Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 17:24
Static task
static1
Behavioral task
behavioral1
Sample
9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe
Resource
win10v2004-20241007-en
General
-
Target
9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe
-
Size
351KB
-
MD5
307237e6aa7c78c29f2bfac45ce3d7f7
-
SHA1
c173014b1d922dd4ed978c158641db9fb2f3a4ee
-
SHA256
9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982
-
SHA512
8f24f0dad85c388b6a6f14b36f49917c48fe3a932ce2eb3c8122eaba62aa5b153626e633f8691de5cf9ec3923ae67dc382866200b0a4398803ca0f59e207ce26
-
SSDEEP
6144:V/OZplJYZplx/OZpl7/OZplx/OZplQ/OZplU:V/MJqx/M7/Mx/MQ/MU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
Processes:
9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exeIExplorer.exeimoet.execute.exewinlogon.exeTiwi.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" winlogon.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
Processes:
cute.exewinlogon.exe9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exeTiwi.exeIExplorer.exeimoet.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" imoet.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
Processes:
IExplorer.exeimoet.execute.exewinlogon.exe9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exeTiwi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Tiwi.exe -
Disables RegEdit via registry modification 6 IoCs
Processes:
cute.exewinlogon.exe9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exeTiwi.exeIExplorer.exeimoet.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" imoet.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 6 IoCs
Processes:
9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exeTiwi.exeIExplorer.exeimoet.execute.exewinlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 35 IoCs
Processes:
Tiwi.exeIExplorer.exeTiwi.exeTiwi.exeIExplorer.exeIExplorer.exewinlogon.exeTiwi.exewinlogon.exeimoet.exeIExplorer.exeimoet.execute.execute.exewinlogon.exeimoet.execute.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exeTiwi.exeIExplorer.exewinlogon.exewinlogon.exeimoet.exeimoet.exeTiwi.execute.execute.exeIExplorer.exewinlogon.exeimoet.execute.exepid process 1900 Tiwi.exe 4256 IExplorer.exe 4312 Tiwi.exe 5060 Tiwi.exe 4156 IExplorer.exe 1976 IExplorer.exe 4832 winlogon.exe 1868 Tiwi.exe 4376 winlogon.exe 3556 imoet.exe 2020 IExplorer.exe 244 imoet.exe 1984 cute.exe 2156 cute.exe 4700 winlogon.exe 3960 imoet.exe 4780 cute.exe 2244 Tiwi.exe 5088 IExplorer.exe 5048 winlogon.exe 4168 imoet.exe 4512 cute.exe 1684 Tiwi.exe 1912 IExplorer.exe 3044 winlogon.exe 2160 winlogon.exe 1128 imoet.exe 5040 imoet.exe 2932 Tiwi.exe 2404 cute.exe 4500 cute.exe 4996 IExplorer.exe 1380 winlogon.exe 1332 imoet.exe 4944 cute.exe -
Loads dropped DLL 6 IoCs
Processes:
Tiwi.exeTiwi.exeTiwi.exeTiwi.exeTiwi.exeTiwi.exepid process 5060 Tiwi.exe 4312 Tiwi.exe 1868 Tiwi.exe 2244 Tiwi.exe 1684 Tiwi.exe 2932 Tiwi.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
Processes:
9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exeTiwi.exeimoet.execute.exeIExplorer.exewinlogon.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe -
Adds Run key to start application 2 TTPs 24 IoCs
Processes:
Tiwi.exeIExplorer.execute.exe9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exeimoet.exewinlogon.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" Tiwi.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Tiwi.exe9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc process File opened (read-only) \??\N: Tiwi.exe File opened (read-only) \??\E: 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File opened (read-only) \??\K: IExplorer.exe File opened (read-only) \??\H: winlogon.exe File opened (read-only) \??\R: winlogon.exe File opened (read-only) \??\J: 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File opened (read-only) \??\H: imoet.exe File opened (read-only) \??\R: IExplorer.exe File opened (read-only) \??\L: 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File opened (read-only) \??\B: Tiwi.exe File opened (read-only) \??\N: cute.exe File opened (read-only) \??\L: cute.exe File opened (read-only) \??\Y: 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File opened (read-only) \??\N: imoet.exe File opened (read-only) \??\V: imoet.exe File opened (read-only) \??\Q: 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File opened (read-only) \??\M: IExplorer.exe File opened (read-only) \??\O: IExplorer.exe File opened (read-only) \??\J: IExplorer.exe File opened (read-only) \??\J: Tiwi.exe File opened (read-only) \??\E: cute.exe File opened (read-only) \??\T: IExplorer.exe File opened (read-only) \??\O: Tiwi.exe File opened (read-only) \??\G: winlogon.exe File opened (read-only) \??\V: winlogon.exe File opened (read-only) \??\H: IExplorer.exe File opened (read-only) \??\T: winlogon.exe File opened (read-only) \??\G: 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File opened (read-only) \??\X: Tiwi.exe File opened (read-only) \??\M: Tiwi.exe File opened (read-only) \??\T: Tiwi.exe File opened (read-only) \??\K: winlogon.exe File opened (read-only) \??\N: 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File opened (read-only) \??\L: imoet.exe File opened (read-only) \??\Q: cute.exe File opened (read-only) \??\I: Tiwi.exe File opened (read-only) \??\X: winlogon.exe File opened (read-only) \??\K: 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File opened (read-only) \??\Y: imoet.exe File opened (read-only) \??\Z: imoet.exe File opened (read-only) \??\Z: cute.exe File opened (read-only) \??\I: IExplorer.exe File opened (read-only) \??\B: imoet.exe File opened (read-only) \??\R: imoet.exe File opened (read-only) \??\P: Tiwi.exe File opened (read-only) \??\K: cute.exe File opened (read-only) \??\M: 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File opened (read-only) \??\T: cute.exe File opened (read-only) \??\Y: cute.exe File opened (read-only) \??\L: Tiwi.exe File opened (read-only) \??\U: IExplorer.exe File opened (read-only) \??\W: IExplorer.exe File opened (read-only) \??\S: Tiwi.exe File opened (read-only) \??\J: winlogon.exe File opened (read-only) \??\W: winlogon.exe File opened (read-only) \??\R: 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File opened (read-only) \??\S: IExplorer.exe File opened (read-only) \??\L: winlogon.exe File opened (read-only) \??\P: 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File opened (read-only) \??\S: 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File opened (read-only) \??\E: IExplorer.exe File opened (read-only) \??\I: winlogon.exe File opened (read-only) \??\O: winlogon.exe File opened (read-only) \??\M: cute.exe -
Modifies WinLogon 2 TTPs 18 IoCs
Processes:
9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exeTiwi.exeIExplorer.exeimoet.exewinlogon.execute.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" winlogon.exe -
Drops autorun.inf file 1 TTPs 8 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
IExplorer.exeTiwi.exedescription ioc process File created F:\autorun.inf IExplorer.exe File opened for modification F:\autorun.inf IExplorer.exe File created F:\autorun.inf Tiwi.exe File opened for modification F:\autorun.inf Tiwi.exe File created C:\autorun.inf IExplorer.exe File opened for modification C:\autorun.inf IExplorer.exe File created C:\autorun.inf Tiwi.exe File opened for modification C:\autorun.inf Tiwi.exe -
Drops file in System32 directory 40 IoCs
Processes:
IExplorer.exeIExplorer.exe9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exeIExplorer.exeTiwi.exeIExplorer.execute.exeIExplorer.exewinlogon.exeIExplorer.exeIExplorer.exeimoet.exedescription ioc process File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr cute.exe File created C:\Windows\SysWOW64\IExplorer.exe cute.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\shell.exe 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr winlogon.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe cute.exe File created C:\Windows\SysWOW64\IExplorer.exe 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File opened for modification C:\Windows\SysWOW64\shell.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr Tiwi.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr imoet.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe imoet.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\tiwi.scr 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe imoet.exe File created C:\Windows\SysWOW64\IExplorer.exe imoet.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe cute.exe File opened for modification C:\Windows\SysWOW64\shell.exe 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe -
Drops file in Windows directory 26 IoCs
Processes:
IExplorer.exe9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exeIExplorer.exewinlogon.exeIExplorer.execute.exeIExplorer.exeIExplorer.exeIExplorer.exeIExplorer.exeTiwi.exeimoet.exedescription ioc process File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe cute.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe cute.exe File opened for modification C:\Windows\tiwi.exe 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe File opened for modification C:\Windows\tiwi.exe Tiwi.exe File created C:\Windows\tiwi.exe Tiwi.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe imoet.exe File created C:\Windows\tiwi.exe imoet.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Tiwi.exe9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exewinlogon.exeimoet.exewinlogon.execute.exeTiwi.exeimoet.exewinlogon.execute.exeIExplorer.exewinlogon.exeTiwi.exeIExplorer.exeIExplorer.execute.exewinlogon.execute.execute.exeIExplorer.exewinlogon.exeTiwi.exeTiwi.exeimoet.exeTiwi.exeimoet.exeimoet.execute.exeIExplorer.exeTiwi.execute.exewinlogon.exeIExplorer.exeimoet.exeimoet.exeIExplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe -
Modifies Control Panel 54 IoCs
Processes:
IExplorer.exeimoet.execute.exewinlogon.exe9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exeTiwi.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\s2359 = "Tiwi" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Mouse\SwapMouseButtons = "1" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ cute.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Mouse\ winlogon.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\ 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Mouse\SwapMouseButtons = "1" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Mouse\SwapMouseButtons = "1" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\s1159 = "Tiwi" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Mouse\ cute.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Mouse\SwapMouseButtons = "1" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\s1159 = "Tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\s2359 = "Tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" cute.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Mouse\ IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" imoet.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Mouse\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\s1159 = "Tiwi" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\s2359 = "Tiwi" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Mouse\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\s1159 = "Tiwi" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Mouse\ 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\s1159 = "Tiwi" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\s2359 = "Tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\s2359 = "Tiwi" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\s1159 = "Tiwi" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\s2359 = "Tiwi" cute.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Mouse\SwapMouseButtons = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Mouse\SwapMouseButtons = "1" imoet.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\ cute.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\ Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\ imoet.exe -
Processes:
Tiwi.exeimoet.execute.exewinlogon.exe9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exeIExplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Main\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" imoet.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Main\ cute.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Main\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." winlogon.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Main\ 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Main\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Main\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." cute.exe -
Modifies Internet Explorer start page 1 TTPs 6 IoCs
Processes:
9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exeTiwi.exeIExplorer.exeimoet.execute.exewinlogon.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" winlogon.exe -
Modifies registry class 64 IoCs
Processes:
cute.exe9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exeTiwi.exeimoet.exeIExplorer.exewinlogon.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ cute.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exepid process 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
Tiwi.exeimoet.exewinlogon.exeIExplorer.execute.exepid process 1900 Tiwi.exe 3556 imoet.exe 4832 winlogon.exe 4256 IExplorer.exe 1984 cute.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
Processes:
9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exeTiwi.exeIExplorer.exeTiwi.exeTiwi.exeIExplorer.exeIExplorer.exewinlogon.exeTiwi.exewinlogon.exeimoet.exeimoet.exeIExplorer.exewinlogon.execute.exeimoet.execute.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.execute.exeTiwi.exeIExplorer.exewinlogon.exewinlogon.exeimoet.exeimoet.exeTiwi.execute.execute.exeIExplorer.exewinlogon.exeimoet.execute.exepid process 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe 1900 Tiwi.exe 4256 IExplorer.exe 5060 Tiwi.exe 4312 Tiwi.exe 4156 IExplorer.exe 1976 IExplorer.exe 4832 winlogon.exe 1868 Tiwi.exe 4376 winlogon.exe 3556 imoet.exe 244 imoet.exe 2020 IExplorer.exe 4700 winlogon.exe 1984 cute.exe 3960 imoet.exe 4780 cute.exe 2244 Tiwi.exe 5088 IExplorer.exe 5048 winlogon.exe 4168 imoet.exe 4512 cute.exe 2156 cute.exe 1684 Tiwi.exe 1912 IExplorer.exe 3044 winlogon.exe 2160 winlogon.exe 1128 imoet.exe 5040 imoet.exe 2932 Tiwi.exe 2404 cute.exe 4500 cute.exe 4996 IExplorer.exe 1380 winlogon.exe 1332 imoet.exe 4944 cute.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exeTiwi.exeIExplorer.exewinlogon.exedescription pid process target process PID 5080 wrote to memory of 1900 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Tiwi.exe PID 5080 wrote to memory of 1900 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Tiwi.exe PID 5080 wrote to memory of 1900 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Tiwi.exe PID 5080 wrote to memory of 4256 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe IExplorer.exe PID 5080 wrote to memory of 4256 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe IExplorer.exe PID 5080 wrote to memory of 4256 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe IExplorer.exe PID 5080 wrote to memory of 4312 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Tiwi.exe PID 5080 wrote to memory of 4312 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Tiwi.exe PID 5080 wrote to memory of 4312 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Tiwi.exe PID 1900 wrote to memory of 5060 1900 Tiwi.exe Tiwi.exe PID 1900 wrote to memory of 5060 1900 Tiwi.exe Tiwi.exe PID 1900 wrote to memory of 5060 1900 Tiwi.exe Tiwi.exe PID 1900 wrote to memory of 4156 1900 Tiwi.exe IExplorer.exe PID 1900 wrote to memory of 4156 1900 Tiwi.exe IExplorer.exe PID 1900 wrote to memory of 4156 1900 Tiwi.exe IExplorer.exe PID 5080 wrote to memory of 1976 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe IExplorer.exe PID 5080 wrote to memory of 1976 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe IExplorer.exe PID 5080 wrote to memory of 1976 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe IExplorer.exe PID 1900 wrote to memory of 4832 1900 Tiwi.exe winlogon.exe PID 1900 wrote to memory of 4832 1900 Tiwi.exe winlogon.exe PID 1900 wrote to memory of 4832 1900 Tiwi.exe winlogon.exe PID 4256 wrote to memory of 1868 4256 IExplorer.exe Tiwi.exe PID 4256 wrote to memory of 1868 4256 IExplorer.exe Tiwi.exe PID 4256 wrote to memory of 1868 4256 IExplorer.exe Tiwi.exe PID 5080 wrote to memory of 4376 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe winlogon.exe PID 5080 wrote to memory of 4376 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe winlogon.exe PID 5080 wrote to memory of 4376 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe winlogon.exe PID 1900 wrote to memory of 3556 1900 Tiwi.exe imoet.exe PID 1900 wrote to memory of 3556 1900 Tiwi.exe imoet.exe PID 1900 wrote to memory of 3556 1900 Tiwi.exe imoet.exe PID 4256 wrote to memory of 2020 4256 IExplorer.exe IExplorer.exe PID 4256 wrote to memory of 2020 4256 IExplorer.exe IExplorer.exe PID 4256 wrote to memory of 2020 4256 IExplorer.exe IExplorer.exe PID 5080 wrote to memory of 244 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe imoet.exe PID 5080 wrote to memory of 244 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe imoet.exe PID 5080 wrote to memory of 244 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe imoet.exe PID 1900 wrote to memory of 1984 1900 Tiwi.exe cute.exe PID 1900 wrote to memory of 1984 1900 Tiwi.exe cute.exe PID 1900 wrote to memory of 1984 1900 Tiwi.exe cute.exe PID 5080 wrote to memory of 2156 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe cute.exe PID 5080 wrote to memory of 2156 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe cute.exe PID 5080 wrote to memory of 2156 5080 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe cute.exe PID 4256 wrote to memory of 4700 4256 IExplorer.exe winlogon.exe PID 4256 wrote to memory of 4700 4256 IExplorer.exe winlogon.exe PID 4256 wrote to memory of 4700 4256 IExplorer.exe winlogon.exe PID 4256 wrote to memory of 3960 4256 IExplorer.exe imoet.exe PID 4256 wrote to memory of 3960 4256 IExplorer.exe imoet.exe PID 4256 wrote to memory of 3960 4256 IExplorer.exe imoet.exe PID 4256 wrote to memory of 4780 4256 IExplorer.exe cute.exe PID 4256 wrote to memory of 4780 4256 IExplorer.exe cute.exe PID 4256 wrote to memory of 4780 4256 IExplorer.exe cute.exe PID 4832 wrote to memory of 2244 4832 winlogon.exe Tiwi.exe PID 4832 wrote to memory of 2244 4832 winlogon.exe Tiwi.exe PID 4832 wrote to memory of 2244 4832 winlogon.exe Tiwi.exe PID 4832 wrote to memory of 5088 4832 winlogon.exe IExplorer.exe PID 4832 wrote to memory of 5088 4832 winlogon.exe IExplorer.exe PID 4832 wrote to memory of 5088 4832 winlogon.exe IExplorer.exe PID 4832 wrote to memory of 5048 4832 winlogon.exe winlogon.exe PID 4832 wrote to memory of 5048 4832 winlogon.exe winlogon.exe PID 4832 wrote to memory of 5048 4832 winlogon.exe winlogon.exe PID 4832 wrote to memory of 4168 4832 winlogon.exe imoet.exe PID 4832 wrote to memory of 4168 4832 winlogon.exe imoet.exe PID 4832 wrote to memory of 4168 4832 winlogon.exe imoet.exe PID 4832 wrote to memory of 4512 4832 winlogon.exe cute.exe -
System policy modification 1 TTPs 12 IoCs
Processes:
Tiwi.exeIExplorer.exeimoet.execute.exewinlogon.exe9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" 9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe"C:\Users\Admin\AppData\Local\Temp\9f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5080 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1900 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5060 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4156 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4832 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2244 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5088 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5048 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4168 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4512 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3556 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1684 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1912 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2160 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5040 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4500 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1984 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2932 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4996 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1380 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1332 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4944 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4256 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1868 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2020 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4700 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3960 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4780 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4312 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1976 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4376 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:244 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2156 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3044 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1128 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2404
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
351KB
MD5855712cfc648570d24b36f97f0805c5a
SHA17cc15c21bd1260fdd9211ab313b3e4070f7c72d9
SHA256078551590da8ae407b1ea09b53baaf67b3b2cf506b6e8eb7a67e90b776e56c05
SHA5122c3f98db80b861e49db2ca7d1387f0e458d3cb5f0328599ceb2408ab6858145bedf5fc9d577e7c563967b5b8c9703c1c0c45bbd5900f9ab572dbc447c7d2c49c
-
Filesize
351KB
MD5a85e043d30ed8dd914f03404fdbf7e50
SHA18b4835548ce4309f9315973b8610e6e6b5cb995e
SHA256bfe2181fc7f06b3c3b38249dab855f38d1b5a1022ebd584e2ff6301c070497a0
SHA51217aeb76bc571b8771d3101e2446169c782676ff3e7703af5e9751ce8d1720b6c3d9d9009203c9c1e1677903af5a65a1347e478a988dee8c25ea3b78b23322aff
-
Filesize
45KB
MD5e631d4dc74475276723ab7ba70e7f250
SHA1bb97c2ef2127ce6e140341b91c49e9f60b239e85
SHA2560defc1c091239aa6312875009b0619a008022ccf6ed4cdeedcfc841442d2dc90
SHA512e2eba4fef0bd95045ae946ea8ad338cef8ff04b78ea01adcb6891b24bf8f3fd3be18fdf653fb6254377ac3388170d807e12850b554fa86556c7f9994f6c0111f
-
Filesize
351KB
MD5cc157067ebd79844bed51f25ce543cb4
SHA187bbbadcda588a796545c3c8bd875bd2071f18e9
SHA2562af86171d3386a3fa29287fe19d3b9ac0e577e3399af9d1ca689390c105ab4d6
SHA512b1daa56010e6e4d5c902da7825a45987019532aa25003b42c76e3930e4645e1ca75c8c165346f0a6bf3a717a747b1fe69e1b933d0ed45e95b75fdbbf07ef3166
-
Filesize
45KB
MD5452ea705d0f78dec0f401cfab965d96f
SHA16c43c4fe7e2a4822833b83a123ed3fa4b8f89882
SHA256e3a8d7b21ea7426ac8f9bed70c241c2cffb504dbf5b7f04befb879b336256126
SHA512f04d0a5a87cb9f2cdd99fdafd08c9f24c13b9c3fc5447dd10be782081d03f08ac2bdf379937fb6141aaefa13696f543e66631a1291d0c7e0e206a5639f2abc6b
-
Filesize
45KB
MD5b62f0b236e5e54a810b74592c016fb06
SHA1647dbe39a4bd4487c606e54f986fd95bf674895d
SHA25677521a2ffdafb3ae06e80ec5fc4abd29d612d4b0b37c1a72e119198625085f68
SHA512b14c2d1d48969cd9cc9081481b214cb97741ab8262c0e74860c87156bc8e0df0d87cf9994b9bc1013a059e1a7fc3b81c1725ca631838592c8307f8caff05ea95
-
Filesize
351KB
MD50ec1cb7faf64f7ef217723fe9d319df4
SHA1766fbb9a178ae85d0aca0e56131b257198744075
SHA2560f67e590f34110644fc254131df4611363a4d22f97a426f5956d2e4c8e69909e
SHA51250972ec78dbedd28526f03d5d0de8187d1f695960fa651bcf42e5471007fac7e82f9569d740355d197c99700192c23a5b409bb80acb3e34569dc40d0737a752d
-
Filesize
351KB
MD5b4d1bd50e665a98c4739cfc877d0bf0f
SHA14df088698454824f002d5a69901a66d0fd5ffcf1
SHA25617cbc76cc6c0119cb6bcc1cebd2b5584f129155a750cecc5676975672263f1f8
SHA512f62f3a82690e94f713088ad26d9bd4a94e7455245dff89e56defb977f5dc31030a1784e8d42894ab25259d6c397fe99f8d92882dbc73d910aba3771b47fe212c
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
351KB
MD522790292c18cf8c6cd354c45ff1eb0a8
SHA1abbc2bb6393bd86e2d72ad820604703a7181f02d
SHA2562d317dbfeaa75deb85eabf6c171748ba15ff2f2e9e87815e58bc1de40d1dbdc4
SHA512fc2776668361b73c78192f57f6cb49fb85459b86048e3daaaaaf60387f8120f24fda493f92065c931f4d613f0448582b7b5a808b6625d4b36a47076182f75b9c
-
Filesize
351KB
MD5e1163f96d70e4d6e7413db6b898a0a0c
SHA12443d1aa0259cac73af5848c724dec159670fdf3
SHA2567ba7024c9c9223f8ac5a90aa94caa2afbc5c200c46c4fed0770000cee00b5fd4
SHA512121c903b8d393049baf6ce1def6620d91cdcce5863d033c51f149699ac8ea0ac67a218f7d7098c536164d864f5e8f6c67ffb11006077901b412fa24b320233b6
-
Filesize
351KB
MD5307237e6aa7c78c29f2bfac45ce3d7f7
SHA1c173014b1d922dd4ed978c158641db9fb2f3a4ee
SHA2569f3b6c4b8696aaa01c6041fd6ddf7ceb367665581ab1f1141fc3a8b9bdfee982
SHA5128f24f0dad85c388b6a6f14b36f49917c48fe3a932ce2eb3c8122eaba62aa5b153626e633f8691de5cf9ec3923ae67dc382866200b0a4398803ca0f59e207ce26
-
Filesize
351KB
MD5685bb29a47b02e9f151df55abc8a1d29
SHA16656a0ae1f330f1c8f85383409d93879d5fef374
SHA256ac7468fe3d9b236cedb5d7c9febf7096fa29360991aec40da7bb535b1a25ec9e
SHA512dc230787ddcb22fff64c6e06d1939c7cb102d925242a0e1ffb32294b478996e3130327a0a287a326afacccfd29b2d18fa46b6e8ea5a5e15f9dc2f97d6b23032a
-
Filesize
351KB
MD5d658b3122bc2349e3088b1ae0b008401
SHA1fb45d55a8c153fce5ab21208b148337b0dfc95f0
SHA256fb2a46e41c1957de34f201ed62affa925d5de735329e59e412b9f429e149ac99
SHA512fcd1017e237f13013513e8fd708bf60eb68599e5abaea8c33a1d5d7f11d3210b4736016c989d538585c5ae35f4f9ceb4beaf329ec28d4215ef80e50e562ba018
-
Filesize
729B
MD58e3c734e8dd87d639fb51500d42694b5
SHA1f76371d31eed9663e9a4fd7cb95f54dcfc51f87f
SHA256574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad
SHA51206ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853
-
Filesize
351KB
MD56b8360ed46fe0f48ebb31246b6e755ec
SHA1105a12ef84e24abb792824c1eaf515be5a0b4003
SHA25685eecf6ded8ac20754643004b8938163a6187f7ad574eb95a18ecc60663e85ad
SHA5122b36ec6349459ab6cd14c589680cf762eb5ac30394c30e732b5e7084957b00285b73e79bd2b4d38c73d7b04edd527d3000c5d4973d652b7b7179af4a6a0619c8
-
Filesize
39B
MD5415c421ba7ae46e77bdee3a681ecc156
SHA1b0db5782b7688716d6fc83f7e650ffe1143201b7
SHA256e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e
SHA512dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62