Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 04:01
Static task
static1
Behavioral task
behavioral1
Sample
ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe
Resource
win10v2004-20240611-en
General
-
Target
ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe
-
Size
488KB
-
MD5
72cfc8e8e51dc82384b5f9de57bdf6fc
-
SHA1
b2128b6541ea08de013602a1a7b86ef0f098939d
-
SHA256
ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8
-
SHA512
3c70409e7f9b7f8d82b4ce4b51a8313a277d68fb0ea77177f3514b06d85610b891bad80bf9c80d787a558f27e7d088484d2bfcb6f898a9a1b0467f8b50dd069c
-
SSDEEP
12288:V/Mt/MP/Mx/M7/Mx/M4/MpBE/Mk/M2/M1:VaK2O2HIBEd7M
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" cute.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cute.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Tiwi.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 35 IoCs
pid Process 1072 Tiwi.exe 1216 IExplorer.exe 300 Tiwi.exe 2200 IExplorer.exe 1656 Tiwi.exe 2964 IExplorer.exe 2064 winlogon.exe 2464 Tiwi.exe 1520 IExplorer.exe 1756 winlogon.exe 872 winlogon.exe 1860 imoet.exe 688 imoet.exe 604 imoet.exe 1588 cute.exe 1676 cute.exe 2948 cute.exe 2156 Tiwi.exe 2952 winlogon.exe 2620 IExplorer.exe 2920 Tiwi.exe 2688 imoet.exe 2560 winlogon.exe 2632 Tiwi.exe 2312 IExplorer.exe 2756 imoet.exe 2896 cute.exe 2900 IExplorer.exe 2928 winlogon.exe 3016 winlogon.exe 2848 cute.exe 1980 imoet.exe 1912 imoet.exe 2016 cute.exe 2244 cute.exe -
Loads dropped DLL 53 IoCs
pid Process 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 1072 Tiwi.exe 1072 Tiwi.exe 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 1072 Tiwi.exe 1216 IExplorer.exe 1216 IExplorer.exe 1072 Tiwi.exe 1216 IExplorer.exe 1216 IExplorer.exe 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 1072 Tiwi.exe 1072 Tiwi.exe 1216 IExplorer.exe 1216 IExplorer.exe 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 1072 Tiwi.exe 1072 Tiwi.exe 1216 IExplorer.exe 1216 IExplorer.exe 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 2064 winlogon.exe 2064 winlogon.exe 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 2064 winlogon.exe 1860 imoet.exe 1860 imoet.exe 2064 winlogon.exe 2064 winlogon.exe 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 1588 cute.exe 1588 cute.exe 1860 imoet.exe 1860 imoet.exe 1588 cute.exe 1588 cute.exe 2064 winlogon.exe 2064 winlogon.exe 1588 cute.exe 1588 cute.exe 1860 imoet.exe 1588 cute.exe 1860 imoet.exe 1860 imoet.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe -
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" cute.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: imoet.exe File opened (read-only) \??\L: Tiwi.exe File opened (read-only) \??\I: ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File opened (read-only) \??\M: winlogon.exe File opened (read-only) \??\M: cute.exe File opened (read-only) \??\B: winlogon.exe File opened (read-only) \??\P: imoet.exe File opened (read-only) \??\Q: imoet.exe File opened (read-only) \??\W: imoet.exe File opened (read-only) \??\V: Tiwi.exe File opened (read-only) \??\Z: ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File opened (read-only) \??\J: cute.exe File opened (read-only) \??\R: imoet.exe File opened (read-only) \??\N: winlogon.exe File opened (read-only) \??\K: cute.exe File opened (read-only) \??\I: imoet.exe File opened (read-only) \??\N: imoet.exe File opened (read-only) \??\B: Tiwi.exe File opened (read-only) \??\O: IExplorer.exe File opened (read-only) \??\Z: IExplorer.exe File opened (read-only) \??\G: winlogon.exe File opened (read-only) \??\S: imoet.exe File opened (read-only) \??\H: ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File opened (read-only) \??\V: IExplorer.exe File opened (read-only) \??\Y: winlogon.exe File opened (read-only) \??\N: cute.exe File opened (read-only) \??\E: ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File opened (read-only) \??\N: ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File opened (read-only) \??\Q: ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File opened (read-only) \??\I: IExplorer.exe File opened (read-only) \??\Q: IExplorer.exe File opened (read-only) \??\H: imoet.exe File opened (read-only) \??\Q: winlogon.exe File opened (read-only) \??\S: winlogon.exe File opened (read-only) \??\X: cute.exe File opened (read-only) \??\G: imoet.exe File opened (read-only) \??\M: Tiwi.exe File opened (read-only) \??\S: ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File opened (read-only) \??\W: ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File opened (read-only) \??\M: IExplorer.exe File opened (read-only) \??\V: imoet.exe File opened (read-only) \??\X: Tiwi.exe File opened (read-only) \??\X: ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File opened (read-only) \??\W: winlogon.exe File opened (read-only) \??\J: ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File opened (read-only) \??\U: ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File opened (read-only) \??\W: cute.exe File opened (read-only) \??\K: imoet.exe File opened (read-only) \??\G: IExplorer.exe File opened (read-only) \??\W: IExplorer.exe File opened (read-only) \??\I: winlogon.exe File opened (read-only) \??\T: winlogon.exe File opened (read-only) \??\R: IExplorer.exe File opened (read-only) \??\V: winlogon.exe File opened (read-only) \??\X: winlogon.exe File opened (read-only) \??\B: cute.exe File opened (read-only) \??\P: IExplorer.exe File opened (read-only) \??\I: cute.exe File opened (read-only) \??\O: ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File opened (read-only) \??\Y: ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File opened (read-only) \??\L: IExplorer.exe File opened (read-only) \??\N: IExplorer.exe File opened (read-only) \??\H: winlogon.exe File opened (read-only) \??\O: winlogon.exe -
Modifies WinLogon 2 TTPs 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" winlogon.exe -
Drops autorun.inf file 1 TTPs 8 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File created F:\autorun.inf ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File opened for modification F:\autorun.inf ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File created F:\autorun.inf Tiwi.exe File opened for modification F:\autorun.inf Tiwi.exe File created C:\autorun.inf Tiwi.exe File opened for modification C:\autorun.inf Tiwi.exe File created C:\autorun.inf ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe -
Drops file in System32 directory 40 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr winlogon.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\shell.exe imoet.exe File opened for modification C:\Windows\SysWOW64\shell.exe ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe imoet.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe cute.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe cute.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe cute.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe winlogon.exe File created C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File created C:\Windows\SysWOW64\tiwi.scr ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\shell.exe ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File created C:\Windows\SysWOW64\IExplorer.exe ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe imoet.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr cute.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr imoet.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr Tiwi.exe -
Drops file in Windows directory 26 IoCs
description ioc Process File created C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\tiwi.exe cute.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File created C:\Windows\tiwi.exe Tiwi.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe winlogon.exe File opened for modification C:\Windows\tiwi.exe IExplorer.exe File opened for modification C:\Windows\tiwi.exe imoet.exe File created C:\Windows\tiwi.exe imoet.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe cute.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe Tiwi.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 54 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Mouse\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Mouse\SwapMouseButtons = "1" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\International\s2359 = "Tiwi" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\International\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\International\s1159 = "Tiwi" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Mouse\SwapMouseButtons = "1" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\International\s2359 = "Tiwi" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\ winlogon.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Mouse\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\International\s1159 = "Tiwi" cute.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Mouse\ ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\International\ imoet.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\International\ cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Mouse\SwapMouseButtons = "1" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\International\ winlogon.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\International\s2359 = "Tiwi" imoet.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Mouse\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\International\s1159 = "Tiwi" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Mouse\ Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\International\s2359 = "Tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\International\s1159 = "Tiwi" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\International\s1159 = "Tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\International\s2359 = "Tiwi" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Mouse\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\International\ ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\International\ Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Mouse\SwapMouseButtons = "1" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\ cute.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\ ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\International\s1159 = "Tiwi" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Mouse\SwapMouseButtons = "1" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Mouse\SwapMouseButtons = "1" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\International\s2359 = "Tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" Tiwi.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" cute.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" imoet.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\ imoet.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\ ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." winlogon.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\ IExplorer.exe -
Modifies Internet Explorer start page 1 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" cute.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 1072 Tiwi.exe 1860 imoet.exe 2064 winlogon.exe 1216 IExplorer.exe 1588 cute.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
pid Process 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 1072 Tiwi.exe 1216 IExplorer.exe 300 Tiwi.exe 2200 IExplorer.exe 1656 Tiwi.exe 2964 IExplorer.exe 2464 Tiwi.exe 2064 winlogon.exe 1520 IExplorer.exe 1756 winlogon.exe 872 winlogon.exe 1860 imoet.exe 688 imoet.exe 604 imoet.exe 1588 cute.exe 1676 cute.exe 2948 cute.exe 2156 Tiwi.exe 2952 winlogon.exe 2620 IExplorer.exe 2920 Tiwi.exe 2560 winlogon.exe 2688 imoet.exe 2632 Tiwi.exe 2312 IExplorer.exe 2756 imoet.exe 2900 IExplorer.exe 2896 cute.exe 3016 winlogon.exe 2928 winlogon.exe 2848 cute.exe 1912 imoet.exe 2016 cute.exe 1980 imoet.exe 2244 cute.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2924 wrote to memory of 1072 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 28 PID 2924 wrote to memory of 1072 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 28 PID 2924 wrote to memory of 1072 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 28 PID 2924 wrote to memory of 1072 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 28 PID 2924 wrote to memory of 1216 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 29 PID 2924 wrote to memory of 1216 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 29 PID 2924 wrote to memory of 1216 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 29 PID 2924 wrote to memory of 1216 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 29 PID 2924 wrote to memory of 300 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 30 PID 2924 wrote to memory of 300 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 30 PID 2924 wrote to memory of 300 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 30 PID 2924 wrote to memory of 300 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 30 PID 2924 wrote to memory of 2200 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 32 PID 2924 wrote to memory of 2200 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 32 PID 2924 wrote to memory of 2200 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 32 PID 2924 wrote to memory of 2200 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 32 PID 1072 wrote to memory of 1656 1072 Tiwi.exe 31 PID 1072 wrote to memory of 1656 1072 Tiwi.exe 31 PID 1072 wrote to memory of 1656 1072 Tiwi.exe 31 PID 1072 wrote to memory of 1656 1072 Tiwi.exe 31 PID 1072 wrote to memory of 2964 1072 Tiwi.exe 33 PID 1072 wrote to memory of 2964 1072 Tiwi.exe 33 PID 1072 wrote to memory of 2964 1072 Tiwi.exe 33 PID 1072 wrote to memory of 2964 1072 Tiwi.exe 33 PID 2924 wrote to memory of 2064 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 34 PID 2924 wrote to memory of 2064 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 34 PID 2924 wrote to memory of 2064 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 34 PID 2924 wrote to memory of 2064 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 34 PID 1216 wrote to memory of 2464 1216 IExplorer.exe 35 PID 1216 wrote to memory of 2464 1216 IExplorer.exe 35 PID 1216 wrote to memory of 2464 1216 IExplorer.exe 35 PID 1216 wrote to memory of 2464 1216 IExplorer.exe 35 PID 1216 wrote to memory of 1520 1216 IExplorer.exe 37 PID 1216 wrote to memory of 1520 1216 IExplorer.exe 37 PID 1216 wrote to memory of 1520 1216 IExplorer.exe 37 PID 1216 wrote to memory of 1520 1216 IExplorer.exe 37 PID 1072 wrote to memory of 1756 1072 Tiwi.exe 36 PID 1072 wrote to memory of 1756 1072 Tiwi.exe 36 PID 1072 wrote to memory of 1756 1072 Tiwi.exe 36 PID 1072 wrote to memory of 1756 1072 Tiwi.exe 36 PID 1216 wrote to memory of 872 1216 IExplorer.exe 38 PID 1216 wrote to memory of 872 1216 IExplorer.exe 38 PID 1216 wrote to memory of 872 1216 IExplorer.exe 38 PID 1216 wrote to memory of 872 1216 IExplorer.exe 38 PID 2924 wrote to memory of 1860 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 39 PID 2924 wrote to memory of 1860 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 39 PID 2924 wrote to memory of 1860 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 39 PID 2924 wrote to memory of 1860 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 39 PID 1072 wrote to memory of 688 1072 Tiwi.exe 40 PID 1072 wrote to memory of 688 1072 Tiwi.exe 40 PID 1072 wrote to memory of 688 1072 Tiwi.exe 40 PID 1072 wrote to memory of 688 1072 Tiwi.exe 40 PID 1216 wrote to memory of 604 1216 IExplorer.exe 41 PID 1216 wrote to memory of 604 1216 IExplorer.exe 41 PID 1216 wrote to memory of 604 1216 IExplorer.exe 41 PID 1216 wrote to memory of 604 1216 IExplorer.exe 41 PID 2924 wrote to memory of 1676 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 42 PID 2924 wrote to memory of 1676 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 42 PID 2924 wrote to memory of 1676 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 42 PID 2924 wrote to memory of 1676 2924 ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe 42 PID 1072 wrote to memory of 1588 1072 Tiwi.exe 43 PID 1072 wrote to memory of 1588 1072 Tiwi.exe 43 PID 1072 wrote to memory of 1588 1072 Tiwi.exe 43 PID 1072 wrote to memory of 1588 1072 Tiwi.exe 43 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe"C:\Users\Admin\AppData\Local\Temp\ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2924 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1072 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1656
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2964
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1756
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:688
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1588 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2632
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3016
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1912
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2016
-
-
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1216 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2464
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1520
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:872
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:604
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2948
-
-
-
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:300
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2200
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2064 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2156
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2620
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2560
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2848
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1860 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2920
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2312
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2928
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1980
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2244
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1676
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2952
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5c61f12be600e3dbe8af53c46ef928704
SHA113638752aa1ea8f1378d2aaabb5cbb7bc49f4c88
SHA256d1170612f5bd905c73fe6f64402329b298ab115705de95b52625f88b4c58ad67
SHA512b2675ec53d1cb09172b064ea3dead648249d4ed50d60cecd5fb1a465e4d70f0272c3b6bd6b72bc1c34254ef6ced322c0d8dcf50f67e100f99da76e1663c0837c
-
Filesize
488KB
MD561badce13726f3323f89dbc3ea4c4a26
SHA14d643f687c05e866ff4405fc9af6878e47ec5b67
SHA256dd9d2e627b103db034d037a8d2e6d12e9b5cf1fcdbfa6a5ab3a92fd1ed360392
SHA51251e166c6468c81cfe1824cf6fce593f979cdd1b54c51651ab9af57641305b623ef1cfa6af84ae489ce528bacf784cd1632523d6087a4f52ca1719a1258316020
-
Filesize
488KB
MD5c3051cb76c45f668b9243b075c3150a2
SHA1bb46683fcf227ce28c7ef24d1a266a8e997bea62
SHA2566089f5ea75b404170ad527a1486badf3735ce41edb04eaef378861fea50e288b
SHA5121bb0cc1856d7fe9cc09be21f14c4305f6cc3b8726477a2f32d354b08f1f66d31b654247228227d4c8cf8b974b0278aa78af9b657ce19f98280786cd49bcb2201
-
Filesize
488KB
MD5e5622aab81dad06dba31c68e966d2acc
SHA1378bc77a7f54c12c9fffcf7e4c5896a1c9526a1c
SHA2568bcb8e1d96553effcb3ce7903aebadcb92198b8ed59d339d4c7fa963f95dd770
SHA51256c4d4362803162ad4d2ed7f109b3201fab0dd3c27eb018ee2c174ea6b50012496cbd248b84cc8fbcf28ff131b8d5ac4eaca53bed1cbf875482c4bdac08f52d3
-
Filesize
488KB
MD503cee96ce07174bf81f38d9f8216f6d7
SHA12305778f1464850e3c995aabf5ba4cf3f1718bd3
SHA256f492a018da8113f4d5613d38c7891ef66f3ea501cd247d441627a6dadd3411c3
SHA512fdcd27b263eba98e53352199f4070583812b2d53c37451d1d6755076bbdc3eff18ff91122fed7afb101b4896b313e005999b62659809e78bacdfcae516f58df7
-
Filesize
45KB
MD525b077f4438a3d1875e6f9302b5fd85e
SHA1d92f492dab385871b860f7cbe9e76a7cfe04e93b
SHA25603d5d0ef1395a1c3afc1654d7368a92dfea5fe5ff4d0a0792f2e7da044572247
SHA5123718935be497598039d7a8a371584bd12e497b6ea378f297b0a944b943bc2e6668b98514b0350d0f49296a912f3810d545511f164c47778442e43112c273348e
-
Filesize
45KB
MD52fde878f2e74049e94485cdf75bec019
SHA164d2265df9ef9540a01f303b7f56f4e71baf630b
SHA25675c59f24051e2bb90e7b50e61983fa40159c534c260b21387231762658160707
SHA512c751f6c2145376400ce46aade93e186c25c55037d83e6fe2e1effae02cb55b03b96e71afe27734f4c6fcd72f4098d4ee4f283c8f889829f8a7c10f274d69beb4
-
Filesize
488KB
MD5ccde744f9695d41994c212ca4c1fac56
SHA1e09e18b9e0fefd47b1b976948101d5e3ececd4a2
SHA2561bc20b21845a6c9262a0cd20d19dd69252d70243bdee442b5020b5c3515d435c
SHA512b2a42d44eb87482de94209bb01cb03791bb20b9eb25d015cecb65db6689004259a8fb8d5a6a017904cf2a5fb44d35ad64fe47e24e11648325ef77eb8df77122f
-
Filesize
488KB
MD5bce578e7233583d1c7ce5ce1715662cc
SHA19866ccd0fb8d42fc3bbf0acfe04363778d8af41f
SHA256156ed478cc35d2f5ff756c76d498a262de273d20b8d58c61b4b8ed554f358870
SHA512d1a283bd48b7e66e5d167137c8b88f8e3536a9703a7475be689e002fa161bc21eaabc79a0ebdc3268cdfd0c4b563b08783bb1afef9aa85fcb74cd1045168e37a
-
Filesize
488KB
MD5cbfaf07d9286f8f4c65f17ea6d0d1264
SHA184ca22f4fdd2a46a65ef2a5bd6f249b13dd2bf5b
SHA25641be1d2e191c3ce8682da169cc227f2a722f3ca9a93d86891c8349e036f58996
SHA51296c79c1605e9a32776fc7bc750b6f9135b0f3ae49837dd9d9688e8b14e9d9548594e7ece87c2b45815a946b8a05be8953628e084f306bf94e9996bcab7eed0c8
-
Filesize
488KB
MD54146b02ba51565a36767e1649e1c1aa2
SHA109f68adbc15c65031095dc5f9d1619168f6c6def
SHA2566dc9a1499e7d7d4d948370583b90799512b074cd4cf46c2f2a4694be1a81bbe4
SHA512b240af85c8667620c96cfe1595fdd128cfb74bb2c9444bef7f118285c3c585d7023b0257b7f293b7e9b77b73e94cab963f4a32292aabacabd5d03366e250a5f5
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
488KB
MD599c7e01be2a35b34989e3e36490f8d4e
SHA1bd700709f4f33e1b88ec6e223190d1a28a8360ed
SHA2562115307acff748cf656190af1f13014d4087281d472dd033b231c1c052cae821
SHA5129bfc964007162fce0ca880dbcf7655e62badd28288fbc9fef234f48644b86d19462d2aad5d581fe586f5d6495921b6a5c3a789063ef8bd7ac055bd02513c459d
-
Filesize
488KB
MD572cfc8e8e51dc82384b5f9de57bdf6fc
SHA1b2128b6541ea08de013602a1a7b86ef0f098939d
SHA256ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8
SHA5123c70409e7f9b7f8d82b4ce4b51a8313a277d68fb0ea77177f3514b06d85610b891bad80bf9c80d787a558f27e7d088484d2bfcb6f898a9a1b0467f8b50dd069c
-
Filesize
488KB
MD5d8786961bcaeb5341b4d682528ac4cd9
SHA1d1be501f8a497a3368ce6fd76f56ffbbd1584e3e
SHA2563378c1483e70f5852d3a2f78e99cc2cd9e900addb7f87b594c56312ce15fb6a6
SHA512685a3d0a60a2ae15e1f0f36058cc76317187b3cf2aaace40d3795d91d24a88902acfe313469209c6a967a401853a419728f04480f48fe4a278a8a43d06e7f5ef
-
Filesize
488KB
MD5c629a7653d5973a0dd5a21a8a6fae0f4
SHA1defc360f5a08a02ca8ea6983f1b0e21f248c6082
SHA2561505a52ea0276c434e7fd825cb071d245947c16244bdcaef8868678146573e70
SHA5126afd2856c0649960299f84aa886a35ed66540f47f7d86069294ae886efe5e137045d4f9a513f1c6f2c3b13ef6601bf0f32ad584b10d361608184b111d3dcfba3
-
Filesize
488KB
MD5e8adf497adc725a030cc4de7301d8158
SHA15cbe2029b8f7db9d67c12bb6900366e9779882d4
SHA25680bf314068ec8a6885c6ecdf33c6fbc986d5fbbe505cc21891199e68fd52992e
SHA512f1a7e705d12378c2b3dfc40e0a4ee09ca8093bb57acd14afd6c8e15bcdfe105de6cc41db040f74a47676002b6c3267570c2fbe8eae859d05f9803be51cd954a9
-
Filesize
729B
MD58e3c734e8dd87d639fb51500d42694b5
SHA1f76371d31eed9663e9a4fd7cb95f54dcfc51f87f
SHA256574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad
SHA51206ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853
-
Filesize
488KB
MD59ac58ae20aacb956f207e0bd998f32ac
SHA16b0ff833e22d3a3950fae0d7c72d49f345dfe893
SHA2563fa850f447cf89504af37e8bfb86d45d679471cfa402c8a0a1275732fcb611b7
SHA512381ef945538f92a3965d83d803e1d393b33ec54eed9631875ae8ce1f8e2b56283eb555b5ce8f351cc0a96c522e65fec34288192a967bf876b29d520c2e8986f3
-
Filesize
39B
MD5415c421ba7ae46e77bdee3a681ecc156
SHA1b0db5782b7688716d6fc83f7e650ffe1143201b7
SHA256e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e
SHA512dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62
-
Filesize
488KB
MD57d0b171ecddc1cd89960247d03f796d4
SHA11097d051e591265fff52ba5be0e8a53c8e20a124
SHA256b74649886273bf77013d8719964763880af1f560c7ebb4fdcf06938f696a2203
SHA5124af89d904b1c1b349a13edb941dfb0363df1a1deb6b536f3243135cc80d4f37470ea523a64ef79b51ad4d8d736ba8dc0b3f9b5d181ea7d9f96248c622707e621