Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe
Resource
win10v2004-20241007-en
General
-
Target
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe
-
Size
488KB
-
MD5
79af48ffd26e35d00400b84af73b39d6
-
SHA1
30da916fef4549f8fe094956fccd6f92096230ab
-
SHA256
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55
-
SHA512
fa0a4e681e29fffa937bcaa92bb6fc67503071cff81aa172c71aa21cbb218f63549b9403023d7e1910e95cd65552d06f887d573a7ca02cbe735a7ac19db835be
-
SSDEEP
12288:V/MW/MP/Mx/M7/Mx/M4/MpBE/Mk/M2/M1:VJK2O2HIBEd7M
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
Processes:
winlogon.execute.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exeIExplorer.exeimoet.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cute.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
Processes:
IExplorer.exewinlogon.exeimoet.execute.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Tiwi.exe -
Disables RegEdit via registry modification 6 IoCs
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cute.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 6 IoCs
Processes:
winlogon.exeimoet.execute.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exeIExplorer.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 35 IoCs
Processes:
Tiwi.exeIExplorer.exeTiwi.exeTiwi.exeTiwi.exeIExplorer.exeIExplorer.exewinlogon.exeIExplorer.exewinlogon.exeimoet.exewinlogon.exeTiwi.execute.exeTiwi.exeIExplorer.exeIExplorer.exeimoet.exeimoet.exewinlogon.exewinlogon.exewinlogon.exeimoet.exeimoet.execute.execute.exeTiwi.execute.exeimoet.execute.exeIExplorer.execute.exewinlogon.exeimoet.execute.exepid process 2356 Tiwi.exe 2808 IExplorer.exe 2152 Tiwi.exe 2076 Tiwi.exe 2604 Tiwi.exe 696 IExplorer.exe 2580 IExplorer.exe 844 winlogon.exe 1944 IExplorer.exe 2020 winlogon.exe 1992 imoet.exe 1132 winlogon.exe 876 Tiwi.exe 1620 cute.exe 2856 Tiwi.exe 2920 IExplorer.exe 2316 IExplorer.exe 2844 imoet.exe 2456 imoet.exe 2872 winlogon.exe 1720 winlogon.exe 2588 winlogon.exe 2832 imoet.exe 2612 imoet.exe 2264 cute.exe 2108 cute.exe 2352 Tiwi.exe 2320 cute.exe 1020 imoet.exe 2172 cute.exe 2300 IExplorer.exe 2700 cute.exe 1296 winlogon.exe 2896 imoet.exe 1148 cute.exe -
Loads dropped DLL 53 IoCs
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exeIExplorer.exeimoet.exewinlogon.execute.exepid process 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 2356 Tiwi.exe 2356 Tiwi.exe 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 2808 IExplorer.exe 2808 IExplorer.exe 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 2356 Tiwi.exe 2356 Tiwi.exe 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 2808 IExplorer.exe 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 2808 IExplorer.exe 1992 imoet.exe 1992 imoet.exe 844 winlogon.exe 844 winlogon.exe 2356 Tiwi.exe 2356 Tiwi.exe 2808 IExplorer.exe 2808 IExplorer.exe 1992 imoet.exe 1992 imoet.exe 844 winlogon.exe 844 winlogon.exe 844 winlogon.exe 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 2808 IExplorer.exe 2808 IExplorer.exe 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 1992 imoet.exe 2356 Tiwi.exe 2356 Tiwi.exe 844 winlogon.exe 844 winlogon.exe 1620 cute.exe 1620 cute.exe 1992 imoet.exe 1992 imoet.exe 1620 cute.exe 1620 cute.exe 1620 cute.exe 1620 cute.exe 1620 cute.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
Processes:
IExplorer.exeimoet.exewinlogon.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.execute.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe -
Adds Run key to start application 2 TTPs 24 IoCs
Processes:
winlogon.exeimoet.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exeIExplorer.execute.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" winlogon.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeIExplorer.exeimoet.execute.exeTiwi.exewinlogon.exedescription ioc process File opened (read-only) \??\Y: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\N: IExplorer.exe File opened (read-only) \??\M: imoet.exe File opened (read-only) \??\X: imoet.exe File opened (read-only) \??\Y: imoet.exe File opened (read-only) \??\R: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\P: IExplorer.exe File opened (read-only) \??\X: IExplorer.exe File opened (read-only) \??\T: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\U: imoet.exe File opened (read-only) \??\Z: cute.exe File opened (read-only) \??\R: cute.exe File opened (read-only) \??\S: cute.exe File opened (read-only) \??\K: Tiwi.exe File opened (read-only) \??\U: Tiwi.exe File opened (read-only) \??\E: winlogon.exe File opened (read-only) \??\R: imoet.exe File opened (read-only) \??\B: cute.exe File opened (read-only) \??\G: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\J: winlogon.exe File opened (read-only) \??\I: imoet.exe File opened (read-only) \??\E: cute.exe File opened (read-only) \??\B: Tiwi.exe File opened (read-only) \??\Q: IExplorer.exe File opened (read-only) \??\K: imoet.exe File opened (read-only) \??\B: IExplorer.exe File opened (read-only) \??\E: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\Z: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\Q: Tiwi.exe File opened (read-only) \??\I: cute.exe File opened (read-only) \??\J: imoet.exe File opened (read-only) \??\I: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\J: Tiwi.exe File opened (read-only) \??\H: IExplorer.exe File opened (read-only) \??\G: winlogon.exe File opened (read-only) \??\N: winlogon.exe File opened (read-only) \??\P: Tiwi.exe File opened (read-only) \??\V: cute.exe File opened (read-only) \??\J: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\W: Tiwi.exe File opened (read-only) \??\M: IExplorer.exe File opened (read-only) \??\M: cute.exe File opened (read-only) \??\G: cute.exe File opened (read-only) \??\V: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\E: IExplorer.exe File opened (read-only) \??\O: winlogon.exe File opened (read-only) \??\R: winlogon.exe File opened (read-only) \??\V: imoet.exe File opened (read-only) \??\O: Tiwi.exe File opened (read-only) \??\M: winlogon.exe File opened (read-only) \??\U: winlogon.exe File opened (read-only) \??\V: winlogon.exe File opened (read-only) \??\T: imoet.exe File opened (read-only) \??\J: cute.exe File opened (read-only) \??\Q: cute.exe File opened (read-only) \??\X: cute.exe File opened (read-only) \??\Z: Tiwi.exe File opened (read-only) \??\S: IExplorer.exe File opened (read-only) \??\V: IExplorer.exe File opened (read-only) \??\B: imoet.exe File opened (read-only) \??\L: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\T: IExplorer.exe File opened (read-only) \??\U: cute.exe File opened (read-only) \??\X: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe -
Modifies WinLogon 2 TTPs 18 IoCs
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeIExplorer.exewinlogon.exeTiwi.execute.exeimoet.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ cute.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exedescription ioc process File created F:\autorun.inf be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened for modification F:\autorun.inf be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File created C:\autorun.inf be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened for modification C:\autorun.inf be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe -
Drops file in System32 directory 40 IoCs
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeIExplorer.exewinlogon.exeimoet.execute.exeTiwi.exeIExplorer.exeIExplorer.exeIExplorer.exeIExplorer.exeIExplorer.exeIExplorer.exedescription ioc process File created C:\Windows\SysWOW64\IExplorer.exe be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr winlogon.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe imoet.exe File opened for modification C:\Windows\SysWOW64\shell.exe cute.exe File opened for modification C:\Windows\SysWOW64\shell.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe imoet.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr imoet.exe File created C:\Windows\SysWOW64\IExplorer.exe cute.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\tiwi.scr be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr Tiwi.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr cute.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\shell.exe be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\shell.exe imoet.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe cute.exe File created C:\Windows\SysWOW64\shell.exe be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File created C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe -
Drops file in Windows directory 26 IoCs
Processes:
IExplorer.exewinlogon.exeIExplorer.execute.exeIExplorer.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeIExplorer.exeIExplorer.exeimoet.exeIExplorer.exeTiwi.exeIExplorer.exedescription ioc process File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe cute.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe imoet.exe File created C:\Windows\tiwi.exe imoet.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe cute.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe Tiwi.exe File created C:\Windows\tiwi.exe Tiwi.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe IExplorer.exe File created C:\Windows\tiwi.exe IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
winlogon.execute.exeTiwi.exeTiwi.exeIExplorer.exeTiwi.execute.exeIExplorer.exeTiwi.exeIExplorer.exewinlogon.execute.execute.exeimoet.exewinlogon.exeimoet.exeimoet.execute.exeTiwi.exeimoet.exeTiwi.exeIExplorer.exewinlogon.exeIExplorer.exeTiwi.exewinlogon.exeimoet.execute.execute.exeIExplorer.exewinlogon.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeIExplorer.exeimoet.exewinlogon.exeimoet.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe -
Modifies Control Panel 54 IoCs
Processes:
Tiwi.exewinlogon.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeIExplorer.exeimoet.execute.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\s2359 = "Tiwi" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\ IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Mouse\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Mouse\SwapMouseButtons = "1" cute.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\ be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Mouse\SwapMouseButtons = "1" imoet.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\s2359 = "Tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\s2359 = "Tiwi" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Mouse\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\s1159 = "Tiwi" imoet.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Mouse\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\s2359 = "Tiwi" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\ imoet.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" cute.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\s1159 = "Tiwi" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\s2359 = "Tiwi" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\s1159 = "Tiwi" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Mouse\SwapMouseButtons = "1" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" cute.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\s2359 = "Tiwi" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Mouse\SwapMouseButtons = "1" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Mouse\SwapMouseButtons = "1" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" cute.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\ be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Mouse\SwapMouseButtons = "1" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\ cute.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Mouse\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Mouse\ be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\s1159 = "Tiwi" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Mouse\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\s1159 = "Tiwi" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\s1159 = "Tiwi" cute.exe -
Processes:
Tiwi.exeimoet.exeIExplorer.exewinlogon.execute.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." imoet.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" imoet.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" cute.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\ be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\ Tiwi.exe -
Modifies Internet Explorer start page 1 TTPs 6 IoCs
Processes:
imoet.execute.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exeIExplorer.exewinlogon.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" winlogon.exe -
Modifies registry class 64 IoCs
Processes:
cute.exeTiwi.exeIExplorer.exeimoet.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exewinlogon.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
Notepad.exepid process 2252 Notepad.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exepid process 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
Tiwi.exeimoet.exewinlogon.exeIExplorer.execute.exepid process 2356 Tiwi.exe 1992 imoet.exe 844 winlogon.exe 2808 IExplorer.exe 1620 cute.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exeIExplorer.exeTiwi.exeTiwi.exeTiwi.exeIExplorer.exeIExplorer.exewinlogon.exeIExplorer.exeimoet.exewinlogon.exewinlogon.exeTiwi.execute.exeTiwi.exeIExplorer.exeIExplorer.exeimoet.exewinlogon.exewinlogon.exeimoet.exeimoet.exewinlogon.execute.exeimoet.execute.execute.exeTiwi.exeimoet.execute.exeIExplorer.exewinlogon.execute.exeimoet.execute.exepid process 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 2356 Tiwi.exe 2808 IExplorer.exe 2152 Tiwi.exe 2076 Tiwi.exe 2604 Tiwi.exe 696 IExplorer.exe 2580 IExplorer.exe 844 winlogon.exe 1944 IExplorer.exe 1992 imoet.exe 2020 winlogon.exe 1132 winlogon.exe 2856 Tiwi.exe 1620 cute.exe 876 Tiwi.exe 2920 IExplorer.exe 2316 IExplorer.exe 2456 imoet.exe 1720 winlogon.exe 2588 winlogon.exe 2844 imoet.exe 2612 imoet.exe 2872 winlogon.exe 2108 cute.exe 2832 imoet.exe 2320 cute.exe 2264 cute.exe 2352 Tiwi.exe 1020 imoet.exe 2172 cute.exe 2300 IExplorer.exe 1296 winlogon.exe 2700 cute.exe 2896 imoet.exe 1148 cute.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exeIExplorer.exewinlogon.exeimoet.exedescription pid process target process PID 392 wrote to memory of 2356 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Tiwi.exe PID 392 wrote to memory of 2356 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Tiwi.exe PID 392 wrote to memory of 2356 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Tiwi.exe PID 392 wrote to memory of 2356 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Tiwi.exe PID 2356 wrote to memory of 2252 2356 Tiwi.exe Notepad.exe PID 2356 wrote to memory of 2252 2356 Tiwi.exe Notepad.exe PID 2356 wrote to memory of 2252 2356 Tiwi.exe Notepad.exe PID 2356 wrote to memory of 2252 2356 Tiwi.exe Notepad.exe PID 392 wrote to memory of 2808 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe IExplorer.exe PID 392 wrote to memory of 2808 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe IExplorer.exe PID 392 wrote to memory of 2808 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe IExplorer.exe PID 392 wrote to memory of 2808 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe IExplorer.exe PID 2356 wrote to memory of 2152 2356 Tiwi.exe Tiwi.exe PID 2356 wrote to memory of 2152 2356 Tiwi.exe Tiwi.exe PID 2356 wrote to memory of 2152 2356 Tiwi.exe Tiwi.exe PID 2356 wrote to memory of 2152 2356 Tiwi.exe Tiwi.exe PID 392 wrote to memory of 2076 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Tiwi.exe PID 392 wrote to memory of 2076 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Tiwi.exe PID 392 wrote to memory of 2076 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Tiwi.exe PID 392 wrote to memory of 2076 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Tiwi.exe PID 2808 wrote to memory of 2604 2808 IExplorer.exe Tiwi.exe PID 2808 wrote to memory of 2604 2808 IExplorer.exe Tiwi.exe PID 2808 wrote to memory of 2604 2808 IExplorer.exe Tiwi.exe PID 2808 wrote to memory of 2604 2808 IExplorer.exe Tiwi.exe PID 2356 wrote to memory of 2580 2356 Tiwi.exe IExplorer.exe PID 2356 wrote to memory of 2580 2356 Tiwi.exe IExplorer.exe PID 2356 wrote to memory of 2580 2356 Tiwi.exe IExplorer.exe PID 2356 wrote to memory of 2580 2356 Tiwi.exe IExplorer.exe PID 392 wrote to memory of 696 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe IExplorer.exe PID 392 wrote to memory of 696 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe IExplorer.exe PID 392 wrote to memory of 696 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe IExplorer.exe PID 392 wrote to memory of 696 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe IExplorer.exe PID 2808 wrote to memory of 1944 2808 IExplorer.exe IExplorer.exe PID 2808 wrote to memory of 1944 2808 IExplorer.exe IExplorer.exe PID 2808 wrote to memory of 1944 2808 IExplorer.exe IExplorer.exe PID 2808 wrote to memory of 1944 2808 IExplorer.exe IExplorer.exe PID 392 wrote to memory of 844 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe winlogon.exe PID 392 wrote to memory of 844 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe winlogon.exe PID 392 wrote to memory of 844 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe winlogon.exe PID 392 wrote to memory of 844 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe winlogon.exe PID 2356 wrote to memory of 2020 2356 Tiwi.exe winlogon.exe PID 2356 wrote to memory of 2020 2356 Tiwi.exe winlogon.exe PID 2356 wrote to memory of 2020 2356 Tiwi.exe winlogon.exe PID 2356 wrote to memory of 2020 2356 Tiwi.exe winlogon.exe PID 392 wrote to memory of 1992 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe imoet.exe PID 392 wrote to memory of 1992 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe imoet.exe PID 392 wrote to memory of 1992 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe imoet.exe PID 392 wrote to memory of 1992 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe imoet.exe PID 844 wrote to memory of 876 844 winlogon.exe Tiwi.exe PID 844 wrote to memory of 876 844 winlogon.exe Tiwi.exe PID 844 wrote to memory of 876 844 winlogon.exe Tiwi.exe PID 844 wrote to memory of 876 844 winlogon.exe Tiwi.exe PID 392 wrote to memory of 1620 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe cute.exe PID 392 wrote to memory of 1620 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe cute.exe PID 392 wrote to memory of 1620 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe cute.exe PID 392 wrote to memory of 1620 392 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe cute.exe PID 2808 wrote to memory of 1132 2808 IExplorer.exe winlogon.exe PID 2808 wrote to memory of 1132 2808 IExplorer.exe winlogon.exe PID 2808 wrote to memory of 1132 2808 IExplorer.exe winlogon.exe PID 2808 wrote to memory of 1132 2808 IExplorer.exe winlogon.exe PID 1992 wrote to memory of 2856 1992 imoet.exe Tiwi.exe PID 1992 wrote to memory of 2856 1992 imoet.exe Tiwi.exe PID 1992 wrote to memory of 2856 1992 imoet.exe Tiwi.exe PID 1992 wrote to memory of 2856 1992 imoet.exe Tiwi.exe -
System policy modification 1 TTPs 12 IoCs
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeimoet.execute.exeIExplorer.exewinlogon.exeTiwi.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cute.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe"C:\Users\Admin\AppData\Local\Temp\be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:392 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2356 -
C:\Windows\Notepad.exeNotepad.exe C:\Present.txt3⤵
- Opens file in notepad (likely ransom note)
PID:2252
-
-
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2152
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2580
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2020
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2844
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2320
-
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2808 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2604
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1944
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1132
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2456
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2264
-
-
-
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2076
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:696
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:844 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:876
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2316
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1720
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2172
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1992 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2856
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2920
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2872
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1020
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2700
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1620 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2352
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2300
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1296
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2896
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1148
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2588
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2612
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
729B
MD58e3c734e8dd87d639fb51500d42694b5
SHA1f76371d31eed9663e9a4fd7cb95f54dcfc51f87f
SHA256574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad
SHA51206ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853
-
Filesize
45KB
MD50b0ca9091f36ba10e2b418dc2e34595f
SHA1a18c8e72e7d1bac879c5880ce20fb08135f4a9a6
SHA256d5ee6a4f02b40a4fe9445490c0cb88480f7a27203b581920977eebe388504d15
SHA512ca46d81f0c9edce7eafd0735d45953931e75c55cb9fc2b7055d2e20f31d1f57eef4148d6e6b4aae8de1b584259919be6e2d1a21b93dd426e0b74b52e8c10d55d
-
Filesize
488KB
MD5e695762bfee1b92b346f17b01a5c2eee
SHA1563a1e5a5861ed74e260e574d0c2588bea01bd3a
SHA2561f195e563a24b8a96df313f6ccca3edbd11acf37e62681179e45b311006b5a0b
SHA5126a01dc586645e94914adb4893bd4732b20ee7170dacf8dd507e896b162fca5714897b4f9c034551e7e702207eb9645b6a830da66c6344039248bbfb07b530c95
-
Filesize
488KB
MD5bbb4efa13dfe550f2540d7baf8615480
SHA17c20a4545952dccc8989951f292824d00ac647f1
SHA256074d43fa9662aae4f39a14bf2feb79307364e99a2c5a954faf380fb211a33c87
SHA51209b4227a4f22e87f7234baca634bc0cca77663e821bf77a23114c3d085087f090b06feae86a0898a9d703eefaa89a5760dcb739d1cf8e8b4714f2173d1da75df
-
Filesize
488KB
MD528ef5290dfe78b52883a5275139352f9
SHA1eb994a1fcb007ea8917d684b300c17d6952a0e4c
SHA25637f1740bc45da90c56d5aa0f555bcc9851c25da51fa142baf01e328fd19426a8
SHA512ae52b76eb27ca8a878e014e920bfa5ddc14ddcfe2704bfa961eec6f0d8cbded341c7abb217f3a54c70d19adebe0ea3dbf4d3e64fec10d0024ad9aba97b5e0e04
-
Filesize
488KB
MD5baaacd5361cede39e4280fe3f8b5c199
SHA1a32c20f1fc6fac6aa1b2b1823278e911b7843923
SHA2560e960214324111eae955412152b69a14b1e7cd41b102663d70fcdd68653d31a0
SHA512c0e38328eecb899d01f1d8eef3e80c7c5372ed177aa9c0237775b02d69ed58d29a6c4fe07bcaed2e6335bff79d2abc09d739cf22e3f6f5780750be373ed8c8d8
-
Filesize
488KB
MD5679dd4e4f07dd900c25bc8a22ce86835
SHA13622f2b6261ca56c4af163105b8b1f7576ac1fd3
SHA2565196fc03d8238d2c2005d438ddc97dcb55f82e72d43f6763002e71d7c4398b24
SHA5121e18e46957e89add7f82410fff22317a5827ea87e3a094f322e8e1f891bdb530546d34e3ac5b2c5570b18ba46185fb812836b7b6d35d96ecaae2726cadbfdc05
-
Filesize
45KB
MD57943e9d58e1ad73fa84c4314edf98130
SHA1cd2e12c474172d7c183e1593262639505130cb41
SHA2566f89bbbb73671c827031870744231a21ed4bc4b10ba17454f2a5f58317a803d3
SHA512651cec9ad6b78970b877f390d6edbdeeb413cda5e55b24b02f1bd5a87c0c4182fdc792a7ae98b0650405f71c1eb92a68bc03c36056a560862dbbf302222e0e62
-
Filesize
45KB
MD52e7e4b0c823d9fab3da0eefbbd210d29
SHA1576aefb60b71c2758e37e8ade1037badc2a14a21
SHA25611e34894347185b7a802ed4fa5f31520cc1436a47610dd088e6deb84078f23ba
SHA512a5545374b9babb299dd1ead78698285274e083d2ddb048c617d577f6aa9ac3be2a21cadbea5a7e2956d36e4991fb05c2156450a819e85cca220ab81fdde8cb64
-
Filesize
488KB
MD5d1433e9358ccb045ece77caf52d335ae
SHA15cf4a06012da35f9413728761906b3e9ae594a10
SHA256d55387de2482832060a0d77eb0f0c8d3150e260e17ba9714054ad750c7d241e9
SHA51251f7e8c2ffc793f938667f07af7e4936e6eaea4a1e46eaf41f95b20585d2bc186024956edd260e7bfdc08af846dd418c3d05e96dd580e567cb19fbded07eabba
-
Filesize
488KB
MD5d82e8ca5ba12a64c149dc6667844c1e2
SHA108bf6e0496928ab36232ebbb6c0f398d81575c66
SHA256870fcdb7c2246bb148139d3b21ecaac9a3ef3145d0caa9642397568882cfe6bc
SHA512c95ca4ad94e7a6c0f5f69795a7fbbdf3d2ccb243a957615c442bdf423cb21df8c37a86c6d2ba548468f27d33858109894ab8131d26da8cfc800f05391074acde
-
Filesize
488KB
MD5aa9eb9464e38e677033a863b9140551d
SHA1bede5a543fedcd83e09e1375683cc9fcd70c5123
SHA2561efaf2864d13be38ca54ab7b8921b549507ec07619f2384ddcc549bcbf25356b
SHA51207191a6efc98fdf678f443a973914ff18c71b3ca4bdee308665fe11c11db1cdb8e808c62b4206b03b5251af9bce11bbef870cdfc1b3382ba8bd97bd7018fa8d1
-
Filesize
488KB
MD53815bae9400b4bab0fe93a30d846ccee
SHA1031fb871c9bd52b5b54a9f664a87693bb84a4263
SHA256fa1241e6ef6b7617c1c0e125514c0b5b73e8332c008119d66c1e495429fd0c18
SHA512abfd55040de6b0bae83ac47faaba8b368472feb178d20a70131743f08c59aae8787cf61356f3a1e4b5caeb78da32a61645e050a56b6ee82b7d5e4e4fa292b7df
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
488KB
MD5c8629a76381ac689465708bcdd1d1b26
SHA1d7c2d7710b8cac1ebafa5c692fdf21cf7a252328
SHA256cce87cb936ba7fc3f6c3f5fd3b1dc96096a71eabd19525f12df611b22ee23158
SHA512e9fce83e925d67cfc36222f1562d33955331898267c3f4c7aa1cee5f9b6107e73142e19baf7a6db9bca96c3ed53a36a158ba6d4d2fd52139e2caec48a14ad641
-
Filesize
488KB
MD50045cff6f1fe3fa8aea0ad43cafe7dca
SHA17e63c0733d07bb985793fc382796c0cc1c6d5aa6
SHA256b9b2f6ebce24cd7b658189793a6316932513d6caeaa42e154411f4dcc82239b5
SHA512b7f8cb7f00ae7ce2d4798abe997333ef4f7feb8621490a3b2de4465962c8bf20ef3a35c97a8968a4007a1239604e492a447c515891f1c2a990f1846441cbc569
-
Filesize
488KB
MD58aa69b788370ef4587032401e2c9b11f
SHA152660f3ca127f11627b45c5d353292c3f7a68430
SHA256f16b2a146197805f0eb6db87b8f0a8bb3ac250a87dbaf378ce808ae51f67aa8a
SHA512b328fdc07514808cc711c2e17212fabf2b04903668526bb56c46f52404095e8c4cbe15c24fd9b81d2a4fcd3818ecd00da42bb637972f1225bd65ede615f95034
-
Filesize
488KB
MD579af48ffd26e35d00400b84af73b39d6
SHA130da916fef4549f8fe094956fccd6f92096230ab
SHA256be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55
SHA512fa0a4e681e29fffa937bcaa92bb6fc67503071cff81aa172c71aa21cbb218f63549b9403023d7e1910e95cd65552d06f887d573a7ca02cbe735a7ac19db835be
-
Filesize
488KB
MD5a7a99ce9b70d8bd5523aa8b636ef8a70
SHA16d1fe479ade33956ef1635ab278c7414fae9ed01
SHA2566b35e5aa7f5d95f9b7a01f3b2fa7f5de393bfff7175cc198d242911b46bafa48
SHA512e4e0b1f233124e55a82a64994ca467e1b64918357ebff55dad26473b3ca7569d9f99c165284622b93477a3566c9152d35ea8fa140ab0905b2821bb1139eff84e
-
Filesize
488KB
MD5c3468aa61e98ae885fd33aabeaad7e2c
SHA1176b239c20e823cd96d04253358ada123280e261
SHA256524b77ca0aa3ba87c7570f7e7fa90053293f675795c355852f583e5c8176a821
SHA512e8644deeae75fed5fa5f61433d882d8532d48b9ff0501ba84e54b748cae946f5730abd4dbc91f3975c58ceabca294d32761e1beb4f89f1c65debb9ef8cb7a57d
-
Filesize
488KB
MD58a7795e71d66a9816aeb4609679b26f7
SHA1f14c76871f0c311ba0be7ae606c3f9d0570569f4
SHA256f608968665dee190bd55d5ed652db212be822e8045654173af53ae5332833462
SHA5127a1136bf663501667e54f2cde660b06607c6c25f9954694e425f6f304e7492ef836588852776d3f9bd9fe38c440272ce460fa2ebb1f0f3316ac5718713ceb541
-
Filesize
488KB
MD573f8e51e94ff7cb4383e222573cdb96e
SHA1630668f6687a53877a9b2c3bd31c3b8123095a8c
SHA256bfea8aa44017fca0e6e46d292577b3f3c3d8050412d4101c3b9e450b7a682092
SHA512fba1d69b2e86765cb83ab27078642772032507b4ce2643860e13dcf212a445fa3fb40d028565962509106999d3c08cfca56b1bbd42d8721d95b7cdc5695d541c
-
Filesize
488KB
MD55b92c8265c50b390a67b3fe930f72c84
SHA1fd6ba5192eaae8024c6d4d02ad8a8e42446511aa
SHA256d5ac390b8e18d09a95c53dc0345e750d58e1d584e0f88a730be32a229f01574d
SHA51243e854119ff3c42cf072bf0e9597a1f9d32f6bc72b841d2e6876b4506f2fb9f9ca38faa32a14d74786e19a741abef9114e30c68e8172cbe0fe01a2dc41030d1d
-
Filesize
488KB
MD5f595333074e4ceb870a089aa67252177
SHA183811b80d3b1b69c477ff786314bff92f7632109
SHA256d63a84ac40152d34528885b6c210631e2949a547aabf57a334ce6aad218bbb14
SHA512abaa52ab222d1fd9b928222f8b89a1f874183f7c60e216dfc5f2eb5e0857c79851309976051519786ff710fefaa951ca8dc3c9522b7f696dd5a65d741d9075b4
-
Filesize
39B
MD5415c421ba7ae46e77bdee3a681ecc156
SHA1b0db5782b7688716d6fc83f7e650ffe1143201b7
SHA256e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e
SHA512dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62
-
Filesize
488KB
MD5f6f49dd6fab63de28988923f0b39b824
SHA1387342dd6a727473cda693b8134e0ac8ebd8e4e2
SHA2566758a6218dcc3feb97e6dd30737a2a9066edf2eef56ac9af1c8da01c319730bb
SHA51208e49eabccc4856d377a0362c43bfc2f3a8b235dfa185506f4c638370bd32e5fb29ec5b102209f6849f28f5b6e33ff9bdd25ac4e8c9ada3b5a9760f859f7e934