Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 09:31

General

  • Target

    8f4c8eedc21411707469411afd6612a0N.exe

  • Size

    351KB

  • MD5

    8f4c8eedc21411707469411afd6612a0

  • SHA1

    f7930c493bd636c2fa732eaaef0f806cc697f716

  • SHA256

    ef29ed602c4549448489b049e9aa16bc5f43ee6554a9652fd0e6461f5bc64396

  • SHA512

    4f8cc5d607decccc2a8dd9aff86346fcb665cdf1f8a1e3d3f0267b778113c81efc44b364cdf829b2dd5159b5ac8eab09a1e7eed68b31f26639cc9c6ff37b7c77

  • SSDEEP

    6144:V/OZplnYZplx/OZpl7/OZplx/OZplQ/OZplU:V/Mnqx/M7/Mx/MQ/MU

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 53 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f4c8eedc21411707469411afd6612a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8f4c8eedc21411707469411afd6612a0N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1748
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2644
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:356
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1856
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2532
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1904
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2328
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2136
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:564
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1724
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:2324
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1216
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2660
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2384
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1624
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2524
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:1672
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2744
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2992
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2320
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2912
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2000
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1636
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1660
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1116
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:908
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1692
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:1492
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1848
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1520
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2692
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2908
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2504
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2824
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1760
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:348

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

          Filesize

          45KB

          MD5

          ea7bdb42e30a3db7724e5fcc3b6cd389

          SHA1

          33ef3a4f254c8c466b1ee87a0937b4bbf53b2a24

          SHA256

          18fb8363d412d2c35a47ab5f132fb3483bbb66d48c84aef2360729b1bfe62a3d

          SHA512

          679ce4f328243b61aa4bf614ac8080cc7e1212dcd804571c870a145df159450a26f39f5bcd10eed494abeaf4ca1befadfba63118e5958443d5939929768799c5

        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

          Filesize

          351KB

          MD5

          2521a8fb3ce64b413958716053feadda

          SHA1

          4ec2239ef92db089114e991315faab86c601a7c5

          SHA256

          6f66012d981823e74dfdbd4627689694c46626a1feffd4d1a821f13298d17965

          SHA512

          21232227b6d55375b59bfcee24062f14c7e59fc9b31e5e830f057c43c22c59f6a6ab1ebe85724ac4f2f25072ad951f94e0aa70e9626c5543324d14217054ba1c

        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

          Filesize

          351KB

          MD5

          1b1da5a71a44ff94adf9d61975844f6e

          SHA1

          e2f6d93914c28651cca9ff240434b916bccf3f00

          SHA256

          aea0cb776ab111ae219a92ef02be6204c3b130a8acd61b765ac22fab0762916b

          SHA512

          9eadb1156a0840c1371f5fa5c5c3e4a5d441ab6a388fc8503062b4cb7e6f249464d988d19a2672273199dd09dc60c5a0f1b48b0a87874c142aae478da254b06a

        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

          Filesize

          351KB

          MD5

          245361e4cab7a714a2aedeb5dc1331fd

          SHA1

          c53a236e92022c15f56805369cb28c695796ed9d

          SHA256

          2ed52b0b9ad93c7d16c6817caeaf4e7dca5e1f587c0c622324399dc2651bbff2

          SHA512

          e22c73fa773cb58328c49d6d556dc1d9b5320807db0c02af0982c1156b50b0e255e4c30da0c65232003938ef8e69926802c6ea7f1b9e51b4c594bcf174f05b0e

        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

          Filesize

          45KB

          MD5

          34a9a700a19c89ec2509ddc5672910ea

          SHA1

          0735b970a5dc89391199931f1bc434f168674589

          SHA256

          06e8e6d88a701447f42e2d0f9dc032279c4ee6bf95a40a6b63f5f80dcd283516

          SHA512

          414e53be9cca70561550173535360e4484fe34ffadb103b713e9f403ccca37a618728fca2ec7a241254b3e31e9256410f9ef35df67dc8601cf782d43dceb51df

        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

          Filesize

          45KB

          MD5

          cd7ee7cab26157940f450128b9d99222

          SHA1

          d3a20da03cf968e2297da45e9b48d95c9af2c2ce

          SHA256

          f26f7678b2df187302fd2726bef52557ccfd8cc310976be321d82f92a5682470

          SHA512

          b66ddf3d9c5e13990908b7ce07be7f4e1f522676eaca3ef9cc3c847b4ce92d930a1975085992f037f467bd4c744ede4e6137af8cccc082bb8e06d0d858d5e9b3

        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe

          Filesize

          351KB

          MD5

          98570e9087604eb22f59028203eed92b

          SHA1

          555dfb12f4c8afd1a508094510faa1db046cb8c3

          SHA256

          352a3803864fdf2b30b873726db1baa503c6135a51cabc2a17f6e637f794fa2e

          SHA512

          99223f38031266a9084f1338128f1881927ef0f6754c38ec45e4603437ede8b79d908891c43e564f40d5279443b05f9e024930ab8e3f9bc680eb07a030bc0895

        • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

          Filesize

          351KB

          MD5

          7b1c254268663c718ba36af69882acaa

          SHA1

          14c291205333b46fea1016b8d09b15bf3d06c5d0

          SHA256

          b07c5fdd8681bc4df2b26985996def43b95fc4e581246a115031454f681175b7

          SHA512

          dc2fbecd157b5491c4481b38baf51ff74c380ad5d2375abc60bc521deca1230ed2b140143cc40c8cafee606ac0682e34e2317aab746e8beb52401836ef5c55bd

        • C:\Windows\MSVBVM60.DLL

          Filesize

          1.3MB

          MD5

          5343a19c618bc515ceb1695586c6c137

          SHA1

          4dedae8cbde066f31c8e6b52c0baa3f8b1117742

          SHA256

          2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

          SHA512

          708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

        • C:\Windows\SysWOW64\shell.exe

          Filesize

          351KB

          MD5

          f5e8e15714b56de398835ec663d1688f

          SHA1

          22a0f1718cfe939669f81f5c3abbc563e83d36af

          SHA256

          12ad2f5f2632f2d6a798544a6af53ab46e646146290afce181f5a2f80af2a1bf

          SHA512

          3b640fb039b5079ed9ba172fc25ecab5d6eb2ba07615c013395096039378f764e1e66b3397764a51ce609222d627df961ca72b99a7a9dceba7411b51e4696c02

        • C:\Windows\SysWOW64\shell.exe

          Filesize

          351KB

          MD5

          935d494370a2898b5762750cc4c08817

          SHA1

          05da4b4e54563f21565e61c57dd434e902974c36

          SHA256

          a2b5c698ee55d8274077fa1d0b0380367941b521d539fe9c15cc20f4fc12dddf

          SHA512

          3581513f312adf3b839742d24a0994c056287a3df84547a762ffd2098599a59c839d5f2c6029821bc389064d4dc726664b29fbabcbdee1d5c75f1e56abcc897c

        • C:\Windows\SysWOW64\shell.exe

          Filesize

          351KB

          MD5

          8f4c8eedc21411707469411afd6612a0

          SHA1

          f7930c493bd636c2fa732eaaef0f806cc697f716

          SHA256

          ef29ed602c4549448489b049e9aa16bc5f43ee6554a9652fd0e6461f5bc64396

          SHA512

          4f8cc5d607decccc2a8dd9aff86346fcb665cdf1f8a1e3d3f0267b778113c81efc44b364cdf829b2dd5159b5ac8eab09a1e7eed68b31f26639cc9c6ff37b7c77

        • C:\Windows\SysWOW64\tiwi.scr

          Filesize

          351KB

          MD5

          9f9118dce06d406d5aa0ef83c62e9519

          SHA1

          178b9edeca654e5a03abf6f7e0bb10fac0d29fe5

          SHA256

          a419faf2840dacc7be0fbe963eecec5ecb01bbb55479ebb35a2e47d6f2da1463

          SHA512

          dbb999b3a0e259aa8fd55180958bd2d0f9047844847da01f8c1aaf06d35a62198ff3d823587e5c76040496e8a466ec5eb1207c38bf8c6418308446d17cc90687

        • C:\Windows\SysWOW64\tiwi.scr

          Filesize

          351KB

          MD5

          256deb2f0d798996f9edae3e51ac564c

          SHA1

          705b417f4d751e461a54aed619df0de08495ea8f

          SHA256

          3da566d9d684e581859230882a6280f27ada13b0e5092e053e3eae69fea1e534

          SHA512

          14be5289cd617b8d837981f2ca85681501ab646cdc4e2b259cbd93338b88f53d03f37c922446840bca2627b5a9e75ab45864de5d40c6b1712636efff64a36c1f

        • C:\Windows\tiwi.exe

          Filesize

          351KB

          MD5

          07508b5fe33057ceb8d7b6ffafcc4e86

          SHA1

          90bb07a40d72ff267c1e3e38bbd5aee79c82fc56

          SHA256

          92bd3261b73b87965ee5a8a47e84a7fc94087657691f6a66bd3c4650ca99a805

          SHA512

          bde5df6fe4d21cf7b21ad2d210979016d4464562ec4ed39755b370370d833f6d94da55b6107eb20e41f1bebf51c33b8f0c1e8fc40d3a465190ea7a753f2c6afe

        • C:\present.txt

          Filesize

          729B

          MD5

          8e3c734e8dd87d639fb51500d42694b5

          SHA1

          f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

          SHA256

          574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

          SHA512

          06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

        • C:\tiwi.exe

          Filesize

          351KB

          MD5

          3a85ebadfb3327fffc308e6599a04af3

          SHA1

          c4e42e2a98a11f0e32ccb31b06ff62a00c1fb62f

          SHA256

          53f88cc089240f9d20e4f102a7227671faafb2d712ed8c5fe9af3035a5461bf9

          SHA512

          b81d1c7db0cfa8260226e04aeead0c2f73330069c414587680e453d5ec5e662d9a4eb86832458e2eba901e1e6b14b18d9eff6bd597446af855003a5bb5a6740c

        • C:\tiwi.exe

          Filesize

          351KB

          MD5

          af09cf9d459b759ecd33355340a70b8b

          SHA1

          b83cd9efa6eda768640c05f42bd3ef4f66f8e621

          SHA256

          af57f6a117aa8ed14f17e4850e089d19a33d1bab90116b88720726be6626604d

          SHA512

          ab952f6e444a266e32a82b68794765148e22af4ef3837f3e4f9f4b40502c19f1f9adce79d103c3ba73d7723cd7f67bab6ad828c30c7bf18c2c7f6cf0d9a28c04

        • F:\autorun.inf

          Filesize

          39B

          MD5

          415c421ba7ae46e77bdee3a681ecc156

          SHA1

          b0db5782b7688716d6fc83f7e650ffe1143201b7

          SHA256

          e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

          SHA512

          dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

        • \Windows\SysWOW64\IExplorer.exe

          Filesize

          351KB

          MD5

          af32274f0190f608e1506f576b39eba7

          SHA1

          1185ffad216fb1468737eac6caced5670e275cee

          SHA256

          d740f066ce109f3823ab9f1c339fb60e42868abba7306da6ec4a3466aeea6c05

          SHA512

          1bb0d2144290a0ea4b29b7fd46e2ed0e89fbeab9c32aecf14572d14ecc914469622244978f26c7d294d788193849636bd869defbc6a43c3412933940e718cb4b

        • memory/356-162-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/356-283-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/356-284-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/564-265-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/564-267-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/1116-273-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/1116-285-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/1216-392-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/1660-214-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/1660-207-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/1660-259-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/1692-317-0x0000000000220000-0x0000000000230000-memory.dmp

          Filesize

          64KB

        • memory/1748-310-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/1748-111-0x00000000037C0000-0x0000000003DBF000-memory.dmp

          Filesize

          6.0MB

        • memory/1748-206-0x00000000037C0000-0x0000000003DBF000-memory.dmp

          Filesize

          6.0MB

        • memory/1748-264-0x00000000037C0000-0x0000000003DBF000-memory.dmp

          Filesize

          6.0MB

        • memory/1748-98-0x00000000037C0000-0x0000000003DBF000-memory.dmp

          Filesize

          6.0MB

        • memory/1748-428-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/1748-99-0x00000000037C0000-0x0000000003DBF000-memory.dmp

          Filesize

          6.0MB

        • memory/1748-110-0x00000000037C0000-0x0000000003DBF000-memory.dmp

          Filesize

          6.0MB

        • memory/1748-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/1748-258-0x00000000037C0000-0x0000000003DBF000-memory.dmp

          Filesize

          6.0MB

        • memory/1848-417-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/2136-274-0x00000000037C0000-0x0000000003DBF000-memory.dmp

          Filesize

          6.0MB

        • memory/2136-112-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/2136-266-0x00000000037C0000-0x0000000003DBF000-memory.dmp

          Filesize

          6.0MB

        • memory/2136-439-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/2384-430-0x0000000000220000-0x0000000000230000-memory.dmp

          Filesize

          64KB

        • memory/2384-429-0x0000000000220000-0x0000000000230000-memory.dmp

          Filesize

          64KB

        • memory/2644-386-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/2644-100-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/2744-388-0x0000000000220000-0x0000000000230000-memory.dmp

          Filesize

          64KB

        • memory/2744-387-0x0000000000220000-0x0000000000230000-memory.dmp

          Filesize

          64KB

        • memory/2744-389-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB