Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/11/2024, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe
Resource
win10v2004-20241007-en
General
-
Target
1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe
-
Size
56KB
-
MD5
3bbe4ee2006f6b8cb2edfbee89c8ba78
-
SHA1
df12fe7fc506d37545914ddd10f11e22abfb1a03
-
SHA256
1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2
-
SHA512
ae7c1fd95244d73585e58d074e1aeb61c9db532e58da129fd44862178b886bdcb0d580f0d9458d3e909988e69e09a7c3b2ad8afafae8c4383d0b624ffea5cecc
-
SSDEEP
768:VNuG777/+V36n9PcXYvn8KR1I3NznRAQZlh4VkpX179r+R5gOwekf:V8w2VS9Eovn8KRgWmhZpX1QNw
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" imoet.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Tiwi.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 35 IoCs
pid Process 2672 Tiwi.exe 2240 IExplorer.exe 3012 winlogon.exe 716 Tiwi.exe 2192 Tiwi.exe 1672 Tiwi.exe 2272 IExplorer.exe 1028 IExplorer.exe 872 Tiwi.exe 2512 IExplorer.exe 1712 winlogon.exe 2328 winlogon.exe 2496 winlogon.exe 2524 IExplorer.exe 2196 imoet.exe 2784 winlogon.exe 2544 imoet.exe 2816 imoet.exe 2156 cute.exe 2964 imoet.exe 2140 cute.exe 2684 cute.exe 1616 imoet.exe 2312 Tiwi.exe 2304 cute.exe 2776 IExplorer.exe 2936 cute.exe 2764 winlogon.exe 776 Tiwi.exe 376 imoet.exe 2488 cute.exe 2068 IExplorer.exe 2060 winlogon.exe 1100 imoet.exe 268 cute.exe -
Loads dropped DLL 53 IoCs
pid Process 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 2672 Tiwi.exe 2672 Tiwi.exe 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 2240 IExplorer.exe 2240 IExplorer.exe 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 2672 Tiwi.exe 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 2672 Tiwi.exe 2240 IExplorer.exe 2240 IExplorer.exe 3012 winlogon.exe 3012 winlogon.exe 2240 IExplorer.exe 2672 Tiwi.exe 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 2240 IExplorer.exe 2672 Tiwi.exe 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 3012 winlogon.exe 3012 winlogon.exe 2240 IExplorer.exe 2240 IExplorer.exe 3012 winlogon.exe 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 2672 Tiwi.exe 2672 Tiwi.exe 3012 winlogon.exe 3012 winlogon.exe 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 2196 imoet.exe 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 2196 imoet.exe 2196 imoet.exe 2196 imoet.exe 2196 imoet.exe 2196 imoet.exe 2196 imoet.exe 2156 cute.exe 2156 cute.exe 2156 cute.exe 2156 cute.exe 2156 cute.exe 2156 cute.exe 2156 cute.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe -
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" Tiwi.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe File opened (read-only) \??\U: 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe File opened (read-only) \??\Y: winlogon.exe File opened (read-only) \??\M: imoet.exe File opened (read-only) \??\T: cute.exe File opened (read-only) \??\J: IExplorer.exe File opened (read-only) \??\E: 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe File opened (read-only) \??\R: winlogon.exe File opened (read-only) \??\U: cute.exe File opened (read-only) \??\G: IExplorer.exe File opened (read-only) \??\P: Tiwi.exe File opened (read-only) \??\H: cute.exe File opened (read-only) \??\O: cute.exe File opened (read-only) \??\R: cute.exe File opened (read-only) \??\Q: Tiwi.exe File opened (read-only) \??\R: Tiwi.exe File opened (read-only) \??\T: Tiwi.exe File opened (read-only) \??\U: Tiwi.exe File opened (read-only) \??\Z: Tiwi.exe File opened (read-only) \??\U: winlogon.exe File opened (read-only) \??\B: imoet.exe File opened (read-only) \??\E: imoet.exe File opened (read-only) \??\Y: cute.exe File opened (read-only) \??\Z: cute.exe File opened (read-only) \??\N: Tiwi.exe File opened (read-only) \??\H: winlogon.exe File opened (read-only) \??\T: IExplorer.exe File opened (read-only) \??\Q: 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe File opened (read-only) \??\E: Tiwi.exe File opened (read-only) \??\O: Tiwi.exe File opened (read-only) \??\T: imoet.exe File opened (read-only) \??\Q: IExplorer.exe File opened (read-only) \??\T: 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe File opened (read-only) \??\L: winlogon.exe File opened (read-only) \??\W: imoet.exe File opened (read-only) \??\L: cute.exe File opened (read-only) \??\S: IExplorer.exe File opened (read-only) \??\P: 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe File opened (read-only) \??\S: 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe File opened (read-only) \??\S: winlogon.exe File opened (read-only) \??\X: winlogon.exe File opened (read-only) \??\E: cute.exe File opened (read-only) \??\V: cute.exe File opened (read-only) \??\M: IExplorer.exe File opened (read-only) \??\R: IExplorer.exe File opened (read-only) \??\U: IExplorer.exe File opened (read-only) \??\J: 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe File opened (read-only) \??\L: 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe File opened (read-only) \??\Y: Tiwi.exe File opened (read-only) \??\B: cute.exe File opened (read-only) \??\N: cute.exe File opened (read-only) \??\W: cute.exe File opened (read-only) \??\Y: 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe File opened (read-only) \??\M: Tiwi.exe File opened (read-only) \??\W: Tiwi.exe File opened (read-only) \??\P: winlogon.exe File opened (read-only) \??\O: imoet.exe File opened (read-only) \??\H: IExplorer.exe File opened (read-only) \??\N: IExplorer.exe File opened (read-only) \??\J: cute.exe File opened (read-only) \??\P: cute.exe File opened (read-only) \??\Z: IExplorer.exe File opened (read-only) \??\J: Tiwi.exe File opened (read-only) \??\G: cute.exe -
Modifies WinLogon 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf IExplorer.exe File opened for modification C:\autorun.inf IExplorer.exe File created F:\autorun.inf IExplorer.exe File opened for modification F:\autorun.inf IExplorer.exe -
Drops file in System32 directory 40 IoCs
description ioc Process File created C:\Windows\SysWOW64\IExplorer.exe cute.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe cute.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr imoet.exe File created C:\Windows\SysWOW64\shell.exe 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr cute.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe imoet.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe imoet.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe cute.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe Tiwi.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\shell.exe 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr Tiwi.exe File created C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr winlogon.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\tiwi.scr 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe File created C:\Windows\SysWOW64\IExplorer.exe imoet.exe -
Drops file in Windows directory 26 IoCs
description ioc Process File created C:\Windows\tiwi.exe IExplorer.exe File created C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe cute.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe IExplorer.exe File created C:\Windows\tiwi.exe cute.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe imoet.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe Tiwi.exe File opened for modification C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe imoet.exe File created C:\Windows\tiwi.exe 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe File created C:\Windows\tiwi.exe Tiwi.exe File created C:\Windows\msvbvm60.dll IExplorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe -
Modifies Control Panel 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\s2359 = "Tiwi" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Mouse\ IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Mouse\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\s2359 = "Tiwi" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Mouse\SwapMouseButtons = "1" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\s2359 = "Tiwi" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Mouse\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\ winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\ cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Mouse\SwapMouseButtons = "1" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\s1159 = "Tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Mouse\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\s1159 = "Tiwi" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\s2359 = "Tiwi" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Mouse\ Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Mouse\SwapMouseButtons = "1" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" cute.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\ Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\s1159 = "Tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\s2359 = "Tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Mouse\SwapMouseButtons = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Mouse\SwapMouseButtons = "1" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\s1159 = "Tiwi" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\s1159 = "Tiwi" cute.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\ 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Mouse\ 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\s1159 = "Tiwi" imoet.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\s2359 = "Tiwi" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\ cute.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\ IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\ imoet.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\ 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Mouse\SwapMouseButtons = "1" imoet.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\International\ IExplorer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" imoet.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\ 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." cute.exe -
Modifies Internet Explorer start page 1 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" IExplorer.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} winlogon.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2908 Notepad.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 2672 Tiwi.exe 2196 imoet.exe 3012 winlogon.exe 2240 IExplorer.exe 2156 cute.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
pid Process 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 2672 Tiwi.exe 2240 IExplorer.exe 3012 winlogon.exe 2192 Tiwi.exe 716 Tiwi.exe 1672 Tiwi.exe 2272 IExplorer.exe 1028 IExplorer.exe 2512 IExplorer.exe 1712 winlogon.exe 2328 winlogon.exe 2496 winlogon.exe 872 Tiwi.exe 2524 IExplorer.exe 2196 imoet.exe 2784 winlogon.exe 2816 imoet.exe 2544 imoet.exe 2156 cute.exe 2140 cute.exe 2964 imoet.exe 1616 imoet.exe 2312 Tiwi.exe 2684 cute.exe 2776 IExplorer.exe 2304 cute.exe 2936 cute.exe 2764 winlogon.exe 376 imoet.exe 776 Tiwi.exe 2488 cute.exe 2068 IExplorer.exe 2060 winlogon.exe 1100 imoet.exe 268 cute.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2672 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 31 PID 2652 wrote to memory of 2672 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 31 PID 2652 wrote to memory of 2672 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 31 PID 2652 wrote to memory of 2672 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 31 PID 2672 wrote to memory of 2908 2672 Tiwi.exe 32 PID 2672 wrote to memory of 2908 2672 Tiwi.exe 32 PID 2672 wrote to memory of 2908 2672 Tiwi.exe 32 PID 2672 wrote to memory of 2908 2672 Tiwi.exe 32 PID 2652 wrote to memory of 2240 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 33 PID 2652 wrote to memory of 2240 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 33 PID 2652 wrote to memory of 2240 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 33 PID 2652 wrote to memory of 2240 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 33 PID 2652 wrote to memory of 3012 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 34 PID 2652 wrote to memory of 3012 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 34 PID 2652 wrote to memory of 3012 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 34 PID 2652 wrote to memory of 3012 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 34 PID 2652 wrote to memory of 716 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 35 PID 2652 wrote to memory of 716 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 35 PID 2652 wrote to memory of 716 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 35 PID 2652 wrote to memory of 716 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 35 PID 2672 wrote to memory of 2192 2672 Tiwi.exe 36 PID 2672 wrote to memory of 2192 2672 Tiwi.exe 36 PID 2672 wrote to memory of 2192 2672 Tiwi.exe 36 PID 2672 wrote to memory of 2192 2672 Tiwi.exe 36 PID 2240 wrote to memory of 1672 2240 IExplorer.exe 37 PID 2240 wrote to memory of 1672 2240 IExplorer.exe 37 PID 2240 wrote to memory of 1672 2240 IExplorer.exe 37 PID 2240 wrote to memory of 1672 2240 IExplorer.exe 37 PID 2672 wrote to memory of 2272 2672 Tiwi.exe 38 PID 2672 wrote to memory of 2272 2672 Tiwi.exe 38 PID 2672 wrote to memory of 2272 2672 Tiwi.exe 38 PID 2672 wrote to memory of 2272 2672 Tiwi.exe 38 PID 3012 wrote to memory of 872 3012 winlogon.exe 39 PID 3012 wrote to memory of 872 3012 winlogon.exe 39 PID 3012 wrote to memory of 872 3012 winlogon.exe 39 PID 3012 wrote to memory of 872 3012 winlogon.exe 39 PID 2652 wrote to memory of 1028 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 40 PID 2652 wrote to memory of 1028 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 40 PID 2652 wrote to memory of 1028 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 40 PID 2652 wrote to memory of 1028 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 40 PID 2240 wrote to memory of 2512 2240 IExplorer.exe 41 PID 2240 wrote to memory of 2512 2240 IExplorer.exe 41 PID 2240 wrote to memory of 2512 2240 IExplorer.exe 41 PID 2240 wrote to memory of 2512 2240 IExplorer.exe 41 PID 2652 wrote to memory of 1712 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 42 PID 2652 wrote to memory of 1712 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 42 PID 2652 wrote to memory of 1712 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 42 PID 2652 wrote to memory of 1712 2652 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe 42 PID 2672 wrote to memory of 2328 2672 Tiwi.exe 43 PID 2672 wrote to memory of 2328 2672 Tiwi.exe 43 PID 2672 wrote to memory of 2328 2672 Tiwi.exe 43 PID 2672 wrote to memory of 2328 2672 Tiwi.exe 43 PID 2240 wrote to memory of 2496 2240 IExplorer.exe 44 PID 2240 wrote to memory of 2496 2240 IExplorer.exe 44 PID 2240 wrote to memory of 2496 2240 IExplorer.exe 44 PID 2240 wrote to memory of 2496 2240 IExplorer.exe 44 PID 3012 wrote to memory of 2524 3012 winlogon.exe 45 PID 3012 wrote to memory of 2524 3012 winlogon.exe 45 PID 3012 wrote to memory of 2524 3012 winlogon.exe 45 PID 3012 wrote to memory of 2524 3012 winlogon.exe 45 PID 2240 wrote to memory of 2196 2240 IExplorer.exe 46 PID 2240 wrote to memory of 2196 2240 IExplorer.exe 46 PID 2240 wrote to memory of 2196 2240 IExplorer.exe 46 PID 2240 wrote to memory of 2196 2240 IExplorer.exe 46 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cute.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe"C:\Users\Admin\AppData\Local\Temp\1d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2652 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2672 -
C:\Windows\Notepad.exeNotepad.exe C:\Present.txt3⤵
- Opens file in notepad (likely ransom note)
PID:2908
-
-
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2192
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2272
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2328
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2544
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2684
-
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2240 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1672
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2512
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2496
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2196 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2312
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2776
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2764
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:376
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2488
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2156 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:776
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2068
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2060
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1100
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:268
-
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3012 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:872
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2524
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2784
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2964
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2304
-
-
-
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:716
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1028
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1712
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2140
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1616
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
729B
MD58e3c734e8dd87d639fb51500d42694b5
SHA1f76371d31eed9663e9a4fd7cb95f54dcfc51f87f
SHA256574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad
SHA51206ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853
-
Filesize
45KB
MD5d2ce1be7833ebbf23d3f3d3e25a9f97b
SHA16dab53fc1dc7dc9fa3ee2b5c6ae63eaed6bf83b0
SHA256c33e7394721b01357bdb350ee242fd787b3efd550b43e0fa5b77df3fd081198a
SHA5129c62245d43ab33152d501313dc016a7f7b4e2d01986973f25b17cdbcab3c6106818b8819bc78bf25f4c2ef7bbaf1f4e3ec2ba7bc36ab95b86e96b4be92a34b85
-
Filesize
56KB
MD5838f978efdd3fa36f0eb27b4b6df3bb1
SHA1a6ca9f57a59cdb9e302b24154f60fb7ec970af49
SHA2560cee604640e7016fedc9e2d2fab9bff8b52fdc728578b8520cad32a46009f60e
SHA512db9e2bb7a793bf1d25e0f6f16df6cdb8b349c1d23665c8239bcbd137c55a9ad78a6853e0b68afc79d5ad2e469561fa808137e06832dfefbe88c410969425cb37
-
Filesize
56KB
MD57a4d557ca3575cf50a36c4f402e9da59
SHA1915321bdc6d5730added51a9bcd3b6b64c24f62d
SHA2569d936d0a3fcd6bcd102f3433aa2e42c34373568669ffc641ee50d6127100c0a0
SHA512b77662f97118ec3246d826387cbf9904ef453779446fafebbf7d17c9485f59719475b0a688cc26e9ac84828a5d9683c2cd5d0233d3a61fb66ddd9b7ecd02aec0
-
Filesize
56KB
MD545e91bba6fe15366e2bdde4132000488
SHA1c5fee08c5d5d742b8defba3fc409f7b27b9af3ff
SHA25626838f42c57002378c74ddf07c39d51fe98ef8cd2d4db6ab4c41866172f81164
SHA5129451677d2a6f46aa9edd438e5902223d0dcdafdaaf16357f844ea335c6c47b4dbd6d82777b7242b39493a5bbbaea3479cc59f92bdba173e71040776899531eb5
-
Filesize
56KB
MD5bda3594b9fe0d2f371006a665861e007
SHA1909de87ab7b06d0d33c8375b0afa5c02cb35ec8a
SHA256963e333d13e365a68d972a67d71c7ac4eaa90f734e7f7172e778d28310ec2de2
SHA512fa7fdf716f49742dc6892b9249ac08ef3647f4c5074150710e75c51f9b6fc5df59e9450b019142bb3b3cd99113660cdf3f0a5bbc5e000ecca1585a9cba311967
-
Filesize
56KB
MD575a33f5fb66e3be22dcda7d85fd13de6
SHA13dcacc36edf74b1bd83d8178e2476b7b5a34898a
SHA256bad5bb5058e7d50f8c9bcdb343f787b0ea397a317507931511b657af0549d345
SHA5128a8b9e7c82c0b981a7d06cc66b10543a84c58f0ffbb8909eaffd88da1451b0274bb7bf265979d1cd38de37db82b9531e2e55ff6c88eef2ccbe11b39a58c568be
-
Filesize
56KB
MD524a999e0347b640532b45bcbaf04bf61
SHA12310862be12e17358cdda79eb27178f727f93fa8
SHA256bc55ac4758efdfc619febf788928245f0ecab1d8f063b540e40755920ebd0952
SHA5127e753c02ec1dc54aaf8a7a02a5dc572c8b33e4e4c495f2bfcd75ef20437d7e3162f84f45c7d6428f06b77a1ac5b0498b78f89723eb7501b695630df1bdf908ca
-
Filesize
45KB
MD555d25d8b396f7a5fdad3a85fff983d44
SHA1b5d5d3c110f99020b132fd11ca690b95a461317a
SHA25671b30db9c3533b816ddd79928daee659c1eb8112f8ac736a1b57bbcb21b238b3
SHA51270d60cd20a2883bd40360626e49ab2b4a724c10656023576418715af70f6d26e5f8ccc2ae5fee97bdb375c889b53abaa6638b711385e71ae0f1a6d5f67578b24
-
Filesize
45KB
MD51fd3893dfe691daae72e15dc55e1a246
SHA1900654767071c7ee4e7699be218535b599ccbb1a
SHA25690ac41a9f581ee13ddd9973b209aefe85524ee0b81be875d53555124e07138dd
SHA512c25a1ef61df2dbca35abe63b937d1c419188a813dae148229109f03a02de3e8c1c79d311c819c433b6bfd30d0a92d244d0bff8c489d60d3ea0e7200f5d4a9786
-
Filesize
45KB
MD53fb99b76be15af2a4e280bc67d442fad
SHA1bc3848d44bd287cfa1e01f53adea5793ea41d80f
SHA2565f279d06804db2c353eb56bdda5711c57114d7819be5673e012d0e55efcf5c69
SHA5128e7a890910e44d390fecb254cfd49e56488bf1b8efcccf6abf5747f51476ac29004ee0769fcbe60b0e7eae0a763bce5e8e59c99ca769b50df34e4d7198674353
-
Filesize
56KB
MD510140b2beb1f44723bb60e32da6538fe
SHA1425bf27d040ae3e5eea47cecd0659d053422c812
SHA256f9147c9e42ebbff8c23b30b471229956d3373ad17733a4c82a1f875ec8e98234
SHA5123831d89d14620e9ad128e545dbb99d250820ec51e8aec60db4668d3c314abfee67b5b97fb4e453ea6057e5ea64f574bcc777dc536fb804f2cff3bccb9c4283a0
-
Filesize
56KB
MD5d6d307580a98f788c7259e12a8c705b3
SHA117d2b78ba5cc992329af8aa4e55d688d4360877c
SHA2569bd76b82c92fab082c0e5e6aeea8cb207a63a015bd14d0d2274d651b0e46e046
SHA51291b291425874c8846b1ae8dba2366bc4dc00d6b98606ff7154102d7f2e3f86d45553c0b5cc44160d6fc19c07ac825581a66a6b1c2e03b4fea756ebf68d1c9fea
-
Filesize
56KB
MD52bab9437df2d85089179713ee24b6c50
SHA140cfd4162b3793b80db8d4216db011e1ffa67822
SHA256f630b019af8dfc2d71cdb92bde83466d7aa8926d1d910f4bc788c85303067df9
SHA512d46811702b1ece659eda5685b53703fa526bfe2dd2b5677205959aac91532ee7539e4b51f43acbfc9a0e7641ea965b73265eb217939d5585d57a280ac3df7c97
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
56KB
MD5eb8e35db53f1f578d1ad982d471db89e
SHA199d17c2e0e9023d87d57cd6af786249ffd5373d6
SHA256f7052a55464ceedb0ee8f322336cb016ec6431b20069201b9bc54eb75e8c2342
SHA5121832e67d25c98a55300b12dbd1296359688561b8a8bc0103bf15de939b9147ace8b01a1f67faa92c0d0becc84489b4cfc0b2b0f520ac416930a4752378d07abe
-
Filesize
56KB
MD51d667e125929f269c865c4449797b75a
SHA1aeb628f2f8334fc206466b267147c4f8a1f3284d
SHA256e160531785ff9425adef8f452fa0cb0f98a8da7b6c0b54aa3a42132f9572e3cb
SHA512a1140b3729b7a2fa26ef4078ce012a33c8a895930240104c37ae6ac9617e61cc96559a8605fd47994e1e4a16761b0e936ef9ca9b9024c6f2d6ae6f9c33b26a46
-
Filesize
56KB
MD543df13380739104d3673df5bb0f06d53
SHA16e9a5fa571c4f5a3f0b4ef7b3203cdfc88861119
SHA2562e706e089ca3ec8d342faab8310249af253619481d39e7cdc3e2f83fc51ddd94
SHA5122ceed08be490ab0baff0624a6423ba7ab95bad3ff898395b02534663c6c956521bcf8d55d6824608c3eb1364976ee9f1edb4518bed39f0af25cc6ba42dcf6aac
-
Filesize
56KB
MD53bbe4ee2006f6b8cb2edfbee89c8ba78
SHA1df12fe7fc506d37545914ddd10f11e22abfb1a03
SHA2561d2e260843d8d2274a19155efcbd59c84c3540743d6975dbdf781575114f07c2
SHA512ae7c1fd95244d73585e58d074e1aeb61c9db532e58da129fd44862178b886bdcb0d580f0d9458d3e909988e69e09a7c3b2ad8afafae8c4383d0b624ffea5cecc
-
Filesize
56KB
MD5d0671471e58b0eb39d23369257da0431
SHA1a7a779cd4069436fc348035a650b145ab54aada3
SHA256f0681f82fefd61d250dd7dd36fe3b1b9b72a079b5d813b250b648fd972e1e9bf
SHA512b8ab3207ceb1fcad2f4bb2ec2cf8436a3de44eb9d83bc947427d847e836b360056b9b8d946f44ca0a13bbaf09901a23c72b8b6d6d1b9b3d1dcdd0db1f4753b6f
-
Filesize
56KB
MD535a8d710268753aa798d82a3d0fef223
SHA1c75a77bbb3bb1635d1e8c992328bc4c76b7e2bcb
SHA256bda380c9da3cb82e87c2a5a1916b647de47031e58fb1464e0ea50e7150c3df24
SHA512395f17d7468a198e6b2b3aaf5e1354c8873597732bccd60c449b274468dc5dd751e94e4cc1ea06ae62f9560238408bf4843a6217d5d52008d577ef008f40df69
-
Filesize
56KB
MD591656450ff0c2984dad567e400c30f7b
SHA17cd7ce7bd2c626da002bd3de41676292f6b44342
SHA2568350fc0844bd01a71d235a0e2762053c0529f145215fbedbc5ee0b904416806b
SHA512f198a5d70ee7e8098c5b8b0034155d92c982026bc17e2de6483a5e3c0614ba75b991fc0f90d27ec2c94b001b3a7bc89e93b43588d6b0bd16ec30605ad864e3d0
-
Filesize
56KB
MD55ee967ee4d64e58a3280e844cf943f11
SHA149c9f72fe8017120a72945d1d4b61a1527e9ca5d
SHA256d43fc3f65393e0ac7c8e942aa030eac322af8ff297fed4edf40132a647ea4e7d
SHA5127b259ea4c406e91904a4688bd28a9f7e32b701a74ae7de8414b7751db8f4ebf6a313dc4fc3e129e8b2db7cecee1a4788ba04b81402e7fc460b3caf6fe9642216
-
Filesize
56KB
MD574777498173490a7f299abe52cbc097d
SHA136ac05b59d5f0c0a467439558354ee132b71a5c4
SHA256e01ede0ed1f1f10fdc6581ded228a64f5d37385ead04ad0fd936ca46d4efd8a9
SHA512f379832b303f53aaf5d50aea665462f8efbf7442a7fb71cc33adf1feda9e54057596cbf761cdcd8bd42809a558dd061fe27afde41c9845545b8c73bb509cd45f
-
Filesize
56KB
MD5acf97942e5da3b6ada0d56da64a1f275
SHA17bf5ebd4c036622ef7ec2ad6b55cd30d302c11d9
SHA2566cf4aea1cae308c1f9ba12dbe8b575313afd052a32422bbb34b486622c6c75b2
SHA51242fcc819f7e7bb4ef5b54047fea8594a21e66c0495ff42eecec304e7ef141266de0ca977f68415a69fb25089c5e8cd516949c18566c070b1397ac1cb8d2c9b86
-
Filesize
56KB
MD5e10568406bd8d0c741b2fef168a6a2f5
SHA1f0e60ae532456106a8e7c0e9ce116658a0e5846f
SHA256e4edc1c8e475fe506c8d7b7b32d95b41ee1e15ec35e1ee781ed2a40b1362961b
SHA512f930e511e8947665976540ee47f80c07ce4884ffd8e713b62809dbee104f96a5bfb4c926150bb010baf6b26bfa10e9bf376594a5104c84e2d9d0a5889480640d
-
Filesize
39B
MD5415c421ba7ae46e77bdee3a681ecc156
SHA1b0db5782b7688716d6fc83f7e650ffe1143201b7
SHA256e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e
SHA512dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62
-
Filesize
56KB
MD5bec3b4e7c898947ccca2ef459e938875
SHA1a0de45f7f1530ec2808911b8e98d8b77275e0921
SHA256353e889a423ff5f69042186001968fa3f253d3adbb19bf03df5f71462ae8ddea
SHA51274818d23682e6f7cd28a9479258209b14230e77da9faa8c4bc6e12b2054361bb7b6260406c53393f52de7eda13221ba0aa9adb5b119b632ca28671a35c369eae
-
Filesize
56KB
MD50a89a132dd67988fa675d6e31682fd53
SHA14d9165b510cf84c30fd2baf69af331a80780e206
SHA25678b04d0f9036f548996596f0ad0963714d901ea086f3d9650dbf2f0f6af5b0a4
SHA512865649dcbf49c42192322d273b47c2cb8f53d636581399f24d953b8fd33622eebe7006f34ca650572670659af19453fa7f0ff5e26ed044a18914466d5996ef8b