Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe
Resource
win10v2004-20241007-en
General
-
Target
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe
-
Size
64KB
-
MD5
339ed763d4978b08c3ee73e7c888f2fc
-
SHA1
64bcd6d5d27f123531d7b1f9a23db45fbc04b490
-
SHA256
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1
-
SHA512
5207562db4a104cf52b35cc94de57dc386801baa457adb72398a67068f07db41152df2a5ac81dc2d06baf70d3db730d38b4053868f2d44bf9628716037d01b54
-
SSDEEP
768:VNuG777/+V36n9PcXYvn8KR1I3NznRAQZlh4VkpX179r+R5hOwekflNuG777/+V2:V8w2VS9Eovn8KRgWmhZpX1Q8wJ8w2V2
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
Processes:
cute.exeTiwi.exewinlogon.exeimoet.exeIExplorer.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cute.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cute.exe -
Disables RegEdit via registry modification 6 IoCs
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cute.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 6 IoCs
Processes:
imoet.execute.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exeIExplorer.exewinlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 35 IoCs
Processes:
Tiwi.exeIExplorer.exewinlogon.exeimoet.exeTiwi.exeTiwi.exeTiwi.exeIExplorer.exeTiwi.exeIExplorer.exeIExplorer.exewinlogon.exeTiwi.exeIExplorer.exewinlogon.exewinlogon.exeIExplorer.exeimoet.exeimoet.execute.exeimoet.exewinlogon.exewinlogon.exeimoet.execute.execute.execute.exeimoet.exeTiwi.execute.execute.exeIExplorer.exewinlogon.exeimoet.execute.exepid process 2792 Tiwi.exe 2592 IExplorer.exe 2456 winlogon.exe 1976 imoet.exe 2216 Tiwi.exe 1780 Tiwi.exe 1004 Tiwi.exe 620 IExplorer.exe 2296 Tiwi.exe 1376 IExplorer.exe 2464 IExplorer.exe 2108 winlogon.exe 2548 Tiwi.exe 2936 IExplorer.exe 2144 winlogon.exe 824 winlogon.exe 2784 IExplorer.exe 2788 imoet.exe 2772 imoet.exe 2948 cute.exe 2820 imoet.exe 2824 winlogon.exe 2704 winlogon.exe 2744 imoet.exe 2692 cute.exe 2816 cute.exe 3028 cute.exe 1068 imoet.exe 1388 Tiwi.exe 1688 cute.exe 2928 cute.exe 3020 IExplorer.exe 2408 winlogon.exe 2252 imoet.exe 1808 cute.exe -
Loads dropped DLL 53 IoCs
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exewinlogon.exeIExplorer.exeimoet.execute.exepid process 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe 2792 Tiwi.exe 2792 Tiwi.exe 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe 2456 winlogon.exe 2456 winlogon.exe 2792 Tiwi.exe 2792 Tiwi.exe 2592 IExplorer.exe 2592 IExplorer.exe 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe 2456 winlogon.exe 1976 imoet.exe 1976 imoet.exe 2792 Tiwi.exe 2792 Tiwi.exe 2456 winlogon.exe 2456 winlogon.exe 2792 Tiwi.exe 2792 Tiwi.exe 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe 1976 imoet.exe 1976 imoet.exe 2592 IExplorer.exe 2592 IExplorer.exe 1976 imoet.exe 2456 winlogon.exe 2456 winlogon.exe 1976 imoet.exe 1976 imoet.exe 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe 2592 IExplorer.exe 2592 IExplorer.exe 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe 2592 IExplorer.exe 2592 IExplorer.exe 2948 cute.exe 2948 cute.exe 2948 cute.exe 2948 cute.exe 2948 cute.exe 2948 cute.exe 2948 cute.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
Processes:
IExplorer.exewinlogon.exeimoet.execute.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe -
Adds Run key to start application 2 TTPs 24 IoCs
Processes:
Tiwi.exeIExplorer.exewinlogon.exeimoet.execute.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" cute.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
IExplorer.exeTiwi.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exewinlogon.exeimoet.execute.exedescription ioc process File opened (read-only) \??\J: IExplorer.exe File opened (read-only) \??\U: IExplorer.exe File opened (read-only) \??\P: Tiwi.exe File opened (read-only) \??\B: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\M: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\V: winlogon.exe File opened (read-only) \??\W: winlogon.exe File opened (read-only) \??\G: imoet.exe File opened (read-only) \??\W: IExplorer.exe File opened (read-only) \??\R: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\U: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\V: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\Y: winlogon.exe File opened (read-only) \??\P: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\T: IExplorer.exe File opened (read-only) \??\L: imoet.exe File opened (read-only) \??\Q: IExplorer.exe File opened (read-only) \??\S: Tiwi.exe File opened (read-only) \??\J: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\X: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\Y: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\X: winlogon.exe File opened (read-only) \??\H: imoet.exe File opened (read-only) \??\W: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\E: winlogon.exe File opened (read-only) \??\H: IExplorer.exe File opened (read-only) \??\Q: cute.exe File opened (read-only) \??\Q: Tiwi.exe File opened (read-only) \??\I: imoet.exe File opened (read-only) \??\K: IExplorer.exe File opened (read-only) \??\T: cute.exe File opened (read-only) \??\V: Tiwi.exe File opened (read-only) \??\P: winlogon.exe File opened (read-only) \??\M: imoet.exe File opened (read-only) \??\T: imoet.exe File opened (read-only) \??\P: IExplorer.exe File opened (read-only) \??\J: Tiwi.exe File opened (read-only) \??\S: winlogon.exe File opened (read-only) \??\N: imoet.exe File opened (read-only) \??\P: cute.exe File opened (read-only) \??\O: Tiwi.exe File opened (read-only) \??\Z: Tiwi.exe File opened (read-only) \??\K: winlogon.exe File opened (read-only) \??\P: imoet.exe File opened (read-only) \??\G: cute.exe File opened (read-only) \??\B: winlogon.exe File opened (read-only) \??\O: imoet.exe File opened (read-only) \??\M: IExplorer.exe File opened (read-only) \??\X: IExplorer.exe File opened (read-only) \??\S: cute.exe File opened (read-only) \??\I: Tiwi.exe File opened (read-only) \??\S: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\Q: winlogon.exe File opened (read-only) \??\E: cute.exe File opened (read-only) \??\V: cute.exe File opened (read-only) \??\Z: winlogon.exe File opened (read-only) \??\E: imoet.exe File opened (read-only) \??\J: imoet.exe File opened (read-only) \??\R: imoet.exe File opened (read-only) \??\X: cute.exe File opened (read-only) \??\Q: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\N: IExplorer.exe File opened (read-only) \??\V: IExplorer.exe File opened (read-only) \??\U: winlogon.exe -
Modifies WinLogon 2 TTPs 18 IoCs
Processes:
Tiwi.exeimoet.execute.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeIExplorer.exewinlogon.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
Tiwi.exedescription ioc process File opened for modification F:\autorun.inf Tiwi.exe File created C:\autorun.inf Tiwi.exe File opened for modification C:\autorun.inf Tiwi.exe File created F:\autorun.inf Tiwi.exe -
Drops file in System32 directory 40 IoCs
Processes:
IExplorer.exeIExplorer.exewinlogon.exeIExplorer.exeIExplorer.exeIExplorer.exeIExplorer.execute.exeTiwi.exeIExplorer.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeimoet.exedescription ioc process File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\shell.exe winlogon.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe cute.exe File created C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr winlogon.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe cute.exe File created C:\Windows\SysWOW64\IExplorer.exe 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened for modification C:\Windows\SysWOW64\shell.exe Tiwi.exe File created C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\shell.exe imoet.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr imoet.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\shell.exe 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr cute.exe File created C:\Windows\SysWOW64\IExplorer.exe imoet.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe cute.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr Tiwi.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe imoet.exe File created C:\Windows\SysWOW64\tiwi.scr 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe -
Drops file in Windows directory 26 IoCs
Processes:
winlogon.exeIExplorer.exeimoet.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeIExplorer.exeTiwi.exeIExplorer.exeIExplorer.exeIExplorer.execute.exeIExplorer.exeIExplorer.exedescription ioc process File created C:\Windows\tiwi.exe winlogon.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe imoet.exe File opened for modification C:\Windows\tiwi.exe 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe Tiwi.exe File created C:\Windows\tiwi.exe Tiwi.exe File opened for modification C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\tiwi.exe imoet.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe cute.exe File created C:\Windows\tiwi.exe 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened for modification C:\Windows\tiwi.exe IExplorer.exe File created C:\Windows\tiwi.exe IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe cute.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IExplorer.exeimoet.exewinlogon.exewinlogon.exeIExplorer.exeTiwi.exewinlogon.execute.exeIExplorer.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exeIExplorer.exeimoet.execute.exewinlogon.exewinlogon.exeimoet.exewinlogon.execute.exeTiwi.exeIExplorer.exeIExplorer.execute.exeimoet.exeIExplorer.exewinlogon.execute.exeimoet.exeimoet.exeTiwi.exeTiwi.exeTiwi.execute.exeimoet.execute.exeTiwi.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe -
Modifies Control Panel 54 IoCs
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exeIExplorer.execute.exeimoet.exewinlogon.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\ 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\ cute.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Mouse\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" imoet.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Mouse\ 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\ IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Mouse\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" imoet.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Mouse\ imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Mouse\SwapMouseButtons = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Mouse\SwapMouseButtons = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Mouse\SwapMouseButtons = "1" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" imoet.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\s1159 = "Tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\s2359 = "Tiwi" imoet.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\ 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\s2359 = "Tiwi" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Mouse\ Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\s1159 = "Tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\s1159 = "Tiwi" cute.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\s2359 = "Tiwi" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Mouse\SwapMouseButtons = "1" cute.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\s2359 = "Tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\s1159 = "Tiwi" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Mouse\SwapMouseButtons = "1" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\s2359 = "Tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\s1159 = "Tiwi" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\s1159 = "Tiwi" imoet.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Mouse\SwapMouseButtons = "1" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\ Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Mouse\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\s2359 = "Tiwi" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Tiwi.exe -
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeIExplorer.exewinlogon.exeimoet.execute.exeTiwi.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\ 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." cute.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." imoet.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." winlogon.exe -
Modifies Internet Explorer start page 1 TTPs 6 IoCs
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" cute.exe -
Modifies registry class 64 IoCs
Processes:
IExplorer.exewinlogon.exeimoet.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.execute.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exepid process 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
Tiwi.exeimoet.exewinlogon.exeIExplorer.execute.exepid process 2792 Tiwi.exe 1976 imoet.exe 2456 winlogon.exe 2592 IExplorer.exe 2948 cute.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exeIExplorer.exewinlogon.exeimoet.exeTiwi.exeTiwi.exeIExplorer.exeTiwi.exeTiwi.exeIExplorer.exeIExplorer.exewinlogon.exewinlogon.exeTiwi.exeIExplorer.exewinlogon.exeimoet.exeIExplorer.execute.exewinlogon.exeimoet.exeimoet.exeimoet.exewinlogon.execute.execute.exeimoet.execute.execute.exeTiwi.execute.exeIExplorer.exewinlogon.exeimoet.execute.exepid process 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe 2792 Tiwi.exe 2592 IExplorer.exe 2456 winlogon.exe 1976 imoet.exe 1780 Tiwi.exe 2216 Tiwi.exe 620 IExplorer.exe 2296 Tiwi.exe 1004 Tiwi.exe 1376 IExplorer.exe 2464 IExplorer.exe 2108 winlogon.exe 2144 winlogon.exe 2548 Tiwi.exe 2936 IExplorer.exe 824 winlogon.exe 2788 imoet.exe 2784 IExplorer.exe 2948 cute.exe 2824 winlogon.exe 2772 imoet.exe 2744 imoet.exe 2820 imoet.exe 2704 winlogon.exe 2816 cute.exe 2692 cute.exe 1068 imoet.exe 3028 cute.exe 1688 cute.exe 1388 Tiwi.exe 2928 cute.exe 3020 IExplorer.exe 2408 winlogon.exe 2252 imoet.exe 1808 cute.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exeIExplorer.exewinlogon.exeimoet.exedescription pid process target process PID 2348 wrote to memory of 2792 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Tiwi.exe PID 2348 wrote to memory of 2792 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Tiwi.exe PID 2348 wrote to memory of 2792 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Tiwi.exe PID 2348 wrote to memory of 2792 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Tiwi.exe PID 2348 wrote to memory of 2592 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe IExplorer.exe PID 2348 wrote to memory of 2592 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe IExplorer.exe PID 2348 wrote to memory of 2592 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe IExplorer.exe PID 2348 wrote to memory of 2592 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe IExplorer.exe PID 2348 wrote to memory of 2456 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe winlogon.exe PID 2348 wrote to memory of 2456 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe winlogon.exe PID 2348 wrote to memory of 2456 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe winlogon.exe PID 2348 wrote to memory of 2456 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe winlogon.exe PID 2348 wrote to memory of 1976 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe imoet.exe PID 2348 wrote to memory of 1976 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe imoet.exe PID 2348 wrote to memory of 1976 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe imoet.exe PID 2348 wrote to memory of 1976 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe imoet.exe PID 2348 wrote to memory of 2216 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Tiwi.exe PID 2348 wrote to memory of 2216 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Tiwi.exe PID 2348 wrote to memory of 2216 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Tiwi.exe PID 2348 wrote to memory of 2216 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Tiwi.exe PID 2792 wrote to memory of 1780 2792 Tiwi.exe Tiwi.exe PID 2792 wrote to memory of 1780 2792 Tiwi.exe Tiwi.exe PID 2792 wrote to memory of 1780 2792 Tiwi.exe Tiwi.exe PID 2792 wrote to memory of 1780 2792 Tiwi.exe Tiwi.exe PID 2592 wrote to memory of 1004 2592 IExplorer.exe Tiwi.exe PID 2592 wrote to memory of 1004 2592 IExplorer.exe Tiwi.exe PID 2592 wrote to memory of 1004 2592 IExplorer.exe Tiwi.exe PID 2592 wrote to memory of 1004 2592 IExplorer.exe Tiwi.exe PID 2792 wrote to memory of 620 2792 Tiwi.exe IExplorer.exe PID 2792 wrote to memory of 620 2792 Tiwi.exe IExplorer.exe PID 2792 wrote to memory of 620 2792 Tiwi.exe IExplorer.exe PID 2792 wrote to memory of 620 2792 Tiwi.exe IExplorer.exe PID 2348 wrote to memory of 1376 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe IExplorer.exe PID 2348 wrote to memory of 1376 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe IExplorer.exe PID 2348 wrote to memory of 1376 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe IExplorer.exe PID 2348 wrote to memory of 1376 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe IExplorer.exe PID 2456 wrote to memory of 2296 2456 winlogon.exe Tiwi.exe PID 2456 wrote to memory of 2296 2456 winlogon.exe Tiwi.exe PID 2456 wrote to memory of 2296 2456 winlogon.exe Tiwi.exe PID 2456 wrote to memory of 2296 2456 winlogon.exe Tiwi.exe PID 2456 wrote to memory of 2464 2456 winlogon.exe IExplorer.exe PID 2456 wrote to memory of 2464 2456 winlogon.exe IExplorer.exe PID 2456 wrote to memory of 2464 2456 winlogon.exe IExplorer.exe PID 2456 wrote to memory of 2464 2456 winlogon.exe IExplorer.exe PID 2792 wrote to memory of 2108 2792 Tiwi.exe winlogon.exe PID 2792 wrote to memory of 2108 2792 Tiwi.exe winlogon.exe PID 2792 wrote to memory of 2108 2792 Tiwi.exe winlogon.exe PID 2792 wrote to memory of 2108 2792 Tiwi.exe winlogon.exe PID 1976 wrote to memory of 2548 1976 imoet.exe Tiwi.exe PID 1976 wrote to memory of 2548 1976 imoet.exe Tiwi.exe PID 1976 wrote to memory of 2548 1976 imoet.exe Tiwi.exe PID 1976 wrote to memory of 2548 1976 imoet.exe Tiwi.exe PID 2592 wrote to memory of 2936 2592 IExplorer.exe IExplorer.exe PID 2592 wrote to memory of 2936 2592 IExplorer.exe IExplorer.exe PID 2592 wrote to memory of 2936 2592 IExplorer.exe IExplorer.exe PID 2592 wrote to memory of 2936 2592 IExplorer.exe IExplorer.exe PID 2348 wrote to memory of 2144 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe winlogon.exe PID 2348 wrote to memory of 2144 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe winlogon.exe PID 2348 wrote to memory of 2144 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe winlogon.exe PID 2348 wrote to memory of 2144 2348 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe winlogon.exe PID 2456 wrote to memory of 824 2456 winlogon.exe winlogon.exe PID 2456 wrote to memory of 824 2456 winlogon.exe winlogon.exe PID 2456 wrote to memory of 824 2456 winlogon.exe winlogon.exe PID 2456 wrote to memory of 824 2456 winlogon.exe winlogon.exe -
System policy modification 1 TTPs 12 IoCs
Processes:
IExplorer.exeimoet.execute.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exewinlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe"C:\Users\Admin\AppData\Local\Temp\98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2348 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2792 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1780
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:620
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2108
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2788
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2948 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1388
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3020
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2408
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2252
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1808
-
-
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2592 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1004
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2936
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2704
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1068
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2928
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2456 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2296
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2464
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:824
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2692
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1976 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2548
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2784
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3028
-
-
-
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2216
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1376
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2144
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1688
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5ed9adc841380142609d298b3d7924997
SHA1dba2ed2da39f1205ab735c12258874af942d5c90
SHA256de99da12fd7aa34116baf1598a5151c1e3d89b98ab4b7d1f020d01b42de41504
SHA5127e922d21dccd6c11fc9434d7eb9a4f1ec99b73368e706af0c39fb875b05c924aa0784a0ae9754b02aa2dd80f7c8b4f5ae32e066f3fe5f42de93e36b80d97b75f
-
Filesize
64KB
MD5d53ef75c4756d63d1aa601a59b9a8997
SHA190a1f45eca11f5906c84c3f3d1e015a4377fccff
SHA25620b9136cc67197909f31d8ed4aacaf9c487d2d76f343bd3b30768c4ac9cacf6f
SHA512fc11815026282338bf93ec3b913f033ed14ef7aa2b24c273985edf7223883f2071444e85456cbb9eefda83971ee5005acdd627c0122c6d6a829275762e11219b
-
Filesize
64KB
MD5b400c025e51329d4395a22b572cb28ab
SHA13228f68ecb97da5af5d21e6c8f9d13048ef449ec
SHA2564577167a55f2666e5e19ba4ae80eb561a32c690091960a690b157d9ffbc465ff
SHA51246e1a109c95477da79e523f541a39cb5843837ae296df07094bc95c9b1c6f799f165fa296ccf63dc729ceba09aa53cf5740a20eb7a199b2e0719e7118878db3d
-
Filesize
64KB
MD553ddc857b600fe0b122d426b7cb1f438
SHA1a5d1486efac2f4b92ad9d8392eb3843c01f8687b
SHA25668f888036336586defeb04a082bb9d91a51ab7d64c0d6e34599d9f94fbb3c53e
SHA5122032e7bbecbf757d657d422b15be0abb9f940542ad795c75c499351470ed31df620143c68a8e8efc5a80f71d83e2e9a3084b32e1abbdbef70205a722e3709a51
-
Filesize
45KB
MD54b7824d99257d152783fc5259e95b856
SHA135531348653a2a3ec870813d111a1addc0e0f67e
SHA256be1803f05f2823ec5230a3cb6fa69330cbb984f273182875982137457d603dc3
SHA512cdae585d2c2a2782b3be89c7caddb747145e3fe175ee2521be18fae1c255346d3c177aa0c4c0ca4bda22495842e381e43b99915e72a8ad937620297c41e2721f
-
Filesize
45KB
MD5e11fd41b3b170630344c3ee57ff67ccc
SHA142a533584a28cd5a0fa684e819177f4166be14ae
SHA2568de76a5305b9bcb10e35249f01a5f314ef900812013662b7a262e4cc02842f25
SHA5123df57c25ab7e6463036f29b663638c6c6422b5347c7c4b5e47845be2c4e2bbb413c8d17460348a45ff6c3271c3b091cf392d8be9722968ef10156750d6c73b38
-
Filesize
45KB
MD54e577faf7f9e52d976b2e9a65a44ee01
SHA1500d374a07135e1bbe4da891a6a69e406ca92acb
SHA256f89372937d5a165515e8e654dc119f209aa24026251e5c43a51f686305c628d2
SHA5121a5cf278c3f964cc21b19be5ecb1406bfd3686fe2c15e20117d1305de6511163e8fe8d021596710205e91db7cc51565ae89de77bd8177f3ce01a40abf4e83e20
-
Filesize
45KB
MD5692d3b679af00140846c0c0ffb733e9a
SHA11b1997666fdc705f39f206bf0bad1218e79ff227
SHA2564b91b12db74155562bd8a92155427e984383d7256baa28424c94dff7ac943e11
SHA51297df4f79da221afbc02dea629db19a23c2b62528a8cef2d1184e0446117bff22a19fe7c9ae933f00ef7b67c7bd4339e7d2d0f08c9312893e198f5433dc3d9344
-
Filesize
64KB
MD592b9be78e7c2ffe9e91c6cbf706937c3
SHA1e8b567aa2fcae4712ad44813c22681d7bed60784
SHA256c18dfd58516645fe9e1096c3db107c34efb6739ec03029dd933f218e524b55c2
SHA512b225a311e36afcae294a16280c0539e50b96bd6411fccc6e900685c4afdd21e10ef4ab78873e59b7eae7f6f221af4c31742949dd4e66ed093c928ff3b2b6b5ab
-
Filesize
64KB
MD573bec3baa97073e2e17cf20c17d5d20f
SHA1809dded75e8b3692003b9e81c7fd874339760b4c
SHA256720e46fac4149259684d7d58999edd930439a7a24880c45a74ccfe188258cd53
SHA51266ae56f0636ab9e129b99da41de0be784822c05cb600312b3ce2c7c9ba55589dfb21f58d505c05a8f28c523347f83891099b01dfd19c0e9a879d0288148895c4
-
Filesize
64KB
MD553cca7bf8a273afcd00fd3f3f708d1e2
SHA1ceb774d5b9b855f639c13afdd2474e8b2f9eea67
SHA256aad1ebf0b030dbf5dc186c68f259b993a7fb6040062dddd47a829e38fca8d786
SHA51257c1b734cd066f83dace0225a87eb6469c096b0236ef4b464234ff8bb5ed3c752c851097c0352dd806fb1123941cbfbea7f89e5e39bb8eb4bcb779b6776c5117
-
Filesize
64KB
MD59043c3f10e8e0ef9277c05a3de0b458d
SHA1f26b22f361e7947b7d148e67d64cce821af25251
SHA256706891439c8b334e35a0e9130f5d3f8553edb355c3fad39fdcf5279ed9b70bce
SHA512c4ad541510d23f2e654c05c93bae81c1d33b7bbc55564362d5f9620f47d95fb12e0e21b958d76751f940f7dd5b18459e05d7f7aa7de72e96c994bf46c9b375c9
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
64KB
MD5ca68a815170ca2d2a2c4a3f4e5a74653
SHA19e55a057d0fbbe3df427d096fa596cbe644ebf0f
SHA25674f9842ab4907b596f100fe04284ec33a06ab595e8bc2fcc5a376ea50fa974d2
SHA512dc01962fb17d99b6d64ea7b008fccb7fef25ff2fb64c7bf105bde74c879406f5c0757c3cf3a6e4786afe219da37053a9086bf4afcfef865926b6594656349ebf
-
Filesize
64KB
MD55c3abceef0a48a1d667366c6f1faf45c
SHA1d7420140f5dd63a0efa58b3996b544864b7e88cf
SHA256fb8a081c44d3cc1c6b4b1299bd2198ca05a23a2d2caae6160670370ec75df24b
SHA51290d6d1d0cb4173078c559d9c0d141b276f1f75341fdc26b38b55906c4951380738150aec84c423e43272203b31f77051329aa44f3cb8ed07360950c70db2496c
-
Filesize
64KB
MD5b68bcc562fe344ab295447ec089e756d
SHA1c34e812605c3d382b63c9071f6891ce326ff140f
SHA2565560f45b9d59ebcda819429f63ec82bf0f008306d2f4f0683652b1e474690bcf
SHA512283fdea482ebf7527bd731f9c8ce30837e58329a5b1dd313e308a9139b3264c7d22cf0d8d1d3ac5b48ad88ded6cfda435b29c79dc29c3ac8d86bcdc13da99537
-
Filesize
64KB
MD57bdf41f548953eec55d0c34f83426da1
SHA1d989770d01c853506eaa22e312cc8a314edc7e97
SHA256fc79122321ca0ac3f1c4686eb6ed87902efefc79ee90825370c24f6417db0432
SHA512813a6b178fb9322b8a40868864d06a8c102d314690e99275f378200b783b7ca7d28d77b3a6d21761fe4582c6dca3329daf2e6b29d5c86e655fe59b9830451226
-
Filesize
64KB
MD5339ed763d4978b08c3ee73e7c888f2fc
SHA164bcd6d5d27f123531d7b1f9a23db45fbc04b490
SHA25698d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1
SHA5125207562db4a104cf52b35cc94de57dc386801baa457adb72398a67068f07db41152df2a5ac81dc2d06baf70d3db730d38b4053868f2d44bf9628716037d01b54
-
Filesize
64KB
MD5fa9dc3a95d8ebdf80b9983330425794a
SHA1b023a0a9aea52e7fbade21b367d2730246c4e549
SHA25613a909aa749722c4ba7cab10fa230729f3b08d82c7e6a37c63b107f3b2e8f699
SHA5123b886a1a4d1b48966df1067f5b925f95e3aa0f8950cba73276be1121e32baa07a8ab7748da3d7f40737b3a7c44fe6bf23f40161cae61ef9071e757e75937b844
-
Filesize
64KB
MD524c3ad9b39d3deabf85707bcfcc40d1d
SHA1d3b165e8a6f031c3872d513ea2f76cd5a4a8a530
SHA256d9f34486b82abb43bd18bd321a61c74497e1717103913a562bef57d63c57fa68
SHA512f4fc6f39090437ee37e2c47c621505b62a5b47f8ff08a748d4093d6ebe3d7ab922799cc1b403635c942d54ec18011653f3a8c69a0e668d63a64622c399c2a79f
-
Filesize
64KB
MD53d7c0c1e7ecb180f8edffbde2179eed9
SHA1241f69056003018d8eb2f0ecc8d8d6e9dcfce850
SHA256412ba4a42a61fd5e64f4b7627ee748316e2090593d9879fa2b35abd46ca40eed
SHA512c66b86bf1965645a262afb46f2a446b17e7bc9e33e26bf07002e4a22dd166957f0f48ea5445edb3145c6ba70851b9b06d079d82d8678d2ba5bde7d0159db2749
-
Filesize
64KB
MD597c5b0e30bf14d49aa34f68becc6bf62
SHA19c2b976892c111fc72225c4133a9a024dffb6853
SHA2569c74ddde946977eabeb1cfcdb74e6e9c53ef0df7fb41968a64c0946f1d1c7021
SHA512c167f112faf38cc5a54ffcd7a738baef28bb151f9bb63d1568d1f13cd47aad91480563474d47c183d8b4ae15da4b6026a84c4c98eb65f2f0a46d5144d4f33856
-
Filesize
64KB
MD51b17cc8cc0f10365015195ccdf2df37a
SHA1928374ebeb7fda26f32fdbd08efb0d579a395a3e
SHA2562a2d54b9168a7593197fab91a2875e164736a9f8bfec080c60d785a15ca1e670
SHA512bca1c2dba8173d1c3b1c5ba7766be45f327cdf576ffd654fd1bb1a17e51051cfab325f0803c45b79d97543e99b07cf4affd1a1c19c178fc8381e8247b341a86d
-
Filesize
729B
MD58e3c734e8dd87d639fb51500d42694b5
SHA1f76371d31eed9663e9a4fd7cb95f54dcfc51f87f
SHA256574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad
SHA51206ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853
-
Filesize
64KB
MD5746b92df007cf67738a3a29b64071e3b
SHA178f527b01959d57f1c9b53c14222a71e7952b3f0
SHA25659a5965227ca2fb133652c465e4ff825005e24042b7c78656b1f09ff15ccb657
SHA5120943b2f3d773e6cfe9209d0ea3e806701e014ef729216e9a00c6f71cddf03ee9dc48dd922fa91335e5e577fe090f34da6c9b0a1af38c09b2640135f98ad4d67f
-
Filesize
64KB
MD5e1164fa9c5bf4586b9b3ab49b829b5ed
SHA1f767b20176a2ca2f5a499776cb6b9da03558f698
SHA2566b6d6d44889f24dc9dd406538462b54f4f308a29b5ced837767cc9726425ad05
SHA512abdd19832de29b8a9e7b50bf0e42785d80bd4ce814424315b07fbd0c9580537d8d977db96a58a386032af91de8e4545d7f058fe4c2e3d04659b8a3aec9a21fae
-
Filesize
64KB
MD5092f8ebd8dcdbf09ed13259401be80af
SHA17f39de100c3a9add6acc256bb97cad281306a01a
SHA256c0c5f70d8b3e8f2f4ba7766961f8fa1bb05d7c22c3c28cd6ca38cab665d341f1
SHA512dc43602423e572f64bf4a7fb1ee684b0afd267e104f9240f7313723e11d42a419807c52365f14598849daa1bac405c08666831d23cd9c8a5b6228f55e304e130
-
Filesize
64KB
MD52de3a2c3ff4e315ab16652643354ade8
SHA1f4ff08c66d76429616ce14d4b4a66f3422c91349
SHA25644a15b2f9d1a849f60a67f3992ce4fad7d69359f4dcb4e3ad35382360df54488
SHA512bdf4fdced619d5d9972038af163fc694cb09a3d2bb96b83b6a5120b36140a5f4a5f2524eb59e95ff00567bfcc1ceabc1b7cab267fd91364e8764451664a17663
-
Filesize
39B
MD5415c421ba7ae46e77bdee3a681ecc156
SHA1b0db5782b7688716d6fc83f7e650ffe1143201b7
SHA256e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e
SHA512dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62
-
Filesize
64KB
MD5c35ca82d87e7a78887c915637645d0a3
SHA1fdbd0f2c5c210d57995f2e09322ba74b384053e8
SHA256163c76569f7e39f543a7fea4b70ae4ce283beecc0e966d274fdcb3e72ccca799
SHA5123fe6ae649c9e71d8f8b62178cd41a63320d1e6b0162128f04c073546253c369052b716db5d7c5754527be22491174daf4b0de121ce3a0d322062031eb7eb8c84
-
Filesize
64KB
MD5581b327d9a9b336f8898e60c03a1e974
SHA10205b7fa5a5e6127664ac4040f8d69b0570c3572
SHA25669c15f72e34bf26140f26a31ef688a8099a18793338bb767f7b13e2848d5e5cc
SHA512dafc7af5290502bd00c9c0b6d7480f381da25e62b31d35bc911831ac247b393622e657db652e2425cba1dad40bfea1123394c93549a30d47b038301643fadcf6
-
Filesize
64KB
MD580dcc511f44f43a387c37292ca7147ef
SHA16d58bf7b088f0410794769292372ab9f29b836e8
SHA2567fbd100360cf4a47187496297ee8429d3ab233982c16da18c5df3f2b13fec91b
SHA512dea578ab9187c973f1048dcb3cb77d4ef8e40d286be017de3961df0abe0c05dd52e25d33a18c75e9178b3c869da16f2a57b915d01114646abe78eb50fac36341