Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2024 01:24

General

  • Target

    98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe

  • Size

    64KB

  • MD5

    339ed763d4978b08c3ee73e7c888f2fc

  • SHA1

    64bcd6d5d27f123531d7b1f9a23db45fbc04b490

  • SHA256

    98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1

  • SHA512

    5207562db4a104cf52b35cc94de57dc386801baa457adb72398a67068f07db41152df2a5ac81dc2d06baf70d3db730d38b4053868f2d44bf9628716037d01b54

  • SSDEEP

    768:VNuG777/+V36n9PcXYvn8KR1I3NznRAQZlh4VkpX179r+R5hOwekflNuG777/+V2:V8w2VS9Eovn8KRgWmhZpX1Q8wJ8w2V2

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 53 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe
    "C:\Users\Admin\AppData\Local\Temp\98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2348
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2792
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1780
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:620
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2108
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2788
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:2948
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1388
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:3020
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2408
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2252
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1808
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2592
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1004
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2936
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2704
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1068
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2928
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2456
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2296
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2464
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:824
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2772
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2692
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1976
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2548
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2784
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2824
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2744
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3028
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2216
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1376
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2144
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2820
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2816
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    ed9adc841380142609d298b3d7924997

    SHA1

    dba2ed2da39f1205ab735c12258874af942d5c90

    SHA256

    de99da12fd7aa34116baf1598a5151c1e3d89b98ab4b7d1f020d01b42de41504

    SHA512

    7e922d21dccd6c11fc9434d7eb9a4f1ec99b73368e706af0c39fb875b05c924aa0784a0ae9754b02aa2dd80f7c8b4f5ae32e066f3fe5f42de93e36b80d97b75f

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    64KB

    MD5

    d53ef75c4756d63d1aa601a59b9a8997

    SHA1

    90a1f45eca11f5906c84c3f3d1e015a4377fccff

    SHA256

    20b9136cc67197909f31d8ed4aacaf9c487d2d76f343bd3b30768c4ac9cacf6f

    SHA512

    fc11815026282338bf93ec3b913f033ed14ef7aa2b24c273985edf7223883f2071444e85456cbb9eefda83971ee5005acdd627c0122c6d6a829275762e11219b

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    64KB

    MD5

    b400c025e51329d4395a22b572cb28ab

    SHA1

    3228f68ecb97da5af5d21e6c8f9d13048ef449ec

    SHA256

    4577167a55f2666e5e19ba4ae80eb561a32c690091960a690b157d9ffbc465ff

    SHA512

    46e1a109c95477da79e523f541a39cb5843837ae296df07094bc95c9b1c6f799f165fa296ccf63dc729ceba09aa53cf5740a20eb7a199b2e0719e7118878db3d

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    64KB

    MD5

    53ddc857b600fe0b122d426b7cb1f438

    SHA1

    a5d1486efac2f4b92ad9d8392eb3843c01f8687b

    SHA256

    68f888036336586defeb04a082bb9d91a51ab7d64c0d6e34599d9f94fbb3c53e

    SHA512

    2032e7bbecbf757d657d422b15be0abb9f940542ad795c75c499351470ed31df620143c68a8e8efc5a80f71d83e2e9a3084b32e1abbdbef70205a722e3709a51

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    4b7824d99257d152783fc5259e95b856

    SHA1

    35531348653a2a3ec870813d111a1addc0e0f67e

    SHA256

    be1803f05f2823ec5230a3cb6fa69330cbb984f273182875982137457d603dc3

    SHA512

    cdae585d2c2a2782b3be89c7caddb747145e3fe175ee2521be18fae1c255346d3c177aa0c4c0ca4bda22495842e381e43b99915e72a8ad937620297c41e2721f

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    e11fd41b3b170630344c3ee57ff67ccc

    SHA1

    42a533584a28cd5a0fa684e819177f4166be14ae

    SHA256

    8de76a5305b9bcb10e35249f01a5f314ef900812013662b7a262e4cc02842f25

    SHA512

    3df57c25ab7e6463036f29b663638c6c6422b5347c7c4b5e47845be2c4e2bbb413c8d17460348a45ff6c3271c3b091cf392d8be9722968ef10156750d6c73b38

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    4e577faf7f9e52d976b2e9a65a44ee01

    SHA1

    500d374a07135e1bbe4da891a6a69e406ca92acb

    SHA256

    f89372937d5a165515e8e654dc119f209aa24026251e5c43a51f686305c628d2

    SHA512

    1a5cf278c3f964cc21b19be5ecb1406bfd3686fe2c15e20117d1305de6511163e8fe8d021596710205e91db7cc51565ae89de77bd8177f3ce01a40abf4e83e20

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    692d3b679af00140846c0c0ffb733e9a

    SHA1

    1b1997666fdc705f39f206bf0bad1218e79ff227

    SHA256

    4b91b12db74155562bd8a92155427e984383d7256baa28424c94dff7ac943e11

    SHA512

    97df4f79da221afbc02dea629db19a23c2b62528a8cef2d1184e0446117bff22a19fe7c9ae933f00ef7b67c7bd4339e7d2d0f08c9312893e198f5433dc3d9344

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    64KB

    MD5

    92b9be78e7c2ffe9e91c6cbf706937c3

    SHA1

    e8b567aa2fcae4712ad44813c22681d7bed60784

    SHA256

    c18dfd58516645fe9e1096c3db107c34efb6739ec03029dd933f218e524b55c2

    SHA512

    b225a311e36afcae294a16280c0539e50b96bd6411fccc6e900685c4afdd21e10ef4ab78873e59b7eae7f6f221af4c31742949dd4e66ed093c928ff3b2b6b5ab

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    64KB

    MD5

    73bec3baa97073e2e17cf20c17d5d20f

    SHA1

    809dded75e8b3692003b9e81c7fd874339760b4c

    SHA256

    720e46fac4149259684d7d58999edd930439a7a24880c45a74ccfe188258cd53

    SHA512

    66ae56f0636ab9e129b99da41de0be784822c05cb600312b3ce2c7c9ba55589dfb21f58d505c05a8f28c523347f83891099b01dfd19c0e9a879d0288148895c4

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    64KB

    MD5

    53cca7bf8a273afcd00fd3f3f708d1e2

    SHA1

    ceb774d5b9b855f639c13afdd2474e8b2f9eea67

    SHA256

    aad1ebf0b030dbf5dc186c68f259b993a7fb6040062dddd47a829e38fca8d786

    SHA512

    57c1b734cd066f83dace0225a87eb6469c096b0236ef4b464234ff8bb5ed3c752c851097c0352dd806fb1123941cbfbea7f89e5e39bb8eb4bcb779b6776c5117

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    64KB

    MD5

    9043c3f10e8e0ef9277c05a3de0b458d

    SHA1

    f26b22f361e7947b7d148e67d64cce821af25251

    SHA256

    706891439c8b334e35a0e9130f5d3f8553edb355c3fad39fdcf5279ed9b70bce

    SHA512

    c4ad541510d23f2e654c05c93bae81c1d33b7bbc55564362d5f9620f47d95fb12e0e21b958d76751f940f7dd5b18459e05d7f7aa7de72e96c994bf46c9b375c9

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    64KB

    MD5

    ca68a815170ca2d2a2c4a3f4e5a74653

    SHA1

    9e55a057d0fbbe3df427d096fa596cbe644ebf0f

    SHA256

    74f9842ab4907b596f100fe04284ec33a06ab595e8bc2fcc5a376ea50fa974d2

    SHA512

    dc01962fb17d99b6d64ea7b008fccb7fef25ff2fb64c7bf105bde74c879406f5c0757c3cf3a6e4786afe219da37053a9086bf4afcfef865926b6594656349ebf

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    64KB

    MD5

    5c3abceef0a48a1d667366c6f1faf45c

    SHA1

    d7420140f5dd63a0efa58b3996b544864b7e88cf

    SHA256

    fb8a081c44d3cc1c6b4b1299bd2198ca05a23a2d2caae6160670370ec75df24b

    SHA512

    90d6d1d0cb4173078c559d9c0d141b276f1f75341fdc26b38b55906c4951380738150aec84c423e43272203b31f77051329aa44f3cb8ed07360950c70db2496c

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    64KB

    MD5

    b68bcc562fe344ab295447ec089e756d

    SHA1

    c34e812605c3d382b63c9071f6891ce326ff140f

    SHA256

    5560f45b9d59ebcda819429f63ec82bf0f008306d2f4f0683652b1e474690bcf

    SHA512

    283fdea482ebf7527bd731f9c8ce30837e58329a5b1dd313e308a9139b3264c7d22cf0d8d1d3ac5b48ad88ded6cfda435b29c79dc29c3ac8d86bcdc13da99537

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    64KB

    MD5

    7bdf41f548953eec55d0c34f83426da1

    SHA1

    d989770d01c853506eaa22e312cc8a314edc7e97

    SHA256

    fc79122321ca0ac3f1c4686eb6ed87902efefc79ee90825370c24f6417db0432

    SHA512

    813a6b178fb9322b8a40868864d06a8c102d314690e99275f378200b783b7ca7d28d77b3a6d21761fe4582c6dca3329daf2e6b29d5c86e655fe59b9830451226

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    64KB

    MD5

    339ed763d4978b08c3ee73e7c888f2fc

    SHA1

    64bcd6d5d27f123531d7b1f9a23db45fbc04b490

    SHA256

    98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1

    SHA512

    5207562db4a104cf52b35cc94de57dc386801baa457adb72398a67068f07db41152df2a5ac81dc2d06baf70d3db730d38b4053868f2d44bf9628716037d01b54

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    64KB

    MD5

    fa9dc3a95d8ebdf80b9983330425794a

    SHA1

    b023a0a9aea52e7fbade21b367d2730246c4e549

    SHA256

    13a909aa749722c4ba7cab10fa230729f3b08d82c7e6a37c63b107f3b2e8f699

    SHA512

    3b886a1a4d1b48966df1067f5b925f95e3aa0f8950cba73276be1121e32baa07a8ab7748da3d7f40737b3a7c44fe6bf23f40161cae61ef9071e757e75937b844

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    64KB

    MD5

    24c3ad9b39d3deabf85707bcfcc40d1d

    SHA1

    d3b165e8a6f031c3872d513ea2f76cd5a4a8a530

    SHA256

    d9f34486b82abb43bd18bd321a61c74497e1717103913a562bef57d63c57fa68

    SHA512

    f4fc6f39090437ee37e2c47c621505b62a5b47f8ff08a748d4093d6ebe3d7ab922799cc1b403635c942d54ec18011653f3a8c69a0e668d63a64622c399c2a79f

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    64KB

    MD5

    3d7c0c1e7ecb180f8edffbde2179eed9

    SHA1

    241f69056003018d8eb2f0ecc8d8d6e9dcfce850

    SHA256

    412ba4a42a61fd5e64f4b7627ee748316e2090593d9879fa2b35abd46ca40eed

    SHA512

    c66b86bf1965645a262afb46f2a446b17e7bc9e33e26bf07002e4a22dd166957f0f48ea5445edb3145c6ba70851b9b06d079d82d8678d2ba5bde7d0159db2749

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    64KB

    MD5

    97c5b0e30bf14d49aa34f68becc6bf62

    SHA1

    9c2b976892c111fc72225c4133a9a024dffb6853

    SHA256

    9c74ddde946977eabeb1cfcdb74e6e9c53ef0df7fb41968a64c0946f1d1c7021

    SHA512

    c167f112faf38cc5a54ffcd7a738baef28bb151f9bb63d1568d1f13cd47aad91480563474d47c183d8b4ae15da4b6026a84c4c98eb65f2f0a46d5144d4f33856

  • C:\Windows\tiwi.exe

    Filesize

    64KB

    MD5

    1b17cc8cc0f10365015195ccdf2df37a

    SHA1

    928374ebeb7fda26f32fdbd08efb0d579a395a3e

    SHA256

    2a2d54b9168a7593197fab91a2875e164736a9f8bfec080c60d785a15ca1e670

    SHA512

    bca1c2dba8173d1c3b1c5ba7766be45f327cdf576ffd654fd1bb1a17e51051cfab325f0803c45b79d97543e99b07cf4affd1a1c19c178fc8381e8247b341a86d

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    64KB

    MD5

    746b92df007cf67738a3a29b64071e3b

    SHA1

    78f527b01959d57f1c9b53c14222a71e7952b3f0

    SHA256

    59a5965227ca2fb133652c465e4ff825005e24042b7c78656b1f09ff15ccb657

    SHA512

    0943b2f3d773e6cfe9209d0ea3e806701e014ef729216e9a00c6f71cddf03ee9dc48dd922fa91335e5e577fe090f34da6c9b0a1af38c09b2640135f98ad4d67f

  • C:\tiwi.exe

    Filesize

    64KB

    MD5

    e1164fa9c5bf4586b9b3ab49b829b5ed

    SHA1

    f767b20176a2ca2f5a499776cb6b9da03558f698

    SHA256

    6b6d6d44889f24dc9dd406538462b54f4f308a29b5ced837767cc9726425ad05

    SHA512

    abdd19832de29b8a9e7b50bf0e42785d80bd4ce814424315b07fbd0c9580537d8d977db96a58a386032af91de8e4545d7f058fe4c2e3d04659b8a3aec9a21fae

  • C:\tiwi.exe

    Filesize

    64KB

    MD5

    092f8ebd8dcdbf09ed13259401be80af

    SHA1

    7f39de100c3a9add6acc256bb97cad281306a01a

    SHA256

    c0c5f70d8b3e8f2f4ba7766961f8fa1bb05d7c22c3c28cd6ca38cab665d341f1

    SHA512

    dc43602423e572f64bf4a7fb1ee684b0afd267e104f9240f7313723e11d42a419807c52365f14598849daa1bac405c08666831d23cd9c8a5b6228f55e304e130

  • C:\tiwi.exe

    Filesize

    64KB

    MD5

    2de3a2c3ff4e315ab16652643354ade8

    SHA1

    f4ff08c66d76429616ce14d4b4a66f3422c91349

    SHA256

    44a15b2f9d1a849f60a67f3992ce4fad7d69359f4dcb4e3ad35382360df54488

    SHA512

    bdf4fdced619d5d9972038af163fc694cb09a3d2bb96b83b6a5120b36140a5f4a5f2524eb59e95ff00567bfcc1ceabc1b7cab267fd91364e8764451664a17663

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • \Users\Admin\AppData\Local\WINDOWS\imoet.exe

    Filesize

    64KB

    MD5

    c35ca82d87e7a78887c915637645d0a3

    SHA1

    fdbd0f2c5c210d57995f2e09322ba74b384053e8

    SHA256

    163c76569f7e39f543a7fea4b70ae4ce283beecc0e966d274fdcb3e72ccca799

    SHA512

    3fe6ae649c9e71d8f8b62178cd41a63320d1e6b0162128f04c073546253c369052b716db5d7c5754527be22491174daf4b0de121ce3a0d322062031eb7eb8c84

  • \Users\Admin\AppData\Local\WINDOWS\winlogon.exe

    Filesize

    64KB

    MD5

    581b327d9a9b336f8898e60c03a1e974

    SHA1

    0205b7fa5a5e6127664ac4040f8d69b0570c3572

    SHA256

    69c15f72e34bf26140f26a31ef688a8099a18793338bb767f7b13e2848d5e5cc

    SHA512

    dafc7af5290502bd00c9c0b6d7480f381da25e62b31d35bc911831ac247b393622e657db652e2425cba1dad40bfea1123394c93549a30d47b038301643fadcf6

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    64KB

    MD5

    80dcc511f44f43a387c37292ca7147ef

    SHA1

    6d58bf7b088f0410794769292372ab9f29b836e8

    SHA256

    7fbd100360cf4a47187496297ee8429d3ab233982c16da18c5df3f2b13fec91b

    SHA512

    dea578ab9187c973f1048dcb3cb77d4ef8e40d286be017de3961df0abe0c05dd52e25d33a18c75e9178b3c869da16f2a57b915d01114646abe78eb50fac36341

  • memory/1004-355-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1376-354-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/1376-353-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/1388-439-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1780-226-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1780-265-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1780-266-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1976-138-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1976-452-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2108-361-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2108-360-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2216-187-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2216-305-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2296-310-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2296-309-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2296-313-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2348-136-0x00000000037C0000-0x0000000003DBF000-memory.dmp

    Filesize

    6.0MB

  • memory/2348-356-0x00000000037C0000-0x0000000003DBF000-memory.dmp

    Filesize

    6.0MB

  • memory/2348-125-0x00000000037C0000-0x0000000003DBF000-memory.dmp

    Filesize

    6.0MB

  • memory/2348-440-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2348-100-0x00000000037C0000-0x0000000003DBF000-memory.dmp

    Filesize

    6.0MB

  • memory/2348-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2348-186-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2348-98-0x00000000037C0000-0x0000000003DBF000-memory.dmp

    Filesize

    6.0MB

  • memory/2348-110-0x00000000037C0000-0x0000000003DBF000-memory.dmp

    Filesize

    6.0MB

  • memory/2348-137-0x00000000037C0000-0x0000000003DBF000-memory.dmp

    Filesize

    6.0MB

  • memory/2348-112-0x00000000037C0000-0x0000000003DBF000-memory.dmp

    Filesize

    6.0MB

  • memory/2348-124-0x00000000037C0000-0x0000000003DBF000-memory.dmp

    Filesize

    6.0MB

  • memory/2348-185-0x00000000037C0000-0x0000000003DBF000-memory.dmp

    Filesize

    6.0MB

  • memory/2456-126-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2456-447-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2548-366-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2592-111-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2592-357-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2788-372-0x00000000001B0000-0x00000000001C0000-memory.dmp

    Filesize

    64KB

  • memory/2792-99-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2792-188-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2824-377-0x0000000000230000-0x0000000000240000-memory.dmp

    Filesize

    64KB