Analysis
-
max time kernel
150s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:58
Static task
static1
Behavioral task
behavioral1
Sample
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe
Resource
win10v2004-20240426-en
General
-
Target
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe
-
Size
91KB
-
MD5
02298bc71b17e3cc682468a9e5c9789d
-
SHA1
ff10519760f8a8ca6b4604c47aefb2fe67f4efde
-
SHA256
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e
-
SHA512
15d5cd9c9d154932a9adc98357f2f0b9fdd15e807a9544c68d312b183b5dcd9fef08436f8422d855be33bd3a538e0f126fdaaf5d14902697bd1c906cb0a84169
-
SSDEEP
1536:IFAutcCNS1mgnd2y1nrPlGiCcCBEulwHiFAutcCNS1mgnd2y1nrPlGiCcCBEulwN:IpWC4YgBPlGiyll8ipWC4YgBPlGiyllM
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
Processes:
imoet.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exeIExplorer.exewinlogon.execute.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" cute.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
Processes:
IExplorer.exewinlogon.exeimoet.execute.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Tiwi.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
Processes:
IExplorer.exewinlogon.exeimoet.execute.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Tiwi.exe -
Disables RegEdit via registry modification 6 IoCs
Processes:
IExplorer.exewinlogon.exeimoet.execute.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Tiwi.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 6 IoCs
Processes:
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 30 IoCs
Processes:
Tiwi.exeIExplorer.exewinlogon.exeimoet.execute.exeTiwi.exeTiwi.exeIExplorer.exeIExplorer.exewinlogon.exeimoet.exewinlogon.exeTiwi.execute.exeIExplorer.exeimoet.exeTiwi.exewinlogon.exeTiwi.exeIExplorer.execute.exeIExplorer.exeimoet.exewinlogon.exewinlogon.execute.exeimoet.exeimoet.execute.execute.exepid process 4812 Tiwi.exe 3308 IExplorer.exe 4048 winlogon.exe 4148 imoet.exe 2564 cute.exe 3076 Tiwi.exe 732 Tiwi.exe 2020 IExplorer.exe 3680 IExplorer.exe 3352 winlogon.exe 4444 imoet.exe 4816 winlogon.exe 5100 Tiwi.exe 4596 cute.exe 4508 IExplorer.exe 1692 imoet.exe 4272 Tiwi.exe 4660 winlogon.exe 4888 Tiwi.exe 1600 IExplorer.exe 3252 cute.exe 1776 IExplorer.exe 4032 imoet.exe 2652 winlogon.exe 2444 winlogon.exe 3796 cute.exe 1720 imoet.exe 1812 imoet.exe 2388 cute.exe 4364 cute.exe -
Loads dropped DLL 5 IoCs
Processes:
Tiwi.exeTiwi.exeTiwi.exeTiwi.exeTiwi.exepid process 3076 Tiwi.exe 732 Tiwi.exe 5100 Tiwi.exe 4272 Tiwi.exe 4888 Tiwi.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
Processes:
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exeIExplorer.execute.exeimoet.exewinlogon.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe -
Adds Run key to start application 2 TTPs 24 IoCs
Processes:
Tiwi.exeIExplorer.execute.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exewinlogon.exeimoet.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" cute.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
IExplorer.exewinlogon.exeTiwi.execute.exeimoet.exedescription ioc process File opened (read-only) \??\Z: IExplorer.exe File opened (read-only) \??\Q: winlogon.exe File opened (read-only) \??\X: Tiwi.exe File opened (read-only) \??\V: winlogon.exe File opened (read-only) \??\I: Tiwi.exe File opened (read-only) \??\Z: Tiwi.exe File opened (read-only) \??\E: winlogon.exe File opened (read-only) \??\I: cute.exe File opened (read-only) \??\U: imoet.exe File opened (read-only) \??\E: cute.exe File opened (read-only) \??\R: cute.exe File opened (read-only) \??\L: IExplorer.exe File opened (read-only) \??\S: Tiwi.exe File opened (read-only) \??\N: cute.exe File opened (read-only) \??\P: winlogon.exe File opened (read-only) \??\Q: imoet.exe File opened (read-only) \??\M: winlogon.exe File opened (read-only) \??\T: winlogon.exe File opened (read-only) \??\L: imoet.exe File opened (read-only) \??\T: cute.exe File opened (read-only) \??\K: IExplorer.exe File opened (read-only) \??\N: IExplorer.exe File opened (read-only) \??\K: Tiwi.exe File opened (read-only) \??\W: Tiwi.exe File opened (read-only) \??\T: IExplorer.exe File opened (read-only) \??\N: Tiwi.exe File opened (read-only) \??\H: winlogon.exe File opened (read-only) \??\N: winlogon.exe File opened (read-only) \??\O: imoet.exe File opened (read-only) \??\K: cute.exe File opened (read-only) \??\U: winlogon.exe File opened (read-only) \??\Z: imoet.exe File opened (read-only) \??\M: cute.exe File opened (read-only) \??\H: Tiwi.exe File opened (read-only) \??\E: Tiwi.exe File opened (read-only) \??\L: cute.exe File opened (read-only) \??\V: cute.exe File opened (read-only) \??\I: winlogon.exe File opened (read-only) \??\J: cute.exe File opened (read-only) \??\G: cute.exe File opened (read-only) \??\W: cute.exe File opened (read-only) \??\G: IExplorer.exe File opened (read-only) \??\K: imoet.exe File opened (read-only) \??\V: imoet.exe File opened (read-only) \??\S: IExplorer.exe File opened (read-only) \??\U: Tiwi.exe File opened (read-only) \??\M: imoet.exe File opened (read-only) \??\B: IExplorer.exe File opened (read-only) \??\W: winlogon.exe File opened (read-only) \??\J: imoet.exe File opened (read-only) \??\I: IExplorer.exe File opened (read-only) \??\V: Tiwi.exe File opened (read-only) \??\K: winlogon.exe File opened (read-only) \??\Y: cute.exe File opened (read-only) \??\M: Tiwi.exe File opened (read-only) \??\X: winlogon.exe File opened (read-only) \??\W: imoet.exe File opened (read-only) \??\P: cute.exe File opened (read-only) \??\M: IExplorer.exe File opened (read-only) \??\J: Tiwi.exe File opened (read-only) \??\E: imoet.exe File opened (read-only) \??\Z: cute.exe File opened (read-only) \??\W: IExplorer.exe File opened (read-only) \??\O: winlogon.exe -
Modifies WinLogon 2 TTPs 18 IoCs
Processes:
IExplorer.exewinlogon.exeimoet.execute.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" Tiwi.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
IExplorer.exedescription ioc process File created C:\autorun.inf IExplorer.exe File opened for modification C:\autorun.inf IExplorer.exe File created F:\autorun.inf IExplorer.exe File opened for modification F:\autorun.inf IExplorer.exe -
Drops file in System32 directory 38 IoCs
Processes:
imoet.exewinlogon.exeIExplorer.execute.exeIExplorer.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeIExplorer.exeTiwi.exeIExplorer.exeIExplorer.exeIExplorer.exedescription ioc process File created C:\Windows\SysWOW64\IExplorer.exe imoet.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr cute.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe cute.exe File opened for modification C:\Windows\SysWOW64\shell.exe imoet.exe File opened for modification C:\Windows\SysWOW64\shell.exe cute.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe imoet.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr winlogon.exe File created C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr imoet.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\shell.exe 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr Tiwi.exe File created C:\Windows\SysWOW64\IExplorer.exe 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe File opened for modification C:\Windows\SysWOW64\shell.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe cute.exe File created C:\Windows\SysWOW64\tiwi.scr 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe winlogon.exe File created C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe -
Drops file in Windows directory 24 IoCs
Processes:
IExplorer.exeimoet.exeIExplorer.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exewinlogon.execute.exeIExplorer.exeIExplorer.exeIExplorer.exeIExplorer.exedescription ioc process File opened for modification C:\Windows\tiwi.exe IExplorer.exe File created C:\Windows\tiwi.exe IExplorer.exe File created C:\Windows\tiwi.exe imoet.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe File created C:\Windows\tiwi.exe Tiwi.exe File opened for modification C:\Windows\tiwi.exe winlogon.exe File opened for modification C:\Windows\tiwi.exe cute.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe Tiwi.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe cute.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe imoet.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe -
Modifies Control Panel 54 IoCs
Processes:
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeIExplorer.exewinlogon.exeimoet.execute.exeTiwi.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\s2359 = "Tiwi" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\s2359 = "Tiwi" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\ winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Mouse\SwapMouseButtons = "1" imoet.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ winlogon.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\ imoet.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\s2359 = "Tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Mouse\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Mouse\SwapMouseButtons = "1" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\s2359 = "Tiwi" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\ 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\s1159 = "Tiwi" imoet.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Mouse\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\s1159 = "Tiwi" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Mouse\SwapMouseButtons = "1" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\s1159 = "Tiwi" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Mouse\ winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Mouse\SwapMouseButtons = "1" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" imoet.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Mouse\ 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\s1159 = "Tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\s1159 = "Tiwi" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Mouse\SwapMouseButtons = "1" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\s2359 = "Tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\s2359 = "Tiwi" imoet.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Mouse\ cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Mouse\SwapMouseButtons = "1" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\s1159 = "Tiwi" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Mouse\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" imoet.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" cute.exe -
Processes:
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeIExplorer.execute.exewinlogon.exeimoet.exeTiwi.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Internet Explorer\Main\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." cute.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Internet Explorer\Main\ 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." imoet.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Internet Explorer\Main\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Internet Explorer\Main\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." winlogon.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Internet Explorer\Main\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Internet Explorer\Main\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." Tiwi.exe -
Modifies Internet Explorer start page 1 TTPs 6 IoCs
Processes:
imoet.execute.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exeIExplorer.exewinlogon.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" winlogon.exe -
Modifies registry class 64 IoCs
Processes:
cute.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeIExplorer.exewinlogon.exeTiwi.exeimoet.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exepid process 4684 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe 4684 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
Tiwi.exeimoet.exewinlogon.exeIExplorer.execute.exepid process 4812 Tiwi.exe 4148 imoet.exe 4048 winlogon.exe 3308 IExplorer.exe 2564 cute.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
Processes:
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exeTiwi.exeIExplorer.exeTiwi.exewinlogon.exeIExplorer.exeimoet.exewinlogon.exeTiwi.exeIExplorer.execute.exeTiwi.exeimoet.exewinlogon.exeIExplorer.exeTiwi.execute.exeIExplorer.exeimoet.exewinlogon.exewinlogon.execute.exeimoet.exeimoet.execute.execute.exepid process 4684 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe 4812 Tiwi.exe 3308 IExplorer.exe 4048 winlogon.exe 4148 imoet.exe 2564 cute.exe 732 Tiwi.exe 2020 IExplorer.exe 3076 Tiwi.exe 3352 winlogon.exe 3680 IExplorer.exe 4444 imoet.exe 4816 winlogon.exe 5100 Tiwi.exe 4508 IExplorer.exe 4596 cute.exe 4272 Tiwi.exe 1692 imoet.exe 4660 winlogon.exe 1600 IExplorer.exe 4888 Tiwi.exe 3252 cute.exe 1776 IExplorer.exe 4032 imoet.exe 2652 winlogon.exe 2444 winlogon.exe 3796 cute.exe 1720 imoet.exe 1812 imoet.exe 2388 cute.exe 4364 cute.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription pid process target process PID 4684 wrote to memory of 4812 4684 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Tiwi.exe PID 4684 wrote to memory of 4812 4684 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Tiwi.exe PID 4684 wrote to memory of 4812 4684 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Tiwi.exe PID 4684 wrote to memory of 3308 4684 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe IExplorer.exe PID 4684 wrote to memory of 3308 4684 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe IExplorer.exe PID 4684 wrote to memory of 3308 4684 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe IExplorer.exe PID 4684 wrote to memory of 4048 4684 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe winlogon.exe PID 4684 wrote to memory of 4048 4684 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe winlogon.exe PID 4684 wrote to memory of 4048 4684 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe winlogon.exe PID 4684 wrote to memory of 4148 4684 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe imoet.exe PID 4684 wrote to memory of 4148 4684 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe imoet.exe PID 4684 wrote to memory of 4148 4684 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe imoet.exe PID 4684 wrote to memory of 2564 4684 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe cute.exe PID 4684 wrote to memory of 2564 4684 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe cute.exe PID 4684 wrote to memory of 2564 4684 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe cute.exe PID 4812 wrote to memory of 3076 4812 Tiwi.exe Tiwi.exe PID 4812 wrote to memory of 3076 4812 Tiwi.exe Tiwi.exe PID 4812 wrote to memory of 3076 4812 Tiwi.exe Tiwi.exe PID 3308 wrote to