Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 00:59

General

  • Target

    01b91ca24688e63a0b93bfc1ed0bafd0N.exe

  • Size

    488KB

  • MD5

    01b91ca24688e63a0b93bfc1ed0bafd0

  • SHA1

    ae614b4dbd9513af82e0e30e2c8776b4e60115a2

  • SHA256

    79a43e231e92ac5ec57ac1bcb3ac36f8fdac3d354c82a42a379b4ad402c6518f

  • SHA512

    f17bea055087e90c33743af5b38a0d79620ff35594da881c6ddecaa782334de128ad02e89920f3bd362e4d65d4ef27683c1aa22958d07d7e55f042371e581769

  • SSDEEP

    12288:V/MA/MP/Mx/M7/Mx/M4/MpBE/Mk/M2/M1:VfK2O2HIBEd7M

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 53 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01b91ca24688e63a0b93bfc1ed0bafd0N.exe
    "C:\Users\Admin\AppData\Local\Temp\01b91ca24688e63a0b93bfc1ed0bafd0N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:860
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2644
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:844
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1568
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1740
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1312
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2956
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2152
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:808
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1588
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1696
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:1028
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2728
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2344
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2952
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1560
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2708
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:1672
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1800
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2816
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2376
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1640
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:304
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2840
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1984
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2536
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1776
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2920
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:836
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:960
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2012
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2340
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1712
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1152
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1448
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    60350ce576712700764f86bd033015ae

    SHA1

    70dccffbd1a0af18250ff47c070c6536aeb17d09

    SHA256

    ed14b052eedebe04f967e4b24288d484c6cced244adae92b30d1f3131fbb0d37

    SHA512

    94a3d5d0dd00b1a43b6b3eb1c5524568a0ca4e8568e3e6d4d67fea6ecb3b62b3f8f82d469374f1a00547d06e266da5ce105152988c89be1492f33cb762cc3e7e

  • C:\Users\Admin\AppData\Local\WINDOWS\winlogon.exe

    Filesize

    488KB

    MD5

    836522046f926d5514975e0947a232a8

    SHA1

    214cfbfe700efd81a8f92b73a2150d024c733f71

    SHA256

    fb7b5ff27eb285bdab5344847bcb5808695a64b5b8843b6ca99d3977f3284f8a

    SHA512

    0ee5b214d94c17d2418b6bccf15c13f5d74b33c78f843905c673a59610385364349f9ce1de36a12a799d126b10d172f7124932b1615960f12192ab99cee2c1fa

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    e61551e58774563922b9d461c0b6d529

    SHA1

    82472e0d32510ad17ae670b0ba18d09bd8c84619

    SHA256

    2859f813d99253c08b210c38b18a89671dad8317af28672266df3fcc77ddec98

    SHA512

    a64e5503620eca4507937223e579ea0cf8b705b087d1ee7243e31f5d4f35cc4901b63909ca8df6cbb4b57e02ba73e52fe1758fc345b7d65c2594c829e1b9fdf8

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    d723ab87011ebacf1987b4610238ba4f

    SHA1

    448515479b8399623ea1930b362c699d5a2294cf

    SHA256

    cbd0470bfce3ba4b968ab2b75986455f462db16f0cf4bc04956f773c2acaab09

    SHA512

    a074f6d0132c534b5673e24f8002bd4658827ecaff50f8082bad8298cd5d1e007d3daa3f9c2d353de99331083cb50c700e67a1f77f78015e06c2d6c16c161de0

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    1df4d9e21dfe2b1733aad06f5e0602c1

    SHA1

    696bb7b609b46c2f5e124fc9a92306d2c71d2a7d

    SHA256

    f07f6378055c63eb5ae391969aa10f98183f9b50af11a8cee932d6439ebdfa48

    SHA512

    0e2747f25893ec16feba704864f69ee7d44f48c72289c6031218dfac3829c40e1c15afbcbfdced323a7546c00444ed51aadd01d5cd36e97a7b23a0ae899d193a

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    3108f907562ebee22f7e47d91bb02f08

    SHA1

    c7d0ba1646137d54e2c2a733690cad3705057ba0

    SHA256

    2be9e75d70f8a0bdb22ef92b0fef42d9ff8ffd6fc6ada0aefe5902cce7f1bfbc

    SHA512

    914bfcd53011736c921b1b25c253c8ccc756c0caec2a3a48f0edf88e1ab849d2762a7804a9fcd3aa5c7a110f66965894c23344453423f3d6dc23e221feb42331

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    11279bf2b1e5aade96425c7f8477750b

    SHA1

    7c1739da531c3f4ae4258c9f1123c9d4fe52c1e4

    SHA256

    bd9d10c40c09c973938579f48acc9bdcc4a5c39f3b69131b15da4123d276d9fd

    SHA512

    c78a6ba3c10ed0b90161dbd53227b52ec80aa2788d8621f8c9c2d9350debc9afc85138bb1eecbe13859d3efce21b642e98a635461f190c6570a0eb369e49d62e

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    28621cfb96498a57c795217bd0c73f95

    SHA1

    dbd79f14e11495ef077177119da1e6e69193b01a

    SHA256

    6a0da3199feeaa77fb6051207c6612df76d4fadd7811377e039d51e12be06f1a

    SHA512

    5ea0148ba5ef832743386666e949e0549d0e25960ee4287147d34de302c100be7dda75956b00311fb811be1c5b1abf61cc1e829ce6683ea0bcb620ac0391299f

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    e3199859f10610d3c7126f6d604ec222

    SHA1

    a6224c65c3c1405cc47daa549690316bd3f3020f

    SHA256

    802ec42bb5e9d14c33055a1d7ca685e4672a2559e8ce951a21f05bc82c4fa044

    SHA512

    edf0ae64bd6c510a26f316a9a42ba2e6f426244655105915377333bf1d50a9c7ca85d7aa93a0b1536bc93971233a26f0c9cf29263b72890829f2857ce8595f28

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    cf970a02cf2e369d5eebde2f6d77a359

    SHA1

    20408aa4f725b1ea28969607ccac85e740dbfe54

    SHA256

    f43f358ac49f35ed9c73f5b0089734dc046a492d5aee7cdfcc3cff5a512dc500

    SHA512

    761a3ea437fe7656f99e558d64cb2764a1ec13004bad992034d9a9cc3b639acad8f54275a3225bf74cd621d18a9717584e6b891b2d1df43f976fdd433631e193

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    8fcf3c50d5ae2550894cc453924954b2

    SHA1

    4fa66ce3b93c4c4462230f2b179a655446007f83

    SHA256

    b99a8f19e7041dc0b43395d386e3b8935db97fdbae1e6039f37e5acc1d1305f8

    SHA512

    eba64e8c4b2a012669361546e7d15970e2c95645c4beb6d3390c7c35750eae60d46df19483bb9408fc6091f762b41a66b94ac0893bc38ae343943e9187eb3ace

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    b649a3ddca8ce920a1a533cf2ce2ae25

    SHA1

    bb2ca7b41b038ff5235c35d59239364fb58cc639

    SHA256

    5a900833831b414207d71f21f90657ddd3b870a7db03bab3542d6d24d31bb7b0

    SHA512

    057a6257ec60fc4720540d4adc21dae10178a45b3d8eb1ea858f387f99076c2cccec5002f8b17d7cd713afa477dd0a0e2cc9575d0edf6dae151531ce2877f900

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    c39b639116a22de2ee5d26fec329bde0

    SHA1

    4b9459bd30167a4c0ea266ede44cdb89bf59e54b

    SHA256

    205b7f7ab0392e824c05fa416f94e93ae541f6259e9a1aef3c16959323beb406

    SHA512

    cac73b28123e10b845951d74aadefa5861612baff5c0a8a39ffcb30449a54710c8b5140763db26e4b02e6ebc561939298ab12aa1aeaf18b0ba44d8761e1cc4d9

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    91eefda1945dc5dd2e61c665e277766f

    SHA1

    bf1d782c5446dbb14ebeceed62a0fa148a985b2f

    SHA256

    1d887aed869621806dfcfd1b88a9caf9abd0d5078044d01f4458980eb5782213

    SHA512

    dc95191ba7f9ee304dfbdfc7604e1ea74d0452cc2139bc880cd2d5194af8d94d0996b3f42e6b73a005ca7a34b97b942d0e3214fa8227493863624ea38c5203a1

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    fe633d173ee0afd1544db5d1cfa36ca1

    SHA1

    9ce961d74fbb6aca8f4fd6bcb113c3aa5d21e7c1

    SHA256

    9477684d6f437748e7d9dbbfa684e8ce277c2ab6448844e956cc2e2d5c3d977c

    SHA512

    9a6c79eb32f023000397a17ad1ba21ff89b299915ad624a16539a5cf05041a493243e9a89942ec286b755716a847347455f4b484b094f5f06654c133edaf0336

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    5871a5983f6c53a133779111d948bc28

    SHA1

    a26d21e8daaf5ab7a4dd64d56938e680a7fa2cfd

    SHA256

    a33460d0d4f4ca67d0d40d64d0a87633bf0366cdbb4255be58fc6b245c179c25

    SHA512

    85b9201c18b035f70bc386bf5565321b3f3662fa03b4fad19b4669599ad0c60e5135ff2589a3630ed1f174216e0da739f47d142b15c47e58b353a87581494fb4

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    bcd034af0d6c6a24b7b790544e08a29e

    SHA1

    d25e95a596b07286d0e8a3d40a8c4a7b39c9a3bc

    SHA256

    729d102a008932c1a4d1f79d202d237f60c3beb71a916387b860a5a09c48eef2

    SHA512

    dabc39fbd964a288384b25392e8a0213f55ac2e88d696145d80ef4b656e311894da9cdbb0f1aaa977657b22c098953726dcabc3b0a542466729c73bd5ef0e360

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    5e4c72233b658d05d4b118cfc1d34dda

    SHA1

    b45ef0d1dea7fe76b85fa8af822d981a69d3d2b1

    SHA256

    a90765c3cc2b7fa92ea5c64e1730ec3740d8a3460c3b37176925555b76aa73ca

    SHA512

    ff50ec332f398637d313e3696a005b54b49617882fd66ef9050ef7376729be6f7a52ae090f25f181ab51532405f289c31c33da681bffb098b9ef584d0a6faf45

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    599668a775a0554e016e92c12c67f144

    SHA1

    83010b0a0bce45f92bd47e7b3481ebe4f6be3b57

    SHA256

    e2bea4383b56e5003ba1cf11d2767f93989d1a6c9ddc1467b8070bca4d902471

    SHA512

    35ce76eae4b7c9d19a2438d831603b61589288775103a2127b0be386fddecd3dcc488aacf852083b9f77687c3aae8ed9aa67d3a681c72f04ee33e3f6a7f555e4

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    4c91fe55c6efa34bea40a4a803e9b5e7

    SHA1

    cb9d5bc6d7bf4fea726367fe744bcc239fa10742

    SHA256

    de980d87214ba7173d44cc8923e6a07501ced1e81374a9bf0a2f931c8c97c0d0

    SHA512

    60bcb21de96afc45679ad58379b3697814a920392bd9ec47181ffe0da0bf8981320ed85652c55eaa3c776b77f8aaa1ab01375e854cf2d50e235e23a4556cec5c

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    63e34b3258a3316757e6f7d9f79fe79f

    SHA1

    1dbfda356de9a3bed8d9c29dc803d3c90b210f2e

    SHA256

    f5d0f3ae263267365b2b9181ec9c4468fc77c854f0dd835892be631337a4ba95

    SHA512

    20ab5fae5911bd13bead5e26075a1a444d3327af7c6f62aa40bdc3055a02958cf667fba5deafd934d550cf11b3f9f6307b2f5e211e9857c871c3e6855b741ef9

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    01b91ca24688e63a0b93bfc1ed0bafd0

    SHA1

    ae614b4dbd9513af82e0e30e2c8776b4e60115a2

    SHA256

    79a43e231e92ac5ec57ac1bcb3ac36f8fdac3d354c82a42a379b4ad402c6518f

    SHA512

    f17bea055087e90c33743af5b38a0d79620ff35594da881c6ddecaa782334de128ad02e89920f3bd362e4d65d4ef27683c1aa22958d07d7e55f042371e581769

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    bf7d45a65080aa03950c1689e77aaa8d

    SHA1

    4585490a147ebf6c8092072ef12a19dc740fe73a

    SHA256

    c7b240b8ef5e90ba28557d997d6b1db5825c8d29a219201543cf1c0366da98d6

    SHA512

    032eed980e51b0be83cc52e8d5a80c5df3d4d814c679cda9d1a1e0cd5943a3db9f960eb73bd689bea95d3e1ed89c06b33c626e62ccd1fca6657878531031472c

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    cf06eb4eede33accda63163cdecb3207

    SHA1

    338fdbb57ae10b8b6de567adb9e4a2bafd6dc1d7

    SHA256

    aeb36c7dc2b40ab600cb59725ba6c7562a67f15b81ac53cabaec96e7ea670814

    SHA512

    737261b7997c472ff9e17a22224051339437d9261fa0062b10f69a31f7f2edbd3fc27f9caa21207df71bf1da72f7836a25565125120dae0df7cfd2eaf8528a20

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    bb5cd74c2cbe0bec2750303751772e6a

    SHA1

    21a194ed13d48a9446305e48c55cf68952a12d8b

    SHA256

    aee94b6b933e265e123bde039945ac2b5af9a78b0bd31542cc8ea757a11bdade

    SHA512

    d975c6fc9ef8be285a3260ceb7a22eeb3e77a6943b2a034847088b2e385d4acca2a34de5ca069fb262e2816011179ecfe00b17c1e3a29d292ad9c1e0fed5dd41

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    4a28efe61e1a29fe063c7d053dcc7189

    SHA1

    55d82308bda6bd4e27f093b35ebc28635eac35e3

    SHA256

    fc259c641a403dd699391921a9ca07b6edb4693c03b26b5b845100a0f3844bf6

    SHA512

    ab6fa2866d5c35452674f5a092bb0e37903b4e5712472aa78a3597d8f848381a4b6dd89b20087871e14065b3a6a17bf7481984103932ccd0f4a5a8d312a57600

  • C:\Windows\tiwi.exe

    Filesize

    488KB

    MD5

    d9e21065cd45b776887c00fb2ac7eeb5

    SHA1

    52e2aaabb8006666ec1df4495dead29de6f00b86

    SHA256

    1a13a0b8aa5f83b058b47d4521c26a33a8b22ae2a16aef72bc0575662b11d90e

    SHA512

    1cd32cb2571373d6969d612b13f91615288f189a85c90a0ab26cd7c629e0e4a175593a7381a99bf60e580b1b06acd50b7fbe5d2c4acd9632c3103064b8fa9142

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    488KB

    MD5

    b04cf761ec8277d063c56abe77075bdf

    SHA1

    da5e5f448c63cbde59118c07a984b201968ee9f8

    SHA256

    76b1c879cd56a609ad03e23ad83b907b42faad0d673e5a7b5301b241d411bfca

    SHA512

    686aa79520f48c8509a99133fa7cb9755bbed1dd40fbc54ce5a75506ab71660b357173c59277003f387843b6811c98f16707609cb7d65ae8d12b93094984cac8

  • C:\tiwi.exe

    Filesize

    488KB

    MD5

    12c2e8eab46f3fe65a035002e367a972

    SHA1

    d3fc2a612c7105b430115a54480982057f4df386

    SHA256

    cda358c607884b0d51991ca5092c5c0dbee8ab7911ee1a59fc4fb9217e8ad077

    SHA512

    d0068fea0d6645afb9ca384a6e73076fc0cd8a23975d3c1a09a2778cba7689692fb74be8ecab2824d2f92afe9ab6cd07664bc6331f706e1fb67b733f1c9cabd2

  • C:\tiwi.exe

    Filesize

    488KB

    MD5

    54a8d619381f2c93715bec63bdf94dfb

    SHA1

    9d47b7374f067bef093f2b65d042ebfc9f3565b5

    SHA256

    b43a58e7c254536e0f9f468672dd8695db463b4b26a8d45700387d7df4616deb

    SHA512

    597290a50b80daf0e8f5304981309cc6ff3736ae416e5d686a033eb43f9e75c25e67c56693c3cc87e4d7d82dcb0deaeda1df91478485744ca2f150d97b187e60

  • C:\tiwi.exe

    Filesize

    488KB

    MD5

    7f754c57864a8f33d1338a42ecadf9d7

    SHA1

    51061a4feeea94334acd858c77ecffa6c1106663

    SHA256

    0c2a10f887aeec547719769e95b5818cbf7bc92fbd80867103541658b01d2070

    SHA512

    69410628191a87529db6287f991dffd54db8c99e93419e3285deda810baba43f2d4cd5a966451583fa90f92a68e172b061bb5154c3068b558d995bab39c82309

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    488KB

    MD5

    364891d0c3bf4d1adc46eb045e78d416

    SHA1

    9d1009a3a50fb6e6d7427c713bc8a00b4768406c

    SHA256

    5f77d47e160226b8c1e2593d9e895c4b241eae85e53d6dbb90e389fb3e84bc9d

    SHA512

    6baad54d2dacdfb1ea79d7a08f88d28a37e5e293b64943301e3915a198da238ff8d5c73eb7929416fef9295622dc07c5e842760ee86de11e3a3487b2ea99ed89

  • memory/808-272-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/808-271-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/808-208-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/844-257-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/844-248-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/844-259-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/860-250-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/860-123-0x00000000036A0000-0x0000000003C9F000-memory.dmp

    Filesize

    6.0MB

  • memory/860-124-0x00000000036A0000-0x0000000003C9F000-memory.dmp

    Filesize

    6.0MB

  • memory/860-111-0x00000000036A0000-0x0000000003C9F000-memory.dmp

    Filesize

    6.0MB

  • memory/860-419-0x00000000036A0000-0x0000000003C9F000-memory.dmp

    Filesize

    6.0MB

  • memory/860-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/860-427-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/860-109-0x00000000036A0000-0x0000000003C9F000-memory.dmp

    Filesize

    6.0MB

  • memory/860-98-0x00000000036A0000-0x0000000003C9F000-memory.dmp

    Filesize

    6.0MB

  • memory/860-269-0x00000000036A0000-0x0000000003C9F000-memory.dmp

    Filesize

    6.0MB

  • memory/960-249-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/960-266-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/960-260-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1588-273-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/1696-318-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/1696-317-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/1800-420-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1984-327-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2152-110-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2152-418-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2152-207-0x00000000037B0000-0x0000000003DAF000-memory.dmp

    Filesize

    6.0MB

  • memory/2340-330-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2644-332-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2644-99-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2728-392-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2832-422-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2832-421-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2840-125-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2840-440-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2920-387-0x0000000000230000-0x0000000000240000-memory.dmp

    Filesize

    64KB