Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2024, 04:01

General

  • Target

    ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe

  • Size

    488KB

  • MD5

    72cfc8e8e51dc82384b5f9de57bdf6fc

  • SHA1

    b2128b6541ea08de013602a1a7b86ef0f098939d

  • SHA256

    ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8

  • SHA512

    3c70409e7f9b7f8d82b4ce4b51a8313a277d68fb0ea77177f3514b06d85610b891bad80bf9c80d787a558f27e7d088484d2bfcb6f898a9a1b0467f8b50dd069c

  • SSDEEP

    12288:V/Mt/MP/Mx/M7/Mx/M4/MpBE/Mk/M2/M1:VaK2O2HIBEd7M

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 53 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 8 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe
    "C:\Users\Admin\AppData\Local\Temp\ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2924
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1072
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1656
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:2964
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1756
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:688
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:1588
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2632
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          PID:2900
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:3016
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1912
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2016
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1216
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2464
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:1520
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:872
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:604
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2948
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:300
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      PID:2200
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2064
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2156
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:2620
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2560
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2756
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2848
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:1860
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2920
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:2312
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2928
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1980
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2244
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1676
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2952
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2688
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    c61f12be600e3dbe8af53c46ef928704

    SHA1

    13638752aa1ea8f1378d2aaabb5cbb7bc49f4c88

    SHA256

    d1170612f5bd905c73fe6f64402329b298ab115705de95b52625f88b4c58ad67

    SHA512

    b2675ec53d1cb09172b064ea3dead648249d4ed50d60cecd5fb1a465e4d70f0272c3b6bd6b72bc1c34254ef6ced322c0d8dcf50f67e100f99da76e1663c0837c

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    61badce13726f3323f89dbc3ea4c4a26

    SHA1

    4d643f687c05e866ff4405fc9af6878e47ec5b67

    SHA256

    dd9d2e627b103db034d037a8d2e6d12e9b5cf1fcdbfa6a5ab3a92fd1ed360392

    SHA512

    51e166c6468c81cfe1824cf6fce593f979cdd1b54c51651ab9af57641305b623ef1cfa6af84ae489ce528bacf784cd1632523d6087a4f52ca1719a1258316020

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    c3051cb76c45f668b9243b075c3150a2

    SHA1

    bb46683fcf227ce28c7ef24d1a266a8e997bea62

    SHA256

    6089f5ea75b404170ad527a1486badf3735ce41edb04eaef378861fea50e288b

    SHA512

    1bb0cc1856d7fe9cc09be21f14c4305f6cc3b8726477a2f32d354b08f1f66d31b654247228227d4c8cf8b974b0278aa78af9b657ce19f98280786cd49bcb2201

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    e5622aab81dad06dba31c68e966d2acc

    SHA1

    378bc77a7f54c12c9fffcf7e4c5896a1c9526a1c

    SHA256

    8bcb8e1d96553effcb3ce7903aebadcb92198b8ed59d339d4c7fa963f95dd770

    SHA512

    56c4d4362803162ad4d2ed7f109b3201fab0dd3c27eb018ee2c174ea6b50012496cbd248b84cc8fbcf28ff131b8d5ac4eaca53bed1cbf875482c4bdac08f52d3

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    03cee96ce07174bf81f38d9f8216f6d7

    SHA1

    2305778f1464850e3c995aabf5ba4cf3f1718bd3

    SHA256

    f492a018da8113f4d5613d38c7891ef66f3ea501cd247d441627a6dadd3411c3

    SHA512

    fdcd27b263eba98e53352199f4070583812b2d53c37451d1d6755076bbdc3eff18ff91122fed7afb101b4896b313e005999b62659809e78bacdfcae516f58df7

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    25b077f4438a3d1875e6f9302b5fd85e

    SHA1

    d92f492dab385871b860f7cbe9e76a7cfe04e93b

    SHA256

    03d5d0ef1395a1c3afc1654d7368a92dfea5fe5ff4d0a0792f2e7da044572247

    SHA512

    3718935be497598039d7a8a371584bd12e497b6ea378f297b0a944b943bc2e6668b98514b0350d0f49296a912f3810d545511f164c47778442e43112c273348e

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    2fde878f2e74049e94485cdf75bec019

    SHA1

    64d2265df9ef9540a01f303b7f56f4e71baf630b

    SHA256

    75c59f24051e2bb90e7b50e61983fa40159c534c260b21387231762658160707

    SHA512

    c751f6c2145376400ce46aade93e186c25c55037d83e6fe2e1effae02cb55b03b96e71afe27734f4c6fcd72f4098d4ee4f283c8f889829f8a7c10f274d69beb4

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe

    Filesize

    488KB

    MD5

    ccde744f9695d41994c212ca4c1fac56

    SHA1

    e09e18b9e0fefd47b1b976948101d5e3ececd4a2

    SHA256

    1bc20b21845a6c9262a0cd20d19dd69252d70243bdee442b5020b5c3515d435c

    SHA512

    b2a42d44eb87482de94209bb01cb03791bb20b9eb25d015cecb65db6689004259a8fb8d5a6a017904cf2a5fb44d35ad64fe47e24e11648325ef77eb8df77122f

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe

    Filesize

    488KB

    MD5

    bce578e7233583d1c7ce5ce1715662cc

    SHA1

    9866ccd0fb8d42fc3bbf0acfe04363778d8af41f

    SHA256

    156ed478cc35d2f5ff756c76d498a262de273d20b8d58c61b4b8ed554f358870

    SHA512

    d1a283bd48b7e66e5d167137c8b88f8e3536a9703a7475be689e002fa161bc21eaabc79a0ebdc3268cdfd0c4b563b08783bb1afef9aa85fcb74cd1045168e37a

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    cbfaf07d9286f8f4c65f17ea6d0d1264

    SHA1

    84ca22f4fdd2a46a65ef2a5bd6f249b13dd2bf5b

    SHA256

    41be1d2e191c3ce8682da169cc227f2a722f3ca9a93d86891c8349e036f58996

    SHA512

    96c79c1605e9a32776fc7bc750b6f9135b0f3ae49837dd9d9688e8b14e9d9548594e7ece87c2b45815a946b8a05be8953628e084f306bf94e9996bcab7eed0c8

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    4146b02ba51565a36767e1649e1c1aa2

    SHA1

    09f68adbc15c65031095dc5f9d1619168f6c6def

    SHA256

    6dc9a1499e7d7d4d948370583b90799512b074cd4cf46c2f2a4694be1a81bbe4

    SHA512

    b240af85c8667620c96cfe1595fdd128cfb74bb2c9444bef7f118285c3c585d7023b0257b7f293b7e9b77b73e94cab963f4a32292aabacabd5d03366e250a5f5

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    99c7e01be2a35b34989e3e36490f8d4e

    SHA1

    bd700709f4f33e1b88ec6e223190d1a28a8360ed

    SHA256

    2115307acff748cf656190af1f13014d4087281d472dd033b231c1c052cae821

    SHA512

    9bfc964007162fce0ca880dbcf7655e62badd28288fbc9fef234f48644b86d19462d2aad5d581fe586f5d6495921b6a5c3a789063ef8bd7ac055bd02513c459d

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    72cfc8e8e51dc82384b5f9de57bdf6fc

    SHA1

    b2128b6541ea08de013602a1a7b86ef0f098939d

    SHA256

    ea423e5817a1eb1aa9e3efa941f2232542f7dd9dd0c603f5bb8292d1b693fdd8

    SHA512

    3c70409e7f9b7f8d82b4ce4b51a8313a277d68fb0ea77177f3514b06d85610b891bad80bf9c80d787a558f27e7d088484d2bfcb6f898a9a1b0467f8b50dd069c

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    d8786961bcaeb5341b4d682528ac4cd9

    SHA1

    d1be501f8a497a3368ce6fd76f56ffbbd1584e3e

    SHA256

    3378c1483e70f5852d3a2f78e99cc2cd9e900addb7f87b594c56312ce15fb6a6

    SHA512

    685a3d0a60a2ae15e1f0f36058cc76317187b3cf2aaace40d3795d91d24a88902acfe313469209c6a967a401853a419728f04480f48fe4a278a8a43d06e7f5ef

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    c629a7653d5973a0dd5a21a8a6fae0f4

    SHA1

    defc360f5a08a02ca8ea6983f1b0e21f248c6082

    SHA256

    1505a52ea0276c434e7fd825cb071d245947c16244bdcaef8868678146573e70

    SHA512

    6afd2856c0649960299f84aa886a35ed66540f47f7d86069294ae886efe5e137045d4f9a513f1c6f2c3b13ef6601bf0f32ad584b10d361608184b111d3dcfba3

  • C:\Windows\tiwi.exe

    Filesize

    488KB

    MD5

    e8adf497adc725a030cc4de7301d8158

    SHA1

    5cbe2029b8f7db9d67c12bb6900366e9779882d4

    SHA256

    80bf314068ec8a6885c6ecdf33c6fbc986d5fbbe505cc21891199e68fd52992e

    SHA512

    f1a7e705d12378c2b3dfc40e0a4ee09ca8093bb57acd14afd6c8e15bcdfe105de6cc41db040f74a47676002b6c3267570c2fbe8eae859d05f9803be51cd954a9

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    488KB

    MD5

    9ac58ae20aacb956f207e0bd998f32ac

    SHA1

    6b0ff833e22d3a3950fae0d7c72d49f345dfe893

    SHA256

    3fa850f447cf89504af37e8bfb86d45d679471cfa402c8a0a1275732fcb611b7

    SHA512

    381ef945538f92a3965d83d803e1d393b33ec54eed9631875ae8ce1f8e2b56283eb555b5ce8f351cc0a96c522e65fec34288192a967bf876b29d520c2e8986f3

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    488KB

    MD5

    7d0b171ecddc1cd89960247d03f796d4

    SHA1

    1097d051e591265fff52ba5be0e8a53c8e20a124

    SHA256

    b74649886273bf77013d8719964763880af1f560c7ebb4fdcf06938f696a2203

    SHA512

    4af89d904b1c1b349a13edb941dfb0363df1a1deb6b536f3243135cc80d4f37470ea523a64ef79b51ad4d8d736ba8dc0b3f9b5d181ea7d9f96248c622707e621

  • memory/300-165-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/300-217-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/300-216-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1072-465-0x00000000038A0000-0x0000000003E9F000-memory.dmp

    Filesize

    6.0MB

  • memory/1072-99-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1072-236-0x00000000038A0000-0x0000000003E9F000-memory.dmp

    Filesize

    6.0MB

  • memory/1072-278-0x00000000038A0000-0x0000000003E9F000-memory.dmp

    Filesize

    6.0MB

  • memory/1072-466-0x00000000038A0000-0x0000000003E9F000-memory.dmp

    Filesize

    6.0MB

  • memory/1072-281-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1216-464-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1216-111-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1656-228-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1656-227-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1656-226-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2156-386-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2200-231-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2200-221-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2312-441-0x00000000002B0000-0x00000000002C0000-memory.dmp

    Filesize

    64KB

  • memory/2464-283-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2464-288-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2560-434-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2632-440-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2920-433-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2924-163-0x0000000003860000-0x0000000003E5F000-memory.dmp

    Filesize

    6.0MB

  • memory/2924-98-0x0000000003760000-0x0000000003D5F000-memory.dmp

    Filesize

    6.0MB

  • memory/2924-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2924-279-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2924-108-0x0000000003760000-0x0000000003D5F000-memory.dmp

    Filesize

    6.0MB

  • memory/2924-453-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2924-220-0x0000000003860000-0x0000000003E5F000-memory.dmp

    Filesize

    6.0MB

  • memory/2924-218-0x0000000003860000-0x0000000003E5F000-memory.dmp

    Filesize

    6.0MB

  • memory/2924-110-0x0000000003760000-0x0000000003D5F000-memory.dmp

    Filesize

    6.0MB

  • memory/2964-280-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB