Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2024 00:27

General

  • Target

    3c554ec6311d8b0f4a4119150ffaa170_NeikiAnalytics.exe

  • Size

    351KB

  • MD5

    3c554ec6311d8b0f4a4119150ffaa170

  • SHA1

    364d1636f7dad5fcdf7a11a253412982036d3a6d

  • SHA256

    bdbeefbb2571aa85acb506f00c649607cf7e90785768ec1116597d2df97c12c0

  • SHA512

    1078ea317eb5539d90db85d869301d25019776cf37a3ce8c8104396e5d599671ec5e610fe909a680c52b7edffa220fa636be6d6ba9f58ce72fba2e1fcf64296f

  • SSDEEP

    6144:V/OZpliYZplx/OZpl7/OZplx/OZplQ/OZplU:V/Miqx/M7/Mx/MQ/MU

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c554ec6311d8b0f4a4119150ffaa170_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3c554ec6311d8b0f4a4119150ffaa170_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:320
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:5040
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2512
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:3188
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3576
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:844
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:2764
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          PID:3856
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:4076
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2256
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:3200
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:2440
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:4044
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          PID:4440
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:3836
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2736
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1672
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1664
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:3940
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:2772
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3980
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1068
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3040
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:1376
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      PID:2620
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4704
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4896
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:1852
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4888
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4492
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3036
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3448
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3804
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3888
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2056
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\cute.exe

    Filesize

    351KB

    MD5

    0a58315d63b952a1288f8f64fd5d0f01

    SHA1

    109a3b614bd5058fb49e443a3bcd7402e5a2cbe6

    SHA256

    2e35c05a6c15071ef32ddfa732ad073be890a0bf0b6df3cdc1ba74a08e695a45

    SHA512

    96e5f477efb4a05f65950b58f406a8b7d0ae7dab59f9dbf514aa3af0c1f91e40702a70fd763f7d490c17b8708a8f6492edf396de1464c75c2aa2bc43aa56136e

  • C:\Users\Admin\AppData\Local\WINDOWS\imoet.exe

    Filesize

    351KB

    MD5

    c8898493ef21329b55935df4521d995c

    SHA1

    2697fdc4732347aebf89a3e81a776fac464b77bb

    SHA256

    860b3d967cbdad35c1f8bedfdbe5dd4b4044add3f3f10384c998849184c63470

    SHA512

    38c8aaac1f8fcaacd43c90136c2eef893be2b4f8fc3c7cc63e365c016268f62746429efbcb402bb10d7ff742172e45f440aa284954ec4c3ffe62c75095eab13b

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    476d7acd43333d40abd6bbc8449439cc

    SHA1

    f4665630f7607c9d6a26748b6ce3efc759735a95

    SHA256

    89303f0c09569901ee196de6aaedc80b713b757eaaadc78a68390c2dda09fc2c

    SHA512

    12654487d6209053a5b92e98a0d3ae3353282f0a90e445371a434659398ca129bbcf9e564f8e59eb159b446bb223d2db1740c5a8a5915158293508376337e9a2

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    351KB

    MD5

    9d7bb519ddd083a036ebb6e87fc05b8d

    SHA1

    776a26c94a6a1e6c780b96bc4ef94177cb67bc55

    SHA256

    725ea343b4d8598406ed8e021ddd71b76135ff5baa52174d0692b0c4ac6c0dc3

    SHA512

    955904cf8603474396059f768e1620fe3609b15223b667bcf792afe4e50d1dc435eab171a2b4e7fbeabe50145993a6c2d41af8c58de45813aab5e98f375f3e9c

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    351KB

    MD5

    6a47256c9c16705778ae83dd40461df6

    SHA1

    6968376b05f8e09bf68eba2836a5d471a8ed4b0c

    SHA256

    202c0b9b6ddaf0e3e133da901d0041582c39d966debbfc0d35ddd85fa096adf6

    SHA512

    eca47d51f734bb2261ef9e2bf1030b268620623eb0d34343c9bd8afcb0522ad757ea47f35ad02126177770d165afc2bc1f8b1d19bea3e5de5d0bf86214e82019

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    a1ef8cd2de4b93a55ffacb9aa36c1ac5

    SHA1

    c30e2032f9a2c6840c5860a1dceeb50e55ebdd97

    SHA256

    ec1e1e8baeaa9dfb04186b86e34d2ecfb3cb7c1a342795a6202768c6e1344023

    SHA512

    340753998fb125957933e34f54fac772adc0c6caf786e228927dfa6d57cf8f960a3e280c81720390530288fd07cd54afe326bf5cc33b1e430a97801409797a75

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    701a9aa1d61a7bf279c993d986da05ef

    SHA1

    5de1b04fef5b55a1f9265bd97c677aa7ba4e505f

    SHA256

    55868149bf4cfcceb098f63644d99fb683108bc20992b34b9261c6160b8ddc05

    SHA512

    9bee6b6b1e8fd3fe6676fc1136b72ca46d323f28ca93d848e11677e7fe8be2e43dbd73d5d697c233055ca7a0b6b6a8aee73dd838778fbf43108712b8ed37f12d

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    5105889510b4c9e7bcca6f5be03458fd

    SHA1

    b1d6e6f4b4d97561c6f6080123723a7396621660

    SHA256

    463dfde3cc8998acb4e174cb9d90ae0c02529b4925bc974a57c8cf9d4e30b0c2

    SHA512

    863c28c11faf5ebf92d36abc12466c091ee01d0e62edddc203222acada940ab53be2965dac7f1542588b7ab803264cd4997f126ec474607c72dc047eb437ebac

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    348d0164447e1d47ef68b189ac58777c

    SHA1

    c1cce1753de06947b2ee07fff9a251db40c81fce

    SHA256

    c2e2d83e0e2a47cdd0527dcfd4be8ea52b62cc547d352a3b73b9f0834b07c438

    SHA512

    2115b186f5e9b5a778c7a7290870b18b187bd4e64fc5de4ba538dae75f0444b559837b255dfe1f3ef5d4e8a3407bccfbe7e52671e1bcbcb5945f0c8d45c93142

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe

    Filesize

    351KB

    MD5

    057e04815ee05cd5dbf82fb13d80d43c

    SHA1

    c9df42c6c26575c7f7b46b73bcf2f49310de9568

    SHA256

    d20a5ebda2a8d8daf785dfac6407886e7a2188141d82a785fb60c64db081c4d8

    SHA512

    619fbb7630552f3c3f9c22e8abe7c7a4a0aa4e7cbfbfcb9c8d3cc56b8a0159d2d70492a625d56278a300f821c1c37c7fed7864065f788ab9eb5c926903c7ff97

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    351KB

    MD5

    c42f460c3361fecf44987f5e42f637ec

    SHA1

    e8d92659d6fd344ed8a46634abf9b1e0bd8a307d

    SHA256

    7a7fd46e9ba7cff69ed590dd1cb26eaddc00d0d4050801e0449d7c2b38d8d29e

    SHA512

    e5f99bcbc53058ea3b70c8e3a9501c01bd2d628a913c13004bdc56e83d5202ba0c4031150cf679cd10210b6000ae65d0812ab0d5a5bf0d9630f18ee0e4ec93f9

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    351KB

    MD5

    c0c55bcd94c11f9918d23159afe329ce

    SHA1

    b4f93040bc063fc5176017c8e1b437e7567ce6d8

    SHA256

    8018143979300074352ea1d8a7d595f895ef1f945a6d9eefed79e54531a56ea7

    SHA512

    f20a79d0233783058a97fa5b140ced1336dca4f4056026c9f17219c5fb4a47012f8402edb9527ada0b3ebdb5cc35e0d06f88ed86318a18ccc4a7fa4f5197c399

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    351KB

    MD5

    6bb60931ae9e909836784d7ebe34d1f0

    SHA1

    23aa9254db20d961de309ca2ddd1586dbe372fc7

    SHA256

    20649dcc8a202210d98d91c509e273488977537b1104c41c7cc0144851dbd14c

    SHA512

    e7d7407ac0dea55433ec33c57c956529de6cd81d51e873abe60cb8f84f5aed15b391a59a6ee7d3bad5439710b6d9e68568c69e5074554d7dab89900917b4968d

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    351KB

    MD5

    cd279aadd15f9a352920d9753f152833

    SHA1

    2fce4a8accbebd691d2a70149a25f23e866defd0

    SHA256

    905c17a230743242b85364d6706adbdc474d8afe85ad3d28216a5aa7f0111c0f

    SHA512

    ca7d6082f8d9c2049bbb1ba086def259fc6ff7d6c0c7e94357bc231a00cc8d20463fa0c7d7798bbca65e3ebb2098ed276a0730863de1fede9aa49b021da4527f

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    351KB

    MD5

    3c554ec6311d8b0f4a4119150ffaa170

    SHA1

    364d1636f7dad5fcdf7a11a253412982036d3a6d

    SHA256

    bdbeefbb2571aa85acb506f00c649607cf7e90785768ec1116597d2df97c12c0

    SHA512

    1078ea317eb5539d90db85d869301d25019776cf37a3ce8c8104396e5d599671ec5e610fe909a680c52b7edffa220fa636be6d6ba9f58ce72fba2e1fcf64296f

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    351KB

    MD5

    0512f964cacaff46e12be7f7ae74463c

    SHA1

    ca00babf7d2d0b5e23e0e99ff35bfc65b4573cf9

    SHA256

    951f4ed746abdf8ddd537ee672dadff837b3ca3c0dd36ba66f7952eaf4ded959

    SHA512

    ce4d118c970022ead1a8159673da036a7f034e3a85d29848af142ec9c524d54e4ac5a422bc4028efafa766043dd6e8a85a5d1611d2465137cd6cdc5fdc9e839f

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    351KB

    MD5

    f40e93fd785558ddff367f7f97db4bf4

    SHA1

    2d8921e42a09e8e5b2fbb24f876fb7280e31bec6

    SHA256

    27f2c24ed2c40447f3e47ae06e77e1f1f415c7f7dbcffc554ffe704089dc0e96

    SHA512

    863409c3d1f5ceb2856d2ed7b8167fe0dcb54b3414e84544c961a8977fa2531a0329151ca813f9759b3b9bb14f1ab05b1ef8be482143eddd53cc32fef2fccda3

  • C:\Windows\tiwi.exe

    Filesize

    351KB

    MD5

    b60819ecbd570eabf6dd89646c700e6f

    SHA1

    16d294cc1aac91c84db89e775e57977936752af3

    SHA256

    291d48255435c13cf86bb6a4ee9268421a6b2af31db8fa613125c22352362abb

    SHA512

    f449a978b2a5d432278fa75033f69808b340cab2e7f7bde2ad6ff622bbead7fb45a49fdb07372b963278e32d713e6a9b8b6d7f4290ae46b997400b2c8452dfa1

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    351KB

    MD5

    eb7374233b7e506275b31771175ce242

    SHA1

    da00a064c4af66d36e433f6d7e72cd4bfed23bb2

    SHA256

    85006e888441f4f288bedb3c2301900d9520c2f640a31f8477fc465940e9ebc4

    SHA512

    76b0edbbf14bd9337e2ba3bc4565638471139d57dddcd550994bdbd20d9723feae259088af3358a009cfa340e6fecdc70c25c5a25c6178a6d984a2c38bb73e62

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • memory/320-275-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/320-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/320-432-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/844-444-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/844-288-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1068-321-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1068-352-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1376-147-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1376-153-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1664-102-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1664-286-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2512-198-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2512-250-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2620-249-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2620-154-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2772-263-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2772-269-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3188-264-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3188-251-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3448-283-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3448-351-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3576-276-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3576-268-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3940-262-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3940-248-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3980-289-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3980-277-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4704-443-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4704-258-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4896-324-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/5040-281-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/5040-96-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB