Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe
Resource
win10v2004-20240802-en
General
-
Target
ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe
-
Size
488KB
-
MD5
34043d652c6669c2bb3de1aa396f48b6
-
SHA1
02d07ad408073ca4f0424fd6a8dbff81f204f5af
-
SHA256
ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c
-
SHA512
b6d99ef57767ba1aaf9725b607dd64f59c5bbfb349a276a3e847cc5eb96f2dc95ad8f5cfc93bef9c386f2b74330059e0664daf6856192df2c77b5e29b4ab04af
-
SSDEEP
12288:V/Mj/MP/Mx/M7/Mx/M4/MpBE/Mk/M2/M1:VkK2O2HIBEd7M
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 35 IoCs
pid Process 2632 Tiwi.exe 2732 IExplorer.exe 1280 Tiwi.exe 1648 IExplorer.exe 2672 Tiwi.exe 2312 Tiwi.exe 2132 winlogon.exe 2824 IExplorer.exe 1536 imoet.exe 1264 IExplorer.exe 568 winlogon.exe 852 winlogon.exe 2032 imoet.exe 2176 Tiwi.exe 1580 imoet.exe 2868 cute.exe 2896 IExplorer.exe 112 cute.exe 2236 winlogon.exe 3052 cute.exe 2264 Tiwi.exe 2116 imoet.exe 2576 winlogon.exe 3048 imoet.exe 2692 IExplorer.exe 2688 cute.exe 2588 winlogon.exe 3056 cute.exe 2708 imoet.exe 2760 Tiwi.exe 2516 cute.exe 2556 IExplorer.exe 1844 winlogon.exe 2652 imoet.exe 2528 cute.exe -
Loads dropped DLL 53 IoCs
pid Process 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 2632 Tiwi.exe 2632 Tiwi.exe 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 2732 IExplorer.exe 2732 IExplorer.exe 2732 IExplorer.exe 2732 IExplorer.exe 2632 Tiwi.exe 2632 Tiwi.exe 2632 Tiwi.exe 2632 Tiwi.exe 2732 IExplorer.exe 2732 IExplorer.exe 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 2132 winlogon.exe 2132 winlogon.exe 2632 Tiwi.exe 2632 Tiwi.exe 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 2732 IExplorer.exe 2732 IExplorer.exe 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 2132 winlogon.exe 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 2132 winlogon.exe 2132 winlogon.exe 1536 imoet.exe 1536 imoet.exe 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 1536 imoet.exe 1536 imoet.exe 2132 winlogon.exe 2132 winlogon.exe 1536 imoet.exe 1536 imoet.exe 1536 imoet.exe 2868 cute.exe 2868 cute.exe 2868 cute.exe 2868 cute.exe 2868 cute.exe 2868 cute.exe 2868 cute.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe -
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" winlogon.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: IExplorer.exe File opened (read-only) \??\V: IExplorer.exe File opened (read-only) \??\W: winlogon.exe File opened (read-only) \??\W: imoet.exe File opened (read-only) \??\Q: cute.exe File opened (read-only) \??\R: cute.exe File opened (read-only) \??\J: ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File opened (read-only) \??\S: IExplorer.exe File opened (read-only) \??\Q: imoet.exe File opened (read-only) \??\S: imoet.exe File opened (read-only) \??\Y: cute.exe File opened (read-only) \??\P: IExplorer.exe File opened (read-only) \??\Q: Tiwi.exe File opened (read-only) \??\H: winlogon.exe File opened (read-only) \??\J: imoet.exe File opened (read-only) \??\K: imoet.exe File opened (read-only) \??\X: cute.exe File opened (read-only) \??\Q: ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File opened (read-only) \??\H: IExplorer.exe File opened (read-only) \??\X: imoet.exe File opened (read-only) \??\W: cute.exe File opened (read-only) \??\M: IExplorer.exe File opened (read-only) \??\Q: IExplorer.exe File opened (read-only) \??\S: Tiwi.exe File opened (read-only) \??\V: imoet.exe File opened (read-only) \??\N: IExplorer.exe File opened (read-only) \??\X: IExplorer.exe File opened (read-only) \??\G: cute.exe File opened (read-only) \??\T: cute.exe File opened (read-only) \??\G: Tiwi.exe File opened (read-only) \??\H: imoet.exe File opened (read-only) \??\Y: IExplorer.exe File opened (read-only) \??\S: winlogon.exe File opened (read-only) \??\N: ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File opened (read-only) \??\J: Tiwi.exe File opened (read-only) \??\O: Tiwi.exe File opened (read-only) \??\P: winlogon.exe File opened (read-only) \??\O: imoet.exe File opened (read-only) \??\Z: imoet.exe File opened (read-only) \??\B: cute.exe File opened (read-only) \??\M: cute.exe File opened (read-only) \??\S: cute.exe File opened (read-only) \??\V: cute.exe File opened (read-only) \??\L: ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File opened (read-only) \??\O: cute.exe File opened (read-only) \??\Z: IExplorer.exe File opened (read-only) \??\P: ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File opened (read-only) \??\J: IExplorer.exe File opened (read-only) \??\O: IExplorer.exe File opened (read-only) \??\P: imoet.exe File opened (read-only) \??\E: cute.exe File opened (read-only) \??\B: Tiwi.exe File opened (read-only) \??\L: cute.exe File opened (read-only) \??\M: ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File opened (read-only) \??\Y: ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File opened (read-only) \??\E: imoet.exe File opened (read-only) \??\U: imoet.exe File opened (read-only) \??\K: cute.exe File opened (read-only) \??\G: ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File opened (read-only) \??\T: ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File opened (read-only) \??\B: winlogon.exe File opened (read-only) \??\T: winlogon.exe File opened (read-only) \??\Y: imoet.exe File opened (read-only) \??\B: IExplorer.exe -
Modifies WinLogon 2 TTPs 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created F:\autorun.inf ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File opened for modification F:\autorun.inf ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File created C:\autorun.inf ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File opened for modification C:\autorun.inf ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe -
Drops file in System32 directory 40 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\tiwi.scr ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr imoet.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe Tiwi.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe cute.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr Tiwi.exe File opened for modification C:\Windows\SysWOW64\shell.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr cute.exe File created C:\Windows\SysWOW64\shell.exe ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr winlogon.exe File created C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe cute.exe File created C:\Windows\SysWOW64\tiwi.scr ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File created C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\shell.exe imoet.exe File created C:\Windows\SysWOW64\IExplorer.exe imoet.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe imoet.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe cute.exe -
Drops file in Windows directory 26 IoCs
description ioc Process File opened for modification C:\Windows\tiwi.exe imoet.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe cute.exe File opened for modification C:\Windows\tiwi.exe ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe File created C:\Windows\tiwi.exe Tiwi.exe File opened for modification C:\Windows\tiwi.exe IExplorer.exe File created C:\Windows\tiwi.exe imoet.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe Tiwi.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe winlogon.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe cute.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe -
Modifies Control Panel 54 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Mouse\SwapMouseButtons = "1" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Mouse\SwapMouseButtons = "1" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\International\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\International\s1159 = "Tiwi" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Mouse\SwapMouseButtons = "1" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\International\s1159 = "Tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" imoet.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\International\ imoet.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\International\s1159 = "Tiwi" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\ ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Mouse\SwapMouseButtons = "1" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\International\ ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Mouse\SwapMouseButtons = "1" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\International\s1159 = "Tiwi" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Mouse\ IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\International\ winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Mouse\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" cute.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Mouse\ ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\International\s2359 = "Tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" imoet.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" cute.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\International\s2359 = "Tiwi" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Mouse\ winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\International\s2359 = "Tiwi" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\International\s1159 = "Tiwi" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Mouse\SwapMouseButtons = "1" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\International\s2359 = "Tiwi" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\International\ IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\International\ cute.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Mouse\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\International\s1159 = "Tiwi" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\International\s2359 = "Tiwi" cute.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Mouse\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\International\s2359 = "Tiwi" imoet.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." imoet.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\ ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\ IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." Tiwi.exe -
Modifies Internet Explorer start page 1 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" Tiwi.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 2632 Tiwi.exe 1536 imoet.exe 2132 winlogon.exe 2732 IExplorer.exe 2868 cute.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
pid Process 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 2632 Tiwi.exe 2732 IExplorer.exe 1280 Tiwi.exe 1648 IExplorer.exe 2132 winlogon.exe 2672 Tiwi.exe 2312 Tiwi.exe 2824 IExplorer.exe 1264 IExplorer.exe 568 winlogon.exe 852 winlogon.exe 1536 imoet.exe 2176 Tiwi.exe 2032 imoet.exe 2868 cute.exe 112 cute.exe 2896 IExplorer.exe 1580 imoet.exe 2236 winlogon.exe 2576 winlogon.exe 3052 cute.exe 2264 Tiwi.exe 2116 imoet.exe 2692 IExplorer.exe 3048 imoet.exe 2688 cute.exe 2588 winlogon.exe 3056 cute.exe 2708 imoet.exe 2760 Tiwi.exe 2556 IExplorer.exe 2516 cute.exe 1844 winlogon.exe 2652 imoet.exe 2528 cute.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2632 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 28 PID 1628 wrote to memory of 2632 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 28 PID 1628 wrote to memory of 2632 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 28 PID 1628 wrote to memory of 2632 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 28 PID 1628 wrote to memory of 2732 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 29 PID 1628 wrote to memory of 2732 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 29 PID 1628 wrote to memory of 2732 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 29 PID 1628 wrote to memory of 2732 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 29 PID 1628 wrote to memory of 1280 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 30 PID 1628 wrote to memory of 1280 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 30 PID 1628 wrote to memory of 1280 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 30 PID 1628 wrote to memory of 1280 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 30 PID 1628 wrote to memory of 1648 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 31 PID 1628 wrote to memory of 1648 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 31 PID 1628 wrote to memory of 1648 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 31 PID 1628 wrote to memory of 1648 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 31 PID 2632 wrote to memory of 2672 2632 Tiwi.exe 32 PID 2632 wrote to memory of 2672 2632 Tiwi.exe 32 PID 2632 wrote to memory of 2672 2632 Tiwi.exe 32 PID 2632 wrote to memory of 2672 2632 Tiwi.exe 32 PID 2732 wrote to memory of 2312 2732 IExplorer.exe 34 PID 2732 wrote to memory of 2312 2732 IExplorer.exe 34 PID 2732 wrote to memory of 2312 2732 IExplorer.exe 34 PID 2732 wrote to memory of 2312 2732 IExplorer.exe 34 PID 1628 wrote to memory of 2132 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 33 PID 1628 wrote to memory of 2132 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 33 PID 1628 wrote to memory of 2132 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 33 PID 1628 wrote to memory of 2132 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 33 PID 2632 wrote to memory of 2824 2632 Tiwi.exe 35 PID 2632 wrote to memory of 2824 2632 Tiwi.exe 35 PID 2632 wrote to memory of 2824 2632 Tiwi.exe 35 PID 2632 wrote to memory of 2824 2632 Tiwi.exe 35 PID 1628 wrote to memory of 1536 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 36 PID 1628 wrote to memory of 1536 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 36 PID 1628 wrote to memory of 1536 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 36 PID 1628 wrote to memory of 1536 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 36 PID 2732 wrote to memory of 1264 2732 IExplorer.exe 37 PID 2732 wrote to memory of 1264 2732 IExplorer.exe 37 PID 2732 wrote to memory of 1264 2732 IExplorer.exe 37 PID 2732 wrote to memory of 1264 2732 IExplorer.exe 37 PID 2732 wrote to memory of 852 2732 IExplorer.exe 38 PID 2732 wrote to memory of 852 2732 IExplorer.exe 38 PID 2732 wrote to memory of 852 2732 IExplorer.exe 38 PID 2732 wrote to memory of 852 2732 IExplorer.exe 38 PID 2632 wrote to memory of 568 2632 Tiwi.exe 39 PID 2632 wrote to memory of 568 2632 Tiwi.exe 39 PID 2632 wrote to memory of 568 2632 Tiwi.exe 39 PID 2632 wrote to memory of 568 2632 Tiwi.exe 39 PID 2632 wrote to memory of 2032 2632 Tiwi.exe 40 PID 2632 wrote to memory of 2032 2632 Tiwi.exe 40 PID 2632 wrote to memory of 2032 2632 Tiwi.exe 40 PID 2632 wrote to memory of 2032 2632 Tiwi.exe 40 PID 2132 wrote to memory of 2176 2132 winlogon.exe 41 PID 2132 wrote to memory of 2176 2132 winlogon.exe 41 PID 2132 wrote to memory of 2176 2132 winlogon.exe 41 PID 2132 wrote to memory of 2176 2132 winlogon.exe 41 PID 2732 wrote to memory of 1580 2732 IExplorer.exe 42 PID 2732 wrote to memory of 1580 2732 IExplorer.exe 42 PID 2732 wrote to memory of 1580 2732 IExplorer.exe 42 PID 2732 wrote to memory of 1580 2732 IExplorer.exe 42 PID 1628 wrote to memory of 2868 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 43 PID 1628 wrote to memory of 2868 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 43 PID 1628 wrote to memory of 2868 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 43 PID 1628 wrote to memory of 2868 1628 ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe 43 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe"C:\Users\Admin\AppData\Local\Temp\ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1628 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2632 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2672
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:568
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:112
-
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2732 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2312
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1264
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:852
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1580
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3052
-
-
-
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1280
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1648
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2132 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2176
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2896
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3048
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3056
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1536 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2264
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2692
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2588
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2708
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2516
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2868 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2760
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2556
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1844
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2652
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2528
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2236
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2116
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD5a53f3a14865ed90e5cdcd265ed176fee
SHA13eef9f9ea4c5753f8d2dc7e0d05fe9ee146d2b8a
SHA2564e5b9d8c0bc73492364fcfa1d9419eda5bb7112fa099df702c63972740c19fd5
SHA51295d1ea28ff278b126f2f2c1b24b5ebc9e13ffced022544b48549bf8240c352058d63c70bc3f640d3cf2b882c8485b0701ae3d0506c8354df390766a831fcb07b
-
Filesize
45KB
MD56165a9e5d192f294aca61cba474f3584
SHA122467a4693a4f153a25f198e1751a69176960b88
SHA256f1ee1180ec73d96be3da928d88ffe480913d89f8d7dfb9b3088ea3f51374f16d
SHA5126bd6673b88aea89308880ec3c13488e56c797308a5b12bb0b0d018a0e1812581bc9426b4124abf8ade8762f05d1572a6fb529e0db076963da48930dab2e09366
-
Filesize
488KB
MD5ff6a0cffa4b6e26d528a250aa3efe6cf
SHA1f65c331b6ce65f9eacb5ddfbb5c0fa7826669693
SHA2568244ce36d7aa96a872e6660096a990fa37d0cefdfd563cae64b54ad324251df6
SHA51252d497240d3a8dcda42c04178c58dd5f9ac31a7a2a94c6d6eb6e71010ffcbe79c26533f6a224fcf846799e9105d6e8a2e6bbb6949ffd6d13823bd4f1e231fe8e
-
Filesize
488KB
MD59eb7f2329020b5025361db6bdad5b2e6
SHA1facb02099fbb9dc5bbdb43ed709d9cdecb52df07
SHA256cada4a4dd867a2a2cf0d861283cfc9dde09663dd64af7acb46c6d3b2f4d5131d
SHA51200b92da06263941137eb0f96c2a28d4eb19dc101b06275fc758e6cba48bbddc25b8cc480e41f9661eec99bcf0d94060d72845e2cf817b3b51fdfff1553a656a4
-
Filesize
488KB
MD5511221f26f6026424d52ccbe977e2e43
SHA17bda51b6bfa7c63b5bf124621c0846625e23a3dd
SHA2562bb3b037b5a5326ad1efda4bd904c1003c2d1120b758455f4f8276d392f10ac9
SHA512f243a4dfcc0ee2d4443617e581d4e6b7a1c62d91923d2ebde91e08168762555af2869b296d20fcd15e4bbabff99a7a9936f318c119eab8effdcf140aab15d49a
-
Filesize
45KB
MD5cc01c746c0c41f62954aa40303c5813d
SHA11dc2934415483d8b6e04104873ef27d491e531c9
SHA256c986f1c37b12a6df86e24b1869b274b79d57f09d0b8f5a39765f9fea40ab1b6a
SHA5126456e2057934427ab7d57ef9509df6cfa37880188b4272e8300e607d5d93eb762cb2418db383c05ec2058309a12811dc462700af140b668045805f6b0c847338
-
Filesize
45KB
MD54573e4fb03ed58f1416329b311e3777c
SHA1e9248ddf0f396f15113ddce50274a06f61bd2117
SHA256ada627fc02d20c3b0bed8dc0a40b85329e90d64549e21febba5e3ffc96c3b7b3
SHA512a6c1f0398b2de1be29af49228a1afa1455fd7632d80d9f635e63f32fe7c72d9fef7fd5da920687e092b0eac62fc4bcc39d71b7cec43f5f963424eed4f81b2303
-
Filesize
45KB
MD5886f66d1ccc29de2f99d157faaf78408
SHA14a83555b69af416c07bec17c4959a0fa9a7a3188
SHA256a9a5220d6b8e6c269820ca705dc3e96026888d9f08162a4afbccd16afaf19dd7
SHA512533b7dfe7c1e67e8d6addba74f840d856f4693c2ce1ed3558596697e2df9a45957f8df569d5b588fac1246129ee83c084906b84fe3ffb78a8804f5a964371623
-
Filesize
488KB
MD568d75a15052d688941917721d0b22435
SHA165280819eae0be8bddb2db792c5774c011c89d55
SHA256e1dd612909f77216b393949a6464a21e710cb09f7b1f7dbc2f880846556b9f8f
SHA51266073859c42091ff90d291c53b1e0d01c9cd037bd053b6d7963e14ff38d484b6762668ec111880b2d9a54cc9aee49426c2a71974e8c9d10afb844e6b00295d10
-
Filesize
488KB
MD5f66f75218348ed8a69f67d59c51e34e3
SHA1a3d47081db50beb02946000669c6b492280c3dfd
SHA25612db3e91315c7578f895c05a23b6468b7fa63e9a9e25f06b429ce8a03181487d
SHA512953c923271ef154746ccbfe502944aca1993a621cf23faac50ae553a2717cf63ce17c8a7f6bfbfa3087ca0ed975bf4409448633d18cc51c9a04417b20bdaa54d
-
Filesize
488KB
MD5711a95e44dad230fb9a6ddf174643de6
SHA18c6d0af56542b7e0fb23cec282e0bdbe3b6bb67f
SHA256177082f7d55b8f051f0fce0f669d6ff8d859a642d6d19d1990a5830964d0160e
SHA512f3abc77869282afebb55c23b3b8e1426ae02b612369cb80b9eb599d89448eb1cc46fe4d690e6c2cd25ae36dd6c34ebd05f59057b36ecb3d7015079650c41e65a
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
488KB
MD532fe05c3d403a3a74b91ce19ca6fe8fc
SHA1d47e4c85a076956ff66806f34e2a58897c45522a
SHA2569261ccafe58311579a312779eadde6e38332cad11a4dd612de9bd67f3a0a29e7
SHA512f489b4e0197f09f97c667284aaaa09bd079e55049424631b5fa77df29704198fbd367efac7faee4c49bc416af32efe2c1e5da44a18bd40da9360852f95217366
-
Filesize
488KB
MD5026631b8d91052a8be034f8eaceb847a
SHA1bb928341ee38f3d221c14a32de2c58bc237e3731
SHA256539335f7192df7a61133e8ccec9487fef4f8eebda8d20aa6a84f85905cada4da
SHA512fcbf91c829bd4153bcef4cd3d6ff6f5413e49709988dc0ddaa5a3841c8643b1cf36fbe5d68b500f8a023c738d283cf362b16970ebdb97265cdab353cc6e2e36c
-
Filesize
488KB
MD51bfa3afcf3bffcf07cb542fe14b6d813
SHA1f47123edd20b589f189cf89bcd2ad1ba1d22974c
SHA256695d598c09e86e67c12162af9b3d6c75de10c13cc53847bbcf62fe432bcddf3c
SHA51281e3625ef236836d821de594e861f0f2b18321700d3d77088430001689a07c8b91d0946bd24164c31afc3683688732761c932b77386658cb3943d510efc30cf6
-
Filesize
488KB
MD534043d652c6669c2bb3de1aa396f48b6
SHA102d07ad408073ca4f0424fd6a8dbff81f204f5af
SHA256ef43e3690d581f49a3b9d534e8ff3873f3811124c5b08ab9e0654e9018d5f34c
SHA512b6d99ef57767ba1aaf9725b607dd64f59c5bbfb349a276a3e847cc5eb96f2dc95ad8f5cfc93bef9c386f2b74330059e0664daf6856192df2c77b5e29b4ab04af
-
Filesize
488KB
MD519508bca16e088a656a910cae309f3e2
SHA16a8d25f0785e5301453eb9238656d012a84566a7
SHA256b9c56b5445a76781810cdc4d9704130b74080394d85717803c292cd5497526d2
SHA5122c43a0cb04c4aed95469182069a50f35942906e58b870c57d2b4fe028d0a35a63808eb1e3891e094d9f0a25ad321684e4c7c141ecbac360627e34ccf21da2588
-
Filesize
488KB
MD52a8280a02020dac5225b9e4a6b0fb36f
SHA1412923e7e4f1c046697453cf566fb325f6e3aea9
SHA2567f9a0cd7c4cbd679ae187fd5d15bb89520cda172e86669b7d887e5dc40714df5
SHA5120547fb4038e0273928092673b6e616be39aab8ee7a6b6566916e0d806282b0281a5a1894ef951193e50254541e0e0ebc4455c75d7a931815b8e626ceb14d655e
-
Filesize
488KB
MD59ee767785cf562068c1a8c6407d7b787
SHA157525e8b13d02b36745ee784e20fbf3748b1bf1b
SHA2564c00025c8ba353d44260ccdbddbbdc41fdaf6a1d2bc5be3cfcd424b395da3ec7
SHA5122caae992085433d14a291a5c0c62df163049bc546f8069b9d3fa77db1d8b515fae15bedb06e50a6c6fb30e86f2a79217d0b326ca73effc33a014abe70adf36ff
-
Filesize
729B
MD58e3c734e8dd87d639fb51500d42694b5
SHA1f76371d31eed9663e9a4fd7cb95f54dcfc51f87f
SHA256574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad
SHA51206ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853
-
Filesize
488KB
MD58dde1ec3939a6d92380faf2cdfde790f
SHA138ae0a941e6435bd028adf7427bf65b50da22077
SHA2561eaa8790c42a46122fac7a1b81efb449af3f37535203a309a34ab34a1707e00f
SHA5126f02ade870bc51d67e6574f5f82e2e642224c1576547c1568e7ffa89c3c187108bcba2b42ec3c787b4ac43f218a51d2423d1620c954b121114045078785419ec
-
Filesize
488KB
MD5abcc640955db81d2af8a6086f729d1ba
SHA17c39327a6b25cd8083503fc95667728917ce8695
SHA2568410a53c5966ec4464b52adf096221e12013b3703bfc7eb21a0c47126a930d87
SHA512f83ecb4ae48162857beafbb357df42ed192311f2ad5a504df3a25338800925128dae6ac717b2155148dc77726d6063ef6d16cf56b7127747fa62cbc4d84c05f9
-
Filesize
39B
MD5415c421ba7ae46e77bdee3a681ecc156
SHA1b0db5782b7688716d6fc83f7e650ffe1143201b7
SHA256e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e
SHA512dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62