memory of 732 3308 IExplorer.exe Tiwi.exe PID 3308 wrote to memory of 732 3308 IExplorer.exe Tiwi.exe PID 3308 wrote to memory of 732 3308 IExplorer.exe Tiwi.exe PID 3308 wrote to memory of 2020 3308 IExplorer.exe IExplorer.exe PID 3308 wrote to memory of 2020 3308 IExplorer.exe IExplorer.exe PID 3308 wrote to memory of 2020 3308 IExplorer.exe IExplorer.exe PID 4812 wrote to memory of 3680 4812 Tiwi.exe IExplorer.exe PID 4812 wrote to memory of 3680 4812 Tiwi.exe IExplorer.exe PID 4812 wrote to memory of 3680 4812 Tiwi.exe IExplorer.exe PID 3308 wrote to memory of 3352 3308 IExplorer.exe winlogon.exe PID 3308 wrote to memory of 3352 3308 IExplorer.exe winlogon.exe PID 3308 wrote to memory of 3352 3308 IExplorer.exe winlogon.exe PID 3308 wrote to memory of 4444 3308 IExplorer.exe imoet.exe PID 3308 wrote to memory of 4444 3308 IExplorer.exe imoet.exe PID 3308 wrote to memory of 4444 3308 IExplorer.exe imoet.exe PID 4812 wrote to memory of 4816 4812 Tiwi.exe winlogon.exe PID 4812 wrote to memory of 4816 4812 Tiwi.exe winlogon.exe PID 4812 wrote to memory of 4816 4812 Tiwi.exe winlogon.exe PID 4048 wrote to memory of 5100 4048 winlogon.exe Tiwi.exe PID 4048 wrote to memory of 5100 4048 winlogon.exe Tiwi.exe PID 4048 wrote to memory of 5100 4048 winlogon.exe Tiwi.exe PID 3308 wrote to memory of 4596 3308 IExplorer.exe cute.exe PID 3308 wrote to memory of 4596 3308 IExplorer.exe cute.exe PID 3308 wrote to memory of 4596 3308 IExplorer.exe cute.exe PID 4048 wrote to memory of 4508 4048 winlogon.exe IExplorer.exe PID 4048 wrote to memory of 4508 4048 winlogon.exe IExplorer.exe PID 4048 wrote to memory of 4508 4048 winlogon.exe IExplorer.exe PID 4812 wrote to memory of 1692 4812 Tiwi.exe imoet.exe PID 4812 wrote to memory of 1692 4812 Tiwi.exe imoet.exe PID 4812 wrote to memory of 1692 4812 Tiwi.exe imoet.exe PID 4148 wrote to memory of 4272 4148 imoet.exe Tiwi.exe PID 4148 wrote to memory of 4272 4148 imoet.exe Tiwi.exe PID 4148 wrote to memory of 4272 4148 imoet.exe Tiwi.exe PID 4048 wrote to memory of 4660 4048 winlogon.exe winlogon.exe PID 4048 wrote to memory of 4660 4048 winlogon.exe winlogon.exe PID 4048 wrote to memory of 4660 4048 winlogon.exe winlogon.exe PID 2564 wrote to memory of 4888 2564 cute.exe Tiwi.exe PID 2564 wrote to memory of 4888 2564 cute.exe Tiwi.exe PID 2564 wrote to memory of 4888 2564 cute.exe Tiwi.exe PID 4148 wrote to memory of 1600 4148 imoet.exe IExplorer.exe PID 4148 wrote to memory of 1600 4148 imoet.exe IExplorer.exe PID 4148 wrote to memory of 1600 4148 imoet.exe IExplorer.exe PID 4812 wrote to memory of 3252 4812 Tiwi.exe cute.exe PID 4812 wrote to memory of 3252 4812 Tiwi.exe cute.exe PID 4812 wrote to memory of 3252 4812 Tiwi.exe cute.exe PID 4048 wrote to memory of 4032 4048 winlogon.exe imoet.exe -
System policy modification 1 TTPs 12 IoCs
Processes:
cute.exe9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exeIExplorer.exewinlogon.exeimoet.exeTiwi.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" 9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System imoet.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe"C:\Users\Admin\AppData\Local\Temp\9a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4684 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4812 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3076 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:3680 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4816 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1692 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3252 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3308 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:732 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2020 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3352 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4444 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4596 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4048 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:5100 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4508 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4660 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4032 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3796 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4148 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4272 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2652 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1720 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2388 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2564 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4888 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2444 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1812 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4364
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD522c9e9d0c712429e5087305388156d60
SHA154ad610f0fcfe24b575e8c591c7c0d7545a101d0
SHA2563ad348f5603210e0203469af0241b697cb4390827e41033da44186712a0d7d6b
SHA512a8b87e93e4d7f6a0271d1edb79d4063329f3cd19d4d69bcab8dd218c3a8ac3c5d688ae0622b567aac68cd585892cb5cbebbc5cdb80b4e18bb185d86bda27818b
-
Filesize
91KB
MD5cfb6e95310cf5fff1f0d8a69897cd225
SHA11b8fa9e03ac4097be896e97a4c027c54932c1d91
SHA25669148b05932dc12077329d110b61f4c297340801787692905b978d9231e47181
SHA512af225a1902b0ebd6579cc1dee16195e6e2af9a24cf790de572ffc2fbecc3677d35395f8b6f25f540c1bcbdf13548a1ba2d324056614ea28af8be808763fbaadf
-
Filesize
91KB
MD5304fcb4ec1b72fe15fad845b16efe94f
SHA1244afa4e978ba0fb8e7a5f53a5163be4a14b4712
SHA25695e83cf11ba4beb7b7cd63988d1d9ff51277eb881e6bfd8e58f3aae430c4787d
SHA5123ab9896d584c041256738f10aafa6b475be03c0cae799e8748635b977da1897b49fdd0137d646c1edd298e08524d833b3c334ddb087bead514377382ac631e18
-
Filesize
45KB
MD507fe7c18a57b3708721fea1b825877dc
SHA1087d641aa76a3a93a2df2e76cd326388c77393cc
SHA256a075a46fb8e8d8777d2a13bcf26112303413ddd3db923fe2b19e906ef7a3bc6a
SHA5128a028089efc620160c3af54f06906523d3b33a5703cf2ac1f253235471b65e85ae69850db7725d2763363441dbd6db3189660450a32f436f6dfe552afcb074ac
-
Filesize
45KB
MD5f574a8a09c503e23400adf1417e5854d
SHA14f8215a79245ce0fe53801fed2547d2b1169ccc0
SHA25678bd2908b90297a8b527e1b6b8aae555b82f0ea8122b669e74add03f726730d5
SHA5124d2fd3f05846bfe8c2c7da689c3618aa980c84117f7c3e9b5e5d6b39ff7cc42ea5de17455d16611599839a340d149e5a9297f94df78db3f21702c4cf570c080d
-
Filesize
45KB
MD53239f362579bb289f9ec6e88565c5dea
SHA1ef9b403e43c32f576c08bc66282f19af79d0f915
SHA2562db448eb47a09575c720446af1b7c32d8febba04bc325bfde1099c95afe105a8
SHA51280ff3da45320b8f92b86b5a66a73308e9a549eb83c154fc5cf04aa4404adb2eaa1c75fe019fa7e55b575440ee0491cb018e222d6d6475ba13c9c4efab057d5c7
-
Filesize
91KB
MD5aad8845179757b29951022eebdc5b80a
SHA155a713afce95ffe87cc3621324939fec9cfceeaa
SHA256fa16aacba7674ef189338023d021170e1da87084e303157df566afa2bf581bc7
SHA512390c97c12ad3e3c6b3bb155c6d4490c55bd9498d008d7cda8884fd164ea61869bfcc148bb1062e3d03902a4c0509d76d6afbcd6dd7e9b180e7d8f596cb34a02d
-
Filesize
91KB
MD5465c148c6ffccb4c8e2bbbc24d0be1e6
SHA13e43e6eecdd04f6117cc997ae48ab620654efc25
SHA25649b7ba3b8b82cf1afb77cdc3afa6f1c129cf02fc0fe68d0b1447bc197b2efc2c
SHA512e4db3f56a0e491fd638713e9ff8550ace80c41cf4dc69373c94202b1d239fe18b15e5fbd46ecc5b857f15f5f0672997d2447abc1d76ba1377166d329c3b59813
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
91KB
MD5fde38c3307e639ea70e7a21e5b64baa6
SHA14431219fac7860b3d906e09bffd5e498df94cd24
SHA256a2e50e3001a0898424ddda7f617f6d96499902d8e5a2645e7ada04e78256d7c5
SHA512ce1ad1cfe5327767ef597a7b2881aef506643da9c60dc6772ccb3dfeb55cb33922c791ce9af631efba0ba50103e5605ac83686b8febaf78dd49499bc85125a53
-
Filesize
91KB
MD5558de64b744c838c5ab5adb2a1d49b9c
SHA1c8068cbb0dd8a26f6c961629cbbe3f04e79489b7
SHA2560eb7405295b7ebb7ca8b9297bf3e7ec5d61277636077e80544e49958549d3b4e
SHA512f2ed67a2fb65a72ea4a5fb30ecc63611c1fc904a77c1315bbc3469d64be1432e28368011e6d684a9cccda3e15739024d92f60a7f020c24b25cb678c181043bbe
-
Filesize
91KB
MD581ad313c4dcdfdd835fdf72d2a59dc6b
SHA1e96ed85d61bbe0f2790f5f2129c2896119f68115
SHA256525e1c9337f7f78a50e595ed73f959bb19125a8fb3af261f9e0bbe9d61bcb1b4
SHA512bf70710babbdacd73901d967c16fdbd652ae28048199439e0c59a96bf7c2bcefeed458ba524fab5c1852ae59cac60a7ba286c0c6e3b90684d125a067c1ad0eb2
-
Filesize
91KB
MD5135d0ebbf96e554be3f9f2eea1a2528e
SHA1a1305d1e7c8f7e814fe0c4bfbacc46f53bc86446
SHA256f15901a66883c6cd9e7d873fbac1e1e16c027189b503bd67fcbaf182cd0e806b
SHA512c3d56bff44db84aacad8708ea758752d809a6abd594043f89ee6fcb2c3066cb441e813cc612f2c988626cfdc70c5619a0d9d8bac779efc5a60310b51f2b373ef
-
Filesize
91KB
MD502298bc71b17e3cc682468a9e5c9789d
SHA1ff10519760f8a8ca6b4604c47aefb2fe67f4efde
SHA2569a77a96195039c211b22e821183f47a501f3deb402b5c03b744f738150a5626e
SHA51215d5cd9c9d154932a9adc98357f2f0b9fdd15e807a9544c68d312b183b5dcd9fef08436f8422d855be33bd3a538e0f126fdaaf5d14902697bd1c906cb0a84169
-
Filesize
91KB
MD583bb8dda6192272b1dcb80a2ebd98f6b
SHA1af96737beb42a9439b9ecb1e44cbf233a60d435e
SHA256a9cbafd3883a64d6aade8c0b109c64a4faaf30329c20fa09c0f2f031bf1952c1
SHA512a1f2c42728d0c40a5b827a06ed31709029cb51b5a1ebca251d4c730ed4115dde7ac5b4f446c81aa9279d4d83878f6787f1e3f42d0c565de949738dd357db506f
-
Filesize
91KB
MD565ca024e006368b61ba66cbbacddd87c
SHA1b38ad6130a29c724f2bf019ce0315abef15f0ac1
SHA25646c607a15268aacd0b9423bef394b9f9d470030c691390725eceeab90187f3e3
SHA5125d7a607f2848aeb8b0bb91d833880fadeb976bffcfad9dd0e784190ab153db9a1d26b939eb8de3b20b679599c85eec822a443e3fb99abb2a0bdb1c7f17d3cb88
-
Filesize
91KB
MD57d372a09269655569a2fdc50ced0a618
SHA11fcd84a2f57bad118ede49087f52a43aa47cd91c
SHA256d64c4d6814909d8f42f5eb47e96a21320889592370c4f99c3882471402f83f52
SHA51217f4f29123761b36a8b473fc19f60377004b3008f8d333d1e397a282e2a7cca1a3986c1fb67fbfda8347ea7fa376cefb10e8f4aecb1e0c93748f7ed4fa94291e
-
Filesize
729B
MD58e3c734e8dd87d639fb51500d42694b5
SHA1f76371d31eed9663e9a4fd7cb95f54dcfc51f87f
SHA256574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad
SHA51206ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853
-
Filesize
91KB
MD59ee79b7c11d491f8175349dd70d794c0
SHA12297d9633f0be2881b007eeb607828e5bc346e4f
SHA2567c2a0f844979427591da3c4443ac8537e9bee9055fd81a193774005bf61c361a
SHA51248ce9537e1aee50d0f5dc23fef107d245aa317e879b22f5c79f5f7b930a71f3f4dd9c05bd7431f9fab577bb478ca9d31d1f7f7899001e15d89b9892dd5853323
-
Filesize
91KB
MD57d0fc0e8dce328ff451025c1f29de9af
SHA17fd9ca0b73a807c9a7d10c00aa5484a44c7a8a8e
SHA256184494029b6f835e3e0a02d796a88b9173d2163b62e9ff67e20c086c2d73b3c8
SHA512ce4a7669c0b17627955004ff0b1221e9ace939a2b654a8ce9812b75df668be34cdc2a240210f2e9fcde6cf0338a670624bd84113da23e4ac42a0b3bb7479c8f6
-
Filesize
91KB
MD5d95c03ebd3c6eab53bf07f044ec29796
SHA19cbcd225e05ddd0bdc3710bb54535ba2a795693a
SHA25627e9eab9466ad96fc03baed90f34e3ef297efdb63e72b1d64bab75ae54379d87
SHA512f1becef49caaf1559cd70c6bedaf30006f9a5c60c2c505f95352f3dd7f6d68c1964b77c43fe083d0dcf13b10ff5c7674a6e09f691ee86163e02ba7e0d3e3498e
-
Filesize
39B
MD5415c421ba7ae46e77bdee3a681ecc156
SHA1b0db5782b7688716d6fc83f7e650ffe1143201b7
SHA256e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e
SHA512dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62