Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 19:02

General

  • Target

    38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe

  • Size

    488KB

  • MD5

    5baf96723b9c3826a7640cefd5dc5bb0

  • SHA1

    1daeba3bae8ab308b48904042b4dc9b55e87b6b2

  • SHA256

    38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4

  • SHA512

    8ac95bb706a660844bf7ea204c6ca76537cc12b9603ef2bd2a9fee57a33e572551d1423693330921444a6dae54cb8060bd81635b7df45196afdec1cb25b352ae

  • SSDEEP

    12288:V/Mw/MP/Mx/M7/Mx/M4/MpBE/Mk/M2/M1:VTK2O2HIBEd7M

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 53 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe
    "C:\Users\Admin\AppData\Local\Temp\38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2660
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2388
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2356
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1932
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2308
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1004
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1620
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1432
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2936
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1644
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2268
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2468
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1616
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1672
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2276
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2316
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1524
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2708
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2332
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2032
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1696
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2512
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1720
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2596
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:844
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2056
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1960
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2108
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1764
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2824
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1740
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1324
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2380
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2572
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1104
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    a4232eb5b00a58551b782cfe081099a4

    SHA1

    4b562c47ff1297d57db557a5eccbb14d62e8b697

    SHA256

    beb3c498dc203069345ab327933cbfd77694ed8b4ebd8d6952afc2b859df6d56

    SHA512

    c6da98b6dd4b7319b6210b51862ea8e2e869a7e2f737b0c4712a8cf6af122eb1005f7295284cbe6d38b6494bf7e80c25c95e451425d3739a91fc1f2a469d51c9

  • C:\Users\Admin\AppData\Local\WINDOWS\winlogon.exe

    Filesize

    488KB

    MD5

    e4fcfe35f71b2cd7a43b466ae2a0593f

    SHA1

    22e3da47a83e9686c421d6421d0da726d7cea580

    SHA256

    b906522a3b7e46097ad63a4a97223a77d508a2bcdfc2f265e84795376f67e2e6

    SHA512

    16ff7bac905944f0ddc25f414759e26b7485aaed08c80cb76fb57ebdcc1c2897f596d24614d23d50a6f861c896dacc1bd7473ea8f0ad25ef031cab9bae4a6840

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    4c9f9e6521e5a881b5bef7365985a520

    SHA1

    caab14fc5a4fcd4ca3722259b0596f080815279d

    SHA256

    7551f7d4549e63443ba3349d732a9804841db7b6ae7d14caa3239db2876e8293

    SHA512

    72e0fd67109c8f32aaa57c4948217eda82c9b97122249db4f8fad54ead43922ede3e8ee3140350f6e45ded30a00d3b57dcd073ae6650be427d7a82829ae3e699

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    f1d077360f4740356769f32672cd4d92

    SHA1

    e1b29d8c60d141705ef2651c5f309b654c070087

    SHA256

    56e21179b660192d395cd5da64a14322cb214237d9da2fde2274f067126e2d25

    SHA512

    35c377b4c24f58c0b75f2b8445c0aa816dd716e0b0a0d0634d27e87e6ef721f777e3833296cc282586716c0ab6156b6dfb1bf72744229ffba5e289218ae57c74

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    565f2f5118d80e01888baded563ea17c

    SHA1

    2aeb23721ef3499efd511f05ca02c7c48f7c26ac

    SHA256

    eb0e0ab93ee5a03e0ab8137820942b3f2f4e0ba5922087b3be5b3148ef983c6c

    SHA512

    fa43291f91e7388fb32623f4a847de3d929c32e4391ff8798c51433b63c633a5c44108ab5e0fefce130059be4efd9441902c20827fe5cba958b74c33c75b501c

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    418363f455abe326293fef2519d165fe

    SHA1

    445117f1fdb3df8ba2a0ed691af6ec4f1e7c0656

    SHA256

    f5dfe85b7431309f4dcea0eefc584869f7122a618e72349664141bbe7d422823

    SHA512

    c52f2df2f88e87f970f525f838c74662fb194936a2e29a9bbf5148372c1efc7fe3e4e742a22a417cdb0d3fac60eed8dd728c1e27dfd99e3e380c13bd9b329790

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    9bc8a86b73c8fb67644e9ffcff0c7cde

    SHA1

    16f4bec4dbe3802e2364e8b35616662ad92d72b5

    SHA256

    2e07c57ed2c7e5f6ff288050700ee23918fba71e16724fad7024f6ff22996e58

    SHA512

    0098bc1aa8859af65bc151f71cc8fcac345afd5e4090a8cc73332e976b933f1d313974d356c757857cdd5aea504630e827c04d918d46f33cb24770afc2061b1b

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    760fd178bec2445ac0ce30a390534dc9

    SHA1

    58cbae2432b464e3bf23578d3f995d357ab134a3

    SHA256

    070dc733005f9d3c9821e8e79c8af526e7181eb2d46142ccbe6abcc73fa1f94a

    SHA512

    0f3d00e67580a3932e68318ecfd8dc82eafd9213d836389571a2ec65bd47d50bc5657cf3fead72a9a4ea00e82cf144102ebcf4f48b8cdd5b11795e26e35155ce

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    bce5e8c4003ec202ed9ce99c71acbe49

    SHA1

    7a06bd2c3c70d48995ec0dc3a6f5f77366e40db2

    SHA256

    5c4180f32910591c631d25a472ddbe35589264ceae7727c6a77286800a67495a

    SHA512

    c6425035193b6814afa47b6490f91f77be931232da6dc011ab79fdb1af23984cf31f8538dc6d99c54ccd89080aab9bd31d967d9778002b5f516e7ee30c9ffb93

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    fb9bc98f83fa40d3b0b73785ce886fe7

    SHA1

    b1719147c85611de02d783eca888fccac9042fc8

    SHA256

    af4f828ff2f5d7b9104481dfa8f19c0c749627a3da631c31ffffaa6ecaa63309

    SHA512

    24c9d6b21d76e874929fad7359bca2b1af44215ee2341e4e6686edfc324aadeebc5b686bfb41af51b2f646d5566297547ce57ee203e8d6244dd33a266307e2ed

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    488KB

    MD5

    b2b78e3c66af3a55b54dcd960b10018e

    SHA1

    e9cbd4b27b3f33c65861429fd8248b367aaa2c65

    SHA256

    6f269353626abfafea69643907adb837aeaa5b11e251e9cd316217ee26ae8db4

    SHA512

    6a02f8dd738486152f84d031dccec7c5e229a929aacade121ddc4e1df5f28244b5b337915ed02db2d35c49323be957ae141f228648c4597db838c19f9015d6ed

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    3446901cc0b6578af030faaee9aafdbc

    SHA1

    5b3891f780f63a48e92c48bff79a2e52e693b5d1

    SHA256

    77cf1a3e09ad7cf8d2d29af7df02d6918b4b2ee4683ee0ba869910f6c328cfbb

    SHA512

    db7dafd357fb5d8548a2bd5e27dda8d5f0a45c52a6181a8c1084face29fc9a27b83a7f33985613371ef28f32b4372927292acad2a2c9865939615696a8e69984

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    a69ae8dc4ac50afd529717d4453a3cc8

    SHA1

    21c87cf99f80b0029501932ce549f57aa0ec5b4c

    SHA256

    6c149df555d93dba935f394460650100eaf51f2265a85cdd5c7e209ef0c74885

    SHA512

    c517f9a738ff0851f9d8ace660f746e4ba296f12904c73395f69f8f01df8444156d5728d0ae2723247bbbe89e20e0a9d50f385a141e18e9dd9fd236e5451b690

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    19f48187a4528d9df5f80e581d545f90

    SHA1

    d57e7dcf44cad381cd30ffbaebdc0f7155693f40

    SHA256

    c2300551b3149f084f437fe298d31796170fcfe152287d7e97748354a3fa5495

    SHA512

    359ad956a3dce386fb87ed00ca908ee13835214cd156b0b49b2ca03283e43f3c25f26e76b09f44d05245d6bf0933f1264a6854b03d76e20d5e0e2f51dd2f546a

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    5baf96723b9c3826a7640cefd5dc5bb0

    SHA1

    1daeba3bae8ab308b48904042b4dc9b55e87b6b2

    SHA256

    38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4

    SHA512

    8ac95bb706a660844bf7ea204c6ca76537cc12b9603ef2bd2a9fee57a33e572551d1423693330921444a6dae54cb8060bd81635b7df45196afdec1cb25b352ae

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    1f9035071061aafcc740da21479034e5

    SHA1

    14dab6e3e4a0ba1c33d75df4af0adcb8b4cf6ef6

    SHA256

    62cea6c99f7ee0a0bb2b4d52ba6eb5db0ddb0963af6237a4e0c9210b2f08c62d

    SHA512

    31c8faed15987849bd56b37e6118adee66b9248ecf7dc68cd56aece650c74954ad51b4bc4a7220a1d3ecb8ee3d1c5bdb6c26121a669a04e57572d1a1bcb80b63

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    84d2e2dd03bc379056b16415c5b381f8

    SHA1

    c2341c6880f1f39ae4c15c2315756c531848419d

    SHA256

    d5ab7f0d18c203b3430ad3a0202785493209157513fcdf639352ea7f2c5e2dba

    SHA512

    c11843a0279dbb658894940db6f53de368f04ec39b7719ee3639c16d658fdce67bc82b18b29f18f59765375eb5423e78ab5f2d47ed28d113ea2b4a08a0f3cf2f

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    ec173cb4a7844d78d2789e42c9ef77bc

    SHA1

    48a722038fd07700e821ede06cbf349240e3e1b1

    SHA256

    b4e8b14f271f4276a4970ed5e9653aa3a7a554f50f7ece78c4e30494b2686e64

    SHA512

    863b3709b334c343aca147536a7b269478c4d0d9e0d67211d81c72eea8502eeda55df99f9d812bee13a0f2e6edc7bd438ac2df8635ab51d8be2862b5d31d2b58

  • C:\Windows\tiwi.exe

    Filesize

    488KB

    MD5

    146673dbed7544300eefd7e97bf7376d

    SHA1

    ce051b9052d68956d59b77305609f2584f1df49f

    SHA256

    10817dbb8e534df4f84204f6b7dff924748ca6c4abe3882ec449b54a46c276a8

    SHA512

    10b0a71a60aea1344defa9024cfc958639116a54926c7c287aa5f70b8bc472ec56fad9666a832360918b9c511b807caea3e8ec88f16f634756289b82a2857fa9

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    488KB

    MD5

    e63ad77cf817f68afe9e7e571071bb92

    SHA1

    7185961c95a20f450b2b9b548c9fef290072e534

    SHA256

    a582fd85580ee8552a38ae33c2f38de24ebbd3671c9f808e3a762fdbaffc941e

    SHA512

    d2b87a5ac704286abf72b2cf1790891c51bb0a8256b4c783fcbaf0920f3bf734f2448593096fe920e37b10ff4983420256ff89e3de1fc09a8f95afc25b2c7681

  • C:\tiwi.exe

    Filesize

    488KB

    MD5

    04c6ed6a246dc745bcc911366a039677

    SHA1

    e88cb42a560430b81bd21b96fe930edd3dadba63

    SHA256

    ef8d199b15a90dd03580e0571b07d0ca673b597fd96dd2ca6a50ee3af067e667

    SHA512

    9b52a1fbfcb301207ce101607d88e3e7e9771f706059ee7cc33850453078c8534c8db5a286e3ad554556eb0ec0f875ec1b9d2bf1af2e34a27715c8826332710d

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • memory/1104-421-0x0000000000300000-0x0000000000310000-memory.dmp

    Filesize

    64KB

  • memory/1104-420-0x0000000000300000-0x0000000000310000-memory.dmp

    Filesize

    64KB

  • memory/1432-422-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1432-110-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-341-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1672-217-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1672-214-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1672-206-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1720-381-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1764-419-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1932-268-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1932-275-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2268-306-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2276-274-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2356-221-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2356-205-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2356-220-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2388-267-0x0000000003820000-0x0000000003E1F000-memory.dmp

    Filesize

    6.0MB

  • memory/2388-222-0x0000000003820000-0x0000000003E1F000-memory.dmp

    Filesize

    6.0MB

  • memory/2388-438-0x0000000003820000-0x0000000003E1F000-memory.dmp

    Filesize

    6.0MB

  • memory/2388-99-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2388-385-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2660-223-0x0000000003880000-0x0000000003E7F000-memory.dmp

    Filesize

    6.0MB

  • memory/2660-207-0x0000000003880000-0x0000000003E7F000-memory.dmp

    Filesize

    6.0MB

  • memory/2660-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2660-384-0x0000000003780000-0x0000000003D7F000-memory.dmp

    Filesize

    6.0MB

  • memory/2660-111-0x0000000003780000-0x0000000003D7F000-memory.dmp

    Filesize

    6.0MB

  • memory/2660-109-0x0000000003780000-0x0000000003D7F000-memory.dmp

    Filesize

    6.0MB

  • memory/2660-98-0x0000000003780000-0x0000000003D7F000-memory.dmp

    Filesize

    6.0MB

  • memory/2660-288-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2660-431-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2660-266-0x0000000003880000-0x0000000003E7F000-memory.dmp

    Filesize

    6.0MB

  • memory/2936-280-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB