039c129dc44a0e311be22f0ac24

    SHA1

    afc3c2b9ba6fb90d186803966b85690672252596

    SHA256

    8a18e8a4ecb409cf172b588be05a885312d66d7acb0e8aa89b37463a4610bab0

    SHA512

    c5b32c6ecf3f14a7a39e11509df33560cb4eea566d42e5ef82542170f412a83075c9738fc8e8c63948b10ff2d971e09a458c991771992dc78e6efb315caac9c0

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    351KB

    MD5

    1b822d63864974c2623e1e6e4c25d1d7

    SHA1

    5a4558ee8f4c7b13100680bb0d56f7e9e7b97b67

    SHA256

    1a702edd17b47e70b3a781d7fff917934fdb635914df9c6b51841e620a04b835

    SHA512

    751a301fa76aecc3085e013485a0abab816634580587c25fbe11e7889538fa2f1a087aeef7ab8f2c602c7a11e82b8e4e7c803a104d5c5e524ec2c983b0e4aba3

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    351KB

    MD5

    3c554ec6311d8b0f4a4119150ffaa170

    SHA1

    364d1636f7dad5fcdf7a11a253412982036d3a6d

    SHA256

    bdbeefbb2571aa85acb506f00c649607cf7e90785768ec1116597d2df97c12c0

    SHA512

    1078ea317eb5539d90db85d869301d25019776cf37a3ce8c8104396e5d599671ec5e610fe909a680c52b7edffa220fa636be6d6ba9f58ce72fba2e1fcf64296f

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    351KB

    MD5

    11e1486e825519ab361efdec205257d4

    SHA1

    1f665dcf10e9cc28a8e4a73bb934d1a95449dbd6

    SHA256

    0b2ed4719c83b227dea41b9197f9b5cdef6e56b396ce680faad4a8c9e108c3df

    SHA512

    b3710c16e2286c856076fa1befbca7be79ed990d3965c2e4cd1462a10c67012bf0e6988dcfae98f21978172ba67e410d5e8a72e8b13500fa695a217acf60bb69

  • C:\Windows\tiwi.exe

    Filesize

    351KB

    MD5

    346f4b2766136982947924df27f90c88

    SHA1

    9508d9ef980f014f9e5d54804fcd3a4e18b9a827

    SHA256

    61ecb74f6e89d94354d7a0542d33886485008fef7446207eb48b6e66265d7015

    SHA512

    043c06a911adc9691b7ce2d648a40ddaa5296bbe6b2ad52c929bf506d56e8dc46602c59fb5286d366e1e2e4bd9b9ff77a2dc09a23591639f3476fd6e8f028583

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    351KB

    MD5

    368478775acb6238efcc14cd54bc0792

    SHA1

    8d8523437885310ffb97bb40d7ede2e83c5c0b0a

    SHA256

    9f9e7b36db93919717454d31b46db560efa2f3a7da34cc85f71773eeb7188c8d

    SHA512

    3c957a89f1e2a940ccac0263872cc05ca4fbf20807b35d5d2e46f251396b80dcf39c6bc3c6b9f684b80004ac6a7e04aad027377a3bdd05eb2739b5a92a629393

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    351KB

    MD5

    e0e5667c1002f7c0b92efac5e9f06e09

    SHA1

    a619253eb9bd2a21d1df6a93fdf68a1adb2a9e55

    SHA256

    a2cd60fb083eb1c8eba0834f8b7faf7d877d5f44d2dedeb02c5a0ab48d22277b

    SHA512

    46bae54a14163c3ba3b1df2f51dc2f0b1fe27ed5adaf6c82d637d9996f771f18c3f442a43201493eca23d86fa53cd2f9df3292434491ff013b303c8639f136e4

  • memory/692-323-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/692-322-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/1160-285-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1160-270-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1160-287-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1540-455-0x00000000037D0000-0x0000000003DCF000-memory.dmp

    Filesize

    6.0MB

  • memory/1540-110-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1540-454-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1540-268-0x00000000037D0000-0x0000000003DCF000-memory.dmp

    Filesize

    6.0MB

  • memory/1576-217-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1576-218-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1576-165-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1584-438-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1668-111-0x00000000036D0000-0x0000000003CCF000-memory.dmp

    Filesize

    6.0MB

  • memory/1668-109-0x00000000036D0000-0x0000000003CCF000-memory.dmp

    Filesize

    6.0MB

  • memory/1668-99-0x00000000036D0000-0x0000000003CCF000-memory.dmp

    Filesize

    6.0MB

  • memory/1668-273-0x00000000037D0000-0x0000000003DCF000-memory.dmp

    Filesize

    6.0MB

  • memory/1668-433-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1668-222-0x00000000037D0000-0x0000000003DCF000-memory.dmp

    Filesize

    6.0MB

  • memory/1668-164-0x00000000037D0000-0x0000000003DCF000-memory.dmp

    Filesize

    6.0MB

  • memory/1668-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1668-220-0x00000000037D0000-0x0000000003DCF000-memory.dmp

    Filesize

    6.0MB

  • memory/1872-372-0x00000000001B0000-0x00000000001C0000-memory.dmp

    Filesize

    64KB

  • memory/1872-371-0x00000000001B0000-0x00000000001C0000-memory.dmp

    Filesize

    64KB

  • memory/1872-373-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2056-288-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2056-289-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2056-216-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2188-408-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2308-269-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2308-221-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2356-432-0x0000000000230000-0x0000000000240000-memory.dmp

    Filesize

    64KB

  • memory/2468-430-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2692-402-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2916-370-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2948-98-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2948-453-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB