Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 20:18
Static task
static1
Behavioral task
behavioral1
Sample
1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe
Resource
win10v2004-20241007-en
General
-
Target
1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe
-
Size
351KB
-
MD5
8ab266da034d68f83f6148e2e36610db
-
SHA1
cc5bd0694a9e8e7007f8b7eeff312c8fdec833b8
-
SHA256
1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424
-
SHA512
c332e3e8427543dbebb0bd0de694028fe164e3cc330c131b8a463d3dd1ba5391efe921ee6d5690ffdc6a95d3f9714baab1c6d1142141086b1182eb2308115776
-
SSDEEP
6144:V/OZplcYZplx/OZpl7/OZplx/OZplQ/OZplU:V/Mcqx/M7/Mx/MQ/MU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
Processes:
Tiwi.exeIExplorer.exewinlogon.execute.exe1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exeimoet.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
Processes:
cute.exe1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exeTiwi.exeIExplorer.exewinlogon.exeimoet.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" imoet.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
Processes:
IExplorer.exewinlogon.exeimoet.execute.exe1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exeTiwi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Tiwi.exe -
Disables RegEdit via registry modification 6 IoCs
Processes:
1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cute.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 6 IoCs
Processes:
1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 35 IoCs
Processes:
Tiwi.exeIExplorer.exeTiwi.exeTiwi.exeIExplorer.exeIExplorer.exeTiwi.exeIExplorer.exewinlogon.exewinlogon.exewinlogon.exeimoet.exeimoet.exeimoet.exeTiwi.execute.execute.exeIExplorer.execute.exeTiwi.exewinlogon.exewinlogon.exeIExplorer.exeimoet.execute.exeimoet.exewinlogon.exeTiwi.execute.exeimoet.exeIExplorer.execute.exewinlogon.exeimoet.execute.exepid process 2632 Tiwi.exe 2112 IExplorer.exe 2712 Tiwi.exe 608 Tiwi.exe 936 IExplorer.exe 348 IExplorer.exe 2396 Tiwi.exe 2944 IExplorer.exe 2120 winlogon.exe 2256 winlogon.exe 2440 winlogon.exe 2104 imoet.exe 2288 imoet.exe 1760 imoet.exe 2548 Tiwi.exe 2800 cute.exe 2908 cute.exe 2244 IExplorer.exe 2188 cute.exe 2620 Tiwi.exe 2260 winlogon.exe 2608 winlogon.exe 2628 IExplorer.exe 2664 imoet.exe 2116 cute.exe 1448 imoet.exe 1196 winlogon.exe 2972 Tiwi.exe 1808 cute.exe 2916 imoet.exe 2368 IExplorer.exe 2680 cute.exe 2940 winlogon.exe 352 imoet.exe 1408 cute.exe -
Loads dropped DLL 53 IoCs
Processes:
1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exepid process 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe 2632 Tiwi.exe 2632 Tiwi.exe 2112 IExplorer.exe 2112 IExplorer.exe 2112 IExplorer.exe 2632 Tiwi.exe 2112 IExplorer.exe 2632 Tiwi.exe 2632 Tiwi.exe 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe 2632 Tiwi.exe 2112 IExplorer.exe 2112 IExplorer.exe 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe 2632 Tiwi.exe 2632 Tiwi.exe 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe 2120 winlogon.exe 2120 winlogon.exe 2112 IExplorer.exe 2112 IExplorer.exe 2120 winlogon.exe 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe 2104 imoet.exe 2104 imoet.exe 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe 2120 winlogon.exe 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe 2120 winlogon.exe 2104 imoet.exe 2104 imoet.exe 2120 winlogon.exe 2120 winlogon.exe 2104 imoet.exe 2800 cute.exe 2800 cute.exe 2104 imoet.exe 2104 imoet.exe 2800 cute.exe 2800 cute.exe 2800 cute.exe 2800 cute.exe 2800 cute.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
Processes:
cute.exeTiwi.exeIExplorer.exe1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exewinlogon.exeimoet.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe -
Adds Run key to start application 2 TTPs 24 IoCs
Processes:
