Analysis

  • max time kernel
    120s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2024, 16:32

General

  • Target

    babe7bfdc9a39e618fb957c857bcaf80N.exe

  • Size

    351KB

  • MD5

    babe7bfdc9a39e618fb957c857bcaf80

  • SHA1

    b86a8c81d603f1511e523bab8db0419b8b7a028e

  • SHA256

    302c738e05e78a786a1d6b6fcdbe12ce0c118ca2d64dcc4b4c37a1f8298ab02d

  • SHA512

    5bd6d28722e9534f6d7789f6b8153d334d7970913f92ba6c895925892280455a0d3ddc523bbfe2e3d19da8341124d104aedb1d46dd22d0d2371c600ee05d0127

  • SSDEEP

    6144:V/OZplcYZplx/OZpl7/OZplx/OZplQ/OZplU:V/Mcqx/M7/Mx/MQ/MU

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 8 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\babe7bfdc9a39e618fb957c857bcaf80N.exe
    "C:\Users\Admin\AppData\Local\Temp\babe7bfdc9a39e618fb957c857bcaf80N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4784
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:728
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2588
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4012
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1988
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:3648
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2320
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2640
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2236
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1496
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:116
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5056
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1472
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5012
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4716
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1628
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4444
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3920
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1880
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3548
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1324
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2684
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3380
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:488
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3372
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4820
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3756
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:396
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:228
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4456
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3372
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4812
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3280
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3980
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3136
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    b559604c59097e80095a042e404f7719

    SHA1

    c012322ba8a7eaf04110baad6d009182aa96d7d4

    SHA256

    44c191a394d0bc459cd906984bc1e90562a10259f8e807eb041d5e547b05b7dd

    SHA512

    b00d41ef53f949b7bf51b4d0b4a9dba420787fdd11ee2fc0d2b8f9cf8837b67ae34975106e684acc1d5d3270297162ac6a7ccfd596ee301daad7a12192371189

  • C:\Users\Admin\AppData\Local\WINDOWS\winlogon.exe

    Filesize

    351KB

    MD5

    9fd2221392528e11ff4d39c4835ad3d5

    SHA1

    acf328b0d02b7add655518bbe8b634001d7c5c21

    SHA256

    1a4a7f906fc17e4b2dff890986b37e997f4d5f94881b2d3c4a8035beee8b79cf

    SHA512

    f7293a6df18f622b9c7f6c0629056c91d2e55b4a28338df567566a091ddbf670ee95ed72569eacc7d6a6fc1dcca268b26541ed43b431b8aec7690eb25e991320

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    351KB

    MD5

    d4c8f5318e8dacc2751a62599a0d91b7

    SHA1

    014e3379d5d4a0e7824071ff6593df2f63cd3a74

    SHA256

    cea4cef073e94c16f289212590c1a2c25822e9262632896acb572621bf6d6bb3

    SHA512

    8f90df67c700abfe0793d997fcced76bb4da59d3bbd7f5615e7eb78d3e708d8677c4714b2f106643379b633ca57a58744dd7eb25256a8ce56aa6ac27ad5ee91a

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    351KB

    MD5

    bb7525fd6776f011ea42e51555bfc2b3

    SHA1

    bb3fad9ddf8f930d4cc4f44252b70286cc18e4e0

    SHA256

    952aa00bfd29ead1f185381836b8925faf9954e51755a4aab770be7fa21674be

    SHA512

    f4a46127d0c44c4617ea4345fb77fd3b0d4424dd63a52a6c52213a71e357dec75311109f48cb8b5418830a296578060082fed5dc1973d9ef260bc3c7f99a14a6

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    351KB

    MD5

    5a9ae245a67425315f0e88be399b6140

    SHA1

    855e9d1445f78a106bd98b80fc2a9b129acf826d

    SHA256

    13f8c309d13b2e4d88d0e09700a0b75065e4b207c67944bdabeb126ee3df4aab

    SHA512

    8f8bb86d60f48fde1263757e8320a093f352d550577637ae98a5f4da86c2f95c80d32bafdc8922b2304aa1f5e28c07acde48eeae622dcfb76db911b6f3858afd

