Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2024, 20:22

General

  • Target

    1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe

  • Size

    56KB

  • MD5

    3bbe4ee2006f6b8cb2edfbee89c8ba78

  • SHA1

    df12fe7fc506d37545914ddd10f11e22abfb1a03

  • SHA256

    1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2

  • SHA512

    ae7c1fd95244d73585e58d074e1aeb61c9db532e58da129fd44862178b886bdcb0d580f0d9458d3e909988e69e09a7c3b2ad8afafae8c4383d0b624ffea5cecc

  • SSDEEP

    768:VNuG777/+V36n9PcXYvn8KR1I3NznRAQZlh4VkpX179r+R5gOwekf:V8w2VS9Eovn8KRgWmhZpX1QNw

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 53 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe
    "C:\Users\Admin\AppData\Local\Temp\1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2652
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2672
      • C:\Windows\Notepad.exe
        Notepad.exe C:\Present.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:2908
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2192
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2272
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2328
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2544
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2684
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2240
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1672
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2512
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2496
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:2196
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2312
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2776
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2764
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:376
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2488
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:2156
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:776
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2068
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2060
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1100
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:268
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3012
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:872
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2524
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2784
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2964
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2304
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:716
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1028
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1712
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2816
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2140
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1616
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    d2ce1be7833ebbf23d3f3d3e25a9f97b

    SHA1

    6dab53fc1dc7dc9fa3ee2b5c6ae63eaed6bf83b0

    SHA256

    c33e7394721b01357bdb350ee242fd787b3efd550b43e0fa5b77df3fd081198a

    SHA512

    9c62245d43ab33152d501313dc016a7f7b4e2d01986973f25b17cdbcab3c6106818b8819bc78bf25f4c2ef7bbaf1f4e3ec2ba7bc36ab95b86e96b4be92a34b85

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    56KB

    MD5

    838f978efdd3fa36f0eb27b4b6df3bb1

    SHA1

    a6ca9f57a59cdb9e302b24154f60fb7ec970af49

    SHA256

    0cee604640e7016fedc9e2d2fab9bff8b52fdc728578b8520cad32a46009f60e

    SHA512

    db9e2bb7a793bf1d25e0f6f16df6cdb8b349c1d23665c8239bcbd137c55a9ad78a6853e0b68afc79d5ad2e469561fa808137e06832dfefbe88c410969425cb37

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    56KB

    MD5

    7a4d557ca3575cf50a36c4f402e9da59

    SHA1

    915321bdc6d5730added51a9bcd3b6b64c24f62d

    SHA256

    9d936d0a3fcd6bcd102f3433aa2e42c34373568669ffc641ee50d6127100c0a0

    SHA512

    b77662f97118ec3246d826387cbf9904ef453779446fafebbf7d17c9485f59719475b0a688cc26e9ac84828a5d9683c2cd5d0233d3a61fb66ddd9b7ecd02aec0

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    56KB

    MD5

    45e91bba6fe15366e2bdde4132000488

    SHA1

    c5fee08c5d5d742b8defba3fc409f7b27b9af3ff

    SHA256

    26838f42c57002378c74ddf07c39d51fe98ef8cd2d4db6ab4c41866172f81164

    SHA512

    9451677d2a6f46aa9edd438e5902223d0dcdafdaaf16357f844ea335c6c47b4dbd6d82777b7242b39493a5bbbaea3479cc59f92bdba173e71040776899531eb5

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    56KB

    MD5

    bda3594b9fe0d2f371006a665861e007

    SHA1

    909de87ab7b06d0d33c8375b0afa5c02cb35ec8a

    SHA256

    963e333d13e365a68d972a67d71c7ac4eaa90f734e7f7172e778d28310ec2de2

    SHA512

    fa7fdf716f49742dc6892b9249ac08ef3647f4c5074150710e75c51f9b6fc5df59e9450b019142bb3b3cd99113660cdf3f0a5bbc5e000ecca1585a9cba311967

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    56KB

    MD5

    75a33f5fb66e3be22dcda7d85fd13de6

    SHA1

    3dcacc36edf74b1bd83d8178e2476b7b5a34898a

    SHA256

    bad5bb5058e7d50f8c9bcdb343f787b0ea397a317507931511b657af0549d345

    SHA512

    8a8b9e7c82c0b981a7d06cc66b10543a84c58f0ffbb8909eaffd88da1451b0274bb7bf265979d1cd38de37db82b9531e2e55ff6c88eef2ccbe11b39a58c568be

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    56KB

    MD5

    24a999e0347b640532b45bcbaf04bf61

    SHA1

    2310862be12e17358cdda79eb27178f727f93fa8

    SHA256

    bc55ac4758efdfc619febf788928245f0ecab1d8f063b540e40755920ebd0952

    SHA512

    7e753c02ec1dc54aaf8a7a02a5dc572c8b33e4e4c495f2bfcd75ef20437d7e3162f84f45c7d6428f06b77a1ac5b0498b78f89723eb7501b695630df1bdf908ca

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    55d25d8b396f7a5fdad3a85fff983d44

    SHA1

    b5d5d3c110f99020b132fd11ca690b95a461317a

    SHA256

    71b30db9c3533b816ddd79928daee659c1eb8112f8ac736a1b57bbcb21b238b3

    SHA512

    70d60cd20a2883bd40360626e49ab2b4a724c10656023576418715af70f6d26e5f8ccc2ae5fee97bdb375c889b53abaa6638b711385e71ae0f1a6d5f67578b24

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    1fd3893dfe691daae72e15dc55e1a246

    SHA1

    900654767071c7ee4e7699be218535b599ccbb1a

    SHA256

    90ac41a9f581ee13ddd9973b209aefe85524ee0b81be875d53555124e07138dd

    SHA512

    c25a1ef61df2dbca35abe63b937d1c419188a813dae148229109f03a02de3e8c1c79d311c819c433b6bfd30d0a92d244d0bff8c489d60d3ea0e7200f5d4a9786

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    3fb99b76be15af2a4e280bc67d442fad

    SHA1

    bc3848d44bd287cfa1e01f53adea5793ea41d80f

    SHA256

    5f279d06804db2c353eb56bdda5711c57114d7819be5673e012d0e55efcf5c69

    SHA512

    8e7a890910e44d390fecb254cfd49e56488bf1b8efcccf6abf5747f51476ac29004ee0769fcbe60b0e7eae0a763bce5e8e59c99ca769b50df34e4d7198674353

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    56KB

    MD5

    10140b2beb1f44723bb60e32da6538fe

    SHA1

    425bf27d040ae3e5eea47cecd0659d053422c812

    SHA256

    f9147c9e42ebbff8c23b30b471229956d3373ad17733a4c82a1f875ec8e98234

    SHA512

    3831d89d14620e9ad128e545dbb99d250820ec51e8aec60db4668d3c314abfee67b5b97fb4e453ea6057e5ea64f574bcc777dc536fb804f2cff3bccb9c4283a0

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    56KB

    MD5

    d6d307580a98f788c7259e12a8c705b3

    SHA1

    17d2b78ba5cc992329af8aa4e55d688d4360877c

    SHA256

    9bd76b82c92fab082c0e5e6aeea8cb207a63a015bd14d0d2274d651b0e46e046

    SHA512

    91b291425874c8846b1ae8dba2366bc4dc00d6b98606ff7154102d7f2e3f86d45553c0b5cc44160d6fc19c07ac825581a66a6b1c2e03b4fea756ebf68d1c9fea

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    56KB

    MD5

    2bab9437df2d85089179713ee24b6c50

    SHA1

    40cfd4162b3793b80db8d4216db011e1ffa67822

    SHA256

    f630b019af8dfc2d71cdb92bde83466d7aa8926d1d910f4bc788c85303067df9

    SHA512

    d46811702b1ece659eda5685b53703fa526bfe2dd2b5677205959aac91532ee7539e4b51f43acbfc9a0e7641ea965b73265eb217939d5585d57a280ac3df7c97

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    56KB

    MD5

    eb8e35db53f1f578d1ad982d471db89e

    SHA1

    99d17c2e0e9023d87d57cd6af786249ffd5373d6

    SHA256

    f7052a55464ceedb0ee8f322336cb016ec6431b20069201b9bc54eb75e8c2342

    SHA512

    1832e67d25c98a55300b12dbd1296359688561b8a8bc0103bf15de939b9147ace8b01a1f67faa92c0d0becc84489b4cfc0b2b0f520ac416930a4752378d07abe

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    56KB

    MD5

    1d667e125929f269c865c4449797b75a

    SHA1

    aeb628f2f8334fc206466b267147c4f8a1f3284d

    SHA256

    e160531785ff9425adef8f452fa0cb0f98a8da7b6c0b54aa3a42132f9572e3cb

    SHA512

    a1140b3729b7a2fa26ef4078ce012a33c8a895930240104c37ae6ac9617e61cc96559a8605fd47994e1e4a16761b0e936ef9ca9b9024c6f2d6ae6f9c33b26a46

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    56KB

    MD5

    43df13380739104d3673df5bb0f06d53

    SHA1

    6e9a5fa571c4f5a3f0b4ef7b3203cdfc88861119

    SHA256

    2e706e089ca3ec8d342faab8310249af253619481d39e7cdc3e2f83fc51ddd94

    SHA512

    2ceed08be490ab0baff0624a6423ba7ab95bad3ff898395b02534663c6c956521bcf8d55d6824608c3eb1364976ee9f1edb4518bed39f0af25cc6ba42dcf6aac

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    56KB

    MD5

    3bbe4ee2006f6b8cb2edfbee89c8ba78

    SHA1

    df12fe7fc506d37545914ddd10f11e22abfb1a03

    SHA256

    1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2

    SHA512

    ae7c1fd95244d73585e58d074e1aeb61c9db532e58da129fd44862178b886bdcb0d580f0d9458d3e909988e69e09a7c3b2ad8afafae8c4383d0b624ffea5cecc

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    56KB

    MD5

    d0671471e58b0eb39d23369257da0431

    SHA1

    a7a779cd4069436fc348035a650b145ab54aada3

    SHA256

    f0681f82fefd61d250dd7dd36fe3b1b9b72a079b5d813b250b648fd972e1e9bf

    SHA512

    b8ab3207ceb1fcad2f4bb2ec2cf8436a3de44eb9d83bc947427d847e836b360056b9b8d946f44ca0a13bbaf09901a23c72b8b6d6d1b9b3d1dcdd0db1f4753b6f

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    56KB

    MD5

    35a8d710268753aa798d82a3d0fef223

    SHA1

    c75a77bbb3bb1635d1e8c992328bc4c76b7e2bcb

    SHA256

    bda380c9da3cb82e87c2a5a1916b647de47031e58fb1464e0ea50e7150c3df24

    SHA512

    395f17d7468a198e6b2b3aaf5e1354c8873597732bccd60c449b274468dc5dd751e94e4cc1ea06ae62f9560238408bf4843a6217d5d52008d577ef008f40df69

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    56KB

    MD5

    91656450ff0c2984dad567e400c30f7b

    SHA1

    7cd7ce7bd2c626da002bd3de41676292f6b44342

    SHA256

    8350fc0844bd01a71d235a0e2762053c0529f145215fbedbc5ee0b904416806b

    SHA512

    f198a5d70ee7e8098c5b8b0034155d92c982026bc17e2de6483a5e3c0614ba75b991fc0f90d27ec2c94b001b3a7bc89e93b43588d6b0bd16ec30605ad864e3d0

  • C:\Windows\tiwi.exe

    Filesize

    56KB

    MD5

    5ee967ee4d64e58a3280e844cf943f11

    SHA1

    49c9f72fe8017120a72945d1d4b61a1527e9ca5d

    SHA256

    d43fc3f65393e0ac7c8e942aa030eac322af8ff297fed4edf40132a647ea4e7d

    SHA512

    7b259ea4c406e91904a4688bd28a9f7e32b701a74ae7de8414b7751db8f4ebf6a313dc4fc3e129e8b2db7cecee1a4788ba04b81402e7fc460b3caf6fe9642216

  • C:\tiwi.exe

    Filesize

    56KB

    MD5

    74777498173490a7f299abe52cbc097d

    SHA1

    36ac05b59d5f0c0a467439558354ee132b71a5c4

    SHA256

    e01ede0ed1f1f10fdc6581ded228a64f5d37385ead04ad0fd936ca46d4efd8a9

    SHA512

    f379832b303f53aaf5d50aea665462f8efbf7442a7fb71cc33adf1feda9e54057596cbf761cdcd8bd42809a558dd061fe27afde41c9845545b8c73bb509cd45f

  • C:\tiwi.exe

    Filesize

    56KB

    MD5

    acf97942e5da3b6ada0d56da64a1f275

    SHA1

    7bf5ebd4c036622ef7ec2ad6b55cd30d302c11d9

    SHA256

    6cf4aea1cae308c1f9ba12dbe8b575313afd052a32422bbb34b486622c6c75b2

    SHA512

    42fcc819f7e7bb4ef5b54047fea8594a21e66c0495ff42eecec304e7ef141266de0ca977f68415a69fb25089c5e8cd516949c18566c070b1397ac1cb8d2c9b86

  • C:\tiwi.exe

    Filesize

    56KB

    MD5

    e10568406bd8d0c741b2fef168a6a2f5

    SHA1

    f0e60ae532456106a8e7c0e9ce116658a0e5846f

    SHA256

    e4edc1c8e475fe506c8d7b7b32d95b41ee1e15ec35e1ee781ed2a40b1362961b

    SHA512

    f930e511e8947665976540ee47f80c07ce4884ffd8e713b62809dbee104f96a5bfb4c926150bb010baf6b26bfa10e9bf376594a5104c84e2d9d0a5889480640d

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • \Users\Admin\AppData\Local\WINDOWS\winlogon.exe

    Filesize

    56KB

    MD5

    bec3b4e7c898947ccca2ef459e938875

    SHA1

    a0de45f7f1530ec2808911b8e98d8b77275e0921

    SHA256

    353e889a423ff5f69042186001968fa3f253d3adbb19bf03df5f71462ae8ddea

    SHA512

    74818d23682e6f7cd28a9479258209b14230e77da9faa8c4bc6e12b2054361bb7b6260406c53393f52de7eda13221ba0aa9adb5b119b632ca28671a35c369eae

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    56KB

    MD5

    0a89a132dd67988fa675d6e31682fd53

    SHA1

    4d9165b510cf84c30fd2baf69af331a80780e206

    SHA256

    78b04d0f9036f548996596f0ad0963714d901ea086f3d9650dbf2f0f6af5b0a4

    SHA512

    865649dcbf49c42192322d273b47c2cb8f53d636581399f24d953b8fd33622eebe7006f34ca650572670659af19453fa7f0ff5e26ed044a18914466d5996ef8b

  • memory/716-177-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/716-275-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/716-276-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/776-447-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/872-348-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1672-315-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1672-262-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2192-221-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2192-266-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2192-265-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2240-112-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2240-458-0x0000000003880000-0x0000000003E7F000-memory.dmp

    Filesize

    6.0MB

  • memory/2240-343-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2312-412-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2524-350-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2524-351-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2652-176-0x00000000039C0000-0x0000000003FBF000-memory.dmp

    Filesize

    6.0MB

  • memory/2652-126-0x00000000038C0000-0x0000000003EBF000-memory.dmp

    Filesize

    6.0MB

  • memory/2652-419-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2652-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2652-100-0x00000000038C0000-0x0000000003EBF000-memory.dmp

    Filesize

    6.0MB

  • memory/2652-259-0x00000000038C0000-0x0000000003EBF000-memory.dmp

    Filesize

    6.0MB

  • memory/2652-98-0x00000000038C0000-0x0000000003EBF000-memory.dmp

    Filesize

    6.0MB

  • memory/2652-220-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2652-125-0x00000000038C0000-0x0000000003EBF000-memory.dmp

    Filesize

    6.0MB

  • memory/2652-113-0x00000000038C0000-0x0000000003EBF000-memory.dmp

    Filesize

    6.0MB

  • memory/2652-111-0x00000000038C0000-0x0000000003EBF000-memory.dmp

    Filesize

    6.0MB

  • memory/2672-268-0x0000000003800000-0x0000000003DFF000-memory.dmp

    Filesize

    6.0MB

  • memory/2672-99-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2672-260-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2672-459-0x0000000003800000-0x0000000003DFF000-memory.dmp

    Filesize

    6.0MB

  • memory/3012-127-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3012-433-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB