Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-08-2024 00:27

General

  • Target

    f2f33e589970c245dac03bbcaf1f1500N.exe

  • Size

    351KB

  • MD5

    f2f33e589970c245dac03bbcaf1f1500

  • SHA1

    f0c27c8b3163a108626c7f34baef121f0980c210

  • SHA256

    017896522203c35720725c13f9123954d07b298f738b4c76dec0b6b74570f70d

  • SHA512

    22f02a80498412854e4618282f60b80b7960f4d3c0756f8393ca89033caf95aa18c506d4edce60d408ddb8aadeff77d2585fe9e5d606389db80036bc8054cb20

  • SSDEEP

    6144:V/OZpl9YZplx/OZpl7/OZplx/OZplQ/OZplU:V/M9qx/M7/Mx/MQ/MU

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 6 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2f33e589970c245dac03bbcaf1f1500N.exe
    "C:\Users\Admin\AppData\Local\Temp\f2f33e589970c245dac03bbcaf1f1500N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3120
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1232
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3396
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2244
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2320
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2204
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:4692
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:860
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1092
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1560
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1820
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1612
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2732
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2248
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2900
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3972
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2480
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1824
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:5116
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2712
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2940
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4420
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2244
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4476
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2916
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1568
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4368
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3116
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4556
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2552
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3736
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2360
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2312
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3436
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4560
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3756
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4616,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=4104 /prefetch:8
    1⤵
      PID:708

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\WINDOWS\imoet.exe

      Filesize

      351KB

      MD5

      311df5543a9e84475bee01a7d6e8f707

      SHA1

      fbfb4f4513fae57bbe0272e0847b1d167b99195f

      SHA256

      ee41c58fc89e2b7bc2d245f6570a41c93cfe6625a0807d111aef126e33f51fb2

      SHA512

      ebb2cbf682d74353f023b694f86a79bbfab0c0650f9d5938494e8f2e529b9f2afeb04c9d3b17fb95ea57811cf12062f8e99b7982106d2c9546d1de15fe889634

    • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

      Filesize

      45KB

      MD5

      fda52e5e72e6562b36385db8a3661afc

      SHA1

      ab56dd4061b3546bb4220f097f2007ebb9f58a40

      SHA256

      b07d1150c56ed52276cbe027bf725ac9d7af28e62eb8c23e1a817c411f360dae

      SHA512

      a5b65db3c5f62dd5cdfd73bd1ec3ec6277562e0f647364b69a28ce4aa4dcd43ccb393b326742e76af581c125498cd4ffa9da459f16daea094ca44c36023a0ae9

    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

      Filesize

      351KB

      MD5

      ae1ec723084797afac0d9061c9ff872e

      SHA1

      1bc86be8d1fde0d67a430b384921e0fd8c3b27fe

      SHA256

      90ccb873409479be15f26c39c2dfa027a7aace4cb1323d79f5fbb67e96a61957

      SHA512

      949d9976c30d347a1060a28a2df99d02d748269131fef65387f755d08ab23754799848025ec754c06ba1de4dce9aaf2420ec32c7574bea458abab69294c40eb7

    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

      Filesize

      351KB

      MD5

      44836b522fab31403939954a3d84d317

      SHA1

      4464e13f1cba8e425bf447b30b22ac72147c21ed

      SHA256

      2d02d0c8bb41f44f8ef627e2f922ec12b7d971edcf37b3ee0ac096af66d49742

      SHA512

      1ceffa81dd6687944c46f0a6485896938dfb7798aec3dbb99a0fbc6b52aee8c05ac59cac6791e94e7775682dd3a6cfeccf0fb37eaf08dd4d1d9df1398b4bfae0

    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

      Filesize

      351KB

      MD5

      1c4ecf465768c6787ae92d1f11d0ffaf

      SHA1

      1fa7bde216ae5e74fc6f516cbb0f5c06839672c3

      SHA256

      0b7fcc6feb3c4d298f3745043ec9e5c30ab5386ddd6e97409a71f7b2c2c0e3f9

      SHA512

      a0fec1e03d3c338b4b6fb704d685f546a18843402f1dcf52d8d8f2acac98d0af79f7d06b1bfcce71ca483ff4ad2032b12371a70dbfdd9b2c4f16059b2ec2d51f

    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

      Filesize

      45KB

      MD5

      47f9f8989b37d12219808ad40ee8b3e6

      SHA1

      7b2a982364f4aadc7eac7e5015f9a6a700d63956

      SHA256

      46a070d03c8706179d9babbac73d40478b5ebe9c45e7ca0d32748aef247c9524

      SHA512

      c2e2fa094056d4145d9379a94e616156443d09887aab58450abb8161ad98c3967b64c955e008de03aeff262b35233cc9e12efa161bac8177b3c25b265f22b39b

    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

      Filesize

      45KB

      MD5

      2e0b4652c5e2ecef2f6d5c5868ddafc6

      SHA1

      b45d48baa98ef900891e811410c31a956dc90b1b

      SHA256

      456772ee7628ec8922afbaac806032fa375a0ee301d69f643724f0b54a2235b4

      SHA512

      b5b8b625e2bcdedd858af3e086fa375b9d4711c21ccf2ed7074065b8a14f1660d6dc926b00ce12eda1476fb812b529658cd7108d51ba3f03d1cccd373b22c808

    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe

      Filesize

      351KB

      MD5

      ff0eec92bf4464bc85ca7d7dd52d3440

      SHA1

      68618d6fc3521008d50d2b463fc08da1704217be

      SHA256

      a3c2deb996ef76f64715b36e99e58690e97914c5baa9d9319273af7daf5b5d4f

      SHA512

      bc381abf91766d8adbb869c5e6b45f5ce29f715aec665b5b4f30472588a09199be0094caecccdccf1502fd150f3abba68c314a5327da3660f1d9b6c1beac28ac

    • C:\Windows\MSVBVM60.DLL

      Filesize

      1.4MB

      MD5

      25f62c02619174b35851b0e0455b3d94

      SHA1

      4e8ee85157f1769f6e3f61c0acbe59072209da71

      SHA256

      898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

      SHA512

      f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

    • C:\Windows\SysWOW64\IExplorer.exe

      Filesize

      351KB

      MD5

      b641571cb293a7b859e9429023ba7d67

      SHA1

      0d73f7380efc8ca923f64e895c52dd878ca95384

      SHA256

      d0094413f299bf0ea2d544a26fee355f8e8d3f7a937fac01997e1fadca0a9fe9

      SHA512

      ce96ee78ba51af9b48ba844b77937f962a0ed2d80cfce3c3d1d35cad4e8ab44298470262bfe6c163330be3b56fd1cd1b6b8ffb46e3c048f0fcac683d1303db02

    • C:\Windows\SysWOW64\shell.exe

      Filesize

      351KB

      MD5

      f2f33e589970c245dac03bbcaf1f1500

      SHA1

      f0c27c8b3163a108626c7f34baef121f0980c210

      SHA256

      017896522203c35720725c13f9123954d07b298f738b4c76dec0b6b74570f70d

      SHA512

      22f02a80498412854e4618282f60b80b7960f4d3c0756f8393ca89033caf95aa18c506d4edce60d408ddb8aadeff77d2585fe9e5d606389db80036bc8054cb20

    • C:\Windows\tiwi.exe

      Filesize

      351KB

      MD5

      e97730c71a8a0de0c07d9e7e6e751042

      SHA1

      f9f88117df7c34eed5c1c5d5b2b3b50ef10ba5bb

      SHA256

      c00fa6cea32d475760ce41583e22644bef33e5b226eb95ae9422d8a616ff65ed

      SHA512

      af67bbde2b648995d83ece565d3d9eb12d54b3ba8f31429cdd91d78268097f3a401c274fb9d021d70619b5afc27c77f3493e26f5a2ede0c22252dd53e83fd089

    • C:\present.txt

      Filesize

      729B

      MD5

      8e3c734e8dd87d639fb51500d42694b5

      SHA1

      f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

      SHA256

      574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

      SHA512

      06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

    • F:\autorun.inf

      Filesize

      39B

      MD5

      415c421ba7ae46e77bdee3a681ecc156

      SHA1

      b0db5782b7688716d6fc83f7e650ffe1143201b7

      SHA256

      e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

      SHA512

      dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

    • memory/1232-269-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/1232-96-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/2204-277-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/2204-270-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/2244-219-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/2244-251-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/2248-278-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/2312-290-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/2312-305-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/2320-267-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/2320-253-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/2712-169-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/2712-223-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/2732-102-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/2732-279-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/2900-289-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/2940-422-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/2940-231-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/3120-379-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/3120-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/3120-264-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/3396-198-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/3396-218-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/3972-292-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/3972-302-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/4368-248-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/4368-423-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/4692-291-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/4692-424-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/5116-170-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB

    • memory/5116-147-0x00000000003E0000-0x00000000009DF000-memory.dmp

      Filesize

      6.0MB