Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 00:42

General

  • Target

    a9f92f478f7e8911cd263130c4e97e4a719050cd0030f07ca27650dab31d699f.exe

  • Size

    57KB

  • MD5

    260cbbb284f543073f34adfc4c9bbb28

  • SHA1

    d37d110c9b9fe06235ffda5a28b9b9fcb5e32685

  • SHA256

    a9f92f478f7e8911cd263130c4e97e4a719050cd0030f07ca27650dab31d699f

  • SHA512

    e5b843c6ce3da053ec97b59d34c044427e7c1bf5ae461cb2a862f04468c323fa8480d0f2cad1c8dbce91f4068c87389addbb95878771860dd3b8214a4a38904f

  • SSDEEP

    768:Nh5sxVPFXfgaDjof4ZgHqLNhldu8pGTUTY26TsGrn5wFbUzMsPzB577Xwekfp:NHsxFJfgaDjofVKn1pGwTJOlw1Urvwl

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 45 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 38 IoCs
  • Drops file in Windows directory 24 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 31 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9f92f478f7e8911cd263130c4e97e4a719050cd0030f07ca27650dab31d699f.exe
    "C:\Users\Admin\AppData\Local\Temp\a9f92f478f7e8911cd263130c4e97e4a719050cd0030f07ca27650dab31d699f.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1952
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2652
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2972
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1932
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1592
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1652
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1260
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2668
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1004
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1776
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2016
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1800
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:744
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:792
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1340
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:556
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1544
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:560
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2012
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1132
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1028
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2952
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2056
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2132
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2492
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2592
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2892
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2960
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2772
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2600
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    592cd88cf4f3cdff56991bbbc66f9397

    SHA1

    2113a9a4c998629bae12f9702a795de665e5455d

    SHA256

    7142269a0c7e6d46be151cdc6abf03f7f875842179e9f17f85c9c57e033d013e

    SHA512

    2d25c5a2a5ab26318c24fad52627f6af47f145d08accfdf847e118187a6a05bf126ed479a9901941c171be168071a915afa8189b6535acf18b650a7835b12198

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    7dfe2f41ed985f669a2ce0d99108f69b

    SHA1

    90e4f47882e368143a8f0ffc4b17b866a8057fa6

    SHA256

    176f3e15995b15fd3a87363585e1725456b720de31c194ade5af6bcec2735386

    SHA512

    333e40f0f3ef7f8f6b5d4dd83025c631b6c01763436defbd96abdeb43f090de40c16ac5c80ce830984eb9133151e023ee2ee1a24ff7a4a0cb72af4ba741e5610

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    2f065312a4404452bb11b2db94a62050

    SHA1

    25b6b18608da1c037c53e48ffc1c4c1b94600fca

    SHA256

    f7196cfe0be2ea2fb5c304df07d5d2099ac56bbcc0ab0fb52a92891e42978377

    SHA512

    181d429fa8c4e1472194a6f1d905a78657f9004f8d3a212df955b68df5582be8c3bcfabc9b3f09d89e9ee1eab9d38d589cc26e0d971ec882e60edf48a11f3c87

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    71e4d7ac6aa02c168280d2fe11b1e16d

    SHA1

    6212e9b03354a4a6fb399cf50f18bf7d1d39e320

    SHA256

    87aa33e42b96776379132c100a4a8ec236e49c364863e509ed7741b2ef07b4c6

    SHA512

    5c0035f2f75f0b5c0185324c0fd0695148db9e18026945f06bbebbfeac753728caeaf1a847026d210e1744a9814c517668fdf168708c158483a26fe6c688bd6a

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    57KB

    MD5

    1fe05a42e51d417d4466c21b92d6da50

    SHA1

    f4a8845966cb9553dba2f1c366523cd817a6b196

    SHA256

    88210333b370d8838aa74bada6a6ee344baba2b3c09d8bfdb742ca3f8c38eb1a

    SHA512

    417e63b5f7a2dae72b105e0ed9022b189ede4bc397b6a720396429fc2bcf37053e1c318bcbcff6768a98f8c873c023eb5259153bf63bb46963a5b032622ea345

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    57KB

    MD5

    5af81a7c37f176381262a6d38d480405

    SHA1

    c2748ef6d07060a356163088b277576b67e2730b

    SHA256

    143056d117e36ab594a820ad6cc2ba751e6e82294cbb95a64f1941c2944eed10

    SHA512

    21eed70bddee88af12863ddf409fe5fdaf4b150fa3f6a3f372cc9b9d34aa141b40849fd8d348f0da282737dbfe2e82c4f45d86dfa9fd2d0660b7fa3df42083dc

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    57KB

    MD5

    f4df4a7b0b59eb4cf90ccc5ae54abe42

    SHA1

    b3c00480187844897bcdec428dc2c2a80bd5d3c8

    SHA256

    a40dfb952eedf1fd632f60414090e1fa083204ebb9c95e218ec45a24790e847b

    SHA512

    c5454fde74f09b20daa3e4a3472bb2273356e9377402e8dfc57d9c3e749fed5e2175c8a7588f9ff6fd49bca90f718e71811794b5137ac54bdad5418fbe7fbfac

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    57KB

    MD5

    fc23e893dab61a62076aa54a623c0b7b

    SHA1

    5042ea1508580decb75ee044978248f2b15aa59e

    SHA256

    f076a22eda2140fe386d7e437a0cbdbe60b908dbe495988dc4e17436b2f6b7a6

    SHA512

    748f2254bfb8825500ffc5d546061fca0c504aaf8e766cf3e65eeaa1e690241ebbc8ee3a262f2c6dc967ea1b9ee8372728ad1a20dbbb46e533070b1c1ecd05bc

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    57KB

    MD5

    5c49dae09e70a5deae593c428fd141ab

    SHA1

    0c4554f5459f5b79432abdd68a6f166fc2c6df09

    SHA256

    a0216819d13c84b6c9cbf0e6e963d9571203ec8082bf03c864d1a252cb1c6f76

    SHA512

    6a329b3da90adfd8c36e9dc2f8a6d018ae3f86e4d331e77cd5c7da6b301d94db54d69c173ae71c0a387cb8fd83551d80e339d1fd52fd2c5fae590db11db71a32

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    57KB

    MD5

    9f86a47a926e66b9800c5ce34183f412

    SHA1

    c6be0d760a3639f0d7e7c9ba7bf500bb67b44ddd

    SHA256

    efdc7cda579fa3144c9e3c17a63120bd7603b512e4fb738d02fb1ca620a2bd29

    SHA512

    2e9d3153cfa37572c0f649171f8336a6a098114f8ad736d5cc6483651ed82ab6ea6f3651d6a4b7ef7e005bd3d4beb4f382986c2b30998a814c5fa8646efaf03d

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    57KB

    MD5

    b3afff27e4c0997223597cd5f9f217f6

    SHA1

    5350a9d918226bfb4314832ea53fb853544f609b

    SHA256

    920eb3f09b9dee544bc065d220e00b5b92385a13c58c6e79487602d8bf25e2a5

    SHA512

    5fbde4b2ac2dc3193ff065b51d77da70b8d8eb0389177d38aad2ed7023cdeaf69268140856035b612a78e71ecc472ef95fb4fba0cfd6de9547f0c32e5cabfaaa

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    57KB

    MD5

    260cbbb284f543073f34adfc4c9bbb28

    SHA1

    d37d110c9b9fe06235ffda5a28b9b9fcb5e32685

    SHA256

    a9f92f478f7e8911cd263130c4e97e4a719050cd0030f07ca27650dab31d699f

    SHA512

    e5b843c6ce3da053ec97b59d34c044427e7c1bf5ae461cb2a862f04468c323fa8480d0f2cad1c8dbce91f4068c87389addbb95878771860dd3b8214a4a38904f

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    57KB

    MD5

    07086a0b22c078c161e0e389da44d2eb

    SHA1

    9f712c8e820872f9c6734492f9d2d3afbb3efeff

    SHA256

    2a181811bd8460a574def4f6c45aff070745667dd3501b91279607e42db7331b

    SHA512

    001f9eb9171f78b42c193ef2406fc8a3bc61004fd3c0a52382755f22cdcd1b11e3afda833528f7e356ac0c40d97d53dbd231b49bf484a65328fd580c136f536c

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    57KB

    MD5

    7f60d3f66b90ef5d1ba51ef6c3698266

    SHA1

    145794ee808162b6394212ecc40c4028b2f9a0b6

    SHA256

    dc8ea8c46b4ef859c29516411293a109e9444ceb7de1812d3741d63ebd3b01a5

    SHA512

    457a32865cbad7af63f147974a6037846b194de6a828c5a3262d66eb08fd3a797d77bb1630df0f8689ac6d6b34326bb8ae1c5d215bd01cdf409c965441bd2773

  • C:\Windows\tiwi.exe

    Filesize

    57KB

    MD5

    7eef049005f58b6a5dfc55d86c753609

    SHA1

    73d6147077cfa5d81b752b7d6709ff6298a281c6

    SHA256

    42f2036c731d012836a098871822e280186a8a6f09f52eb234ea81fb675540f7

    SHA512

    7f461820b6d88b98f97504cf361680e17822ea9a7b9db1cd848cecce18aca34d91d07adac11f074b275965055822991593bfdde5fe231c0a9bfaf60b30564c9f

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    57KB

    MD5

    b322b3ca0f1727dba840c6dcfa97bdb0

    SHA1

    0b2d93f1a06ecf7950230bfa48a1e685fc2a5cf5

    SHA256

    b9bf4b2a647aa632216aaf6fcd0a0fee011ef4409d5ec4ae983fb31cbcf35643

    SHA512

    95c83d294ecb93d1789460e7a5e5415f1114d139f8843b2fe8d5b351b48e1b74785bc7c6647f51c7e22165de25e7b9a5a874831ef71061b55f48221aa5105646

  • C:\tiwi.exe

    Filesize

    57KB

    MD5

    bbec0b54a8e6323d862d41a1c711a385

    SHA1

    57b7d0025a1f52052cb177b76bad3c2487050c24

    SHA256

    5d3b54bd62309062e8c4682c60230508bdf25ac8a3439f0dc7f8ea4237da01da

    SHA512

    7ac4be6298ed551e830aead725986cf68091e765adf7c13293b6c1a553fddc8c760e5080957b515a7394d9dbad4624d3a641b26216737ea730c6a84208dfc2fc

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • \Users\Admin\AppData\Local\WINDOWS\cute.exe

    Filesize

    57KB

    MD5

    f1556174ae3327bbd2fed13a57bbd514

    SHA1

    46411bc7d22daf15c60d5ef33e6108dbe715105e

    SHA256

    4a2afa8421092a1c17433d38bf8a3ad379b73d82c2f0b908d4d05333e78fc0ca

    SHA512

    9cd03eeb2eb32cd714f90db443dc10706ca81325d16c3678049dd5a692c43a4db0199bf3face89c41744880d53e47128a39f34fb2b937b4a25f0c26d15f2ff49

  • \Users\Admin\AppData\Local\WINDOWS\imoet.exe

    Filesize

    57KB

    MD5

    cd1e4930e2ff497f5c90a377d8eeb644

    SHA1

    00ea1f8f39b28172f9befa2c2e6bc5863d947ad2

    SHA256

    7074314b60a74787166ee1cd1c917651d92693d42e0114a66977201be1ea676f

    SHA512

    0548db59bd28e5fc509ffd7da90ce2ef70c09e2c8b9820c9749d28b776bebf997c4e25a3698578dae27aa7b53237caf75e02e2179e4c1b5bdbf8f516ee79a66b

  • \Users\Admin\AppData\Local\WINDOWS\winlogon.exe

    Filesize

    57KB

    MD5

    2b77c95480f1e87472e63acc2f24c1a2

    SHA1

    a9dfddf679c42f760efd01a1bf71e6104c459d8f

    SHA256

    221b0800278352e9dabe625d90c31957efce7b2c381423207adcf11dfce71a8a

    SHA512

    beb0a3898feed6e44afe1224b59a4e80b880ac507cdda10b8ab5dd65935435a2004831e9487443dc7e8fbff086504a9f1859cea47446a28fd45872c4234653c1

  • memory/556-322-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/560-341-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/728-427-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/744-343-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/792-283-0x0000000001FB0000-0x0000000001FE3000-memory.dmp

    Filesize

    204KB

  • memory/792-447-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/792-124-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/792-224-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1004-232-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1004-233-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1028-330-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1028-334-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1028-335-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1132-415-0x0000000002610000-0x0000000002643000-memory.dmp

    Filesize

    204KB

  • memory/1132-136-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1132-448-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1132-235-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1260-444-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1340-270-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1340-264-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1340-271-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1544-331-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1592-436-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1592-433-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1652-437-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1776-274-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1800-324-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1800-290-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1932-226-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1932-430-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1952-133-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1952-0-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1952-134-0x00000000030C0000-0x00000000030F3000-memory.dmp

    Filesize

    204KB

  • memory/1952-152-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1952-97-0x00000000030C0000-0x00000000030F3000-memory.dmp

    Filesize

    204KB

  • memory/1952-111-0x00000000030C0000-0x00000000030F3000-memory.dmp

    Filesize

    204KB

  • memory/1952-145-0x00000000030C0000-0x00000000030F3000-memory.dmp

    Filesize

    204KB

  • memory/1952-122-0x00000000030C0000-0x00000000030F3000-memory.dmp

    Filesize

    204KB

  • memory/1952-98-0x00000000030C0000-0x00000000030F3000-memory.dmp

    Filesize

    204KB

  • memory/2012-385-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2012-400-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2016-284-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2056-404-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2132-414-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2132-412-0x00000000002E0000-0x00000000002F0000-memory.dmp

    Filesize

    64KB

  • memory/2492-421-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2592-394-0x00000000024A0000-0x00000000024D3000-memory.dmp

    Filesize

    204KB

  • memory/2592-449-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2592-407-0x00000000024A0000-0x00000000024D3000-memory.dmp

    Filesize

    204KB

  • memory/2592-282-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2592-149-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2600-423-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2652-225-0x00000000026B0000-0x00000000026E3000-memory.dmp

    Filesize

    204KB

  • memory/2652-329-0x00000000026B0000-0x00000000026E3000-memory.dmp

    Filesize

    204KB

  • memory/2652-146-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2652-445-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2652-434-0x00000000026B0000-0x00000000026E3000-memory.dmp

    Filesize

    204KB

  • memory/2652-100-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2668-148-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2668-216-0x0000000001DD0000-0x0000000001E03000-memory.dmp

    Filesize

    204KB

  • memory/2668-113-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2668-446-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2668-289-0x0000000001DD0000-0x0000000001E03000-memory.dmp

    Filesize

    204KB

  • memory/2772-408-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2772-410-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2892-390-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2892-389-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2952-396-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2960-393-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2960-402-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2960-391-0x00000000003B0000-0x00000000003C0000-memory.dmp

    Filesize

    64KB

  • memory/2960-392-0x00000000003B0000-0x00000000003C0000-memory.dmp

    Filesize

    64KB

  • memory/2972-219-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2972-221-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB