Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 20:43
Static task
static1
Behavioral task
behavioral1
Sample
13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe
Resource
win10v2004-20241007-en
General
-
Target
13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe
-
Size
384KB
-
MD5
b4f8597636f01b29ead992b7beda4b56
-
SHA1
baf39a69fe0e0fb907251caad32678e1d406f500
-
SHA256
13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c
-
SHA512
05dddcef58aba6531ec66c8d8c2a4ef45a942ac6f5436d0fabccdc9895e1eab39a1a3c68fc9bfe8ae9eafb2e222713977d1a6130f78450198baad6394894e390
-
SSDEEP
6144:V/OZpls/OZplP/OZplx/OZpl7/OZplx/OZpl4/OZplpBE/OZk:V/Ms/MP/Mx/M7/Mx/M4/MpBE/z
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
Processes:
IExplorer.exe13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exeTiwi.exewinlogon.exeimoet.execute.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" cute.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
Processes:
13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cute.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
Processes:
Tiwi.exeIExplorer.exewinlogon.exeimoet.execute.exe13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe -
Disables RegEdit via registry modification 6 IoCs
Processes:
13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cute.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 6 IoCs
Processes:
imoet.execute.exe13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exeTiwi.exeIExplorer.exewinlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 35 IoCs
Processes:
Tiwi.exeIExplorer.exewinlogon.exeTiwi.exeTiwi.exeIExplorer.exeIExplorer.exewinlogon.exeimoet.execute.exewinlogon.exeTiwi.exeTiwi.exeIExplorer.exeimoet.exeIExplorer.exeimoet.exewinlogon.execute.execute.exeimoet.exewinlogon.exeTiwi.exeTiwi.execute.exeimoet.exeIExplorer.exeIExplorer.exewinlogon.execute.exewinlogon.exeimoet.exeimoet.execute.execute.exepid process 2640 Tiwi.exe 4536 IExplorer.exe 368 winlogon.exe 4752 Tiwi.exe 4812 Tiwi.exe 736 IExplorer.exe 3144 IExplorer.exe 4856 winlogon.exe 4836 imoet.exe 4376 cute.exe 3736 winlogon.exe 2996 Tiwi.exe 1136 Tiwi.exe 1036 IExplorer.exe 3572 imoet.exe 3584 IExplorer.exe 2884 imoet.exe 4164 winlogon.exe 2156 cute.exe 4128 cute.exe 4936 imoet.exe 3840 winlogon.exe 3304 Tiwi.exe 3416 Tiwi.exe 840 cute.exe 1600 imoet.exe 1008 IExplorer.exe 980 IExplorer.exe 4932 winlogon.exe 468 cute.exe 2452 winlogon.exe 2492 imoet.exe 1672 imoet.exe 1356 cute.exe 3420 cute.exe -
Loads dropped DLL 6 IoCs
Processes:
Tiwi.exeTiwi.exeTiwi.exeTiwi.exeTiwi.exeTiwi.exepid process 4752 Tiwi.exe 4812 Tiwi.exe 2996 Tiwi.exe 1136 Tiwi.exe 3304 Tiwi.exe 3416 Tiwi.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
Processes:
cute.exeIExplorer.exeimoet.exewinlogon.exe13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exeTiwi.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe -
Adds Run key to start application 2 TTPs 24 IoCs
Processes:
IExplorer.exewinlogon.exeimoet.exe13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exeTiwi.execute.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" IExplorer.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Tiwi.exeimoet.exe13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exeIExplorer.execute.exewinlogon.exedescription ioc process File opened (read-only) \??\B: Tiwi.exe File opened (read-only) \??\W: imoet.exe File opened (read-only) \??\E: 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened (read-only) \??\E: IExplorer.exe File opened (read-only) \??\Y: imoet.exe File opened (read-only) \??\Y: 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened (read-only) \??\K: Tiwi.exe File opened (read-only) \??\K: imoet.exe File opened (read-only) \??\U: cute.exe File opened (read-only) \??\Z: 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened (read-only) \??\W: Tiwi.exe File opened (read-only) \??\X: winlogon.exe File opened (read-only) \??\U: imoet.exe File opened (read-only) \??\T: winlogon.exe File opened (read-only) \??\W: cute.exe File opened (read-only) \??\T: 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened (read-only) \??\Q: winlogon.exe File opened (read-only) \??\M: IExplorer.exe File opened (read-only) \??\I: 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened (read-only) \??\L: 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened (read-only) \??\I: imoet.exe File opened (read-only) \??\I: cute.exe File opened (read-only) \??\P: cute.exe File opened (read-only) \??\T: cute.exe File opened (read-only) \??\M: 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened (read-only) \??\E: Tiwi.exe File opened (read-only) \??\I: IExplorer.exe File opened (read-only) \??\Q: IExplorer.exe File opened (read-only) \??\K: 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened (read-only) \??\X: cute.exe File opened (read-only) \??\S: winlogon.exe File opened (read-only) \??\J: IExplorer.exe File opened (read-only) \??\U: IExplorer.exe File opened (read-only) \??\B: cute.exe File opened (read-only) \??\M: cute.exe File opened (read-only) \??\V: 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened (read-only) \??\L: Tiwi.exe File opened (read-only) \??\K: IExplorer.exe File opened (read-only) \??\Y: IExplorer.exe File opened (read-only) \??\W: 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened (read-only) \??\W: winlogon.exe File opened (read-only) \??\L: winlogon.exe File opened (read-only) \??\O: winlogon.exe File opened (read-only) \??\H: imoet.exe File opened (read-only) \??\M: imoet.exe File opened (read-only) \??\N: imoet.exe File opened (read-only) \??\S: imoet.exe File opened (read-only) \??\G: IExplorer.exe File opened (read-only) \??\J: imoet.exe File opened (read-only) \??\N: 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened (read-only) \??\O: 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened (read-only) \??\V: Tiwi.exe File opened (read-only) \??\X: Tiwi.exe File opened (read-only) \??\B: 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened (read-only) \??\U: Tiwi.exe File opened (read-only) \??\O: imoet.exe File opened (read-only) \??\G: 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened (read-only) \??\S: 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened (read-only) \??\S: Tiwi.exe File opened (read-only) \??\L: imoet.exe File opened (read-only) \??\N: IExplorer.exe File opened (read-only) \??\R: 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened (read-only) \??\H: Tiwi.exe File opened (read-only) \??\J: winlogon.exe -
Modifies WinLogon 2 TTPs 18 IoCs
Processes:
cute.exe13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exeTiwi.exewinlogon.exeimoet.exeIExplorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ Tiwi.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exedescription ioc process File opened for modification F:\autorun.inf 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File created C:\autorun.inf 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened for modification C:\autorun.inf 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File created F:\autorun.inf 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe -
Drops file in System32 directory 40 IoCs
Processes:
IExplorer.exeimoet.exe13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exeIExplorer.execute.exeIExplorer.exeTiwi.exeIExplorer.exeIExplorer.exeIExplorer.exewinlogon.exeIExplorer.exedescription ioc process File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe imoet.exe File opened for modification C:\Windows\SysWOW64\shell.exe 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File created C:\Windows\SysWOW64\tiwi.scr 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe cute.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened for modification C:\Windows\SysWOW64\shell.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\shell.exe imoet.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr imoet.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr winlogon.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File created C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\shell.exe 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File created C:\Windows\SysWOW64\IExplorer.exe 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr cute.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr Tiwi.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe cute.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe imoet.exe File opened for modification C:\Windows\SysWOW64\shell.exe cute.exe -
Drops file in Windows directory 26 IoCs
Processes:
IExplorer.exeIExplorer.exe13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exeIExplorer.exeIExplorer.exewinlogon.exeIExplorer.exeTiwi.exeimoet.execute.exeIExplorer.exeIExplorer.exedescription ioc process File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe IExplorer.exe File opened for modification C:\Windows\tiwi.exe winlogon.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe Tiwi.exe File created C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\tiwi.exe imoet.exe File opened for modification C:\Windows\tiwi.exe cute.exe File created C:\Windows\tiwi.exe cute.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe File opened for modification C:\Windows\tiwi.exe Tiwi.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe imoet.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cute.exe13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exewinlogon.exeimoet.exeIExplorer.execute.execute.execute.exeimoet.exeTiwi.exeIExplorer.exeimoet.exeTiwi.exeimoet.exewinlogon.exeTiwi.exeTiwi.exeTiwi.exeIExplorer.exewinlogon.exeTiwi.exeIExplorer.exewinlogon.exeIExplorer.exewinlogon.execute.exeIExplorer.exeimoet.exeimoet.exewinlogon.execute.execute.exeimoet.exeTiwi.exewinlogon.exeIExplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe -
Modifies Control Panel 54 IoCs
Processes:
Tiwi.exeIExplorer.exewinlogon.execute.exeimoet.exe13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s1159 = "Tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s2359 = "Tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s2359 = "Tiwi" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\SwapMouseButtons = "1" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s1159 = "Tiwi" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" cute.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\ 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s2359 = "Tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s2359 = "Tiwi" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s2359 = "Tiwi" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\SwapMouseButtons = "1" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\SwapMouseButtons = "1" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s1159 = "Tiwi" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s1159 = "Tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\ winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\SwapMouseButtons = "1" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" imoet.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\ IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\SwapMouseButtons = "1" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" cute.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\ 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" cute.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\ Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\ imoet.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\ imoet.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s1159 = "Tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s2359 = "Tiwi" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\SwapMouseButtons = "1" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s1159 = "Tiwi" imoet.exe -
Processes:
IExplorer.exewinlogon.exeTiwi.exeimoet.execute.exe13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main\ Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" cute.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main\ 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." imoet.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main\ cute.exe -
Modifies Internet Explorer start page 1 TTPs 6 IoCs
Processes:
winlogon.exeimoet.execute.exe13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exeTiwi.exeIExplorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" IExplorer.exe -
Modifies registry class 64 IoCs
Processes:
13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exeTiwi.exeimoet.exewinlogon.exeIExplorer.execute.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exepid process 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
Tiwi.exeimoet.exewinlogon.exeIExplorer.execute.exepid process 2640 Tiwi.exe 4836 imoet.exe 368 winlogon.exe 4536 IExplorer.exe 4376 cute.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
Processes:
13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exeTiwi.exeIExplorer.exewinlogon.exeTiwi.exeTiwi.exeIExplorer.exewinlogon.exeimoet.exeIExplorer.exewinlogon.execute.exeTiwi.exeTiwi.exeIExplorer.exeimoet.exeimoet.exewinlogon.exeIExplorer.execute.execute.exeimoet.exewinlogon.exeTiwi.exeTiwi.execute.exeIExplorer.exeimoet.exeIExplorer.exewinlogon.exewinlogon.execute.exeimoet.exeimoet.execute.execute.exepid process 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe 2640 Tiwi.exe 4536 IExplorer.exe 368 winlogon.exe 4752 Tiwi.exe 4812 Tiwi.exe 736 IExplorer.exe 4856 winlogon.exe 4836 imoet.exe 3144 IExplorer.exe 3736 winlogon.exe 4376 cute.exe 2996 Tiwi.exe 1136 Tiwi.exe 1036 IExplorer.exe 3572 imoet.exe 2884 imoet.exe 4164 winlogon.exe 3584 IExplorer.exe 4128 cute.exe 2156 cute.exe 4936 imoet.exe 3840 winlogon.exe 3416 Tiwi.exe 3304 Tiwi.exe 840 cute.exe 980 IExplorer.exe 1600 imoet.exe 1008 IExplorer.exe 4932 winlogon.exe 2452 winlogon.exe 468 cute.exe 2492 imoet.exe 1672 imoet.exe 3420 cute.exe 1356 cute.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exeTiwi.exewinlogon.exeIExplorer.exedescription pid process target process PID 3504 wrote to memory of 2640 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Tiwi.exe PID 3504 wrote to memory of 2640 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Tiwi.exe PID 3504 wrote to memory of 2640 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Tiwi.exe PID 3504 wrote to memory of 4536 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe IExplorer.exe PID 3504 wrote to memory of 4536 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe IExplorer.exe PID 3504 wrote to memory of 4536 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe IExplorer.exe PID 3504 wrote to memory of 368 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe winlogon.exe PID 3504 wrote to memory of 368 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe winlogon.exe PID 3504 wrote to memory of 368 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe winlogon.exe PID 3504 wrote to memory of 4752 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Tiwi.exe PID 3504 wrote to memory of 4752 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Tiwi.exe PID 3504 wrote to memory of 4752 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Tiwi.exe PID 2640 wrote to memory of 4812 2640 Tiwi.exe Tiwi.exe PID 2640 wrote to memory of 4812 2640 Tiwi.exe Tiwi.exe PID 2640 wrote to memory of 4812 2640 Tiwi.exe Tiwi.exe PID 3504 wrote to memory of 736 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe IExplorer.exe PID 3504 wrote to memory of 736 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe IExplorer.exe PID 3504 wrote to memory of 736 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe IExplorer.exe PID 2640 wrote to memory of 3144 2640 Tiwi.exe IExplorer.exe PID 2640 wrote to memory of 3144 2640 Tiwi.exe IExplorer.exe PID 2640 wrote to memory of 3144 2640 Tiwi.exe IExplorer.exe PID 3504 wrote to memory of 4856 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe winlogon.exe PID 3504 wrote to memory of 4856 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe winlogon.exe PID 3504 wrote to memory of 4856 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe winlogon.exe PID 3504 wrote to memory of 4836 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe imoet.exe PID 3504 wrote to memory of 4836 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe imoet.exe PID 3504 wrote to memory of 4836 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe imoet.exe PID 3504 wrote to memory of 4376 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe cute.exe PID 3504 wrote to memory of 4376 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe cute.exe PID 3504 wrote to memory of 4376 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe cute.exe PID 2640 wrote to memory of 3736 2640 Tiwi.exe winlogon.exe PID 2640 wrote to memory of 3736 2640 Tiwi.exe winlogon.exe PID 2640 wrote to memory of 3736 2640 Tiwi.exe winlogon.exe PID 368 wrote to memory of 2996 368 winlogon.exe Tiwi.exe PID 368 wrote to memory of 2996 368 winlogon.exe Tiwi.exe PID 368 wrote to memory of 2996 368 winlogon.exe Tiwi.exe PID 4536 wrote to memory of 1136 4536 IExplorer.exe Tiwi.exe PID 4536 wrote to memory of 1136 4536 IExplorer.exe Tiwi.exe PID 4536 wrote to memory of 1136 4536 IExplorer.exe Tiwi.exe PID 368 wrote to memory of 1036 368 winlogon.exe IExplorer.exe PID 368 wrote to memory of 1036 368 winlogon.exe IExplorer.exe PID 368 wrote to memory of 1036 368 winlogon.exe IExplorer.exe PID 2640 wrote to memory of 3572 2640 Tiwi.exe imoet.exe PID 2640 wrote to memory of 3572 2640 Tiwi.exe imoet.exe PID 2640 wrote to memory of 3572 2640 Tiwi.exe imoet.exe PID 4536 wrote to memory of 3584 4536 IExplorer.exe IExplorer.exe PID 4536 wrote to memory of 3584 4536 IExplorer.exe IExplorer.exe PID 4536 wrote to memory of 3584 4536 IExplorer.exe IExplorer.exe PID 3504 wrote to memory of 2884 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe imoet.exe PID 3504 wrote to memory of 2884 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe imoet.exe PID 3504 wrote to memory of 2884 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe imoet.exe PID 368 wrote to memory of 4164 368 winlogon.exe winlogon.exe PID 368 wrote to memory of 4164 368 winlogon.exe winlogon.exe PID 368 wrote to memory of 4164 368 winlogon.exe winlogon.exe PID 2640 wrote to memory of 2156 2640 Tiwi.exe cute.exe PID 2640 wrote to memory of 2156 2640 Tiwi.exe cute.exe PID 2640 wrote to memory of 2156 2640 Tiwi.exe cute.exe PID 3504 wrote to memory of 4128 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe cute.exe PID 3504 wrote to memory of 4128 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe cute.exe PID 3504 wrote to memory of 4128 3504 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe cute.exe PID 368 wrote to memory of 4936 368 winlogon.exe imoet.exe PID 368 wrote to memory of 4936 368 winlogon.exe imoet.exe PID 368 wrote to memory of 4936 368 winlogon.exe imoet.exe PID 4536 wrote to memory of 3840 4536 IExplorer.exe winlogon.exe -
System policy modification 1 TTPs 12 IoCs
Processes:
IExplorer.exewinlogon.exeimoet.execute.exe13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exeTiwi.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe"C:\Users\Admin\AppData\Local\Temp\13b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3504 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2640 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4812
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3144
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3736
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3572
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2156
-
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4536 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1136
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3584
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3840
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1600
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:468
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:368 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2996
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1036
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4164
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4936
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:840
-
-
-
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4752
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:736
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4856
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4836 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3416
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1008
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2452
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1672
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3420
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4376 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3304
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:980
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4932
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2492
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1356
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2884
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4128
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5d3f39ccbe37e1a6f35e13cc4c53124de
SHA1ef315e424dce286680b5d0c315d9f5fb72314d30
SHA256a7e3ea8c06f89baa0270ebd02e1cdf63613bb592a09a118cb047cf47f69bbaa5
SHA512739d25606b64ce9c6b5f2291eab1fbe804337755d5eec17b562dff56ba63d3c9854689b885c0833b6b629965e0bf2a88f236b49e5097f441945874e3d00d70b8
-
Filesize
384KB
MD5a4024ca7945aaa7b9240e2ee521c88de
SHA1591a48ab547ffcacbff7822b5e280cb7e17ce9c4
SHA2560a70325484a8626c42dd1a28b9e0ebf7dd72f9768ede980749058a0032ef6bf3
SHA5122ad33d446f59352214e2af776c664237575ac9bf0a07a0fce0f54ae22d2715dd8ac80ee1c0f0a8a8590d5511008dd2d0fac052b57b088ccbf851eecceedb5d08
-
Filesize
384KB
MD5bb0a86226223bfb2d9dd23f284808275
SHA195e47700f0ff0574614b488bf0d8fb5ee9cb1120
SHA2568fdb396026d9a2640df7bd3c9c030d4963d7b667708215151624d5ddeaf27cce
SHA512a5d294e3efeba24492794b51e3feb0180531ad71655d9bcda11e6dcb11d9151604198f8d1a2c2b247654086db141a7b4596fbea1738120c886587fe71ee773d0
-
Filesize
384KB
MD55bdd97148db710be9ac531110757eb8f
SHA1591ace340c4f5d3efed9609eca1da07111f6fcb7
SHA256477166753b80b0364d4ae4a75313e42941f39c8b647b9b54096116d54e2d798b
SHA512f9e2563dece97c03363e068c0f676b109465d8029629d51916ef6cd625857ae6a95a71cdb70ff483b1b2ff888c33266ca0e2285a765b552d91254bb9ccbdd258
-
Filesize
384KB
MD5870c98d6527aed27d182bb941e211118
SHA1849df9a249e6e68444744ede0c4ce10071aa842f
SHA256fadd873bfbc6d188732b1fc6efa70d6e12b796e11b018b39ad2b37cc273caa01
SHA512bca4dfe57854ba098a6a1ab17863d214b77f66d3e54c58dfcbef91f3362e1edb5a1c953120a1303e474e36aaa2d4f234213946aa7d7c40909dd5b36ab649391a
-
Filesize
384KB
MD5dbea15ff67d5597d00e36c88391e6359
SHA1b3a0c363074dad63a3a38f9620a3aa115db50e3d
SHA256237f978e178a5c502f912618f85d94bee3abb4337d088004ebfc2462bdc04eee
SHA5126d6846aa2e2d055942386179b62a68c38a2cd6a040477d50f4b470dde6024acc544ca664fcf6ae7dc10cf2c5a7ab4be7bc02b68c13a0eb995b2e41561a2b6ec8
-
Filesize
45KB
MD5644f4c7f3966068d97f4ad03d903f4e0
SHA1f6cc90dbe3e351dcc4c30cbe12ff4c8714127f0a
SHA25634a5ec71e6a25016d314084a0daa95700033462edc52043c3b8218c2c5dfd610
SHA51220f1a1ffc9a562b4618a8929480396cdf64859d445382b22efa149ee79b9e8781825d7245aebd7acee905d54199ca75f5fa419b424bf95fdabc2143d3fabe812
-
Filesize
45KB
MD5d72792da4305bd5342e13b7618175ae9
SHA1ce9955df06e72c5dd146365faee9978df94a19fe
SHA256323fd6ac1a4609bb6e65738779419a424712d4ee6d91d1a2e0bad572d354db44
SHA512d6944f62a7418c869f49afff0a9826c336f049db95ed463dfe3f8aedc367d24d621d7dc656f62c5f9351fd1936a81c98598e58e2e5e6067d014162819765178e
-
Filesize
384KB
MD565e62d9a37d59dede28ed6433653b1b8
SHA10642827c8df9768c41e94555353830da9e30f61c
SHA25675104b86388a2305e60e703f8e87a5302ddc780ee276dc6dc7a3811f89eea7a8
SHA5121b158a86181b33e5a7592d4443e9d6db0f0d9eeea4a3efa5aab5fd6d427f251e9af6ada12fd5c125e47f2254b07e081d856b3ec86ef5d22cda5d965c5de5bfad
-
Filesize
384KB
MD56dd338182fa865ab4e0203b4d2e14339
SHA14afb7e04b1c8a17d867b3e7348724eff5402be7e
SHA25666328c5f766686895db7831c94398a260d4e2148e802e28277e9fc9a9582a9cd
SHA5121e885eb53112bcb0b906ed833d753fec93afce6d156c52d7006697e2dae9b2acdc7e1d3f0d35eb991260fbd0d68dffe238eeb0944a18452b8be0645701027712
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
384KB
MD5d7ec8638ea7f78aaf51e8b90d968189d
SHA1f11a219326798d6e1b9e55f0a23c758b297d79b0
SHA25653cc9dc7466929ba2f34124498888e7382945586df4c9e4bbde0698e61027145
SHA512bf36796677c95f17888dc46dbe36920434dfbe8d55a0d6c6c49b566b8e30593680ef3028f59a22f49ac5961a98a58814bfce4cccad5cd0df89932aeb5e4cd0f3
-
Filesize
384KB
MD5474d587c76ae408c5da290f1c041dfee
SHA176507685befbb0b7cc7d54a90758b56d2787c46a
SHA25691a44d48852528a0bd9ba766ec4a8c7d982f10ff280143f538934671367bdb7e
SHA512ee016f2930c43493e8589d730491ab8b1bfdb67a7fae6e901b27a19adafd9b68fbf2a5e7633cf7a15ac84708d49306c9dbdf770d86977a1f49fbe1430865fb88
-
Filesize
384KB
MD528a1c237c6d4832f483d0381539cca35
SHA1888d362e4ec878d6545200f5efd81175d7ef5e59
SHA256d5c755d7425c79f7a8fcd8c3f2110cabc6a874934630be68fd0ca152dba510e9
SHA512632610a70960d7701f7c501ea6360303fad96aa2054c872fec5c3efd3087241b57fcf7571726053df563be2a26ec6701e24a85c2a51d5a4e1839528aa37bb512
-
Filesize
384KB
MD5b4f8597636f01b29ead992b7beda4b56
SHA1baf39a69fe0e0fb907251caad32678e1d406f500
SHA25613b1ccfef5d5c9a927293d1b9335eea95612d47999b327382311354a95d1ea5c
SHA51205dddcef58aba6531ec66c8d8c2a4ef45a942ac6f5436d0fabccdc9895e1eab39a1a3c68fc9bfe8ae9eafb2e222713977d1a6130f78450198baad6394894e390
-
Filesize
384KB
MD5ded2ea3aa6b917eaccc7c3042336932f
SHA1eb9f2f68ae963ef010d95e78ede502b61ea50e75
SHA256c761badb7f08458b6791072abd1b04df9aedd0b0d307149760a2fadfc9ef0792
SHA5127c01c59d7f72fe70db16b4e9aa742422e0415c8b2484a81e07a46bf715a56ee51599a5442cdce87e27ec0970e266484c2381f052958d02c3736a3ac417220318
-
Filesize
384KB
MD565817b20e5fdcc61b4c2d52ccc453180
SHA1f282b1d69244685b2e2b50fdb0e2e30ec775cbbc
SHA256dc7d8f1d42004376294c74b8975c4ecc6047423495b339d58202881d46808ab4
SHA51245dc14d76e1ba922d9916fee9b90946fa019e0584162a58bb68a2351267b778fc806b9b7004985723e1062d3171132bceaf3e61e369c8bd3ef65926df7d639c8
-
Filesize
384KB
MD51025fe127c26ec5a3c98850e5bf715a2
SHA1cda9cdb330ce06de50fa62389487e0c72d852d71
SHA2562dedc3cc444d5f7313180eafc450e2f658b9dbbf9fbf8b03c2258f99937bf9ec
SHA51277666474677b6c40149dd86626fe874862758d8289b9689737e83ffe3e09ebed02fc3a6c609810401bc0a9c0fce2dfe208bda10c1a1b50a7b2a88cf91cdbc8e3
-
Filesize
729B
MD58e3c734e8dd87d639fb51500d42694b5
SHA1f76371d31eed9663e9a4fd7cb95f54dcfc51f87f
SHA256574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad
SHA51206ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853
-
Filesize
384KB
MD5789aac70891c79c05d8690cce61be113
SHA1d9f80d9e45559c80f5c6d2b6a953b1280c4e6ef4
SHA25653ba94deece543d301f5d3013c52452d98b5ac4af8803598cb01b3291af5c3b0
SHA5120a4fb8f28fc5cd9140f2345c5c6089e9588d9e45f63ebb9d4dc8b31e73113dd60096861c6a11df13b342ec5d47e097099ff821580ade8eb645ce287038925c25
-
Filesize
384KB
MD52dcc22ff25e837fc570b6d4d0e03b164
SHA1d472e0cee150ba16f7df74cef33c2ce8763041db
SHA2564b8939a116e357bdeee39de6ec60157f08b5f69dd63f0d93680b41e3ee748a46
SHA512d3eaa979aec625528f6f47f4c9ea3ddb618d78a1dc32a9f3907df85f5dbfb5cff7fa748a3acb852136836b6d6bc2c1bfbc000998b83fe98d680892354bedc380
-
Filesize
39B
MD5415c421ba7ae46e77bdee3a681ecc156
SHA1b0db5782b7688716d6fc83f7e650ffe1143201b7
SHA256e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e
SHA512dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62