Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 00:55

General

  • Target

    d89a5683bfbcf6feeccd980be0229a12e32f912007c2775c830d90d3d42877ca.exe

  • Size

    488KB

  • MD5

    408124fac57fb47e5a962f0351e0546e

  • SHA1

    a992b643d319612429f7a26fca87ddab71f49a59

  • SHA256

    d89a5683bfbcf6feeccd980be0229a12e32f912007c2775c830d90d3d42877ca

  • SHA512

    9a4d2b4c9f1f38f70d7095eec7e093d9738693191aca8a6cec29c95493e6305dddb55a302e178d77c72a34a57a4c8f027c998629209e1c23f9f0efb905963661

  • SSDEEP

    12288:V/MZ/MP/Mx/M7/Mx/M4/MpBE/Mk/M2/M1:ViK2O2HIBEd7M

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 53 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d89a5683bfbcf6feeccd980be0229a12e32f912007c2775c830d90d3d42877ca.exe
    "C:\Users\Admin\AppData\Local\Temp\d89a5683bfbcf6feeccd980be0229a12e32f912007c2775c830d90d3d42877ca.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2096
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2076
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1208
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:840
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:924
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1636
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2432
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2524
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:752
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2188
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:348
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1584
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2832
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1316
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1148
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:1764
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2900
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1784
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2936
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2148
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2088
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2492
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2720
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2560
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2960
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2864
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2636
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:1312
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2356
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:760
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1508
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2324
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2568
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2632
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1920
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    a4d94edc732de0edcde87795115096f8

    SHA1

    7e899b759bb797d3faa89b648a94e61678575ebd

    SHA256

    9a404d9d196407ffff1ba4f7dee166f6288b2ee7ea4bd68cd900fbc958ab3c8e

    SHA512

    32fad6cc7e20698028748d1e5b1979725d3513b43a555b30ff4582681fa9c7d6b0ace9ea1151f461c388bfeb0808d553277011eb14306cb578b7fc0eb8b82bf0

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    3213a37299e14612054586b0685f24b2

    SHA1

    8323528546ae718f9d08897bb8a0d1db8f508b94

    SHA256

    0c5f41a0342208678e57e68bd86691a28fda9b179f60aa750530fcff1dc299ec

    SHA512

    2fe4e74b5b78faa53c3876575d5dfaa71975e867a01fb60eb9a463932905c7a9f86411ac2b5dcb84a174775ac91bbef6289edca96e8c64dd5a238e621e51da1d

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    3ecf2ad7c792bbb7c70410f502385c94

    SHA1

    b629a4d8840d746b81466d0ec56d368ef76af92b

    SHA256

    165bf2b659360dc2f3a9417af2445c9c538aa9bb1309506e5e39e7c8c6a86ead

    SHA512

    d2d1f3766277093aa6657bbb5528a242ddd5d6467f85096c08d4b7857c8f0e25687a7319e0ebb612279ebbfda2709592d61e33a336c400a8ab6331bf567cbde0

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    c1abceaa730d837cf5af0580eed2d722

    SHA1

    724292dfe68a2da580d7ef0e18852bf4d8bc5549

    SHA256

    fade368d3dd7df50ed54426771bc9a00dba6afe5c352a79a88201182283ec0f4

    SHA512

    519098cf74b307ca00d44a0c331c96b1db962988cbc8af3c84511e693b93862aa755b333dfad50e649a7960477587766883421c9528b84675ef4313b4646427e

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    d9322cfdf7436c50e76d5d041fd081f3

    SHA1

    925a351d9eb04c5ba4a9e7589d7475e8fcd4b022

    SHA256

    089769148fdfb4d7d59bba4a0848b64a94953013f494bb475284f7ff814b857e

    SHA512

    c58507e018d3d1f76a1fec0034cffdda2e800d176d2e94cfa00785f4f6fc935ebda2719f9ef4d922aead86035bf781adabd860ac1aeb354abfd276697aac2940

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    1022f9289459d404b6a5545b342d1bba

    SHA1

    4b106481aef76f9727c68b0cd0eae4dbaa96e020

    SHA256

    f46de9090dd3478b88607377cca41468d1837ad37297490dfea5693da48ee044

    SHA512

    a19c17fcfa21e5ace73dbc2eddeb3651bcc8fc25b3add688c473ae78e8ddd2865621b81e86a1cd97d2459d7fd6fe780f193468ff02370c14e635b953dfc6d361

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    1166f6447c3eb7de82d2c564f92fe58c

    SHA1

    89bcfd841b3cb984c2e361f8bc1610b18f927af3

    SHA256

    0d7bf17c211b5a09e67463aa8c8d17e38d0e7d7e62900b6c37371be874b4ce0c

    SHA512

    e061e2d264a67f6ad86319df2762f9db0a88b40d290c0e5bdf7052921e9a6f7056f10b91f69a4accec8f1fb018b164366c98c89e2d68d8565a89e253836142f6

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe

    Filesize

    488KB

    MD5

    c1472279b72915015eea416f1d0347c1

    SHA1

    9bd04f7f846faeedca8877e84ea39e2e80cce72e

    SHA256

    1f5b630f1e053898c7c8b2f5f4c8ee3ffefdc1281dbbe265e001227ba0a85b65

    SHA512

    421388d0db38d62fdb0734949976c0108e829624a2acb6852cf5b34fc093b2a9321099610af3786380298a8f228e446a42e05582c8a0f909acd22b1012415bb9

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    a42ff58fb78ffc845a8a88e893ae6508

    SHA1

    673c54305f70ef6598d64f502dce7d66e361d5b7

    SHA256

    a04bfe84417815e9eedcff051d5ce730d0c6e681ec1b7bb7a28761ab5b070e4a

    SHA512

    cf7cbdde3d182b3f8553b1628257e94cdbfb42a2a359b8cce7c0ee8add0fd49019599963e42633266a413ecfb7cb20f23b820983cc356da2076bfff2aca75e6a

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    3b46aa2f0235eca36df40cc15b33bc64

    SHA1

    8aa2e02fb7d0041637c816deb8ae461d373d4476

    SHA256

    c89c79c57ed9997abeccebca4e29b339b245a7a39e1b7303e5657826846f26af

    SHA512

    b1a176af95378156599f05464a1fc6810baa18d2e22b4153f265a843c1ab53cbecbec5905213fa3c948819d13a5c38d793acb064f05d5cc14f95bbbe05c54e75

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    ae536d5b11b4c1233eb2064348a91487

    SHA1

    e80adc79ab832b4d2e2692e0defb209851370c88

    SHA256

    3bf3a800d8b4b977e5feee3ee62ee8c12d99dfc97b761ccbfecfc2a48a074e14

    SHA512

    38a2895e08ec2543ea415f6519437a0d6183c07083abd3fd6d7a8c7418cd9abaff0ffa86b9a583f85a06b5b5fd00a9d5e0419e8bfc7d39a67548eaf0f4f701bd

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    f3d2cbba8614377e41e566d235bcefec

    SHA1

    bbd0b2d97010118c6a449729c19b5e4bd735500a

    SHA256

    479e6e801fd7cf9b3303bce2651ef35f3067123303bbdad2bff70ab3dc2332db

    SHA512

    a19686de951726cc8b66224bafe31eeba9a64ed9944d60bb4c44bc3b90ca9e8c65506ccb799002f7af67a8f69810d5312a4f9424f3ce73c32a3cd541dffe45a4

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    408124fac57fb47e5a962f0351e0546e

    SHA1

    a992b643d319612429f7a26fca87ddab71f49a59

    SHA256

    d89a5683bfbcf6feeccd980be0229a12e32f912007c2775c830d90d3d42877ca

    SHA512

    9a4d2b4c9f1f38f70d7095eec7e093d9738693191aca8a6cec29c95493e6305dddb55a302e178d77c72a34a57a4c8f027c998629209e1c23f9f0efb905963661

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    8c2f866564a73e6f4b34cb69953bae23

    SHA1

    1c4f26eb87029afec4998f435e4053419c383c42

    SHA256

    0363e2a2a7b6ad764e99b02b9cd1b659cecfc7e51bd448ba981e94421df8ef6b

    SHA512

    088e62528822ada5f160099192c46546f2c4e19c281db8e4300bea5e9bd55e4e7e748eba840e4a1d65fb07d0af93250c28e0e3f6974444417bfb68153886fd05

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    d20cb16c669b805540eeddeea46b1b7c

    SHA1

    8963517473ae7a846317d05f538f235cdde57f7e

    SHA256

    f968d1091de26b723009e1c076be69a0e472e0f7f6fcf6f50bcc482136ca0542

    SHA512

    7ad17f2639fa9b53a8eab195a0f28b56640bdfb5a4439e5ba38722af455af63bdd6252d12477bc575310c31b2150a23a63b5eb72d7b5bc0a6c0c9490a4829996

  • C:\Windows\tiwi.exe

    Filesize

    488KB

    MD5

    00c05ef9439f91522f454b899b2736be

    SHA1

    7249d64b62cc0f19163ccfc794e8fcf27ff4d707

    SHA256

    5fe0ecdca800eed9b8685ab6307844cb1a060896dc6b3b5e014c05be8f7e3912

    SHA512

    f453eb7be5e288f6117e535a092a42459ecdc94daba37b98159c673a892672a0e0103716ccf9b06354e29243d391d72d92afe51f179d65be3bc783850a6a62b1

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    488KB

    MD5

    b4bded278a36a80fa4f1ea3a47c00fca

    SHA1

    c118d3f84cb5f5a9be5e7b8d2070d9ae846be298

    SHA256

    2529e112278d2498c85b27f13af638afcd65844c67f57a84c31c04d3f423bf1a

    SHA512

    23c1b7ed082848b94b714bebae99ac8388a440444d55495ae00b74c2b7873c1ee035efa7e93957ba82fa69e27538b92000dd322bf68ad66213ec10afa972d954

  • C:\tiwi.exe

    Filesize

    488KB

    MD5

    ea9030ac962e8ce4671deb7234eb47ab

    SHA1

    873689ce92d12e9bd08f0b2295cb079038f1e0cf

    SHA256

    276e2cef1df593c12aee71c7d3a186123aa5ab0b65a1500721c64d9cad25a598

    SHA512

    f74daeacaec93daab3f15bd087aaf6e0650bef32efe622b7802c17680d5f32d606ecbe3db533e55b2224f9264011931433ffa20e02337d83bf0761c6d041fbf1

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    488KB

    MD5

    43064b483a992c02d473387fe03352f6

    SHA1

    287156c869d5437cabdfc5c27f954d0ea62696b9

    SHA256

    f9c2222fdc1f79986020f5b5afbb56608c160814064c92e8e131afed0e4032d5

    SHA512

    3cc919d82e2df58fa30d0bedb16e339b18bc7a5fef4152c332241b8edf488e142b72539a7b8a6edc6134fe63706f7743166bc1645d2c20dc08c418ff8110af1b

  • memory/752-295-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/752-289-0x0000000000310000-0x0000000000320000-memory.dmp

    Filesize

    64KB

  • memory/1148-232-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1148-182-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1208-259-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1208-229-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1208-260-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1316-167-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1316-180-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1316-178-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1508-435-0x00000000001B0000-0x00000000001C0000-memory.dmp

    Filesize

    64KB

  • memory/2076-265-0x0000000003800000-0x0000000003DFF000-memory.dmp

    Filesize

    6.0MB

  • memory/2076-99-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2076-296-0x0000000003800000-0x0000000003DFF000-memory.dmp

    Filesize

    6.0MB

  • memory/2076-297-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2096-165-0x0000000003810000-0x0000000003E0F000-memory.dmp

    Filesize

    6.0MB

  • memory/2096-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2096-434-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2096-109-0x0000000003710000-0x0000000003D0F000-memory.dmp

    Filesize

    6.0MB

  • memory/2096-228-0x0000000003710000-0x0000000003D0F000-memory.dmp

    Filesize

    6.0MB

  • memory/2096-181-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2096-166-0x0000000003810000-0x0000000003E0F000-memory.dmp

    Filesize

    6.0MB

  • memory/2096-98-0x0000000003710000-0x0000000003D0F000-memory.dmp

    Filesize

    6.0MB

  • memory/2096-177-0x0000000003810000-0x0000000003E0F000-memory.dmp

    Filesize

    6.0MB

  • memory/2096-110-0x0000000003710000-0x0000000003D0F000-memory.dmp

    Filesize

    6.0MB

  • memory/2096-425-0x0000000003810000-0x0000000003E0F000-memory.dmp

    Filesize

    6.0MB

  • memory/2356-418-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2524-298-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2524-111-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2632-389-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2636-444-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2636-443-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2720-415-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2900-414-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB