Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 04:54

General

  • Target

    8e9316fcfb2ebcab1131cb233d259ac7c22732c6af85b81d314e390acf95a09aN.exe

  • Size

    351KB

  • MD5

    ef27fdf7082169a2ffe88ac3b4821c50

  • SHA1

    7d7dab58ed43b6124e20970928c453a19a24ffe6

  • SHA256

    8e9316fcfb2ebcab1131cb233d259ac7c22732c6af85b81d314e390acf95a09a

  • SHA512

    877a5e2938a74e30438d6da76e7e2f5074dba877bb3b0640db624a33a09ad861744d11df394f3c9fe76aaf7dabfeb439e8d0ab6aa8be2b959f746ed058a2732e

  • SSDEEP

    6144:V/OZplaYZplx/OZpl7/OZplx/OZplQ/OZplU:V/Maqx/M7/Mx/MQ/MU

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 53 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 8 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e9316fcfb2ebcab1131cb233d259ac7c22732c6af85b81d314e390acf95a09aN.exe
    "C:\Users\Admin\AppData\Local\Temp\8e9316fcfb2ebcab1131cb233d259ac7c22732c6af85b81d314e390acf95a09aN.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1716
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2496
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2584
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2084
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1648
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2184
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:884
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2800
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1640
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1604
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:564
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2364
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2652
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1712
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1300
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1328
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2008
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2108
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2660
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:308
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:296
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2124
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2704
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2520
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2944
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2388
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2548
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:464
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2816
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2564
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:636
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1048
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1940
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3032
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2528
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\cute.exe

    Filesize

    351KB

    MD5

    f399c11ebbff2e59f3ee83a658f465ae

    SHA1

    068edb00be296d8814573c05b0f89d71d6d62f25

    SHA256

    24bcb512ee026ebf7ee3ce36272536589ebd61d4ba009e4333823c20dc4a0e9b

    SHA512

    2da18670e0c34ac20ec519078a2368587246f00413f9265ff7630f4e80650569040dd450298cbde2102fad9feb2867db6179e8cdfd61e4cd1126433bed4b7e41

  • C:\Users\Admin\AppData\Local\WINDOWS\imoet.exe

    Filesize

    351KB

    MD5

    4d2adb508d1a1c8f716ef351fb897b2b

    SHA1

    a96c8ad25eb094ea0f4009469e9c0f3bbb3873e3

    SHA256

    3083407481d8757daeecfc40735a8b9c812b5950a4ec99c283bc66984a597e52

    SHA512

    9e70c3bb1e2b1550047f143bc106c316fc2a8dc54e6f17f95aca4bcef74be46dbfd4aa7f1dea3cdc3ba0d8136a0d6d16f800e11585d542c06b7f521b91c5feb0

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    b7ebda531a615761f87eb2e956bfa96b

    SHA1

    4a23e1e5c56361ccee450a1deaf97da2896d2905

    SHA256

    498d532d654c73445e48d487d7001ddf940498bb5c49155c127e26d58b067b71

    SHA512

    8ac70e65180b7fb44f708199a0698feacd91fa076f9a9153fa950da8384c34ce7494566189331fe309a039c9ab479f76dc63d6e993528eafbafb70660f02a55d

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    351KB

    MD5

    7981119e96bf3a3551be8d0142c89f2d

    SHA1

    e7188822718e01035d74fb10171763e8a6f778d4

    SHA256

    caca54b7e6f7d9a18b54d65f399c6a615eacce6ef12e541dca7879c3d2448837

    SHA512

    90dd3f3dbbfc26e5d9d6a2085ab21464f1513cf6fb61aadf7593a8ccb9baac2c18453d59f2dbeaa77de785e219eec778e13140c6cdf719cf6d310cff8def8d0d

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    351KB

    MD5

    1c63c570a8585f7366f6568d6e119d20

    SHA1

    572f0c133c5ca7965cd57a2d2f129a153d9d5c7d

    SHA256

    4fe53eed57ffdcbdd10d9521fb86c52bd19d56483fe554dcdd2091ac407a2791

    SHA512

    e3ac35e9da54339a5e22cb7128bd09c4621b579fc20eb2acbed321c849604097eabf8bf6d0eae313e0a6e2fba0311d7f88fc1771a78156d9c06c2977f00fe2cd

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    5e5cf7458a64550caf5bae744053a9ac

    SHA1

    5b70dea63ae2233b17867f802351d427975ad035

    SHA256

    58399cefa1bf534a8ba8deecc5c380e43459681f2665efd983ae84f6d81ed972

    SHA512

    fde1fc51b07470f7918cf98490375030029eff456037968cc212b11bc3d40142bc92cfcbc6fce9fce7a877d1174ab77bb7f169e54e8f7a26380f6180f92e3b1e

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    406bf53eb217110e1955db45dd82b864

    SHA1

    5537adbf7b9c30dbfd7fd83b525a81dece06ab85

    SHA256

    6f5a5f7fd758d40338cfe9e26734167d7387eea0b8474c62b79441298a07bd14

    SHA512

    adca2ebf021af9111d6a3f92fdfe816afe6525dccf9eb0718bdafdf33a94dbed17e5af68868eff51b7353e4eb57ddbc19a4139ddbc093aa737644beb57b5be8c

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe

    Filesize

    351KB

    MD5

    3442b8dc17c7e30f4350a9a75b24d6c4

    SHA1

    cda3783c10adfdbfaf0d98f7825f7f9a804502ad

    SHA256

    6ef7d335ba1445e11d1993067b3c76bbcd6e99bf9395971f5350f0866b0f9943

    SHA512

    b1dd7f5acc632b17e18d60ed1a3a7328b3956a4163d3d153988ad3df224ed432aefeaabf3d15f054a73267dc010a8c9a0cfb8e82a0589eb8f195653395c3938b

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe

    Filesize

    351KB

    MD5

    29d3f0b0e8ba0eed88b2be3e90b53226

    SHA1

    5d78f1bac371c7b8469ca9af85ce2e86ab4d0894

    SHA256

    984db4e07f24e10c08d2e47b026409065d8f4d0110708e1028113c7bfa84f101

    SHA512

    be7a075dc57d71fb438a6ec28d4497278a6ee5a13e710b30f0cdeff5c6e0996c82d0a4c673fd6045ee7579e0a60bc09537b64ecdc2eaa4a0fb5c5074fa360789

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    351KB

    MD5

    2619a3d49b1163d6d6cf1051a5b89943

    SHA1

    d383f190468deead1f82fc5ec15fd8b5e1cc202a

    SHA256

    b27ee0c2f9909b38ad1278d511cb57097c966d91dde64d0a17ba9eebc6c64ecf

    SHA512

    02b6e7269fb05979c85619729e602dd9e99fc40b515854893aadd187920857feb233754c953b97ed2cde61423f89115e81213a734599ee54b7eed66aa22252d5

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    351KB

    MD5

    98fe4e05ad0bd22e1c46f6984536e31e

    SHA1

    b97e037199aa91c2f95cd5a78bca760fb5170244

    SHA256

    88de8c170bb9eb3fc9b1c48db4ece2c1d9014eb7d4ebee5eb102152c9925607b

    SHA512

    e51ae0ff6a568043b5ceabfda4c3c1832cc6e661f2ef91abeeaa937ec3ba36aee3b5421c6117aa6ba448d5b2335bd509fccdbb522dc0f9784264350c3559b6bf

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    351KB

    MD5

    851ff9fdc3a342254a177f61cfaa2cd0

    SHA1

    0343a268df7de6fdd93828034ae27d17c3d0cc5d

    SHA256

    38c3d853b1fbe217a8532f6d62eeba008d844399a78f6f09484a58516c542966

    SHA512

    36f2017fcd8a638d6859dd413a161940b5de533d6fd2288676df8909211da5f46a9aa5e50482d78dddf46c32ea7b6173444a16f844d57870766920626f19baf0

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    351KB

    MD5

    e082dfa92757618e68aaeee19096884a

    SHA1

    c44ec5bb118b849d1018ace35e8d2508000a0cd5

    SHA256

    925b7ea0f892ecf4dc2372f1a5ad6e365ae63ba1f42de546cbbc1a6cfed08add

    SHA512

    d4c373a66d308a81cd3f15e0e64f9d407787ac10340ad5c8bb45840c6c3f2eccfc161b16692d1883dcb72549c0495f70813f7bab2f72413c9a2f9b4a6aed6a0a

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    351KB

    MD5

    ef27fdf7082169a2ffe88ac3b4821c50

    SHA1

    7d7dab58ed43b6124e20970928c453a19a24ffe6

    SHA256

    8e9316fcfb2ebcab1131cb233d259ac7c22732c6af85b81d314e390acf95a09a

    SHA512

    877a5e2938a74e30438d6da76e7e2f5074dba877bb3b0640db624a33a09ad861744d11df394f3c9fe76aaf7dabfeb439e8d0ab6aa8be2b959f746ed058a2732e

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    351KB

    MD5

    191458f317745867188d78a395993656

    SHA1

    d3a82bd2c6358f725d66e527ea03c970c81af01f

    SHA256

    659f8e1e748e952594a5da6590baf12f453631c674e8abee33280b18e27d90e4

    SHA512

    c83ec4f7440bb376b3b3b1746581f594eb9e165add22195e52d28561c81de3bec6be0fc30575cfc797ee89df29d259281bcab0858e2421147e6651b48b140c72

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    351KB

    MD5

    a815b8e44e89806ee622cf36ae302e68

    SHA1

    604c207c03e3e55690be422fcd3cb9893481dc81

    SHA256

    3858d4b883a0ddca597493903c4be017b4992861398aab502747b6686d481216

    SHA512

    247ab02ec201806da18bbc9e74540483361dce2081f4353b329f1ee427c0228b09065b79b009caa3165fc8b5907b42ae6b4c55a8e6d0054d65e256e887e5af50

  • C:\Windows\tiwi.exe

    Filesize

    351KB

    MD5

    e61f03256b50bf89da2558f5cfaa0044

    SHA1

    54c93afcd3adff9cd95a2a8826e17faddf995353

    SHA256

    5e7fe03d3578cb2bf16ac188f2748578e4e4379c5ff2312528538cd726ca6dc0

    SHA512

    797cfe7aa90e39d7dea8f1d2f5be3d9d0cb83b3d3be96cb778883b449df62289aa132e65e19a718ddb3ccc266699eb2f61445cb460f60ffdb8b21a71485281fb

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    351KB

    MD5

    b63a8dbf6a2c3ff5da64bcd2946524cd

    SHA1

    e7895dad846accc1676e400a4fbb33f5a0b25bed

    SHA256

    7d40c11b575bb715941761508a41c1f72cc26ee05b2aa3265f85a2da60438435

    SHA512

    a31c943f4cce4bbea1f5993d977f1cca354f230ede8e8201804db182c6b7653ee856e12e1c5bf2b7b69d59babad8754a7821e20e2e3e95a88d8a1846b2500d83

  • C:\tiwi.exe

    Filesize

    351KB

    MD5

    4368d503960edf0d8760cb1d0e6ca322

    SHA1

    287439702953844b9e533106b0ddb2d90ad07973

    SHA256

    26e437829082a47337b3430947025cf60a967ae66dc87d104acda42d07758154

    SHA512

    d5ca2ce3df44e98dd2654b177a2e86ce5cdad61d21f928b19c81dda01bb9a7ee9fe0678a2f419455666fb209d74e4aec06f4f903569e28f0e3880170ccc46793

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    351KB

    MD5

    8d4d99ca2def40735e0d0fd6d56dbff7

    SHA1

    481195526a3b0600d484d284e98563e2b6d63503

    SHA256

    4f20235083a7f0dee8d1aeecf8207ec0b13656315ecc95513027b58fa376e67e

    SHA512

    4ec28f07a607ff1ebcc3058bdc75b2f60e613a6d7b68ba59318d41b2256024dfdfe831c8880533ca15f8667b0b38084ba913cc1e4f8184b32deae2c22d19361f

  • memory/296-468-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/296-469-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/564-327-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/884-335-0x00000000002A0000-0x00000000002B0000-memory.dmp

    Filesize

    64KB

  • memory/1300-181-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1300-287-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1640-294-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1712-178-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1712-170-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1712-166-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1716-234-0x0000000003800000-0x0000000003DFF000-memory.dmp

    Filesize

    6.0MB

  • memory/1716-179-0x0000000003800000-0x0000000003DFF000-memory.dmp

    Filesize

    6.0MB

  • memory/1716-98-0x0000000003800000-0x0000000003DFF000-memory.dmp

    Filesize

    6.0MB

  • memory/1716-110-0x0000000003800000-0x0000000003DFF000-memory.dmp

    Filesize

    6.0MB

  • memory/1716-165-0x0000000003800000-0x0000000003DFF000-memory.dmp

    Filesize

    6.0MB

  • memory/1716-232-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1716-310-0x0000000003800000-0x0000000003DFF000-memory.dmp

    Filesize

    6.0MB

  • memory/1716-112-0x0000000003800000-0x0000000003DFF000-memory.dmp

    Filesize

    6.0MB

  • memory/1716-180-0x0000000003800000-0x0000000003DFF000-memory.dmp

    Filesize

    6.0MB

  • memory/1716-457-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1716-100-0x0000000003800000-0x0000000003DFF000-memory.dmp

    Filesize

    6.0MB

  • memory/1716-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2008-408-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2084-288-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2084-239-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2496-472-0x00000000037A0000-0x0000000003D9F000-memory.dmp

    Filesize

    6.0MB

  • memory/2496-99-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2496-237-0x00000000037A0000-0x0000000003D9F000-memory.dmp

    Filesize

    6.0MB

  • memory/2496-238-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2520-445-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2528-447-0x0000000000300000-0x0000000000310000-memory.dmp

    Filesize

    64KB

  • memory/2548-465-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2584-236-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2584-227-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2584-235-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2660-451-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2704-443-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2800-357-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2800-111-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2816-444-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB