Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:58
Static task
static1
Behavioral task
behavioral1
Sample
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe
Resource
win10v2004-20240426-en
General
-
Target
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe
-
Size
91KB
-
MD5
02298bc71b17e3cc682468a9e5c9789d
-
SHA1
ff10519760f8a8ca6b4604c47aefb2fe67f4efde
-
SHA256
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e
-
SHA512
15d5cd9c9d154932a9adc98357f2f0b9fdd15e807a9544c68d312b183b5dcd9fef08436f8422d855be33bd3a538e0f126fdaaf5d14902697bd1c906cb0a84169
-
SSDEEP
1536:IFAutcCNS1mgnd2y1nrPlGiCcCBEulwHiFAutcCNS1mgnd2y1nrPlGiCcCBEulwN:IpWC4YgBPlGiyll8ipWC4YgBPlGiyllM
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
Processes:
IExplorer.exewinlogon.execute.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exeimoet.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" Tiwi.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
Processes:
cute.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exeIExplorer.exewinlogon.exeimoet.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" imoet.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
Processes:
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cute.exe -
Disables RegEdit via registry modification 6 IoCs
Processes:
IExplorer.exewinlogon.exeimoet.execute.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Tiwi.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 6 IoCs
Processes:
IExplorer.exewinlogon.exeimoet.execute.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 30 IoCs
Processes:
Tiwi.exeIExplorer.exewinlogon.exeimoet.execute.exeTiwi.exeTiwi.exeIExplorer.exeIExplorer.exewinlogon.exeTiwi.exewinlogon.exeimoet.exeIExplorer.exeTiwi.exeTiwi.exeimoet.exeIExplorer.exewinlogon.execute.exeimoet.exeIExplorer.execute.execute.exewinlogon.exewinlogon.exeimoet.exeimoet.execute.execute.exepid process 2516 Tiwi.exe 1656 IExplorer.exe 1616 winlogon.exe 1572 imoet.exe 2340 cute.exe 1776 Tiwi.exe 1236 Tiwi.exe 280 IExplorer.exe 788 IExplorer.exe 1996 winlogon.exe 2244 Tiwi.exe 1732 winlogon.exe 1912 imoet.exe 1084 IExplorer.exe 2992 Tiwi.exe 1696 Tiwi.exe 2416 imoet.exe 1716 IExplorer.exe 2532 winlogon.exe 3012 cute.exe 2664 imoet.exe 2604 IExplorer.exe 3032 cute.exe 2832 cute.exe 2724 winlogon.exe 1984 winlogon.exe 2176 imoet.exe 1668 imoet.exe 2684 cute.exe 1988 cute.exe -
Loads dropped DLL 45 IoCs
Processes:
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exepid process 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe 2516 Tiwi.exe 2516 Tiwi.exe 1656 IExplorer.exe 1656 IExplorer.exe 2516 Tiwi.exe 2516 Tiwi.exe 2516 Tiwi.exe 2516 Tiwi.exe 1656 IExplorer.exe 1656 IExplorer.exe 1616 winlogon.exe 1616 winlogon.exe 1656 IExplorer.exe 1656 IExplorer.exe 1572 imoet.exe 1616 winlogon.exe 1572 imoet.exe 2516 Tiwi.exe 2516 Tiwi.exe 1616 winlogon.exe 1616 winlogon.exe 2340 cute.exe 2340 cute.exe 1656 IExplorer.exe 1656 IExplorer.exe 1616 winlogon.exe 1616 winlogon.exe 1572 imoet.exe 1572 imoet.exe 2340 cute.exe 2340 cute.exe 1572 imoet.exe 2340 cute.exe 2340 cute.exe 1572 imoet.exe 1572 imoet.exe 2340 cute.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
Processes:
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe -
Adds Run key to start application 2 TTPs 24 IoCs
Processes:
imoet.exeIExplorer.exewinlogon.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.execute.exeTiwi.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" IExplorer.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
IExplorer.exeimoet.execute.exeTiwi.exewinlogon.exedescription ioc process File opened (read-only) \??\W: IExplorer.exe File opened (read-only) \??\H: imoet.exe File opened (read-only) \??\P: imoet.exe File opened (read-only) \??\Q: imoet.exe File opened (read-only) \??\V: imoet.exe File opened (read-only) \??\N: cute.exe File opened (read-only) \??\E: Tiwi.exe File opened (read-only) \??\L: Tiwi.exe File opened (read-only) \??\M: imoet.exe File opened (read-only) \??\I: imoet.exe File opened (read-only) \??\B: cute.exe File opened (read-only) \??\U: cute.exe File opened (read-only) \??\X: cute.exe File opened (read-only) \??\R: Tiwi.exe File opened (read-only) \??\S: winlogon.exe File opened (read-only) \??\O: winlogon.exe File opened (read-only) \??\G: cute.exe File opened (read-only) \??\Q: Tiwi.exe File opened (read-only) \??\Z: IExplorer.exe File opened (read-only) \??\H: cute.exe File opened (read-only) \??\P: Tiwi.exe File opened (read-only) \??\O: imoet.exe File opened (read-only) \??\S: IExplorer.exe File opened (read-only) \??\U: winlogon.exe File opened (read-only) \??\U: IExplorer.exe File opened (read-only) \??\L: winlogon.exe File opened (read-only) \??\Q: winlogon.exe File opened (read-only) \??\T: winlogon.exe File opened (read-only) \??\N: imoet.exe File opened (read-only) \??\W: Tiwi.exe File opened (read-only) \??\P: IExplorer.exe File opened (read-only) \??\O: Tiwi.exe File opened (read-only) \??\X: IExplorer.exe File opened (read-only) \??\L: cute.exe File opened (read-only) \??\R: cute.exe File opened (read-only) \??\K: Tiwi.exe File opened (read-only) \??\M: Tiwi.exe File opened (read-only) \??\J: IExplorer.exe File opened (read-only) \??\U: imoet.exe File opened (read-only) \??\Y: IExplorer.exe File opened (read-only) \??\E: cute.exe File opened (read-only) \??\I: IExplorer.exe File opened (read-only) \??\V: cute.exe File opened (read-only) \??\V: Tiwi.exe File opened (read-only) \??\X: Tiwi.exe File opened (read-only) \??\X: winlogon.exe File opened (read-only) \??\Q: cute.exe File opened (read-only) \??\Y: cute.exe File opened (read-only) \??\Z: cute.exe File opened (read-only) \??\R: IExplorer.exe File opened (read-only) \??\V: IExplorer.exe File opened (read-only) \??\R: imoet.exe File opened (read-only) \??\E: IExplorer.exe File opened (read-only) \??\K: IExplorer.exe File opened (read-only) \??\K: cute.exe File opened (read-only) \??\Z: Tiwi.exe File opened (read-only) \??\J: imoet.exe File opened (read-only) \??\O: IExplorer.exe File opened (read-only) \??\X: imoet.exe File opened (read-only) \??\L: imoet.exe File opened (read-only) \??\T: cute.exe File opened (read-only) \??\Q: IExplorer.exe File opened (read-only) \??\K: imoet.exe File opened (read-only) \??\R: winlogon.exe -
Modifies WinLogon 2 TTPs 18 IoCs
Processes:
winlogon.exeimoet.execute.exeTiwi.exeIExplorer.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ IExplorer.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
Tiwi.exedescription ioc process File created C:\autorun.inf Tiwi.exe File opened for modification C:\autorun.inf Tiwi.exe File created F:\autorun.inf Tiwi.exe File opened for modification F:\autorun.inf Tiwi.exe -
Drops file in System32 directory 38 IoCs
Processes:
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeimoet.exeTiwi.exeIExplorer.exeIExplorer.exeIExplorer.exeIExplorer.execute.exewinlogon.exeIExplorer.exeIExplorer.exedescription ioc process File created C:\Windows\SysWOW64\tiwi.scr 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe File opened for modification C:\Windows\SysWOW64\shell.exe imoet.exe File created C:\Windows\SysWOW64\IExplorer.exe imoet.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe File opened for modification C:\Windows\SysWOW64\shell.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe imoet.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr Tiwi.exe File opened for modification C:\Windows\SysWOW64\shell.exe cute.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File created C:\Windows\SysWOW64\IExplorer.exe cute.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe cute.exe File created C:\Windows\SysWOW64\shell.exe 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe File created C:\Windows\SysWOW64\IExplorer.exe 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe File created C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\shell.exe winlogon.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr winlogon.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr imoet.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr cute.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe -
Drops file in Windows directory 24 IoCs
Processes:
IExplorer.exeTiwi.exeIExplorer.exeimoet.execute.exeIExplorer.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exewinlogon.exeIExplorer.exeIExplorer.exeIExplorer.exedescription ioc process File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe Tiwi.exe File created C:\Windows\tiwi.exe Tiwi.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe imoet.exe File opened for modification C:\Windows\tiwi.exe cute.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe File opened for modification C:\Windows\tiwi.exe IExplorer.exe File created C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe imoet.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe File opened for modification C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\tiwi.exe cute.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe IExplorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 54 IoCs
Processes:
imoet.exewinlogon.exeTiwi.execute.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeIExplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Mouse\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Mouse\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\s2359 = "Tiwi" imoet.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\s2359 = "Tiwi" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Mouse\SwapMouseButtons = "1" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" cute.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\s1159 = "Tiwi" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\s2359 = "Tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\s1159 = "Tiwi" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ imoet.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Mouse\SwapMouseButtons = "1" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\s1159 = "Tiwi" cute.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Mouse\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\s2359 = "Tiwi" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Mouse\ 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Mouse\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Mouse\SwapMouseButtons = "1" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Mouse\ cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Mouse\SwapMouseButtons = "1" cute.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\ 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\s1159 = "Tiwi" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\s1159 = "Tiwi" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Mouse\SwapMouseButtons = "1" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\s1159 = "Tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\s2359 = "Tiwi" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Mouse\SwapMouseButtons = "1" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\s2359 = "Tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" IExplorer.exe -
Processes:
Tiwi.exeIExplorer.exewinlogon.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeimoet.execute.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" cute.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\ 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." imoet.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." cute.exe -
Modifies Internet Explorer start page 1 TTPs 6 IoCs
Processes:
winlogon.exeimoet.execute.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exeIExplorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" IExplorer.exe -
Modifies registry class 64 IoCs
Processes:
IExplorer.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.execute.exeimoet.exewinlogon.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exepid process 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
Tiwi.exeimoet.exewinlogon.exeIExplorer.execute.exepid process 2516 Tiwi.exe 1572 imoet.exe 1616 winlogon.exe 1656 IExplorer.exe 2340 cute.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
Processes:
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exeTiwi.exeTiwi.exeIExplorer.exeIExplorer.exewinlogon.exeTiwi.exewinlogon.exeIExplorer.exeimoet.exeTiwi.exewinlogon.exeimoet.exeTiwi.execute.exeIExplorer.exeimoet.execute.exeIExplorer.execute.exewinlogon.exewinlogon.exeimoet.exeimoet.execute.execute.exepid process 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe 2516 Tiwi.exe 1656 IExplorer.exe 1616 winlogon.exe 1572 imoet.exe 2340 cute.exe 1776 Tiwi.exe 1236 Tiwi.exe 280 IExplorer.exe 788 IExplorer.exe 1996 winlogon.exe 2244 Tiwi.exe 1732 winlogon.exe 1084 IExplorer.exe 1912 imoet.exe 2992 Tiwi.exe 2532 winlogon.exe 2416 imoet.exe 1696 Tiwi.exe 3012 cute.exe 1716 IExplorer.exe 2664 imoet.exe 3032 cute.exe 2604 IExplorer.exe 2832 cute.exe 2724 winlogon.exe 1984 winlogon.exe 2176 imoet.exe 1668 imoet.exe 2684 cute.exe 1988 cute.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription pid process target process PID 2380 wrote to memory of 2516 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Tiwi.exe PID 2380 wrote to memory of 2516 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Tiwi.exe PID 2380 wrote to memory of 2516 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Tiwi.exe PID 2380 wrote to memory of 2516 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Tiwi.exe PID 2380 wrote to memory of 1656 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe IExplorer.exe PID 2380 wrote to memory of 1656 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe IExplorer.exe PID 2380 wrote to memory of 1656 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe IExplorer.exe PID 2380 wrote to memory of 1656 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe IExplorer.exe PID 2380 wrote to memory of 1616 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe winlogon.exe PID 2380 wrote to memory of 1616 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe winlogon.exe PID 2380 wrote to memory of 1616 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe winlogon.exe PID 2380 wrote to memory of 1616 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe winlogon.exe PID 2380 wrote to memory of 1572 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe imoet.exe PID 2380 wrote to memory of 1572 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe imoet.exe PID 2380 wrote to memory of 1572 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe imoet.exe PID 2380 wrote to memory of 1572 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe imoet.exe PID 2380 wrote to memory of 2340 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe cute.exe PID 2380 wrote to memory of 2340 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe cute.exe PID 2380 wrote to memory of 2340 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe cute.exe PID 2380 wrote to memory of 2340 2380 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe cute.exe PID 2516 wrote to memory of 1776 2516 Tiwi.exe Tiwi.exe PID 2516 wrote to memory of 1776 2516 Tiwi.exe Tiwi.exe PID 2516 wrote to memory of 1776 2516 Tiwi.exe Tiwi.exe PID 2516 wrote to memory of 1776 2516 Tiwi.exe Tiwi.exe PID 1656 wrote to memory of 1236 1656 IExplorer.exe Tiwi.exe PID 1656 wrote to memory of 1236 1656 IExplorer.exe Tiwi.exe PID 1656 wrote to memory of 1236 1656 IExplorer.exe Tiwi.exe PID 1656 wrote to memory of 1236 1656 IExplorer.exe Tiwi.exe PID 2516 wrote to memory of 280 2516 Tiwi.exe IExplorer.exe PID 2516 wrote to memory of 280 2516 Tiwi.exe IExplorer.exe PID 2516 wrote to memory of 280 2516 Tiwi.exe IExplorer.exe PID 2516 wrote to memory of 280 2516 Tiwi.exe IExplorer.exe PID 1616 wrote to memory of 2244 1616 winlogon.exe Tiwi.exe PID 1616 wrote to memory of 2244 1616 winlogon.exe Tiwi.exe PID 1616 wrote to memory of 2244 1616 winlogon.exe Tiwi.exe PID 1616 wrote to memory of 2244 1616 winlogon.exe Tiwi.exe PID 1656 wrote to memory of 788 1656 IExplorer.exe IExplorer.exe PID 1656 wrote to memory of 788 1656 IExplorer.exe IExplorer.exe PID 1656 wrote to memory of 788 1656 IExplorer.exe IExplorer.exe PID 1656 wrote to memory of 788 1656 IExplorer.exe IExplorer.exe PID 2516 wrote to memory of 1996 2516 Tiwi.exe winlogon.exe PID 2516 wrote to memory of 1996 2516 Tiwi.exe winlogon.exe PID 2516 wrote to memory of 1996 2516 Tiwi.exe winlogon.exe PID 2516 wrote to memory of 1996 2516 Tiwi.exe winlogon.exe PID 2516 wrote to memory of 1912 2516 Tiwi.exe imoet.exe PID 2516 wrote to memory of 1912 2516 Tiwi.exe imoet.exe PID 2516 wrote to memory of 1912 2516 Tiwi.exe imoet.exe PID 2516 wrote to memory of 1912 2516 Tiwi.exe imoet.exe PID 1656 wrote to memory of 1732 1656 IExplorer.exe winlogon.exe PID 1656 wrote to memory of 1732 1656 IExplorer.exe winlogon.exe PID 1656 wrote to memory of 1732 1656 IExplorer.exe winlogon.exe PID 1656 wrote to memory of 1732 1656 IExplorer.exe winlogon.exe PID 1572 wrote to memory of 2992 1572 imoet.exe Tiwi.exe PID 1572 wrote to memory of 2992 1572 imoet.exe Tiwi.exe PID 1572 wrote to memory of 2992 1572 imoet.exe Tiwi.exe PID 1572 wrote to memory of 2992 1572 imoet.exe Tiwi.exe PID 1616 wrote to memory of 1084 1616 winlogon.exe IExplorer.exe PID 1616 wrote to memory of 1084 1616 winlogon.exe IExplorer.exe PID 1616 wrote to memory of 1084 1616 winlogon.exe IExplorer.exe PID 1616 wrote to memory of 1084 1616 winlogon.exe IExplorer.exe PID 2340 wrote to memory of 1696 2340 cute.exe Tiwi.exe PID 2340 wrote to memory of 1696 2340 cute.exe Tiwi.exe PID 2340 wrote to memory of 1696 2340 cute.exe Tiwi.exe PID 2340 wrote to memory of 1696 2340 cute.exe Tiwi.exe -
System policy modification 1 TTPs 12 IoCs
Processes:
imoet.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeIExplorer.exewinlogon.execute.exeTiwi.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe"C:\Users\Admin\AppData\Local\Temp\9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2380 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2516 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:280 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1996 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1912 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3012 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1656 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1236 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:788 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2416 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3032 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1616 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2244 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1084 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2532 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2664 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2832 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1572 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2992 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1716 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2724 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2176 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2684 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2340 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1696 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1984 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1668 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1988
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD58d5c5ff4691b5de13fbc0bea3355a6e7
SHA151a07f908788ffa809c41f13338cb22751b6bfd9
SHA256831bed176f38c0ea7301dac22970e7a53dd0df0fd1a1b1d5cf8b74e8ee78f181
SHA512829c3e1481231b5a2c9690214fc4eb7d94b9e0303d395a94189fa1d1d9f5a362d498e92c7a80bd8c585ad1c6df96fbb82105e6ddf7eabb0ab677e849e0223b91
-
Filesize
45KB
MD59421a5795c38f8516e37e1a1bb67ffc9
SHA1c11949ac0eb773f04c965fdf9bd2d9b25fbc2ac5
SHA25630a1548dfa685b1cee484ff1d34d82b3f3480e02995e8ffe3bc621443fa67d0c
SHA512e005c81663316a533e1d5c0a7e03f1a09c589a948f2c24fef97d2b40f36577251519b08a861bd10c087c4910ac52e2d4787cc611619cfd098072c291332d9955
-
Filesize
45KB
MD52828519436d7bf8e6fa361203e0c18d3
SHA160bbca968a20828b8d9a42df0e88bdf66d654a63
SHA256f80c83163f7fe8e2b817c45f52824c1c3b7862cd5f243f2c24851a4a7186c986
SHA512fee621caa398087f0de5785cae7c4bea30f8f71bc0e7cb474bdb0c404df0aef6598ee511ef83ec88ee0e1fc5c0ad2f633b3f6ff623151d8f2b41e64c2cf93082
-
Filesize
45KB
MD5ee1071158a002dce06d5ae87548d5675
SHA189a63599db469b42ce780dfff11f0eae5e514a9e
SHA256e4d33d88c393e5755fb23f36bfb1c37aca34e6d6c272f5997d7fe0e2b39a1b23
SHA5125e7630fa8e5d820c0c3ce8c5efbed8decb0f8cb24ab7b247deff999fc3aedd1d7588bee8f0a41946d821fb7b56b6e55715714fd92dce1fcf2fd8f3b78c05de1b
-
Filesize
45KB
MD5375c09bcf0611952e34110f41150f977
SHA178dbbd18f2756700d167f619ba994098ad140329
SHA256899a6b525ecc081a87f61825fcbe397b31762e3db56db2cf728b750d5e7925c8
SHA512c6e3b2ddbb047f9587e5ce88d13a1dfa9acc5807d5cc366fbaa763191d1fb794bf0bfed723989e725fb9e71619d4c871317ecd987faaea6387f8eb4d0d00337e
-
Filesize
91KB
MD5a2f3d29f97fde859630f21fefa5a0c4b
SHA127bb5a994c8227f035009e0119fc8e4e5ae3e8ed
SHA2563c94f3d5594996f26dbf250775d4b603fa83fa21c85126db593a1d323e718c02
SHA512f4e3bd7ea88fc8be0bce3e619cc90e0b627454bcf45ec5a141aaea17cc704fbab165db5cf3c52fb8af085272a518c4ef16ce147e212895332f50b441963d5e57
-
Filesize
91KB
MD58c4fb99cb292b16b8b6cf544b393fe37
SHA1383cb069be84073d2f3d9cbd3155eb1772fde504
SHA256680d9c9e0fcbea6c0ebc91f04e82e7fbfee9ed8d277e3007a551511453311361
SHA512e8d4c2450139e56f3e11658bb5b6584fc46c124746dc61e83606bae3272c1128a5b803a1e37d7fd96479f10acd305bccbe7edb09508e0d7b40a3d7dd7a0b574e
-
Filesize
91KB
MD5db5f7b95270d85e0addd3820b7affdac
SHA1c1674e8c92fd23a807330a746c7fba7715f1289f
SHA256921ab186fb3121d78bbe84552a82b99b8679df1a9a7aadb375ee2b62019c1469
SHA512fe19cfeb89544180ed8548a9b6a952895d0b4a6356780f6db29f2f04b804473d89ca754912537a2db38efd8f1add5e3c50d4ac98610c847445acdd5c0dc76d2b
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
91KB
MD535bc85ac6be1649e5c8c9ea0959e5790
SHA1b0244fa41b2a5cccb814e1fdf486d2779721819c
SHA2568139df09406cb646e7cde30a8f14e38b1316db44d6c738988fe02d7d0deff1da
SHA5122b4c98eabab76171664f73c9a6392e192bb41d718778e314ae3467aa08ff388609bc3065a0f4a4b169eed93ae70fa91f8bd8f8e6256614e486ac0d9fa031fd26
-
Filesize
91KB
MD54c0bc555a2869951b9af15ecf2f97103
SHA116e39bf7c1a8213f52bcab1b1c4530a72ba91b8f
SHA25658ad9f1a94d61267e4e64ed1b9126b45215eb5908b31339647eddaef022d727a
SHA5120587aa6a4c9990bb708fd659b8389a72ec268087e801f7815899a0635003b9c9735cb5c06ee71f8cca503ec2e3dd85f7a7e02b32ebf943347b66c3cbb2370701
-
Filesize
91KB
MD543185755fda6043988666c3b8df9360a
SHA131ba3bc6bd4327e9304e5a769f1e054009bca27c
SHA25689a8bee8c4678ec34c67c5b11c4f3a17228e98bc88ae8e6f603ad96fa58dbbc6
SHA5123e4a7758141759d5a5ea4af20729b9523e49fbe0a1319dc9166f5838e6ae7d9dc1fc009f3f23c9d2a095bfa5f8e4924fc8410cd7506b5814b1ad16c85a18a038
-
Filesize
91KB
MD502298bc71b17e3cc682468a9e5c9789d
SHA1ff10519760f8a8ca6b4604c47aefb2fe67f4efde
SHA2569a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e
SHA51215d5cd9c9d154932a9adc98357f2f0b9fdd15e807a9544c68d312b183b5dcd9fef08436f8422d855be33bd3a538e0f126fdaaf5d14902697bd1c906cb0a84169
-
Filesize
91KB
MD56754a8fccd0c48a862ce5b1420f1d22f
SHA19f1b0d1180015d217df93e684ba581b24f12444b
SHA25685f2f9c509b9bbe5abfa212c9ab24467a369dbefa8f1e93e043993ac9ec4a06b
SHA5124bc03e986b2fef899e9eaf1d335a3ba9b09276f6767e32c647deb49f3bf3cd89192b28a6cfeca7111bb45c145f33cf61ad9ed097caaf99bbc74068837b452b28
-
Filesize
91KB
MD5039e11addbf77bea19d3a6f254e1303c
SHA1ce9c7c962737431db78564b9577713793c865293
SHA256b6f9b4a65d240a567a74c7ba31d751ac096eb8c37ffad28c21b63c029c228122
SHA5123d0852b3182b25f8ab9fe5c46c907dbf7dc125a7e7c17ddec0af7088c80c42f93c7d96fb55916c4d009dfd0b8ec33c7a6007c07f62dff919603f877478798d0f
-
Filesize
91KB
MD5cdbd3c67c8e0feee72950f266fd3eb46
SHA1eec38494e394d8d2ff748ac39eef36f93841447e
SHA2565da0716d585c8df5d46dc8accbe0913bef9aef08fbed2ad7db3d8271e78f5d8a
SHA51291f6944f9c306f51fdb2e7f71ca28d4dfd2299c99fc1f7513218c8c2494bd12f04a3dad3a7d8eba7447d73cab9ba9b65113c6116ff236df3f7667583e4c7dd33
-
Filesize
91KB
MD5360dfb8d61e8c486aa7d3d463d7bcdc5
SHA1ffdd36cef4c7c6c39b0b33f67fc0526485fe1745
SHA256327bcd669f8876dabfca9ef005cb9ee043f85afdbd9e430cff063a5d3220b92b
SHA5120c23505d5e00c341b6c4c9cae6667d2ae604778e68d828c6febeab8e5a9997e52caf0d5283cd60cebefd7dc4f177e1e39323ade799b0645a4d2ab3c44d9f0ed3
-
Filesize
729B
MD58e3c734e8dd87d639fb51500d42694b5
SHA1f76371d31eed9663e9a4fd7cb95f54dcfc51f87f
SHA256574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad
SHA51206ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853
-
Filesize
91KB
MD56595bd88b12dfe085576f6890c07f568
SHA1df453ef3504c8f84f76e1e262fd31d3862aaf7b5
SHA256e742b3b55790e56ce7a3fee804d6df05c19c8498a157660252b4ad61e9ecead7
SHA51233be378d1f18d3a3a53d914488968af88bdebdfae29f63728512aaf9e7815be250e9720ac8897e673be33a967786009eec4755338c60e09607b4acace1e31faa
-
Filesize
91KB
MD5bede26017cac937711c9b81cf1821ced
SHA1c4868ad7d37e31480c3dab0cc68bd2a15f3e7fc1
SHA256049f5aacb56c886f0b022a13fcab1eb0c4e5bb37595a19fe1459d627e27e1443
SHA51232c60f8309be5801ad6147b34b5bdc995d39cb9f0b7fbd0713750f58ddf9f44dce508e983756830e11ae0ea59384a688d1e358df46564814bd91e1ccb985f4a4
-
Filesize
91KB
MD5d6d585601a53d84a31423da06c178f80
SHA17521f86da021951550f7e00c0df3ac1af215c391
SHA256013ab1da821708ff8cf1431d2ec7b294bc8a6adcbc0e1deebcf4c668d9034ffa
SHA512d8ef546c61314484b4b9bcd113c5fdd20b633c4ba7be38e2829a1706e04fce724a48121d0266dc4ddcdbe73e179fe498a2fbd8b65709ec5801e076178bfc4e50
-
Filesize
91KB
MD511ef99b75edd5edcbec861a7be6245fc
SHA1aa055939095f2886a99bb2029b5fe740badbe4b2
SHA2568ae2b9676e91677da17e32b57088678e166b18b69b6c245c87dc9396d292b0e5
SHA5121e2aa9ad692a2d60f53bc714113b82c4800d93e9790d643339db915e22b7cef1557b47fd0eb02be03e994bdd238d99c5a169cf98409af9855855dc36c7200e93
-
Filesize
39B
MD5415c421ba7ae46e77bdee3a681ecc156
SHA1b0db5782b7688716d6fc83f7e650ffe1143201b7
SHA256e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e
SHA512dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62
-
Filesize
91KB
MD5806736dadf1f6b00f84a226dbb47ca96
SHA166597d4f3062f0854a1361a1f8ae30c24e82c214
SHA2564ef2ac427f1bb86404432c732b251ec3e55ff0d53851cc9532c70622ff07a5bf
SHA512b0740905f86c36bc116320ac821afffd0e87403dd03b9e53d799edd44d92d6ec5113dc7bc842fb5b9677e7ea881d406ddad58770a2344b5d0d5cca6d932ea3a9
-
Filesize
91KB
MD5570a11823dc8a9ff8feca3000ef97d71
SHA1d0b05578274c5e1dbfcb722514187e04bb1cb4f6
SHA2569e41986bf9c4a65d0354ce986f02a2609ed9f5a3933f9a8a1fed045726987b6b
SHA512a5e4d53e61667a82ec099d313c025eda5dc7d7141d175d27602b9e3f770dfb42e338324ef5dc28f4b4d8bc1aca8ed23fdcb882f8b181cc88e9d1a520435c503c
-
Filesize
91KB
MD59e74ac366c374e3d3986904203eb74d9
SHA1b26a45f0763b0749f194ecf4b330045243d85af6
SHA256c71f33421ab8fc92ae69ad1e93b01f08171e73f37c4c8bf122feac98dec6916b
SHA512f232033f61e424b055e901a9347d6294f7f78de489d6be986fe2475a367812da99de78a7dd175c0f4f0d894214c6df7659b729408199356990252d6604c8b265