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    351KB

    MD5

    060b60ae30c5caf81de5ac1ec0e6ed3c

    SHA1

    a949f65d9925e7cb88114aff95e0b710cf45f5cb

    SHA256

    3d4411827729ba8bd3bf5a6d87ee9389f38ec4aa60380dd96f74fd1cc5b0d757

    SHA512

    75f7c766af8ce10cfab5721e524cefa25d18dd8cf3b33731158f784f9b995ff0e4f88a8136d90cddd3b609680aac049f11a412b7724a19d53af7bb3ce6e8e4cc

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    155ba38d3948ad50ec0c4e2b5feb3bc5

    SHA1

    21b643ae2eaff713e6998b03fd1a71c27595e81f

    SHA256

    c3f8fd041cb7eb77f656495aeb7f8aeb38725cf3da12e1ed77484e8553ddb6c7

    SHA512

    6f1d24e81c3c35638bbbd7448798901a8411e11a93c01f7381be0c83e4a7097b6a55021cbcb69de232c8f3817a87bed1c1439b2bead0a76f19e6f364a3877a16

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    f1006f9b13da6849247296eb77486afe

    SHA1

    e16b329f5d13372860def813af762e91a0a61202

    SHA256

    eaf353ccdb86bb48fb56028f4c3aed0351000cd2a7a77ed932bb2c2b2e5cc567

    SHA512

    ea80b10070e8bbf7db9e04ec49b67513c41157b2d2a99dce329f41fca05b07bb8c828b37de02ae8ba56a4b06837e362586e86bc0c446c6ebe27822a6f1744411

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    a2389d55ed1038a2bdeb37273f87b05f

    SHA1

    fc2321e2661eb2b5d9f591a934a94b8ab4f35629

    SHA256

    cf16459b316dc85ca364f6115493b902615fd6a80ca5e70770cfbca0fdeb04b0

    SHA512

    bc1a8e8534da35c8a22435576db6641f5ecb317febaf7fe8bc56a6881875e04c0014d8072a45e145ad7e0de0585fd99cc711d725a561bff7229323ebd3e797f9

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    351KB

    MD5

    7445bc77399bea6d1e319c358f8260bf

    SHA1

    f02727a3bbed1f93948d210308e6c45f8ede9f36

    SHA256

    2e33ae4bd055c33d937994c0b59d626ebd386d419ce71639422885a53c43f5b5

    SHA512

    1be41af68dcc7eb50d55e66207d8ba3718f560fd3924e04584649ca5b5d370611fad6e14d0c07da98ce0a5efa27f24fc9ee714a170e58f63650f3db500749a3e

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    351KB

    MD5

    cfb603ea5f736e42a23ae181ded6f1f1

    SHA1

    c50bd6d67175f3b369efa9b6e0c4689d404b30b1

    SHA256

    3516cb390c6a4a75a9e7ea6c042fdf84db36c0583d6ffc18cc3ed77d45aa8e85

    SHA512

    456102b5e634ece28a55e710bb9866edd38ab534592b72108d00f48a58384b119cfc759f8ba570960512c130199abe5a976f4ff7f5a2213b92ebc091a58f4080

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    351KB

    MD5

    536dacaa5b486d2bf05a398282f6c3ca

    SHA1

    f36fd874ef732aa224329ecf7939bb7b6f2aed0a

    SHA256

    52024d4ee45a1d0816344c795d8c13d50a64a445cff3aeaa1787705cb1ce24c5

    SHA512

    b24139e446808c05ef04392c2814f0ee38f8edf6014a39df1d5a81bf5b3f5bdb6f4d4b8e33be3701fed25179c625e540a0c2c4e14d0910c1ac884a5acebee462

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    351KB

    MD5

    2cb184b0064d30811814df687e4a8c35

    SHA1

    f44dc6247433762c5c91cf2bafa8a27315dc6cea

    SHA256

    a5f1910e006f2dd38f9a5b380c42b54a04f362b0f8762e9a9b02038a37f3eb29

    SHA512

    1f7cbbf43e6e88057ac707a969bbd3909aeddf61274a50735913be16d29eacdfb42f06939ac2e4d26a202b65245d49dfa6bc3ed35e150625fb1340aa8658bfe6

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    351KB

    MD5

    c048032ddcb09c921cc87fb6829a6664

    SHA1

    19bf45ba1346eb0a81775494648a7e34b85b9dfe

    SHA256

    f4a7c789c3d8cf3443884faea94e82c0adcc6bd8d5ecd2fdaad150ad77a116d2

    SHA512

    83de95a274d2b35218bb3dbaf3499ab07a3441ec270d0e43267e4a682d6b5bf2e45f65275bd8a7f0db0004a203972097b828d79bf8353cd9e919d4f0302ddf21

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    351KB

    MD5

    babe7bfdc9a39e618fb957c857bcaf80

    SHA1

    b86a8c81d603f1511e523bab8db0419b8b7a028e

    SHA256

    302c738e05e78a786a1d6b6fcdbe12ce0c118ca2d64dcc4b4c37a1f8298ab02d

    SHA512

    5bd6d28722e9534f6d7789f6b8153d334d7970913f92ba6c895925892280455a0d3ddc523bbfe2e3d19da8341124d104aedb1d46dd22d0d2371c600ee05d0127

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    351KB

    MD5

    7279761b20d2398e253cea8f2088cac4

    SHA1

    a4e8607a46706706b9803f566a37fb100e2f4837

    SHA256

    2b6340599e95f1f169a892e735e7286a9742124020e04a825382921245d375dc

    SHA512

    b6f102cf1d7bea9b4b68967f7fcde2b6cb3473c43974e5b630059af1f95c5efdd994859cc87f6cdccc4adabf763d26dca9959c91ed00a6a23873560f522a0b1e

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    351KB

    MD5

    27c68de89d44a602ad32743ab2d53a52

    SHA1

    4a06c73825e1953234714acb51b92ca70035b398

    SHA256

    0947c814f100c16fceed5ab17eb7a84cb96941e4f431e7da6555939efadf3f67

    SHA512

    359c12537831c09e5f5a2a91b60ede358083da07965c2d0d87a15d3c15e27216a82f513d4ce01c2774551fc11d439eb239235f6ae982bba04201b5c2f0af87ac

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    351KB

    MD5

    43ddc83aa0382f56b11989b65ffedb4b

    SHA1

    83f809a83c567fda3c1e14ca626446e788fffe6e

    SHA256

    56e42f34cf7da5d2ca9d821389869f968dba5868dd8eb45d3926926536ccdd8c

    SHA512

    cda27cb2006035e20e3b9d1b4b4356d4cbc5cced5f3815c5a32d86a059115fe79aab7f960041922c60958241c260434570e7a00594e852ff8f7fc244f7ae447e

  • C:\Windows\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\tiwi.exe

    Filesize

    351KB

    MD5

    4c081ccf31422c302433af6ddd1b33f8

    SHA1

    5ad06352fa70ff242d42f5e5c7d3704b571ddf19

    SHA256

    c9ec3c10fb5550abf180ca8d32d878cbfcdac451ae17db4c8bbb2c88e0a982d0

    SHA512

    21a0afa8281bf3869d4c593a199e7d011453c1adbe5b93d14069a94b3b47d081fb1557dc6d8c9501855db372c184155c1036e7fef364be9c407cd6b2b3bf0e48

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    351KB

    MD5

    44e58ddd682afdd1cc50bdeee5f4cf9c

    SHA1

    47baccb3ed26d83f13e2d464b9267f7d9945cb26

    SHA256

    0579cd06b0b00a55f5a605796c3919e5a29d4d20a5d8c5aa3e5e24394629b4c1

    SHA512

    cae837059daf01cffa52436eed1b4df759cc775b3ba75631c6deb52758c3e864af411608342b23ea98141ef64c7a00c31e9d9954b8b1615fbe19e2ed27ca2972

  • C:\tiwi.exe

    Filesize

    351KB

    MD5

    e097858f84b7426fa397cdc4ccaa02b8

    SHA1

    d88ddbe52aee63c465cce3e843be95025800635e

    SHA256

    9aa566cda2d639062f47cf4bc2b97384870a52c068c5a35124dbd6bcdf32cc42

    SHA512

    69d456b94b7b41a898b752e05630dd465819d4bfaebbc1b56e2012e2d3431433711082424c8553bb69acacff82971ada51f118e0fe3833db89d524defabf6e30

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • memory/396-305-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/396-318-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/728-294-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/728-96-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1472-304-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1472-102-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1628-310-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1628-315-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1880-429-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1880-110-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1988-219-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1988-271-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2588-187-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2588-212-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3372-148-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3372-193-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3548-298-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3548-314-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3648-430-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3648-297-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3756-269-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3756-301-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4012-217-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4012-213-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4716-300-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4716-270-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4784-268-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4784-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4784-393-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4820-194-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4820-258-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/5012-259-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/5012-267-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB