Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 03:47
Static task
static1
Behavioral task
behavioral1
Sample
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe
Resource
win10v2004-20241007-en
General
-
Target
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe
-
Size
488KB
-
MD5
79af48ffd26e35d00400b84af73b39d6
-
SHA1
30da916fef4549f8fe094956fccd6f92096230ab
-
SHA256
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55
-
SHA512
fa0a4e681e29fffa937bcaa92bb6fc67503071cff81aa172c71aa21cbb218f63549b9403023d7e1910e95cd65552d06f887d573a7ca02cbe735a7ac19db835be
-
SSDEEP
12288:V/MW/MP/Mx/M7/Mx/M4/MpBE/Mk/M2/M1:VJK2O2HIBEd7M
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
Processes:
winlogon.exeimoet.execute.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exeIExplorer.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cute.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
Processes:
imoet.execute.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exeIExplorer.exewinlogon.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe -
Disables RegEdit via registry modification 6 IoCs
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cute.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 6 IoCs
Processes:
winlogon.exeimoet.execute.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exeIExplorer.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 35 IoCs
Processes:
Tiwi.exeIExplorer.exeTiwi.exeTiwi.exeIExplorer.exeIExplorer.exeTiwi.exewinlogon.exewinlogon.exeIExplorer.exeimoet.exeimoet.exewinlogon.exeimoet.execute.execute.execute.exewinlogon.exeimoet.execute.exeTiwi.exeIExplorer.exeTiwi.exewinlogon.exeIExplorer.exeTiwi.exewinlogon.exeimoet.exeIExplorer.exeimoet.execute.exewinlogon.execute.exeimoet.execute.exepid Process 2272 Tiwi.exe 4028 IExplorer.exe 952 Tiwi.exe 2244 Tiwi.exe 1916 IExplorer.exe 384 IExplorer.exe 3644 Tiwi.exe 2160 winlogon.exe 4784 winlogon.exe 1828 IExplorer.exe 2980 imoet.exe 4204 imoet.exe 4872 winlogon.exe 1956 imoet.exe 4304 cute.exe 1604 cute.exe 1084 cute.exe 3384 winlogon.exe 3180 imoet.exe 932 cute.exe 664 Tiwi.exe 2188 IExplorer.exe 3804 Tiwi.exe 1404 winlogon.exe 2436 IExplorer.exe 4208 Tiwi.exe 1112 winlogon.exe 4364 imoet.exe 4992 IExplorer.exe 1120 imoet.exe 4024 cute.exe 4540 winlogon.exe 840 cute.exe 2720 imoet.exe 892 cute.exe -
Loads dropped DLL 6 IoCs
Processes:
Tiwi.exeTiwi.exeTiwi.exeTiwi.exeTiwi.exeTiwi.exepid Process 952 Tiwi.exe 2244 Tiwi.exe 3644 Tiwi.exe 664 Tiwi.exe 3804 Tiwi.exe 4208 Tiwi.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
Processes:
IExplorer.exewinlogon.exeimoet.execute.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe -
Adds Run key to start application 2 TTPs 24 IoCs
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeIExplorer.exeimoet.execute.exeTiwi.exewinlogon.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" winlogon.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
imoet.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeIExplorer.exeTiwi.exewinlogon.execute.exedescription ioc Process File opened (read-only) \??\G: imoet.exe File opened (read-only) \??\L: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\Y: IExplorer.exe File opened (read-only) \??\K: Tiwi.exe File opened (read-only) \??\N: Tiwi.exe File opened (read-only) \??\P: winlogon.exe File opened (read-only) \??\T: winlogon.exe File opened (read-only) \??\Y: winlogon.exe File opened (read-only) \??\O: cute.exe File opened (read-only) \??\N: IExplorer.exe File opened (read-only) \??\G: winlogon.exe File opened (read-only) \??\H: IExplorer.exe File opened (read-only) \??\R: IExplorer.exe File opened (read-only) \??\T: IExplorer.exe File opened (read-only) \??\L: Tiwi.exe File opened (read-only) \??\U: Tiwi.exe File opened (read-only) \??\V: Tiwi.exe File opened (read-only) \??\R: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\Z: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\K: winlogon.exe File opened (read-only) \??\K: imoet.exe File opened (read-only) \??\V: cute.exe File opened (read-only) \??\S: winlogon.exe File opened (read-only) \??\Z: imoet.exe File opened (read-only) \??\I: cute.exe File opened (read-only) \??\G: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\T: Tiwi.exe File opened (read-only) \??\X: imoet.exe File opened (read-only) \??\U: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\J: cute.exe File opened (read-only) \??\L: IExplorer.exe File opened (read-only) \??\M: IExplorer.exe File opened (read-only) \??\Y: Tiwi.exe File opened (read-only) \??\Q: winlogon.exe File opened (read-only) \??\J: imoet.exe File opened (read-only) \??\T: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\J: IExplorer.exe File opened (read-only) \??\O: IExplorer.exe File opened (read-only) \??\B: Tiwi.exe File opened (read-only) \??\U: winlogon.exe File opened (read-only) \??\R: cute.exe File opened (read-only) \??\O: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\P: Tiwi.exe File opened (read-only) \??\S: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\S: cute.exe File opened (read-only) \??\U: cute.exe File opened (read-only) \??\M: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\X: IExplorer.exe File opened (read-only) \??\W: winlogon.exe File opened (read-only) \??\Q: cute.exe File opened (read-only) \??\Q: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\X: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\Y: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\E: Tiwi.exe File opened (read-only) \??\M: Tiwi.exe File opened (read-only) \??\R: Tiwi.exe File opened (read-only) \??\Z: winlogon.exe File opened (read-only) \??\M: imoet.exe File opened (read-only) \??\K: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\N: be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened (read-only) \??\O: winlogon.exe File opened (read-only) \??\Z: IExplorer.exe File opened (read-only) \??\N: imoet.exe File opened (read-only) \??\R: imoet.exe -
Modifies WinLogon 2 TTPs 18 IoCs
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeIExplorer.exewinlogon.exeimoet.execute.exeTiwi.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ Tiwi.exe -
Drops autorun.inf file 1 TTPs 10 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
Tiwi.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeIExplorer.exedescription ioc Process File opened for modification F:\autorun.inf Tiwi.exe File created F:\autorun.inf be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened for modification C:\autorun.inf be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File created C:\autorun.inf IExplorer.exe File opened for modification F:\autorun.inf IExplorer.exe File created F:\autorun.inf Tiwi.exe File opened for modification F:\autorun.inf be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File created C:\autorun.inf be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened for modification C:\autorun.inf IExplorer.exe File created F:\autorun.inf IExplorer.exe -
Drops file in System32 directory 40 IoCs
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeIExplorer.exeIExplorer.exeIExplorer.exeimoet.execute.exeTiwi.exeIExplorer.exeIExplorer.exewinlogon.exeIExplorer.exeIExplorer.exedescription ioc Process File created C:\Windows\SysWOW64\shell.exe be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr imoet.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe imoet.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe cute.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe imoet.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr cute.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr Tiwi.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe winlogon.exe File created C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened for modification C:\Windows\SysWOW64\shell.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr winlogon.exe File opened for modification C:\Windows\SysWOW64\shell.exe cute.exe File created C:\Windows\SysWOW64\IExplorer.exe cute.exe File created C:\Windows\SysWOW64\tiwi.scr be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe imoet.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe -
Drops file in Windows directory 26 IoCs
Processes:
Tiwi.exeIExplorer.exewinlogon.exeimoet.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeIExplorer.exeIExplorer.execute.exeIExplorer.exeIExplorer.exeIExplorer.exeIExplorer.exedescription ioc Process File created C:\Windows\tiwi.exe Tiwi.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\tiwi.exe imoet.exe File opened for modification C:\Windows\tiwi.exe be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File created C:\Windows\tiwi.exe be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe IExplorer.exe File opened for modification C:\Windows\tiwi.exe cute.exe File opened for modification C:\Windows\tiwi.exe imoet.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe Tiwi.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe cute.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Tiwi.exeTiwi.exewinlogon.exeTiwi.exeimoet.exewinlogon.exeimoet.exeTiwi.exeIExplorer.exeIExplorer.exeIExplorer.exeIExplorer.exewinlogon.execute.exeTiwi.execute.exeIExplorer.execute.exeimoet.execute.exeimoet.execute.execute.exewinlogon.exeimoet.exeTiwi.exeimoet.exeIExplorer.exewinlogon.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeIExplorer.exeimoet.execute.exewinlogon.exeTiwi.exewinlogon.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe -
Modifies Control Panel 54 IoCs
Processes:
Tiwi.exeimoet.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeIExplorer.exewinlogon.execute.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Mouse\SwapMouseButtons = "1" imoet.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\ Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\ be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\ Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Mouse\SwapMouseButtons = "1" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\s1159 = "Tiwi" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Mouse\SwapMouseButtons = "1" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\s2359 = "Tiwi" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\s1159 = "Tiwi" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\s1159 = "Tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\s2359 = "Tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" imoet.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\s2359 = "Tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\s2359 = "Tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\s1159 = "Tiwi" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Mouse\SwapMouseButtons = "1" cute.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Mouse\ Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\ IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Mouse\ imoet.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Mouse\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\ imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Mouse\SwapMouseButtons = "1" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\s2359 = "Tiwi" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Mouse\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\s1159 = "Tiwi" cute.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\ be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Mouse\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\s1159 = "Tiwi" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Mouse\ be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Mouse\SwapMouseButtons = "1" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\s2359 = "Tiwi" imoet.exe -
Processes:
IExplorer.exewinlogon.execute.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeimoet.exeTiwi.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Main\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Main\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." cute.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Main\ be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Main\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Main\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" cute.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Main\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." imoet.exe -
Modifies Internet Explorer start page 1 TTPs 6 IoCs
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" cute.exe -
Modifies registry class 64 IoCs
Processes:
imoet.execute.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeIExplorer.exewinlogon.exeTiwi.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
Notepad.exepid Process 2908 Notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exepid Process 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
Tiwi.exeimoet.exewinlogon.exeIExplorer.execute.exepid Process 2272 Tiwi.exe 4204 imoet.exe 2160 winlogon.exe 4028 IExplorer.exe 4304 cute.exe -
Suspicious use of SetWindowsHookEx 35 IoCs
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exeIExplorer.exeTiwi.exeTiwi.exeIExplorer.exeIExplorer.exeTiwi.exewinlogon.exewinlogon.exeIExplorer.exewinlogon.exeimoet.exeimoet.execute.execute.execute.exewinlogon.exeimoet.execute.exeTiwi.exeIExplorer.exeTiwi.exeIExplorer.exewinlogon.exeTiwi.exewinlogon.exeimoet.exeIExplorer.exeimoet.execute.exewinlogon.exeimoet.execute.execute.exepid Process 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 2272 Tiwi.exe 4028 IExplorer.exe 952 Tiwi.exe 2244 Tiwi.exe 1916 IExplorer.exe 384 IExplorer.exe 3644 Tiwi.exe 2160 winlogon.exe 4784 winlogon.exe 1828 IExplorer.exe 4872 winlogon.exe 4204 imoet.exe 2980 imoet.exe 4304 cute.exe 1604 cute.exe 1084 cute.exe 3384 winlogon.exe 3180 imoet.exe 932 cute.exe 664 Tiwi.exe 2188 IExplorer.exe 3804 Tiwi.exe 2436 IExplorer.exe 1404 winlogon.exe 4208 Tiwi.exe 1112 winlogon.exe 4364 imoet.exe 4992 IExplorer.exe 1120 imoet.exe 4024 cute.exe 4540 winlogon.exe 2720 imoet.exe 840 cute.exe 892 cute.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exeIExplorer.exewinlogon.exedescription pid Process procid_target PID 2036 wrote to memory of 2272 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 83 PID 2036 wrote to memory of 2272 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 83 PID 2036 wrote to memory of 2272 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 83 PID 2272 wrote to memory of 2908 2272 Tiwi.exe 84 PID 2272 wrote to memory of 2908 2272 Tiwi.exe 84 PID 2036 wrote to memory of 4028 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 85 PID 2036 wrote to memory of 4028 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 85 PID 2036 wrote to memory of 4028 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 85 PID 2036 wrote to memory of 952 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 86 PID 2036 wrote to memory of 952 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 86 PID 2036 wrote to memory of 952 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 86 PID 2272 wrote to memory of 2244 2272 Tiwi.exe 87 PID 2272 wrote to memory of 2244 2272 Tiwi.exe 87 PID 2272 wrote to memory of 2244 2272 Tiwi.exe 87 PID 2036 wrote to memory of 1916 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 88 PID 2036 wrote to memory of 1916 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 88 PID 2036 wrote to memory of 1916 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 88 PID 2272 wrote to memory of 384 2272 Tiwi.exe 91 PID 2272 wrote to memory of 384 2272 Tiwi.exe 91 PID 2272 wrote to memory of 384 2272 Tiwi.exe 91 PID 4028 wrote to memory of 3644 4028 IExplorer.exe 92 PID 4028 wrote to memory of 3644 4028 IExplorer.exe 92 PID 4028 wrote to memory of 3644 4028 IExplorer.exe 92 PID 2036 wrote to memory of 2160 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 93 PID 2036 wrote to memory of 2160 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 93 PID 2036 wrote to memory of 2160 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 93 PID 2272 wrote to memory of 4784 2272 Tiwi.exe 94 PID 2272 wrote to memory of 4784 2272 Tiwi.exe 94 PID 2272 wrote to memory of 4784 2272 Tiwi.exe 94 PID 4028 wrote to memory of 1828 4028 IExplorer.exe 95 PID 4028 wrote to memory of 1828 4028 IExplorer.exe 95 PID 4028 wrote to memory of 1828 4028 IExplorer.exe 95 PID 2272 wrote to memory of 2980 2272 Tiwi.exe 96 PID 2272 wrote to memory of 2980 2272 Tiwi.exe 96 PID 2272 wrote to memory of 2980 2272 Tiwi.exe 96 PID 2036 wrote to memory of 4204 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 98 PID 2036 wrote to memory of 4204 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 98 PID 2036 wrote to memory of 4204 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 98 PID 4028 wrote to memory of 4872 4028 IExplorer.exe 99 PID 4028 wrote to memory of 4872 4028 IExplorer.exe 99 PID 4028 wrote to memory of 4872 4028 IExplorer.exe 99 PID 4028 wrote to memory of 1956 4028 IExplorer.exe 101 PID 4028 wrote to memory of 1956 4028 IExplorer.exe 101 PID 4028 wrote to memory of 1956 4028 IExplorer.exe 101 PID 2272 wrote to memory of 4304 2272 Tiwi.exe 102 PID 2272 wrote to memory of 4304 2272 Tiwi.exe 102 PID 2272 wrote to memory of 4304 2272 Tiwi.exe 102 PID 2036 wrote to memory of 1604 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 103 PID 2036 wrote to memory of 1604 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 103 PID 2036 wrote to memory of 1604 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 103 PID 4028 wrote to memory of 1084 4028 IExplorer.exe 104 PID 4028 wrote to memory of 1084 4028 IExplorer.exe 104 PID 4028 wrote to memory of 1084 4028 IExplorer.exe 104 PID 2036 wrote to memory of 3384 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 105 PID 2036 wrote to memory of 3384 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 105 PID 2036 wrote to memory of 3384 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 105 PID 2036 wrote to memory of 3180 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 106 PID 2036 wrote to memory of 3180 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 106 PID 2036 wrote to memory of 3180 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 106 PID 2036 wrote to memory of 932 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 107 PID 2036 wrote to memory of 932 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 107 PID 2036 wrote to memory of 932 2036 be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe 107 PID 2160 wrote to memory of 664 2160 winlogon.exe 108 PID 2160 wrote to memory of 664 2160 winlogon.exe 108 -
System policy modification 1 TTPs 12 IoCs
Processes:
imoet.execute.exebe27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exeTiwi.exewinlogon.exeIExplorer.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe"C:\Users\Admin\AppData\Local\Temp\be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2036 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2272 -
C:\Windows\Notepad.exeNotepad.exe C:\Present.txt3⤵
- Opens file in notepad (likely ransom note)
PID:2908
-
-
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2244
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:384
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4784
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2980
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4304 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4208
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4992
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4540
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:892
-
-
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4028 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3644
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1828
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4872
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1956
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1084
-
-
-
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:952
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1916
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2160 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:664
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2188
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1404
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4364
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4024
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4204 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3804
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2436
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1112
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1120
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:840
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1604
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3384
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3180
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:932
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
729B
MD58e3c734e8dd87d639fb51500d42694b5
SHA1f76371d31eed9663e9a4fd7cb95f54dcfc51f87f
SHA256574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad
SHA51206ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853
-
Filesize
45KB
MD54bbed3c25ce56713b060e011441b2d00
SHA1118fe1965087ea1a4515446cd9b4a2587af6d4d5
SHA2567fc8d2ca838dab15030ff16128d90393271ac4f903dc81a3ccc75fd0400ba720
SHA5123fe723847ba0cfd7ff9f3d3f0cef1693e328a592a1d2f8a7e351968a4b46c94ffa86308d3934354bc02bb709085e3db6dbfe6f1a4e1500af7d1b4b994d5af398
-
Filesize
488KB
MD587aa29f601e59fa21b2ee03520a62714
SHA11e39f70761ffe3caaf71353091658f698aa1096c
SHA256ef2433073572d91890fc9b245870127a435183225c6e4a3536992ce9fb23272e
SHA512dd15ab704f7212b2fc30c990a7474de46fca62c66ea16bbea3022e00106ca3b408a8147ff174f3ca64a936bce822e179492e4ee8ee808281bb30347d5c1dfd76
-
Filesize
488KB
MD5c76a60ad5a710332ce0dd8781397d38b
SHA153af87a1b0242e8a117f69c46d4b3342cd9e0c47
SHA256f24c28c42518f7098fb120b5a029f4e0abfa01d7fd8998235a98c2be45ce6444
SHA512926c909e4b22bac7aa235d9e009b0840e1cedf2b095f6f2b5607bc59304ea1e2591515e062dc6e8f0117e79fa2c7c70c04e2bcd22bc350cb89b3f8925211da1f
-
Filesize
488KB
MD5a85e50eb9a91cd83392085aee16c89b9
SHA1dd3ae5e14d5a1eb15d3c8d6a46ed2673c2f4673e
SHA2561a3916817e98bf4447ea09b341f1d3b3219e69a1d9866ea854cdadd7f30f0ab9
SHA5128af2eb451eeb4192fe80b7ed6d82a13dd95d82ef2a7e817350b48cfc528193a9600b0c75d0c1645fcdc4e2bcc682e2fd103b21f4d9b85ea12ef75118d3396273
-
Filesize
488KB
MD5da99057ab2b5913e452c8240ddf6e726
SHA1ae28ba57ec08da4103249c1069d24a08349765f9
SHA256bdfb97160817c7b649eb111b949f41a0a5b6cf0111bb18b4d375fef12b0eb302
SHA51221e580b0ce8c0840e9c338c93c979f6f2f3f9bbbc19016d5b990e5078338bf6b5a46bdc0dd0afdf6a7fe73e12fe3c914ac64e71c0253da786e4eefc6a55fe6d6
-
Filesize
488KB
MD5b3cb0ad37a125718c23fa97dfae40982
SHA1d91d0c0f2bcda621543a389b6c570570a0d3553a
SHA2560d9f502c5866295b177aa3e112c957e9efa69e776a863d08379f275eb96c62a4
SHA512a38bf5a76c7c9d2cbf13969d8a0323ea69762d2e1377aae50bd38d33f75384825a07f20b195f31f71f4eb33b31b66abde2bf913fa750b6f360987180d3d91118
-
Filesize
488KB
MD53cdd3f8fca4360a90407ef93ca83c631
SHA1bb4449757f049b914fd66f589c1498a138ae2ed8
SHA2567e39d57257c880649c3e49d050ca5ad92f8ddb94435b79988ab91232674a1603
SHA5129a47d751ca6d2d976599e12b191822e791b6508ff712e5e89c33882aae2bcd76c6b6c947c39e26580c6b81d340fc60467adfe5e668ce4c18f6acec356e091dad
-
Filesize
45KB
MD54de206c3221fee56ad63340b861db572
SHA140235d006103f31cd41a59c20b93eb2646d4c2f8
SHA2565577d345c488ac45225268fb063d0b9c95bbe350cee72620bba10e9ad74889b8
SHA512ad423bdecea8987ee7f0b50737f6289f808ef680f771927fd04e1880a00ef21fe7c0789e15220fac9f2737b98bf7bebcec0f1aa8b9a6e4bbd79dcb27d0bfa0bf
-
Filesize
45KB
MD59714cf1adbf33ceb22f287921cb78941
SHA1104d7204d8ba99d500e22e5257eda8dea936cc6f
SHA2567e77c2f4f21c4357ac24aa4c58e4ed483387c9791774b058b6b8e2023f28ed1a
SHA5123f02cbf30b2c924e5a8090268a11a890b5ffad1dca7d5d87867f6295087c255fbd69e55736646f19ad26a02c82f77eca9f83247ffec9d3cedfed2f61cbfd8e7a
-
Filesize
488KB
MD501b2cf6c83b53e536c1eb0f00a4ea185
SHA1419c8f32a333ff3456f8f243b963602f04fd8154
SHA256bf960cd05edd7964d0119b27f2ffc67bc90df2bb819e7752db0845fdb6606258
SHA512419589579f30befcbd5fc4bd6243470b40ec4f1d5896d8088cf5ec9cc0273e80caf0c392a9db35a21c36153c64b751245c786deb9cc406966d6714debea4d648
-
Filesize
488KB
MD5ad5b535e3e212d26800109a77442a9a2
SHA1f17786af04d0144b1236f8bf16d291637b92670b
SHA256ede441a55df89b96f4036edc9c895f7bb03dcfd4e0881b2cda5c98dbe86ea99d
SHA512c71c9a0796d5aed973265ef4ef73d5ff0b8d87d322434d046a558a80ff88f69fef4a8e4db2c2f02f7d78a9c18a2016aed5aae43585d6a524dbe47dbd410a5633
-
Filesize
488KB
MD525492ee1f550d97a319dd3b8ad7c35c8
SHA134e87a0df0aa598660a972340a74b2835f04a610
SHA25694684f665261beb6e6bebc1c79b661e005b3d35b032c64d23dc2da80204726c2
SHA512a721ea597ee3b0dad72ce719112e5c2488c745c02dbe09b36181e74a84a9f453b4aef30011dedaa354d9a807a3786d1877b58f66a46046c75c3dedf7cd5e66e0
-
Filesize
488KB
MD53a0616efa7ab966539f7b5e118df5918
SHA14d4efa8c6f98b1c4bbf900bd03cd858a85027bb5
SHA2563065013f70b9d4ff7932e08d6e315e02ba92375fbddb9f0cc263e96167140d77
SHA512f8b0690c0712dbc4fe95e10a134abee82a39fafdeb29278a573df94bf33baf00d311919499fbf204ccb25c891e7cc8e03e33e26a3f4e90dfc0c2fef2a585db78
-
Filesize
488KB
MD5f12d40e2a88c374672aa415d21501ee5
SHA12182d545acc249f6e888f43d2e2ff150a4c73b7c
SHA256ddccea13b6fc1a7913f514ade8bf6cc71d31745f3d44b716da4c0b5ae741fdef
SHA512fd2bdcf4b84354f3f2a5fa245da7b8d798cc85c4a72269cd293ff81b9065984fc44e3fbfb2a9503a6a19ff683b1834a6eaff3b3caa1a14913d0fd8c87ba55529
-
Filesize
488KB
MD52c40044be10a817e3b204f3de66ae783
SHA1c2dee8381829d2f2f65958836ab3f1d2a9fa4358
SHA256fcefe8c3f98c37707db2698a84e08fa0406d74df64f69dc703037d92150ff370
SHA512ac9a84ab09ce2d569e9ee341151863964a8f92abc6105000ad3215123b295111be463c19f9eecc75a472ab75f3cec768e973e0abd462a0881556458b87cec8b1
-
Filesize
488KB
MD579af48ffd26e35d00400b84af73b39d6
SHA130da916fef4549f8fe094956fccd6f92096230ab
SHA256be27a344debe1ecfbb9947247ef1b94b3b201d84215f48eee0e74bd54d0a0b55
SHA512fa0a4e681e29fffa937bcaa92bb6fc67503071cff81aa172c71aa21cbb218f63549b9403023d7e1910e95cd65552d06f887d573a7ca02cbe735a7ac19db835be
-
Filesize
488KB
MD5b23b732e54516cf96b666f3bf9e1f68c
SHA1ecdd2f51f1a5cc60d4126cddfbca3ab820f9cdd3
SHA256510788ee603e3fbf292c35564f274fcb27e8b6f2714d1f87015971790c12c749
SHA512f0b6d91ce16af6159dde40bcef3fd4150424320f5af227719f137cd8a27cd549d814cc644ee9c1cc192ecfc42b12b193846415ae372109add09fb93b6bb5a2a0
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
488KB
MD54342964e9813d2539978257cfdbaa710
SHA119920e9d8334423a4fe874d385b7e6098350530b
SHA256b9e9c7c20286f068ddb4792a6901b0891203462d392f8307e225b71534e51915
SHA512255fe9360badaa0aa033ad27a769af4a36a1d8d195baf8d6b5fe4ece193aa018a3f519a605721f97c8a95d349f0f5f98b19ed7ed3da5237f517fdf41caeaa333
-
Filesize
488KB
MD593feb919fff76a4e281fa35ca0df5e81
SHA1f26240d70f2c79c12705635dc44f302b4f31e8e4
SHA2566520c77781e58ef6d26a75e2e9da55ea34b86d4a7ed4ed2cf586cd18845a9c08
SHA5123820129f59177b36f6d2923b624ab14e5f228771d3f2cee77d0979dcc5c0791990715bbfb7b757bd131f2c51ebdccf445f4eb8ed49c3426295b7fc192e20d4a6
-
Filesize
39B
MD5415c421ba7ae46e77bdee3a681ecc156
SHA1b0db5782b7688716d6fc83f7e650ffe1143201b7
SHA256e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e
SHA512dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62