Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 21:19

General

  • Target

    83e301b31b019b229c64aa33b6c15420N.exe

  • Size

    488KB

  • MD5

    83e301b31b019b229c64aa33b6c15420

  • SHA1

    99a5746b0467147bd6611fb7c8f953f0149d7d6e

  • SHA256

    7184edb4daf97a850035a3f8e38a7fc750057c064910251d1d0e19e3178ea088

  • SHA512

    4159cf739455cb8f6b4e41e8c4f16a24c77dbdbe577512fcb3de2a67480728e3095b802e192fcfe8486d6a55c8809e0fb4fe70b2964a2fbf82cd391b747e674e

  • SSDEEP

    12288:V/Mq/MP/Mx/M7/Mx/M4/MpBE/Mk/M2/M1:V9K2O2HIBEd7M

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 53 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 6 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83e301b31b019b229c64aa33b6c15420N.exe
    "C:\Users\Admin\AppData\Local\Temp\83e301b31b019b229c64aa33b6c15420N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1656
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1560
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1912
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1044
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3052
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2352
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2888
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1176
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1260
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2348
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1652
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:872
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2684
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2452
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1864
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:292
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2944
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:1872
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1408
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2812
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1548
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1684
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2244
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1212
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:348
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:1904
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2992
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3060
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2104
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2892
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1788
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1012
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2988
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2580
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2804
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    7fd9353109eee08240814b0f6ea1365f

    SHA1

    545678b22a0c330596063181e5d2d8223b2ac780

    SHA256

    6aeeaa39a2b728e13a45c30315414b251d5e3fcfc4a664511841b4deb4e7666d

    SHA512

    8013269a079eeaf7a7f15f72aeb5d720d776e1733f45ebd669427638e93dd10b52b4a6a33f1f9952df2437ccb53b0f6810121afa5b21c50aed9bf4a2d62ccee9

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    c88aa57a56eb7a42c799aeb71796e8af

    SHA1

    bc1c1f2d08fefa4b379d6a8f4cc7bbc9af04bbd7

    SHA256

    e6c1929c07bdd9d2dfbc3cb22889fc44f3cfcfa15be12389812e7f3e9557beff

    SHA512

    0f5a296179616b8fbdb66ef9c9ad979a11b0cdd8842d8fd3dea681fbb5e7f2d153fbea5efc9afad923ce2cfbf93b56ed0ea4d47a9eafae4be443b87748ff1713

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    ad8f757ed8fbd67cf724dc4b2246cf43

    SHA1

    34adb5054ce63541d51ed94d803fffa92a2c5bea

    SHA256

    b3049aaf4102fe22ffaf21efdc57ff6d2e387588db7bbb8b3424887bf8eb109b

    SHA512

    e322650078a82a8cc28614fd72e029d0edb53e86553f5be8c3ab159d197192c7a556647f0d96d62fb86fabd3b9ea09d18da104fb3a9c04c488c1c20b0ddae66e

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    84ad2823c10701645b4d91e03ea79a4c

    SHA1

    b91afed0558a2d8a7788ca376d2c566023a8ebf1

    SHA256

    8f6d665ce12a08e64af9fcc9ddcdb6f642233659a073238baa1e9535d8cbfc96

    SHA512

    754bcc6b1b407a611f2e9dce98e098543418bac70d58c46b2b04273abc91f0e2412d748421c77b88a82c7ae9e75b79a69b1e215d4ee400a0c9116116584d1c0e

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    a9d08e512aa74cbe0082614b97fe2382

    SHA1

    0c29d10dcb119adbd21da55f873441a3c34253d4

    SHA256

    f26e72e57639c978af7218c4ff26d3bd4a50f02bb58d94e2b5aba72739ede875

    SHA512

    605cfea370c66348b0ebd941cf825c9a8cf1f41e0824f9c36354f6a06a10a07512def80a06c9b3b96ec6cae0c91507983188c999500d805a5fa155ad63b4cc82

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe

    Filesize

    488KB

    MD5

    95dadabf2e32a9149381e29acf990ff8

    SHA1

    bc2ff705d60055ec3b13e97896a3ae8aaaedc97a

    SHA256

    5a54d1edfec20fabae038ab071a85f2aabb1bdbe643e07cb9fd71334816c482f

    SHA512

    f36813c056033a12862223b5e1ceb548a15434e8a60e5bab7004ab8c15f8bf3554ec1648b4de6cef63765632a5b6ea37cf58af563d75b757eeb2edcbc029cf09

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    6715b9f7c0ee79533cb52e923ec58cc3

    SHA1

    1f6349e5f01abaaf5ff74b06f40397b97afe80c3

    SHA256

    7a2bcc8f61653eca25dc65645cb1084e2dead423e0d926182eddb5ce62a3ac36

    SHA512

    1f2fd8b8e8923c864ddef10b841da965c92261e55ed6dba506448fd8f2968257dde5e78b973937a5cc867c75d49ca9ecd6e986895228be02ed6bd8fdbdde7415

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    fefb076365b2814fdd9445f92907887a

    SHA1

    c7512c11b4577f68196038d0cc223fb31718c4d2

    SHA256

    f73d2d860a2c82be082a5579de8c51803f29f4b3d751aff70a64f43842fa4850

    SHA512

    43bb81d078c3f6b0c94fad72d75d20b8d99e252ea56bc8a2123201589781a150e3abedb95e3d2696f099d9a44b01f13d048d5098c8103bebbf317acebdaca61f

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    eae80940d89ebff2e82cc9c65768de80

    SHA1

    b4deb8148cf0edd62bf97a9c9d69be19e274b643

    SHA256

    7b48d43d7119e89f95514ccafa60d880c176087aa6884f861869b27e96a5aa95

    SHA512

    93ebea707a6fd892839695a72176305b056ba1f9db93f0f108a540a76ce78fa49d74d54ee8ba0b8206a5500c6c36e541888266976bed6a224e98d8eff3b77dd6

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    83e301b31b019b229c64aa33b6c15420

    SHA1

    99a5746b0467147bd6611fb7c8f953f0149d7d6e

    SHA256

    7184edb4daf97a850035a3f8e38a7fc750057c064910251d1d0e19e3178ea088

    SHA512

    4159cf739455cb8f6b4e41e8c4f16a24c77dbdbe577512fcb3de2a67480728e3095b802e192fcfe8486d6a55c8809e0fb4fe70b2964a2fbf82cd391b747e674e

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    b586c71b89bd5e9098e0d1d7b744b651

    SHA1

    9f0e98a8e395313fc5bef7e34a26718133b7b12e

    SHA256

    68a95c6cf210985c1aba4e620fa26c8d2dc2927764b07532161eb86752f8fdd0

    SHA512

    e1543544b77411301c8d39f27dcd132a582dd5a87634e321a07c340acfcc33cb9cc3ae16667909d9d639d7c6d3e074dce7c4117b1df59c4e7987a07420c21fc2

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    dd7ab179223e3a02b8457c9223df8f0d

    SHA1

    cb95894ba896e91630e2a85239d3a99b1affb7d0

    SHA256

    54daaa6ddd12ca8997b49d426ee76064225bc9a10f7880c93b445a41420aedf5

    SHA512

    c22660a0e4bddebc01c28aa21f5b6f24ae5ce9294c3fc49ca96c57a28da79de39390fefee0d2e747d68ead5175c43774dd7a818c7ecb22ec3cacd126d925a1c6

  • C:\Windows\tiwi.exe

    Filesize

    488KB

    MD5

    d4a52efa733130d741309a75d9665c81

    SHA1

    871abb668a6b0e80611334c028782509829c50a5

    SHA256

    0269742645368c2a4f1f228fc9b1366be6fc72022f6412d82629e36a3edfb8f7

    SHA512

    b85ec7d1204227d5464a10e8b0a7aeaea16e10ae7b0334c8f18645c225aed4fd8a4746fa952ece6ca0130d544f99bd088709d1a9ef2ea6f2cc0b2b9ac8d14879

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    488KB

    MD5

    ae9336c40866cbbdb8cf84c8b8cce5e4

    SHA1

    bed2d7d60befd7465b54f1c7bac0456c31d4a976

    SHA256

    ecaab7cc2677a07d24fe20bfca7df0e14396eb05d0256956a4bc46806536e4da

    SHA512

    58478d7838551316cda4288cf8413e9b77ef3ad222c8a914f827004e45e853370d2f4acc7d6a20d4e019f88ec0ebca4693152d252449f9fa51796f677a00c337

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • \Users\Admin\AppData\Local\WINDOWS\winlogon.exe

    Filesize

    488KB

    MD5

    43542a2f685bc783886f53f8c6c0f70f

    SHA1

    7437882b89bbafbba8edf9e0ffb3fe6030d4f71f

    SHA256

    7b7570a7c5c718d8b29d6d0db34ea664cb0ba25aac7c9353b09add79ec449132

    SHA512

    033c0841d08c17fc669e1d36a80be3b3e86c10da55cf579ae4150814684d663bd4b0977d953078bcc340104bc1d3e0cc4c2068f235301eca0d64378faad4e9f8

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    488KB

    MD5

    7a0d2cc430ebeb1f3ffe2c76969802d2

    SHA1

    ec5dd16e3d92cbedb1fef12e1370f521e796667d

    SHA256

    f8adcb66ea9370ec6d8db199fbc44fdfce5c3a6bfb51355c697f79f7afe269eb

    SHA512

    6559775344bb06bb46654f3706fd8e67ab92b1d84f05792c3ae4af6f5348d07d180c87e41966eb615e9043706e1d1a02931cc007608e8cd160125ab099276eff

  • memory/348-286-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/348-191-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1176-371-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1176-112-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1176-274-0x0000000003980000-0x0000000003F7F000-memory.dmp

    Filesize

    6.0MB

  • memory/1176-467-0x0000000003980000-0x0000000003F7F000-memory.dmp

    Filesize

    6.0MB

  • memory/1212-166-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1212-188-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1212-180-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1260-284-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1260-291-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1260-292-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1408-440-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/1408-443-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1548-452-0x00000000003A0000-0x00000000003B0000-memory.dmp

    Filesize

    64KB

  • memory/1560-468-0x00000000036D0000-0x0000000003CCF000-memory.dmp

    Filesize

    6.0MB

  • memory/1560-285-0x00000000036D0000-0x0000000003CCF000-memory.dmp

    Filesize

    6.0MB

  • memory/1560-100-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1560-280-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1656-98-0x0000000003990000-0x0000000003F8F000-memory.dmp

    Filesize

    6.0MB

  • memory/1656-99-0x0000000003990000-0x0000000003F8F000-memory.dmp

    Filesize

    6.0MB

  • memory/1656-165-0x0000000003A90000-0x000000000408F000-memory.dmp

    Filesize

    6.0MB

  • memory/1656-111-0x0000000003990000-0x0000000003F8F000-memory.dmp

    Filesize

    6.0MB

  • memory/1656-460-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1656-109-0x0000000003990000-0x0000000003F8F000-memory.dmp

    Filesize

    6.0MB

  • memory/1656-192-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1656-189-0x0000000003A90000-0x000000000408F000-memory.dmp

    Filesize

    6.0MB

  • memory/1656-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1656-190-0x0000000003A90000-0x000000000408F000-memory.dmp

    Filesize

    6.0MB

  • memory/1656-228-0x0000000003990000-0x0000000003F8F000-memory.dmp

    Filesize

    6.0MB

  • memory/1912-282-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1912-229-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1912-275-0x00000000003A0000-0x00000000003B0000-memory.dmp

    Filesize

    64KB

  • memory/1912-281-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2580-416-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2580-415-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2684-414-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2812-446-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2892-448-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2944-464-0x00000000001B0000-0x00000000001C0000-memory.dmp

    Filesize

    64KB

  • memory/2944-463-0x00000000001B0000-0x00000000001C0000-memory.dmp

    Filesize

    64KB

  • memory/2992-382-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2992-373-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB