Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe
Resource
win10v2004-20241007-en
General
-
Target
38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe
-
Size
488KB
-
MD5
5baf96723b9c3826a7640cefd5dc5bb0
-
SHA1
1daeba3bae8ab308b48904042b4dc9b55e87b6b2
-
SHA256
38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4
-
SHA512
8ac95bb706a660844bf7ea204c6ca76537cc12b9603ef2bd2a9fee57a33e572551d1423693330921444a6dae54cb8060bd81635b7df45196afdec1cb25b352ae
-
SSDEEP
12288:V/Mw/MP/Mx/M7/Mx/M4/MpBE/Mk/M2/M1:VTK2O2HIBEd7M
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" winlogon.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cute.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cute.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Tiwi.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 35 IoCs
pid Process 2388 Tiwi.exe 1432 IExplorer.exe 2356 Tiwi.exe 1672 Tiwi.exe 1932 IExplorer.exe 2276 IExplorer.exe 2936 Tiwi.exe 1644 IExplorer.exe 2316 winlogon.exe 2308 winlogon.exe 2512 imoet.exe 2268 winlogon.exe 1004 imoet.exe 2468 imoet.exe 2108 cute.exe 1524 Tiwi.exe 1620 cute.exe 1616 cute.exe 1720 Tiwi.exe 2708 IExplorer.exe 2596 IExplorer.exe 2572 winlogon.exe 844 winlogon.exe 2332 winlogon.exe 2032 imoet.exe 2056 imoet.exe 1764 Tiwi.exe 1104 imoet.exe 1696 cute.exe 2824 IExplorer.exe 1960 cute.exe 2328 cute.exe 1740 winlogon.exe 1324 imoet.exe 2380 cute.exe -
Loads dropped DLL 53 IoCs
pid Process 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 2388 Tiwi.exe 2388 Tiwi.exe 1432 IExplorer.exe 1432 IExplorer.exe 2388 Tiwi.exe 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 2388 Tiwi.exe 1432 IExplorer.exe 1432 IExplorer.exe 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 2388 Tiwi.exe 2388 Tiwi.exe 1432 IExplorer.exe 1432 IExplorer.exe 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 1432 IExplorer.exe 1432 IExplorer.exe 2388 Tiwi.exe 2388 Tiwi.exe 2316 winlogon.exe 2316 winlogon.exe 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 2512 imoet.exe 2512 imoet.exe 2512 imoet.exe 2512 imoet.exe 2316 winlogon.exe 2512 imoet.exe 2316 winlogon.exe 2316 winlogon.exe 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 2316 winlogon.exe 2316 winlogon.exe 2108 cute.exe 2108 cute.exe 2512 imoet.exe 2512 imoet.exe 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 2108 cute.exe 2108 cute.exe 2108 cute.exe 2108 cute.exe 2108 cute.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe -
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" IExplorer.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: cute.exe File opened (read-only) \??\E: Tiwi.exe File opened (read-only) \??\V: cute.exe File opened (read-only) \??\N: winlogon.exe File opened (read-only) \??\R: Tiwi.exe File opened (read-only) \??\H: IExplorer.exe File opened (read-only) \??\W: IExplorer.exe File opened (read-only) \??\K: cute.exe File opened (read-only) \??\Y: cute.exe File opened (read-only) \??\I: IExplorer.exe File opened (read-only) \??\Q: IExplorer.exe File opened (read-only) \??\U: imoet.exe File opened (read-only) \??\O: 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File opened (read-only) \??\N: IExplorer.exe File opened (read-only) \??\L: winlogon.exe File opened (read-only) \??\V: winlogon.exe File opened (read-only) \??\I: imoet.exe File opened (read-only) \??\B: cute.exe File opened (read-only) \??\I: cute.exe File opened (read-only) \??\K: 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File opened (read-only) \??\B: IExplorer.exe File opened (read-only) \??\S: IExplorer.exe File opened (read-only) \??\Z: imoet.exe File opened (read-only) \??\J: cute.exe File opened (read-only) \??\H: Tiwi.exe File opened (read-only) \??\P: Tiwi.exe File opened (read-only) \??\W: Tiwi.exe File opened (read-only) \??\T: IExplorer.exe File opened (read-only) \??\Y: IExplorer.exe File opened (read-only) \??\Z: Tiwi.exe File opened (read-only) \??\U: IExplorer.exe File opened (read-only) \??\G: 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File opened (read-only) \??\J: Tiwi.exe File opened (read-only) \??\U: winlogon.exe File opened (read-only) \??\W: imoet.exe File opened (read-only) \??\R: 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File opened (read-only) \??\B: winlogon.exe File opened (read-only) \??\M: 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File opened (read-only) \??\Z: 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File opened (read-only) \??\J: winlogon.exe File opened (read-only) \??\R: imoet.exe File opened (read-only) \??\L: cute.exe File opened (read-only) \??\S: 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File opened (read-only) \??\T: 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File opened (read-only) \??\V: 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File opened (read-only) \??\Z: IExplorer.exe File opened (read-only) \??\W: winlogon.exe File opened (read-only) \??\N: imoet.exe File opened (read-only) \??\X: IExplorer.exe File opened (read-only) \??\S: imoet.exe File opened (read-only) \??\Q: 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File opened (read-only) \??\N: Tiwi.exe File opened (read-only) \??\H: winlogon.exe File opened (read-only) \??\P: imoet.exe File opened (read-only) \??\O: winlogon.exe File opened (read-only) \??\X: imoet.exe File opened (read-only) \??\G: cute.exe File opened (read-only) \??\J: 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File opened (read-only) \??\K: winlogon.exe File opened (read-only) \??\E: imoet.exe File opened (read-only) \??\H: cute.exe File opened (read-only) \??\P: 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File opened (read-only) \??\T: Tiwi.exe File opened (read-only) \??\L: IExplorer.exe -
Modifies WinLogon 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File opened for modification C:\autorun.inf 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File created F:\autorun.inf 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File opened for modification F:\autorun.inf 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe -
Drops file in System32 directory 40 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell.exe 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr winlogon.exe File created C:\Windows\SysWOW64\tiwi.scr 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe imoet.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr cute.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe imoet.exe File opened for modification C:\Windows\SysWOW64\shell.exe cute.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe cute.exe File created C:\Windows\SysWOW64\IExplorer.exe 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File created C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe imoet.exe File created C:\Windows\SysWOW64\IExplorer.exe cute.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr Tiwi.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr imoet.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe -
Drops file in Windows directory 26 IoCs
description ioc Process File opened for modification C:\Windows\tiwi.exe Tiwi.exe File opened for modification C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\tiwi.exe winlogon.exe File opened for modification C:\Windows\tiwi.exe imoet.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe imoet.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File created C:\Windows\tiwi.exe Tiwi.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe cute.exe File created C:\Windows\tiwi.exe 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe File opened for modification C:\Windows\tiwi.exe IExplorer.exe File created C:\Windows\tiwi.exe IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe cute.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe -
Modifies Control Panel 54 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Mouse\SwapMouseButtons = "1" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\ Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" cute.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Mouse\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Mouse\SwapMouseButtons = "1" cute.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Mouse\ 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\ 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\s1159 = "Tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Mouse\SwapMouseButtons = "1" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\s1159 = "Tiwi" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Mouse\SwapMouseButtons = "1" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\s1159 = "Tiwi" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\s2359 = "Tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\s2359 = "Tiwi" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Mouse\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\s2359 = "Tiwi" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\s1159 = "Tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\s2359 = "Tiwi" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Mouse\SwapMouseButtons = "1" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\s2359 = "Tiwi" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Mouse\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\s2359 = "Tiwi" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\s1159 = "Tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" cute.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\s1159 = "Tiwi" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Mouse\ imoet.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ cute.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\ cute.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\ IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Mouse\SwapMouseButtons = "1" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\ imoet.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Mouse\ cute.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." cute.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\ 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." imoet.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\ cute.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\ imoet.exe -
Modifies Internet Explorer start page 1 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 2388 Tiwi.exe 2512 imoet.exe 2316 winlogon.exe 1432 IExplorer.exe 2108 cute.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
pid Process 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 2388 Tiwi.exe 1432 IExplorer.exe 1672 Tiwi.exe 2356 Tiwi.exe 2276 IExplorer.exe 1932 IExplorer.exe 2936 Tiwi.exe 2316 winlogon.exe 1644 IExplorer.exe 2308 winlogon.exe 2512 imoet.exe 2268 winlogon.exe 1004 imoet.exe 2468 imoet.exe 2108 cute.exe 1524 Tiwi.exe 1620 cute.exe 1720 Tiwi.exe 2596 IExplorer.exe 1616 cute.exe 2708 IExplorer.exe 2572 winlogon.exe 844 winlogon.exe 2332 winlogon.exe 2032 imoet.exe 1764 Tiwi.exe 2056 imoet.exe 1104 imoet.exe 1696 cute.exe 2824 IExplorer.exe 2328 cute.exe 1960 cute.exe 1740 winlogon.exe 1324 imoet.exe 2380 cute.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2388 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 30 PID 2660 wrote to memory of 2388 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 30 PID 2660 wrote to memory of 2388 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 30 PID 2660 wrote to memory of 2388 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 30 PID 2660 wrote to memory of 1432 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 31 PID 2660 wrote to memory of 1432 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 31 PID 2660 wrote to memory of 1432 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 31 PID 2660 wrote to memory of 1432 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 31 PID 2388 wrote to memory of 2356 2388 Tiwi.exe 32 PID 2388 wrote to memory of 2356 2388 Tiwi.exe 32 PID 2388 wrote to memory of 2356 2388 Tiwi.exe 32 PID 2388 wrote to memory of 2356 2388 Tiwi.exe 32 PID 2660 wrote to memory of 1672 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 33 PID 2660 wrote to memory of 1672 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 33 PID 2660 wrote to memory of 1672 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 33 PID 2660 wrote to memory of 1672 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 33 PID 2660 wrote to memory of 2276 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 34 PID 2660 wrote to memory of 2276 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 34 PID 2660 wrote to memory of 2276 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 34 PID 2660 wrote to memory of 2276 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 34 PID 2388 wrote to memory of 1932 2388 Tiwi.exe 35 PID 2388 wrote to memory of 1932 2388 Tiwi.exe 35 PID 2388 wrote to memory of 1932 2388 Tiwi.exe 35 PID 2388 wrote to memory of 1932 2388 Tiwi.exe 35 PID 1432 wrote to memory of 2936 1432 IExplorer.exe 36 PID 1432 wrote to memory of 2936 1432 IExplorer.exe 36 PID 1432 wrote to memory of 2936 1432 IExplorer.exe 36 PID 1432 wrote to memory of 2936 1432 IExplorer.exe 36 PID 1432 wrote to memory of 1644 1432 IExplorer.exe 37 PID 1432 wrote to memory of 1644 1432 IExplorer.exe 37 PID 1432 wrote to memory of 1644 1432 IExplorer.exe 37 PID 1432 wrote to memory of 1644 1432 IExplorer.exe 37 PID 2660 wrote to memory of 2316 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 39 PID 2660 wrote to memory of 2316 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 39 PID 2660 wrote to memory of 2316 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 39 PID 2660 wrote to memory of 2316 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 39 PID 2388 wrote to memory of 2308 2388 Tiwi.exe 38 PID 2388 wrote to memory of 2308 2388 Tiwi.exe 38 PID 2388 wrote to memory of 2308 2388 Tiwi.exe 38 PID 2388 wrote to memory of 2308 2388 Tiwi.exe 38 PID 1432 wrote to memory of 2268 1432 IExplorer.exe 40 PID 1432 wrote to memory of 2268 1432 IExplorer.exe 40 PID 1432 wrote to memory of 2268 1432 IExplorer.exe 40 PID 1432 wrote to memory of 2268 1432 IExplorer.exe 40 PID 2660 wrote to memory of 2512 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 41 PID 2660 wrote to memory of 2512 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 41 PID 2660 wrote to memory of 2512 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 41 PID 2660 wrote to memory of 2512 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 41 PID 2388 wrote to memory of 1004 2388 Tiwi.exe 42 PID 2388 wrote to memory of 1004 2388 Tiwi.exe 42 PID 2388 wrote to memory of 1004 2388 Tiwi.exe 42 PID 2388 wrote to memory of 1004 2388 Tiwi.exe 42 PID 1432 wrote to memory of 2468 1432 IExplorer.exe 43 PID 1432 wrote to memory of 2468 1432 IExplorer.exe 43 PID 1432 wrote to memory of 2468 1432 IExplorer.exe 43 PID 1432 wrote to memory of 2468 1432 IExplorer.exe 43 PID 2660 wrote to memory of 2108 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 44 PID 2660 wrote to memory of 2108 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 44 PID 2660 wrote to memory of 2108 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 44 PID 2660 wrote to memory of 2108 2660 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe 44 PID 2316 wrote to memory of 1524 2316 winlogon.exe 45 PID 2316 wrote to memory of 1524 2316 winlogon.exe 45 PID 2316 wrote to memory of 1524 2316 winlogon.exe 45 PID 2316 wrote to memory of 1524 2316 winlogon.exe 45 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" 38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System imoet.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe"C:\Users\Admin\AppData\Local\Temp\38b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4N.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2660 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2388 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2356
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1932
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2308
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1004
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1620
-
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1432 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2936
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1644
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2268
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2468
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1616
-
-
-
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1672
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2276
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2316 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1524
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2708
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2332
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1696
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2512 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1720
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2596
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:844
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2056
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1960
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2108 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1764
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1324
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2380
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1104
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5a4232eb5b00a58551b782cfe081099a4
SHA14b562c47ff1297d57db557a5eccbb14d62e8b697
SHA256beb3c498dc203069345ab327933cbfd77694ed8b4ebd8d6952afc2b859df6d56
SHA512c6da98b6dd4b7319b6210b51862ea8e2e869a7e2f737b0c4712a8cf6af122eb1005f7295284cbe6d38b6494bf7e80c25c95e451425d3739a91fc1f2a469d51c9
-
Filesize
488KB
MD5e4fcfe35f71b2cd7a43b466ae2a0593f
SHA122e3da47a83e9686c421d6421d0da726d7cea580
SHA256b906522a3b7e46097ad63a4a97223a77d508a2bcdfc2f265e84795376f67e2e6
SHA51216ff7bac905944f0ddc25f414759e26b7485aaed08c80cb76fb57ebdcc1c2897f596d24614d23d50a6f861c896dacc1bd7473ea8f0ad25ef031cab9bae4a6840
-
Filesize
488KB
MD54c9f9e6521e5a881b5bef7365985a520
SHA1caab14fc5a4fcd4ca3722259b0596f080815279d
SHA2567551f7d4549e63443ba3349d732a9804841db7b6ae7d14caa3239db2876e8293
SHA51272e0fd67109c8f32aaa57c4948217eda82c9b97122249db4f8fad54ead43922ede3e8ee3140350f6e45ded30a00d3b57dcd073ae6650be427d7a82829ae3e699
-
Filesize
488KB
MD5f1d077360f4740356769f32672cd4d92
SHA1e1b29d8c60d141705ef2651c5f309b654c070087
SHA25656e21179b660192d395cd5da64a14322cb214237d9da2fde2274f067126e2d25
SHA51235c377b4c24f58c0b75f2b8445c0aa816dd716e0b0a0d0634d27e87e6ef721f777e3833296cc282586716c0ab6156b6dfb1bf72744229ffba5e289218ae57c74
-
Filesize
488KB
MD5565f2f5118d80e01888baded563ea17c
SHA12aeb23721ef3499efd511f05ca02c7c48f7c26ac
SHA256eb0e0ab93ee5a03e0ab8137820942b3f2f4e0ba5922087b3be5b3148ef983c6c
SHA512fa43291f91e7388fb32623f4a847de3d929c32e4391ff8798c51433b63c633a5c44108ab5e0fefce130059be4efd9441902c20827fe5cba958b74c33c75b501c
-
Filesize
45KB
MD5418363f455abe326293fef2519d165fe
SHA1445117f1fdb3df8ba2a0ed691af6ec4f1e7c0656
SHA256f5dfe85b7431309f4dcea0eefc584869f7122a618e72349664141bbe7d422823
SHA512c52f2df2f88e87f970f525f838c74662fb194936a2e29a9bbf5148372c1efc7fe3e4e742a22a417cdb0d3fac60eed8dd728c1e27dfd99e3e380c13bd9b329790
-
Filesize
45KB
MD59bc8a86b73c8fb67644e9ffcff0c7cde
SHA116f4bec4dbe3802e2364e8b35616662ad92d72b5
SHA2562e07c57ed2c7e5f6ff288050700ee23918fba71e16724fad7024f6ff22996e58
SHA5120098bc1aa8859af65bc151f71cc8fcac345afd5e4090a8cc73332e976b933f1d313974d356c757857cdd5aea504630e827c04d918d46f33cb24770afc2061b1b
-
Filesize
488KB
MD5760fd178bec2445ac0ce30a390534dc9
SHA158cbae2432b464e3bf23578d3f995d357ab134a3
SHA256070dc733005f9d3c9821e8e79c8af526e7181eb2d46142ccbe6abcc73fa1f94a
SHA5120f3d00e67580a3932e68318ecfd8dc82eafd9213d836389571a2ec65bd47d50bc5657cf3fead72a9a4ea00e82cf144102ebcf4f48b8cdd5b11795e26e35155ce
-
Filesize
488KB
MD5bce5e8c4003ec202ed9ce99c71acbe49
SHA17a06bd2c3c70d48995ec0dc3a6f5f77366e40db2
SHA2565c4180f32910591c631d25a472ddbe35589264ceae7727c6a77286800a67495a
SHA512c6425035193b6814afa47b6490f91f77be931232da6dc011ab79fdb1af23984cf31f8538dc6d99c54ccd89080aab9bd31d967d9778002b5f516e7ee30c9ffb93
-
Filesize
488KB
MD5fb9bc98f83fa40d3b0b73785ce886fe7
SHA1b1719147c85611de02d783eca888fccac9042fc8
SHA256af4f828ff2f5d7b9104481dfa8f19c0c749627a3da631c31ffffaa6ecaa63309
SHA51224c9d6b21d76e874929fad7359bca2b1af44215ee2341e4e6686edfc324aadeebc5b686bfb41af51b2f646d5566297547ce57ee203e8d6244dd33a266307e2ed
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
488KB
MD5b2b78e3c66af3a55b54dcd960b10018e
SHA1e9cbd4b27b3f33c65861429fd8248b367aaa2c65
SHA2566f269353626abfafea69643907adb837aeaa5b11e251e9cd316217ee26ae8db4
SHA5126a02f8dd738486152f84d031dccec7c5e229a929aacade121ddc4e1df5f28244b5b337915ed02db2d35c49323be957ae141f228648c4597db838c19f9015d6ed
-
Filesize
488KB
MD53446901cc0b6578af030faaee9aafdbc
SHA15b3891f780f63a48e92c48bff79a2e52e693b5d1
SHA25677cf1a3e09ad7cf8d2d29af7df02d6918b4b2ee4683ee0ba869910f6c328cfbb
SHA512db7dafd357fb5d8548a2bd5e27dda8d5f0a45c52a6181a8c1084face29fc9a27b83a7f33985613371ef28f32b4372927292acad2a2c9865939615696a8e69984
-
Filesize
488KB
MD5a69ae8dc4ac50afd529717d4453a3cc8
SHA121c87cf99f80b0029501932ce549f57aa0ec5b4c
SHA2566c149df555d93dba935f394460650100eaf51f2265a85cdd5c7e209ef0c74885
SHA512c517f9a738ff0851f9d8ace660f746e4ba296f12904c73395f69f8f01df8444156d5728d0ae2723247bbbe89e20e0a9d50f385a141e18e9dd9fd236e5451b690
-
Filesize
488KB
MD519f48187a4528d9df5f80e581d545f90
SHA1d57e7dcf44cad381cd30ffbaebdc0f7155693f40
SHA256c2300551b3149f084f437fe298d31796170fcfe152287d7e97748354a3fa5495
SHA512359ad956a3dce386fb87ed00ca908ee13835214cd156b0b49b2ca03283e43f3c25f26e76b09f44d05245d6bf0933f1264a6854b03d76e20d5e0e2f51dd2f546a
-
Filesize
488KB
MD55baf96723b9c3826a7640cefd5dc5bb0
SHA11daeba3bae8ab308b48904042b4dc9b55e87b6b2
SHA25638b318d623bf540d455650479973b6bf8bcb6f2d27e4287b888ddef34480e4e4
SHA5128ac95bb706a660844bf7ea204c6ca76537cc12b9603ef2bd2a9fee57a33e572551d1423693330921444a6dae54cb8060bd81635b7df45196afdec1cb25b352ae
-
Filesize
488KB
MD51f9035071061aafcc740da21479034e5
SHA114dab6e3e4a0ba1c33d75df4af0adcb8b4cf6ef6
SHA25662cea6c99f7ee0a0bb2b4d52ba6eb5db0ddb0963af6237a4e0c9210b2f08c62d
SHA51231c8faed15987849bd56b37e6118adee66b9248ecf7dc68cd56aece650c74954ad51b4bc4a7220a1d3ecb8ee3d1c5bdb6c26121a669a04e57572d1a1bcb80b63
-
Filesize
488KB
MD584d2e2dd03bc379056b16415c5b381f8
SHA1c2341c6880f1f39ae4c15c2315756c531848419d
SHA256d5ab7f0d18c203b3430ad3a0202785493209157513fcdf639352ea7f2c5e2dba
SHA512c11843a0279dbb658894940db6f53de368f04ec39b7719ee3639c16d658fdce67bc82b18b29f18f59765375eb5423e78ab5f2d47ed28d113ea2b4a08a0f3cf2f
-
Filesize
488KB
MD5ec173cb4a7844d78d2789e42c9ef77bc
SHA148a722038fd07700e821ede06cbf349240e3e1b1
SHA256b4e8b14f271f4276a4970ed5e9653aa3a7a554f50f7ece78c4e30494b2686e64
SHA512863b3709b334c343aca147536a7b269478c4d0d9e0d67211d81c72eea8502eeda55df99f9d812bee13a0f2e6edc7bd438ac2df8635ab51d8be2862b5d31d2b58
-
Filesize
488KB
MD5146673dbed7544300eefd7e97bf7376d
SHA1ce051b9052d68956d59b77305609f2584f1df49f
SHA25610817dbb8e534df4f84204f6b7dff924748ca6c4abe3882ec449b54a46c276a8
SHA51210b0a71a60aea1344defa9024cfc958639116a54926c7c287aa5f70b8bc472ec56fad9666a832360918b9c511b807caea3e8ec88f16f634756289b82a2857fa9
-
Filesize
729B
MD58e3c734e8dd87d639fb51500d42694b5
SHA1f76371d31eed9663e9a4fd7cb95f54dcfc51f87f
SHA256574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad
SHA51206ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853
-
Filesize
488KB
MD5e63ad77cf817f68afe9e7e571071bb92
SHA17185961c95a20f450b2b9b548c9fef290072e534
SHA256a582fd85580ee8552a38ae33c2f38de24ebbd3671c9f808e3a762fdbaffc941e
SHA512d2b87a5ac704286abf72b2cf1790891c51bb0a8256b4c783fcbaf0920f3bf734f2448593096fe920e37b10ff4983420256ff89e3de1fc09a8f95afc25b2c7681
-
Filesize
488KB
MD504c6ed6a246dc745bcc911366a039677
SHA1e88cb42a560430b81bd21b96fe930edd3dadba63
SHA256ef8d199b15a90dd03580e0571b07d0ca673b597fd96dd2ca6a50ee3af067e667
SHA5129b52a1fbfcb301207ce101607d88e3e7e9771f706059ee7cc33850453078c8534c8db5a286e3ad554556eb0ec0f875ec1b9d2bf1af2e34a27715c8826332710d
-
Filesize
39B
MD5415c421ba7ae46e77bdee3a681ecc156
SHA1b0db5782b7688716d6fc83f7e650ffe1143201b7
SHA256e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e
SHA512dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62