IExplorer.exewinlogon.exeimoet.execute.exeTiwi.exe1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" Tiwi.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exeIExplorer.exewinlogon.exeimoet.execute.exeTiwi.exedescription ioc process File opened (read-only) \??\K: 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File opened (read-only) \??\Y: IExplorer.exe File opened (read-only) \??\G: winlogon.exe File opened (read-only) \??\J: 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File opened (read-only) \??\Y: 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File opened (read-only) \??\J: winlogon.exe File opened (read-only) \??\N: imoet.exe File opened (read-only) \??\M: 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File opened (read-only) \??\T: 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File opened (read-only) \??\K: IExplorer.exe File opened (read-only) \??\P: IExplorer.exe File opened (read-only) \??\K: imoet.exe File opened (read-only) \??\R: imoet.exe File opened (read-only) \??\Y: cute.exe File opened (read-only) \??\Y: Tiwi.exe File opened (read-only) \??\I: winlogon.exe File opened (read-only) \??\Q: imoet.exe File opened (read-only) \??\M: cute.exe File opened (read-only) \??\E: 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File opened (read-only) \??\G: Tiwi.exe File opened (read-only) \??\I: Tiwi.exe File opened (read-only) \??\R: Tiwi.exe File opened (read-only) \??\W: Tiwi.exe File opened (read-only) \??\B: winlogon.exe File opened (read-only) \??\I: 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File opened (read-only) \??\Z: 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File opened (read-only) \??\Q: Tiwi.exe File opened (read-only) \??\H: IExplorer.exe File opened (read-only) \??\H: cute.exe File opened (read-only) \??\O: Tiwi.exe File opened (read-only) \??\T: IExplorer.exe File opened (read-only) \??\R: winlogon.exe File opened (read-only) \??\U: winlogon.exe File opened (read-only) \??\G: imoet.exe File opened (read-only) \??\U: imoet.exe File opened (read-only) \??\T: cute.exe File opened (read-only) \??\P: Tiwi.exe File opened (read-only) \??\T: Tiwi.exe File opened (read-only) \??\E: IExplorer.exe File opened (read-only) \??\M: imoet.exe File opened (read-only) \??\S: IExplorer.exe File opened (read-only) \??\M: winlogon.exe File opened (read-only) \??\O: winlogon.exe File opened (read-only) \??\P: winlogon.exe File opened (read-only) \??\W: cute.exe File opened (read-only) \??\G: 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File opened (read-only) \??\W: 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File opened (read-only) \??\E: Tiwi.exe File opened (read-only) \??\L: cute.exe File opened (read-only) \??\B: Tiwi.exe File opened (read-only) \??\M: IExplorer.exe File opened (read-only) \??\O: IExplorer.exe File opened (read-only) \??\L: winlogon.exe File opened (read-only) \??\Z: imoet.exe File opened (read-only) \??\P: cute.exe File opened (read-only) \??\S: cute.exe File opened (read-only) \??\S: Tiwi.exe File opened (read-only) \??\H: imoet.exe File opened (read-only) \??\B: IExplorer.exe File opened (read-only) \??\G: IExplorer.exe File opened (read-only) \??\W: imoet.exe File opened (read-only) \??\Y: imoet.exe File opened (read-only) \??\V: Tiwi.exe File opened (read-only) \??\E: winlogon.exe -
Modifies WinLogon 2 TTPs 18 IoCs
Processes:
1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exeTiwi.exeimoet.exewinlogon.execute.exeIExplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ cute.exe -
Drops autorun.inf file 1 TTPs 6 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
Tiwi.exe1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exedescription ioc process File opened for modification F:\autorun.inf Tiwi.exe File created F:\autorun.inf 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File opened for modification F:\autorun.inf 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File created C:\autorun.inf 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File opened for modification C:\autorun.inf 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File created F:\autorun.inf Tiwi.exe -
Drops file in System32 directory 40 IoCs
Processes:
IExplorer.exeTiwi.exeimoet.exeIExplorer.exe1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exeIExplorer.exewinlogon.execute.exeIExplorer.exeIExplorer.exeIExplorer.exeIExplorer.exedescription ioc process File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe imoet.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File created C:\Windows\SysWOW64\shell.exe 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr winlogon.exe File created C:\Windows\SysWOW64\IExplorer.exe imoet.exe File created C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\shell.exe cute.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe cute.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\tiwi.scr 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File created C:\Windows\SysWOW64\IExplorer.exe 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr Tiwi.exe File opened for modification C:\Windows\SysWOW64\shell.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr imoet.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe cute.exe File created C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\shell.exe imoet.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr cute.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe -
Drops file in Windows directory 26 IoCs
Processes:
Tiwi.exeIExplorer.exeIExplorer.exeIExplorer.exeIExplorer.exe1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exeIExplorer.exeimoet.exeIExplorer.exewinlogon.exeIExplorer.execute.exedescription ioc process File opened for modification C:\Windows\tiwi.exe Tiwi.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File created C:\Windows\tiwi.exe IExplorer.exe File opened for modification C:\Windows\tiwi.exe imoet.exe File created C:\Windows\tiwi.exe imoet.exe File created C:\Windows\tiwi.exe 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe cute.exe File created C:\Windows\tiwi.exe cute.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe Tiwi.exe File opened for modification C:\Windows\tiwi.exe IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exeIExplorer.exeimoet.exewinlogon.execute.exewinlogon.execute.exeIExplorer.exeimoet.exeTiwi.execute.exeIExplorer.exeTiwi.exewinlogon.exewinlogon.exewinlogon.exeimoet.execute.exeimoet.execute.exeIExplorer.exeimoet.exeTiwi.exeimoet.exeIExplorer.exeTiwi.execute.exewinlogon.exeTiwi.execute.exeTiwi.exeTiwi.exeIExplorer.exeimoet.exewinlogon.exeIExplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe -
Modifies Control Panel 54 IoCs
Processes:
Tiwi.exeIExplorer.exewinlogon.exeimoet.exe1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.execute.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\International\s2359 = "Tiwi" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Mouse\SwapMouseButtons = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Mouse\SwapMouseButtons = "1" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Mouse\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\International\s1159 = "Tiwi" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\International\s1159 = "Tiwi" cute.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" cute.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\International\s2359 = "Tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\International\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\International\s2359 = "Tiwi" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Mouse\ Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\International\s2359 = "Tiwi" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Mouse\SwapMouseButtons = "1" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\International\s1159 = "Tiwi" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\International\s2359 = "Tiwi" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" imoet.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Mouse\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Mouse\SwapMouseButtons = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Mouse\SwapMouseButtons = "1" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Mouse\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\International\s2359 = "Tiwi" cute.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\International\ 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\International\s1159 = "Tiwi" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\International\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\International\s1159 = "Tiwi" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Mouse\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\International\s1159 = "Tiwi" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\International\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" imoet.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Mouse\ 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\International\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\International\ imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Mouse\SwapMouseButtons = "1" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe -
Processes:
IExplorer.exewinlogon.execute.exeimoet.exe1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exeTiwi.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." cute.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\ imoet.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" cute.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\ 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" imoet.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." Tiwi.exe -
Modifies Internet Explorer start page 1 TTPs 6 IoCs
Processes:
winlogon.exeimoet.execute.exe1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exeTiwi.exeIExplorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" IExplorer.exe -
Modifies registry class 64 IoCs
Processes:
1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exewinlogon.exeimoet.execute.exeTiwi.exeIExplorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exepid process 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
Tiwi.exeimoet.exewinlogon.exeIExplorer.execute.exepid process 2632 Tiwi.exe 2104 imoet.exe 2120 winlogon.exe 2112 IExplorer.exe 2800 cute.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
Processes:
1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exeTiwi.exeIExplorer.exeTiwi.exeTiwi.exeIExplorer.exeTiwi.exeIExplorer.exewinlogon.exeIExplorer.exewinlogon.exewinlogon.exeimoet.exeimoet.exeTiwi.exeimoet.execute.exeIExplorer.execute.exeTiwi.execute.exewinlogon.exewinlogon.exeimoet.exeIExplorer.execute.exeimoet.exewinlogon.exeTiwi.exeimoet.execute.execute.exeIExplorer.exewinlogon.exeimoet.execute.exepid process 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe 2632 Tiwi.exe 2112 IExplorer.exe 2712 Tiwi.exe 608 Tiwi.exe 348 IExplorer.exe 2396 Tiwi.exe 2944 IExplorer.exe 2120 winlogon.exe 936 IExplorer.exe 2256 winlogon.exe 2440 winlogon.exe 2104 imoet.exe 1760 imoet.exe 2548 Tiwi.exe 2288 imoet.exe 2800 cute.exe 2244 IExplorer.exe 2908 cute.exe 2620 Tiwi.exe 2188 cute.exe 2608 winlogon.exe 2260 winlogon.exe 2664 imoet.exe 2628 IExplorer.exe 2116 cute.exe 1448 imoet.exe 1196 winlogon.exe 2972 Tiwi.exe 2916 imoet.exe 1808 cute.exe 2680 cute.exe 2368 IExplorer.exe 2940 winlogon.exe 352 imoet.exe 1408 cute.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exeTiwi.exeIExplorer.exewinlogon.exedescription pid process target process PID 1964 wrote to memory of 2632 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Tiwi.exe PID 1964 wrote to memory of 2632 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Tiwi.exe PID 1964 wrote to memory of 2632 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Tiwi.exe PID 1964 wrote to memory of 2632 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Tiwi.exe PID 1964 wrote to memory of 2112 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe IExplorer.exe PID 1964 wrote to memory of 2112 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe IExplorer.exe PID 1964 wrote to memory of 2112 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe IExplorer.exe PID 1964 wrote to memory of 2112 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe IExplorer.exe PID 1964 wrote to memory of 2712 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Tiwi.exe PID 1964 wrote to memory of 2712 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Tiwi.exe PID 1964 wrote to memory of 2712 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Tiwi.exe PID 1964 wrote to memory of 2712 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Tiwi.exe PID 2632 wrote to memory of 608 2632 Tiwi.exe Tiwi.exe PID 2632 wrote to memory of 608 2632 Tiwi.exe Tiwi.exe PID 2632 wrote to memory of 608 2632 Tiwi.exe Tiwi.exe PID 2632 wrote to memory of 608 2632 Tiwi.exe Tiwi.exe PID 1964 wrote to memory of 936 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe IExplorer.exe PID 1964 wrote to memory of 936 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe IExplorer.exe PID 1964 wrote to memory of 936 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe IExplorer.exe PID 1964 wrote to memory of 936 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe IExplorer.exe PID 2632 wrote to memory of 348 2632 Tiwi.exe IExplorer.exe PID 2632 wrote to memory of 348 2632 Tiwi.exe IExplorer.exe PID 2632 wrote to memory of 348 2632 Tiwi.exe IExplorer.exe PID 2632 wrote to memory of 348 2632 Tiwi.exe IExplorer.exe PID 2112 wrote to memory of 2396 2112 IExplorer.exe Tiwi.exe PID 2112 wrote to memory of 2396 2112 IExplorer.exe Tiwi.exe PID 2112 wrote to memory of 2396 2112 IExplorer.exe Tiwi.exe PID 2112 wrote to memory of 2396 2112 IExplorer.exe Tiwi.exe PID 2112 wrote to memory of 2944 2112 IExplorer.exe IExplorer.exe PID 2112 wrote to memory of 2944 2112 IExplorer.exe IExplorer.exe PID 2112 wrote to memory of 2944 2112 IExplorer.exe IExplorer.exe PID 2112 wrote to memory of 2944 2112 IExplorer.exe IExplorer.exe PID 2112 wrote to memory of 2256 2112 IExplorer.exe winlogon.exe PID 2112 wrote to memory of 2256 2112 IExplorer.exe winlogon.exe PID 2112 wrote to memory of 2256 2112 IExplorer.exe winlogon.exe PID 2112 wrote to memory of 2256 2112 IExplorer.exe winlogon.exe PID 2632 wrote to memory of 2120 2632 Tiwi.exe winlogon.exe PID 2632 wrote to memory of 2120 2632 Tiwi.exe winlogon.exe PID 2632 wrote to memory of 2120 2632 Tiwi.exe winlogon.exe PID 2632 wrote to memory of 2120 2632 Tiwi.exe winlogon.exe PID 1964 wrote to memory of 2440 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe winlogon.exe PID 1964 wrote to memory of 2440 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe winlogon.exe PID 1964 wrote to memory of 2440 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe winlogon.exe PID 1964 wrote to memory of 2440 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe winlogon.exe PID 2632 wrote to memory of 2104 2632 Tiwi.exe imoet.exe PID 2632 wrote to memory of 2104 2632 Tiwi.exe imoet.exe PID 2632 wrote to memory of 2104 2632 Tiwi.exe imoet.exe PID 2632 wrote to memory of 2104 2632 Tiwi.exe imoet.exe PID 2112 wrote to memory of 2288 2112 IExplorer.exe imoet.exe PID 2112 wrote to memory of 2288 2112 IExplorer.exe imoet.exe PID 2112 wrote to memory of 2288 2112 IExplorer.exe imoet.exe PID 2112 wrote to memory of 2288 2112 IExplorer.exe imoet.exe PID 1964 wrote to memory of 1760 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe imoet.exe PID 1964 wrote to memory of 1760 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe imoet.exe PID 1964 wrote to memory of 1760 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe imoet.exe PID 1964 wrote to memory of 1760 1964 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe imoet.exe PID 2120 wrote to memory of 2548 2120 winlogon.exe Tiwi.exe PID 2120 wrote to memory of 2548 2120 winlogon.exe Tiwi.exe PID 2120 wrote to memory of 2548 2120 winlogon.exe Tiwi.exe PID 2120 wrote to memory of 2548 2120 winlogon.exe Tiwi.exe PID 2632 wrote to memory of 2800 2632 Tiwi.exe cute.exe PID 2632 wrote to memory of 2800 2632 Tiwi.exe cute.exe PID 2632 wrote to memory of 2800 2632 Tiwi.exe cute.exe PID 2632 wrote to memory of 2800 2632 Tiwi.exe cute.exe -
System policy modification 1 TTPs 12 IoCs
Processes:
1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe"C:\Users\Admin\AppData\Local\Temp\1285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1964 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2632 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:608
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:348
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2120 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2548
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2244
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2260
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1448
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1808
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2104 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2620
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2628
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1196
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2916
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2680
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2800 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2972
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2368
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2940
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:352
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1408
-
-
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2112 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2396
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2944
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2256
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2288
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2188
-
-
-
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:936
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2440
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1760
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2908
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2608
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2664
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5fb718a47007942fc98fbe2cf9732fbb5
SHA128eb231e1bbe3f2620fbcc83b4a4d863c35db85a
SHA256cf6141043aaf1ab4d7ac8c37274f630ed7f2eb4e7ebbb58b432c2cdac5cae2a4
SHA5129f7d130111c6e9f746138a08377d3b77cf2bf81a7c3f2834f3faa85f43a96d7588d0993074d1b60556495aaf68ffa2ed9b6a5d76e1949353162b523eed0b151d
-
Filesize
351KB
MD505f29fea0f578a6b5d41446704c43591
SHA1321e647ab474cc7b3a27fd7f75266dcca2b7c9e0
SHA25628da3389bd4238cf4742ddff4cc98c2291fa276e5724715a0f0bfcd4c55b4747
SHA5125210a1ee4f41276ee50a89b848ec60effe77f1ab4c4564224d125f437ebc6b82bd8860fe2ce7a77a68970767ad2f8a0a60dc7b9182d363fe4269021d17d1dda8
-
Filesize
351KB
MD5cacdb0d14baff5b7df19809aef125cd6
SHA15f7f399238172c4fc753e083b78de4e2d78789df
SHA25663f41fe0b3f318c70481ca78bd545ccf49db1cb3f3093f6e9c4da5e6361bb4c4
SHA512287d0f6c4617650968deeba0bc0f54878b5ae2a9a4424eafd10cc44db15c9935ff80252af0a675b30704878d3260c024df382e502a1fde8f3ec6b96058d183c4
-
Filesize
351KB
MD5c58d18a75631842bccd113967981ffdd
SHA117a99269f4a403031acd1d4cccd6eb59f3c50ab2
SHA2562b32b8546ffd1f898ec84ed5ee5fd5a953df68c1e3ab87c3e971c4762a7acca0
SHA51230d10022da01ad6b11f1d892d1a66339c177cfd151896dba6fa01a7af248d897c2379073ef96bddc3182a2e2415841fd277c20cc604edefc01393ea9b1a2a8ef
-
Filesize
351KB
MD54d62fb5742523f969a4002fb8c490b36
SHA1cd806d44aa3f417645dbe099d8aeeae1e3358719
SHA256e6032370a9c64d4538ee7a8ecd51ba68cfd6550b7ce9ec5d091517bae9274eb8
SHA512533b019b40a06ed9993c7a9c77a53a82331e5fbc977a52ddb749fa019daeb14a0f65b9e8d40db7533632a3854ae7d0d8679bb35cf5cbdcbd66d2515953bbd44e
-
Filesize
45KB
MD54d0c2f3d93044485f8ccf62e4215d0f7
SHA149e0342feaf671049bc5b9883d2c5b96bc8502ed
SHA256f48bcb7b56c3ba226c0f0da881433837c568d4a2d26e32c059b88ed629e07c89
SHA5125fee141cbbdb8d3f21c36b5230679c30d9a56535b026f9091ab9a97ba45d04143f1a92dce78e0a6c5de55b6211090d2848b7bc80d8af4a23ec3ac98110f22362
-
Filesize
45KB
MD5f06c93ee0913b676d0f70686147ba39e
SHA1146b598e0d76f65983adbbee7255e63eefeb6a26
SHA2562da4be4ceb16097de53cb17141c92d5748aade34817c27b9e304488875024ec4
SHA51209ad023e9206d175ebbe6cd549908e50d2ce9b8fb2c962265bcda5372476b64b9b4b10dd38156c3c07247cb4809903520d73a1667644775f6a2b946c0e8e8555
-
Filesize
351KB
MD548c89166e461e449588be6760aa0c533
SHA1aa3b982f5b8ef95d25d99ec6211e51ecb8bc2c9a
SHA2567eee47dfe336ad98a52e7d5fc623d4387a336ec7e6f270d13c6d1a729d0f094f
SHA51264cd399753a3d2d38b4b8fd6239e0c3eefc1ecf6c5222a15acf99cd3b9ffa68e9884def2746f9dd35987cfee24bf225f2c266aa0940f88b4415c7e42793482e4
-
Filesize
351KB
MD53259168b34e13268b1bb5c06deafd04c
SHA189091bb5bd7b6e7c922f5912aef622a20ae7fc7b
SHA2560f40e1428162fc9bee5002a2d9c23efd9b1fb6bf9bbd22de6a0d375e96826363
SHA51227567c548ccd70fd9f24d516acbd6c1584539a579871627b054fccaa1a7024f18ec096bcb28e76f108f7905eb5b3a8038ec937be1c40141331e7853c844e6d0a
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
351KB
MD574ab574140c1955354cdbb84c2145554
SHA1cdb301b39e279a09b63d7e7545a3d94e9baab08b
SHA25656b36a76631dd4493bd458140d6d2d92fa3a567617e6b0dd9a5d20b6a1d9a98e
SHA5127f62a279e16482379943d9edce6ed278e10355d59c86d79f20a9c4e26ac9912c82b0b1e1f4a0851309b3245b7c5f3b9be66bba105b99db1ded3c977957c0495c
-
Filesize
351KB
MD525b1aaeae702937c650567bfec92cfa8
SHA13627e8b6cf2277aca2c410d5b1a374b700a8885b
SHA25605bd0ed6cd07afba1c9da089b0fc6e517f5be127278e4f37eebecbf1bf79f6b3
SHA512d40f97dffec454876fd3e5b7a93093928f99efa831bf3b49e7c0cd917a88ee703fede1d28e559fae8ce48e7e064b41522dbdbfedeebb3a02181af93b8011083e
-
Filesize
351KB
MD58ab266da034d68f83f6148e2e36610db
SHA1cc5bd0694a9e8e7007f8b7eeff312c8fdec833b8
SHA2561285cc3f94e48ed14fd51df9556ce8cd05146c8f2759eb1a947a626d2e064424
SHA512c332e3e8427543dbebb0bd0de694028fe164e3cc330c131b8a463d3dd1ba5391efe921ee6d5690ffdc6a95d3f9714baab1c6d1142141086b1182eb2308115776
-
Filesize
351KB
MD505ab57f40813ad90d15f4e4560c2b44e
SHA1217ac669c91aef4c36f70031a3efb399a110e91a
SHA256486ae7ddc4daad563c3e579f09ca0d33e9def62a05f99a0f3e638c5911558c7e
SHA512a05bf9610b03aa49ff0d1c2ae1a2f35506ab3ef5b28993cb6552fe7ed25ab8717e9fb384dddee8b12eeec071a3fccd351d5040d7f48c865f3563289d2d83483d
-
Filesize
351KB
MD55908aacf252356857d962dbc7f52db3c
SHA1523ee652bb1b569b8c15006fea10688b0d2a6f59
SHA256437aece3de1274727971b56bbe4175c30f36964faac7be8c91e2add8b47f2d1d
SHA512355518872b4b38e98ed65c084861e8ab12ab88f2a674d612236b67a89f67471da056850be18308f9b8d9b6c43ff3066a32a8e97361c9180a806855095d6056ba
-
Filesize
351KB
MD5eac2d76881345c670450620bb670666c
SHA15938143e5b22358126a534526f6c929981d6c840
SHA2568cdd997c001fcb13a4a80369964622fb2d3bf5dea3dc89f6e7ce59cbee6936a3
SHA5126b50404eaee4da45d20a90ab16bfc477cf70ed1fb198607fdcc8f82035659af9a172aff7f50fa7bc6ce55819ae6764f1e001e09222eba2335b8ddda2a68e43b3
-
Filesize
729B
MD58e3c734e8dd87d639fb51500d42694b5
SHA1f76371d31eed9663e9a4fd7cb95f54dcfc51f87f
SHA256574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad
SHA51206ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853
-
Filesize
351KB
MD56642f642763b24e61862f76305c056c6
SHA148a459c65abc131ae181848c0136663da5766ace
SHA2564521653a32b04248a881c1dc149dbe7f1eedd5e0600d5ed6b9e7ce0ace43b6b7
SHA512918c7ee7eed49981be9b0659c8d57638d897ad474a34b8612e963c52d0c806127c5495eadacc6e739185b869b79b56cc681f3b05570bebfed9769d26512bc804
-
Filesize
351KB
MD529ec2903e85a2c2796de56633cee6ba8
SHA171a3f6d834b8c93fe74e83a32c5c997be7bdb234
SHA256e471362dd648a850bc8b05168c5286bf3aff2d669568a0a12243455803a15cfe
SHA512cbcd68cc056fce76f20fe78aced6c8ffd0e7f1cf124b79a3c822cde06fe5e2ee73c277e8ac66e3191174e16ff1b8e568344cbbaa6da8e3f562500a2297db0226
-
Filesize
39B
MD5415c421ba7ae46e77bdee3a681ecc156
SHA1b0db5782b7688716d6fc83f7e650ffe1143201b7
SHA256e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e
SHA512dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62
-
Filesize
351KB
MD500d7a0122e2099c3b473bd20504f408e
SHA121ec93802e6836556f73d0d9cbc8225ed6a7927b
SHA256430f4ef0421f27f8c1c933debaccc6f933dc16be9b51970a62505692979591b4
SHA512b11dd29415e835337994dc3f0d867263aedf44004a1c92eabdf968111b14e39fe9629b5a60fb79d20de29f81d650fecf3475e8e555b145cc8532ba2fbe598a23