Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 20:19

General

  • Target

    224650f6485d4404cccd4caed4d224adeb55ba4e4685dc3e29e6623d60e4d473.exe

  • Size

    351KB

  • MD5

    7c15eda61f8fdb33490c1eab50468d36

  • SHA1

    b85ba3909f3706b873c409c17b7f17e7556cde5b

  • SHA256

    224650f6485d4404cccd4caed4d224adeb55ba4e4685dc3e29e6623d60e4d473

  • SHA512

    4652cff3751c5ecd052d1c6151a7af79957e2a5a48370989df78161bdb61d7864ff774bd5056f9f6bcac92e51bf92567d798aadc314536a61e6aa070a1eea84e

  • SSDEEP

    6144:V/OZplYYZplx/OZpl7/OZplx/OZplQ/OZplU:V/MYqx/M7/Mx/MQ/MU

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 53 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\224650f6485d4404cccd4caed4d224adeb55ba4e4685dc3e29e6623d60e4d473.exe
    "C:\Users\Admin\AppData\Local\Temp\224650f6485d4404cccd4caed4d224adeb55ba4e4685dc3e29e6623d60e4d473.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2488
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2556
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1896
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1048
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1656
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2336
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:876
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2204
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2980
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2496
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1572
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2616
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2744
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1448
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2868
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1980
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2168
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2672
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2612
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1112
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2852
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:3032
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2532
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:880
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2380
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1628
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2992
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2108
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1708
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1584
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1940
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1808
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:564
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2812
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2572
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2996

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

          Filesize

          45KB

          MD5

          e8c7fd278f0b563e7616aece29681e6e

          SHA1

          06a2b1ef9d09d85ebf63def7211e5a425cf62c28

          SHA256

          61e113dba6df3542ebbd18410ab15747b7d7869f794c121cc5a5378d06536835

          SHA512

          53b40b5a019be26bf91da928b6ffcf9932baa0c8598cfaba12582e0227f3b3aa47dd4be64f5b4bea7f1ca953b2ecc1b41670b34f73901c96b12114e77ea8831c

        • C:\Users\Admin\AppData\Local\WINDOWS\winlogon.exe

          Filesize

          351KB

          MD5

          a9a45ca8db1082fb552ff50ccbbd057f

          SHA1

          24a6fc9d936e0144be8fdaba6d74d0e89b454d97

          SHA256

          7fb66bcdbc3ca1632f7e208e3d161e6f8ae600f823a294dc1d82427b3716f82c

          SHA512

          2f3ca688997021c68c561affcacfa1678accf1c79a3eaab788527cf59183ed8f909148059903ba527af289a9354b1ca967ff8eefad2ffbf9446b9c394d4a5734

        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

          Filesize

          351KB

          MD5

          ab69d53e66db9f91b0de60a3948a7ba5

          SHA1

          9392fe7c195da38aae2dd167f21d87441d8c1220

          SHA256

          3e657948ae425607fa6856f8065c869e08c183b4ca5b2c04a8f2322fc5ec1647

          SHA512

          408a20b6bb226f4453271596565783841e7ad1acd8eaf3c7a28161d553bc3c37c1e99bbc47bb809e8bc9dbe8fad20b02560e9f37557c41f0e9263e6494716530

        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

          Filesize

          351KB

          MD5

          c6dbe50a6142e61cca424d4d87c5bb79

          SHA1

          d06f4a7397204131494a0917a2bce24003e1f13d

          SHA256

          7387d573f2c6e03a1f79d187f0a85aba5992ba7ffd7f5fd16ce6471906a3cdc2

          SHA512

          09a796f7b4679566b9c245e66d977a3719a7411c077bcc78535245539c37103b5f1c9961e650058ad9c19baea0e25b9b370001f0e0b654fa756ae9cf6336c891

        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

          Filesize

          45KB

          MD5

          3d0013f0b8cd51965784cd7ba89bab79

          SHA1

          18fc098523ec3c6615170e89a16940643c1361ff

          SHA256

          e663c8ca0d90d7710adcc0e03cfc969a65d7babde30c465b5abdbc665e30571a

          SHA512

          129ab76865d6428fbcf7b42fa09ddffc037425288c8ed86efdd64ac9a8bb42bb22833b0506dbf925003e1984b0c1779e3ce2462b42a820d8c20ff4901e0bf0ce

        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

          Filesize

          45KB

          MD5

          cb324faab5d9d5e81492d31a7370fdd8

          SHA1

          c5c68eacb4675d3c781a7ee4eb7a997111105fb9

          SHA256

          6ffedfd622297c898183e8f6b12e1c6ce05f064d56d05e5d19b2aac6c81a1f01

          SHA512

          190f326f9439e22f532c0217a419293efacb81b4ffc91c4c4ace2c6632fa1bfe0d09fba2bcfaaf1599d7e6545bf1421e7c1f3f934797bff1de9153d7ed838321

        • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

          Filesize

          351KB

          MD5

          08fa076cae3b08182602655756e85176

          SHA1

          555d14d91f31dc6776df5812559d7d345595b68b

          SHA256

          3979edb7f8d4fa73ff6fa54a1cea655c5a20c10ff8c5441c4b5228f7e36a5c51

          SHA512

          fc632208b82fc8e7c482b92b7480c93277dd91563af812843f9845bf544be51c6f69c9dd3cc09acdc4034820b6e05349a2f208cc417e593ffe613795e5c4d610

        • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

          Filesize

          351KB

          MD5

          51f253b20652d6ee50f57840a86e3bcb

          SHA1

          06850a6135631c00f978844b95b7256a14717356

          SHA256

          2757edebbab3128e88964583dd0ae3d77daa1f97f89a123623fa28db2492758c

          SHA512

          8e3751af7214d19dfb368981676b30df019a0dc921bdee0e8e9cc7b2cf0a2a625aeb4b22256bc2f49ab460419a5bf307944bf33be64bd946442bcddbb1019c0b

        • C:\Windows\MSVBVM60.DLL

          Filesize

          1.3MB

          MD5

          5343a19c618bc515ceb1695586c6c137

          SHA1

          4dedae8cbde066f31c8e6b52c0baa3f8b1117742

          SHA256

          2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

          SHA512

          708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

        • C:\Windows\SysWOW64\shell.exe

          Filesize

          351KB

          MD5

          776d73363a374705a2ee6fc13385b8a2

          SHA1

          46e2a61dad48ced59fbe61da5163d30a5a9404f5

          SHA256

          7b70669769b66c34c3dc74dd11ee50e531468ae5a60ed9360a2590b230e486f9

          SHA512

          79557da875d506e16e2dc5162e38c08b20fe25d192125bcef3ba448c66c40699ea649716e3d8ce301924dcae9c576d57a4d5dc3cf84335694185a1c96bbee6ad

        • C:\Windows\SysWOW64\shell.exe

          Filesize

          351KB

          MD5

          7ad35b826c9b8b794146261a534a8abf

          SHA1

          4d703298d411f9019de508e1708281b3e9e1af71

          SHA256

          bfd15398321e6437890ea617b6f969cb1c7b621202a2edcbea279e42cbd1ae50

          SHA512

          b58364fd1cc896b260b9b976eb9c19683e8d73b6a7e9639d7492c28fea01ff3bef127d442173a3514ac423114cda6a1745109580f568f324dc802fd5599e9b82

        • C:\Windows\SysWOW64\shell.exe

          Filesize

          351KB

          MD5

          b2696cf8ce96669fa8bef8ad8e491583

          SHA1

          1ab86b6689e1fd55d7027ea255b2e90fde8bef33

          SHA256

          09e0197fa0a77640c7647dacc0bad975fdd2e172bfa0ea837d5caa22e1a56ce4

          SHA512

          4eb5f09056d8c32992b7b6b099ed5820d00267e416c3edba68ed31ed21b9961930b1adae24dd07b4f8bc02ad8b3930174aa6214d548bc3040e5f2d07b7b8d162

        • C:\Windows\SysWOW64\shell.exe

          Filesize

          351KB

          MD5

          7c15eda61f8fdb33490c1eab50468d36

          SHA1

          b85ba3909f3706b873c409c17b7f17e7556cde5b

          SHA256

          224650f6485d4404cccd4caed4d224adeb55ba4e4685dc3e29e6623d60e4d473

          SHA512

          4652cff3751c5ecd052d1c6151a7af79957e2a5a48370989df78161bdb61d7864ff774bd5056f9f6bcac92e51bf92567d798aadc314536a61e6aa070a1eea84e

        • C:\Windows\SysWOW64\tiwi.scr

          Filesize

          351KB

          MD5

          dc7bb70e62fd67c865ca684cf71d21c4

          SHA1

          49470599d0dc022f99fce38408364a0906126d2a

          SHA256

          e764a9e24fbe0c3e561e563cb65d6d0272cdf21dea556ceb5f5e65044642a55d

          SHA512

          0cf7b9987b1999d9faf6c8121e6833aeca2ab07a2bf57a6c62e5b45446544f972a473e400a6611f6e89b1ac96ab8626b11ba11ebf463b87e01c54cdb9587a88e

        • C:\Windows\SysWOW64\tiwi.scr

          Filesize

          351KB

          MD5

          b3e679f12867d6a89b1aa352fe9bf138

          SHA1

          cf02c75c59922dcb9bdcadee3f43af22fcb9c908

          SHA256

          c3097864c607855735476177ce1baaa1ec14a2eb4a81e4a7f6ecfde870a1a2a4

          SHA512

          928495d440c4bb8a3eff30a056b91613102fd699046116a0d58650bf756627fb86f05323511228bf54c7673efd90e0169f5f6d6761983f0193a38776d1b35f79

        • C:\Windows\tiwi.exe

          Filesize

          351KB

          MD5

          4f89ea8fd7e29eb089e84162cea71ffe

          SHA1

          c864cd99dcb0b8475dd6451137fd1909cdfc600f

          SHA256

          d412d57fa6636015c77bf8b146770301047099bb08b6cdf8359dfcc13c17c9f7

          SHA512

          5d9677cb7414c90da1b269e434ebec190b61ffc16230f05e28eae3def6b07a042c98511ed3fe7bb83723a5cd4246849650e0f459fee4d48bd84aefbf497004f1

        • C:\present.txt

          Filesize

          729B

          MD5

          8e3c734e8dd87d639fb51500d42694b5

          SHA1

          f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

          SHA256

          574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

          SHA512

          06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

        • C:\tiwi.exe

          Filesize

          351KB

          MD5

          db62ad45b6823da6368f6461441b6394

          SHA1

          d5b8ae684f2f77fec2182f31901cfc8a6e67ca28

          SHA256

          1bc1be27df7d7838b5c4b4ff9f058c518577999bc0b1146c89ac82b921eee018

          SHA512

          2fdaaa3ee783a6ec945ccd0b13162c35866fc8260081eca73e5e4edc80db5a60a77767b397131558c685c69ef805b35672fd935705fc1c436985d1ce4e6a6a3f

        • C:\tiwi.exe

          Filesize

          351KB

          MD5

          7a6d8caf751c390228eae19afe4b6867

          SHA1

          06d0c8b224c43ade1b983764be8f51a822144cd0

          SHA256

          c55a61158af90a3351c991c2f256c320da4400add20e9d007d480ebc075c667b

          SHA512

          1ba701dc436dcf85b95c89709e13a811d20d56fa92af0ca65b030b283e1b1881fdc2e8ee116ced6a137c10bdfaac2141f49faea3758cf522e53068c6dc0fd124

        • C:\tiwi.exe

          Filesize

          351KB

          MD5

          3c8c68f4a73fbb61ad3bb749a4ab73e7

          SHA1

          8e9d7c40c86f450b0d3063431a3f05ace67d640f

          SHA256

          699b7473057ca65175d05baba113140e08dd4c78c18bb5ad74d94e6843e2038e

          SHA512

          f94551225f319ab0c406c1f662888268c1bc9b0c870b6ab452bca65713a0ce749294575aadef6fc597c48e953adc1e15567bed63252cdf8944b8d983d4d4357e

        • F:\autorun.inf

          Filesize

          39B

          MD5

          415c421ba7ae46e77bdee3a681ecc156

          SHA1

          b0db5782b7688716d6fc83f7e650ffe1143201b7

          SHA256

          e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

          SHA512

          dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

        • \Windows\SysWOW64\IExplorer.exe

          Filesize

          351KB

          MD5

          2b59bed7f909dd0208b60cc5a3eb5e7b

          SHA1

          53fb9dd945afc784039c257ed8f3f60a912be70f

          SHA256

          2b9c283c9f0b90cde277e61c050c339449e323ee0e3b4220864def8594c95e75

          SHA512

          e28448297f219d85bc7372bc0aee46bace20ea5c1360c8c4c2db2012118aabeae288b9061a48eb97b43b8f65d6e782d652d0a0357b420c7a7903b25ed30da453

        • memory/880-433-0x00000000001B0000-0x00000000001C0000-memory.dmp

          Filesize

          64KB

        • memory/880-434-0x00000000001B0000-0x00000000001C0000-memory.dmp

          Filesize

          64KB

        • memory/1048-241-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/1048-291-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/1448-170-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/1448-166-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/1448-178-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/1708-441-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/1896-238-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/1896-236-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/1896-228-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/2168-355-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/2204-435-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/2204-112-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/2488-180-0x0000000003960000-0x0000000003F5F000-memory.dmp

          Filesize

          6.0MB

        • memory/2488-239-0x0000000003860000-0x0000000003E5F000-memory.dmp

          Filesize

          6.0MB

        • memory/2488-179-0x0000000003960000-0x0000000003F5F000-memory.dmp

          Filesize

          6.0MB

        • memory/2488-440-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/2488-182-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/2488-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/2488-165-0x0000000003960000-0x0000000003F5F000-memory.dmp

          Filesize

          6.0MB

        • memory/2488-111-0x0000000003860000-0x0000000003E5F000-memory.dmp

          Filesize

          6.0MB

        • memory/2488-110-0x0000000003860000-0x0000000003E5F000-memory.dmp

          Filesize

          6.0MB

        • memory/2488-99-0x0000000003860000-0x0000000003E5F000-memory.dmp

          Filesize

          6.0MB

        • memory/2488-98-0x0000000003860000-0x0000000003E5F000-memory.dmp

          Filesize

          6.0MB

        • memory/2532-423-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/2556-242-0x0000000003720000-0x0000000003D1F000-memory.dmp

          Filesize

          6.0MB

        • memory/2556-308-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/2556-240-0x0000000003720000-0x0000000003D1F000-memory.dmp

          Filesize

          6.0MB

        • memory/2556-100-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/2556-458-0x0000000003720000-0x0000000003D1F000-memory.dmp

          Filesize

          6.0MB

        • memory/2612-411-0x0000000000220000-0x0000000000230000-memory.dmp

          Filesize

          64KB

        • memory/2612-412-0x0000000000220000-0x0000000000230000-memory.dmp

          Filesize

          64KB

        • memory/2868-181-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/2868-231-0x00000000003E0000-0x00000000009DF000-memory.dmp

          Filesize

          6.0MB

        • memory/2980-298-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB