Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe
Resource
win10v2004-20241007-en
General
-
Target
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe
-
Size
64KB
-
MD5
339ed763d4978b08c3ee73e7c888f2fc
-
SHA1
64bcd6d5d27f123531d7b1f9a23db45fbc04b490
-
SHA256
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1
-
SHA512
5207562db4a104cf52b35cc94de57dc386801baa457adb72398a67068f07db41152df2a5ac81dc2d06baf70d3db730d38b4053868f2d44bf9628716037d01b54
-
SSDEEP
768:VNuG777/+V36n9PcXYvn8KR1I3NznRAQZlh4VkpX179r+R5hOwekflNuG777/+V2:V8w2VS9Eovn8KRgWmhZpX1Q8wJ8w2V2
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exewinlogon.execute.exeIExplorer.exeimoet.exeTiwi.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" cute.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cute.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
Processes:
imoet.execute.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exeIExplorer.exewinlogon.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe -
Disables RegEdit via registry modification 6 IoCs
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cute.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 6 IoCs
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 35 IoCs
Processes:
Tiwi.exeIExplorer.exeTiwi.exeIExplorer.exeTiwi.exeIExplorer.exewinlogon.exewinlogon.exeimoet.exeTiwi.exeimoet.exeIExplorer.execute.execute.exeTiwi.exewinlogon.exeTiwi.exeIExplorer.exewinlogon.exeimoet.exeIExplorer.exewinlogon.exeimoet.execute.exewinlogon.exeimoet.exeimoet.execute.execute.execute.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exepid process 4800 Tiwi.exe 940 IExplorer.exe 1676 Tiwi.exe 3000 IExplorer.exe 4808 Tiwi.exe 3312 IExplorer.exe 3772 winlogon.exe 3324 winlogon.exe 2944 imoet.exe 1716 Tiwi.exe 3996 imoet.exe 1652 IExplorer.exe 1828 cute.exe 4300 cute.exe 4812 Tiwi.exe 1552 winlogon.exe 3124 Tiwi.exe 2336 IExplorer.exe 372 winlogon.exe 4108 imoet.exe 4056 IExplorer.exe 3420 winlogon.exe 1476 imoet.exe 4564 cute.exe 4232 winlogon.exe 4904 imoet.exe 4100 imoet.exe 4948 cute.exe 4748 cute.exe 3688 cute.exe 5076 Tiwi.exe 1500 IExplorer.exe 1520 winlogon.exe 4460 imoet.exe 2512 cute.exe -
Loads dropped DLL 6 IoCs
Processes:
Tiwi.exeTiwi.exeTiwi.exeTiwi.exeTiwi.exeTiwi.exepid process 1676 Tiwi.exe 4808 Tiwi.exe 1716 Tiwi.exe 4812 Tiwi.exe 3124 Tiwi.exe 5076 Tiwi.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exewinlogon.exeimoet.exeTiwi.exeIExplorer.execute.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe -
Adds Run key to start application 2 TTPs 24 IoCs
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeIExplorer.exewinlogon.exeimoet.execute.exeTiwi.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" winlogon.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
IExplorer.exewinlogon.execute.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exeimoet.exedescription ioc process File opened (read-only) \??\P: IExplorer.exe File opened (read-only) \??\J: winlogon.exe File opened (read-only) \??\Q: IExplorer.exe File opened (read-only) \??\N: winlogon.exe File opened (read-only) \??\I: cute.exe File opened (read-only) \??\E: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\V: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\S: Tiwi.exe File opened (read-only) \??\X: Tiwi.exe File opened (read-only) \??\L: IExplorer.exe File opened (read-only) \??\N: IExplorer.exe File opened (read-only) \??\S: winlogon.exe File opened (read-only) \??\E: cute.exe File opened (read-only) \??\L: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\O: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\W: winlogon.exe File opened (read-only) \??\Z: winlogon.exe File opened (read-only) \??\Q: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\K: winlogon.exe File opened (read-only) \??\U: Tiwi.exe File opened (read-only) \??\W: imoet.exe File opened (read-only) \??\M: cute.exe File opened (read-only) \??\J: Tiwi.exe File opened (read-only) \??\M: Tiwi.exe File opened (read-only) \??\U: winlogon.exe File opened (read-only) \??\K: Tiwi.exe File opened (read-only) \??\P: Tiwi.exe File opened (read-only) \??\B: winlogon.exe File opened (read-only) \??\Q: winlogon.exe File opened (read-only) \??\U: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\V: Tiwi.exe File opened (read-only) \??\W: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\H: Tiwi.exe File opened (read-only) \??\G: Tiwi.exe File opened (read-only) \??\O: Tiwi.exe File opened (read-only) \??\Y: winlogon.exe File opened (read-only) \??\O: imoet.exe File opened (read-only) \??\E: Tiwi.exe File opened (read-only) \??\X: winlogon.exe File opened (read-only) \??\G: imoet.exe File opened (read-only) \??\Y: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\N: Tiwi.exe File opened (read-only) \??\W: IExplorer.exe File opened (read-only) \??\G: IExplorer.exe File opened (read-only) \??\O: IExplorer.exe File opened (read-only) \??\X: cute.exe File opened (read-only) \??\T: Tiwi.exe File opened (read-only) \??\X: imoet.exe File opened (read-only) \??\G: winlogon.exe File opened (read-only) \??\J: cute.exe File opened (read-only) \??\J: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\N: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\K: imoet.exe File opened (read-only) \??\L: imoet.exe File opened (read-only) \??\Q: cute.exe File opened (read-only) \??\S: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\Q: Tiwi.exe File opened (read-only) \??\J: imoet.exe File opened (read-only) \??\N: cute.exe File opened (read-only) \??\P: 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened (read-only) \??\Z: Tiwi.exe File opened (read-only) \??\Z: imoet.exe File opened (read-only) \??\Z: cute.exe File opened (read-only) \??\M: IExplorer.exe -
Modifies WinLogon 2 TTPs 18 IoCs
Processes:
Tiwi.exeIExplorer.exewinlogon.exeimoet.execute.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " imoet.exe -
Drops autorun.inf file 1 TTPs 8 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exedescription ioc process File created C:\autorun.inf 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened for modification C:\autorun.inf 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File created C:\autorun.inf Tiwi.exe File opened for modification C:\autorun.inf Tiwi.exe File created F:\autorun.inf 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened for modification F:\autorun.inf 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File created F:\autorun.inf Tiwi.exe File opened for modification F:\autorun.inf Tiwi.exe -
Drops file in System32 directory 40 IoCs
Processes:
IExplorer.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeIExplorer.exeTiwi.exeimoet.exewinlogon.exeIExplorer.execute.exeIExplorer.exeIExplorer.exeIExplorer.exeIExplorer.exedescription ioc process File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr imoet.exe File opened for modification C:\Windows\SysWOW64\shell.exe imoet.exe File created C:\Windows\SysWOW64\IExplorer.exe imoet.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File created C:\Windows\SysWOW64\IExplorer.exe 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr Tiwi.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe winlogon.exe File created C:\Windows\SysWOW64\IExplorer.exe cute.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr cute.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr winlogon.exe File created C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe imoet.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\shell.exe 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe cute.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File created C:\Windows\SysWOW64\tiwi.scr 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe cute.exe -
Drops file in Windows directory 26 IoCs
Processes:
cute.exeTiwi.exeIExplorer.exeIExplorer.exewinlogon.exeimoet.exeIExplorer.exeIExplorer.exeIExplorer.exeIExplorer.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeIExplorer.exedescription ioc process File opened for modification C:\Windows\tiwi.exe cute.exe File opened for modification C:\Windows\tiwi.exe Tiwi.exe File created C:\Windows\tiwi.exe Tiwi.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe winlogon.exe File opened for modification C:\Windows\tiwi.exe imoet.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe cute.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File created C:\Windows\tiwi.exe 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe IExplorer.exe File opened for modification C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\tiwi.exe imoet.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
imoet.exeTiwi.exewinlogon.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.execute.exeIExplorer.exeTiwi.exeIExplorer.execute.exeTiwi.exewinlogon.exeIExplorer.execute.exeTiwi.exeIExplorer.exeIExplorer.exeTiwi.exeTiwi.exeimoet.exeimoet.exeIExplorer.exeimoet.exewinlogon.exewinlogon.exewinlogon.exewinlogon.exeimoet.execute.exeIExplorer.exeimoet.exeTiwi.execute.execute.exewinlogon.exeimoet.execute.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe -
Modifies Control Panel 54 IoCs
Processes:
winlogon.exeimoet.exeIExplorer.execute.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\ winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\SwapMouseButtons = "1" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s1159 = "Tiwi" cute.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\SwapMouseButtons = "1" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\ imoet.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\ 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s1159 = "Tiwi" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\SwapMouseButtons = "1" cute.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\ IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\SwapMouseButtons = "1" imoet.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\ cute.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s1159 = "Tiwi" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\ Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\SwapMouseButtons = "1" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s2359 = "Tiwi" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s1159 = "Tiwi" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s2359 = "Tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s2359 = "Tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" cute.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s1159 = "Tiwi" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\SwapMouseButtons = "1" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s2359 = "Tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s1159 = "Tiwi" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\ winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Mouse\ 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s2359 = "Tiwi" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\s2359 = "Tiwi" imoet.exe -
Processes:
cute.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeimoet.exeTiwi.exewinlogon.exeIExplorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." cute.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main\ 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main\ imoet.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main\ winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." IExplorer.exe -
Modifies Internet Explorer start page 1 TTPs 6 IoCs
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" cute.exe -
Modifies registry class 64 IoCs
Processes:
IExplorer.exeimoet.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exewinlogon.execute.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exepid process 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
Tiwi.exeimoet.exewinlogon.exeIExplorer.execute.exepid process 4800 Tiwi.exe 2944 imoet.exe 3772 winlogon.exe 940 IExplorer.exe 1828 cute.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exeIExplorer.exeTiwi.exeIExplorer.exeTiwi.exeIExplorer.exewinlogon.exewinlogon.exeimoet.exeTiwi.exeimoet.execute.execute.exeIExplorer.exewinlogon.exeTiwi.exeTiwi.exeIExplorer.exewinlogon.exeIExplorer.exeimoet.exewinlogon.exeimoet.exewinlogon.execute.exeimoet.exeimoet.execute.execute.execute.exeTiwi.exeIExplorer.exewinlogon.exeimoet.execute.exepid process 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe 4800 Tiwi.exe 940 IExplorer.exe 1676 Tiwi.exe 3000 IExplorer.exe 4808 Tiwi.exe 3312 IExplorer.exe 3772 winlogon.exe 3324 winlogon.exe 2944 imoet.exe 1716 Tiwi.exe 3996 imoet.exe 1828 cute.exe 4300 cute.exe 1652 IExplorer.exe 1552 winlogon.exe 4812 Tiwi.exe 3124 Tiwi.exe 2336 IExplorer.exe 372 winlogon.exe 4056 IExplorer.exe 4108 imoet.exe 3420 winlogon.exe 1476 imoet.exe 4232 winlogon.exe 4564 cute.exe 4904 imoet.exe 4100 imoet.exe 4948 cute.exe 4748 cute.exe 3688 cute.exe 5076 Tiwi.exe 1500 IExplorer.exe 1520 winlogon.exe 4460 imoet.exe 2512 cute.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exeIExplorer.exewinlogon.exeimoet.exedescription pid process target process PID 1168 wrote to memory of 4800 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Tiwi.exe PID 1168 wrote to memory of 4800 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Tiwi.exe PID 1168 wrote to memory of 4800 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Tiwi.exe PID 1168 wrote to memory of 940 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe IExplorer.exe PID 1168 wrote to memory of 940 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe IExplorer.exe PID 1168 wrote to memory of 940 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe IExplorer.exe PID 1168 wrote to memory of 1676 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Tiwi.exe PID 1168 wrote to memory of 1676 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Tiwi.exe PID 1168 wrote to memory of 1676 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Tiwi.exe PID 1168 wrote to memory of 3000 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe IExplorer.exe PID 1168 wrote to memory of 3000 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe IExplorer.exe PID 1168 wrote to memory of 3000 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe IExplorer.exe PID 4800 wrote to memory of 4808 4800 Tiwi.exe Tiwi.exe PID 4800 wrote to memory of 4808 4800 Tiwi.exe Tiwi.exe PID 4800 wrote to memory of 4808 4800 Tiwi.exe Tiwi.exe PID 4800 wrote to memory of 3312 4800 Tiwi.exe IExplorer.exe PID 4800 wrote to memory of 3312 4800 Tiwi.exe IExplorer.exe PID 4800 wrote to memory of 3312 4800 Tiwi.exe IExplorer.exe PID 1168 wrote to memory of 3772 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe winlogon.exe PID 1168 wrote to memory of 3772 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe winlogon.exe PID 1168 wrote to memory of 3772 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe winlogon.exe PID 4800 wrote to memory of 3324 4800 Tiwi.exe winlogon.exe PID 4800 wrote to memory of 3324 4800 Tiwi.exe winlogon.exe PID 4800 wrote to memory of 3324 4800 Tiwi.exe winlogon.exe PID 1168 wrote to memory of 2944 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe imoet.exe PID 1168 wrote to memory of 2944 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe imoet.exe PID 1168 wrote to memory of 2944 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe imoet.exe PID 940 wrote to memory of 1716 940 IExplorer.exe Tiwi.exe PID 940 wrote to memory of 1716 940 IExplorer.exe Tiwi.exe PID 940 wrote to memory of 1716 940 IExplorer.exe Tiwi.exe PID 4800 wrote to memory of 3996 4800 Tiwi.exe imoet.exe PID 4800 wrote to memory of 3996 4800 Tiwi.exe imoet.exe PID 4800 wrote to memory of 3996 4800 Tiwi.exe imoet.exe PID 940 wrote to memory of 1652 940 IExplorer.exe IExplorer.exe PID 940 wrote to memory of 1652 940 IExplorer.exe IExplorer.exe PID 940 wrote to memory of 1652 940 IExplorer.exe IExplorer.exe PID 1168 wrote to memory of 1828 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe cute.exe PID 1168 wrote to memory of 1828 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe cute.exe PID 1168 wrote to memory of 1828 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe cute.exe PID 4800 wrote to memory of 4300 4800 Tiwi.exe cute.exe PID 4800 wrote to memory of 4300 4800 Tiwi.exe cute.exe PID 4800 wrote to memory of 4300 4800 Tiwi.exe cute.exe PID 3772 wrote to memory of 4812 3772 winlogon.exe Tiwi.exe PID 3772 wrote to memory of 4812 3772 winlogon.exe Tiwi.exe PID 3772 wrote to memory of 4812 3772 winlogon.exe Tiwi.exe PID 940 wrote to memory of 1552 940 IExplorer.exe winlogon.exe PID 940 wrote to memory of 1552 940 IExplorer.exe winlogon.exe PID 940 wrote to memory of 1552 940 IExplorer.exe winlogon.exe PID 2944 wrote to memory of 3124 2944 imoet.exe Tiwi.exe PID 2944 wrote to memory of 3124 2944 imoet.exe Tiwi.exe PID 2944 wrote to memory of 3124 2944 imoet.exe Tiwi.exe PID 3772 wrote to memory of 2336 3772 winlogon.exe IExplorer.exe PID 3772 wrote to memory of 2336 3772 winlogon.exe IExplorer.exe PID 3772 wrote to memory of 2336 3772 winlogon.exe IExplorer.exe PID 1168 wrote to memory of 372 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe winlogon.exe PID 1168 wrote to memory of 372 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe winlogon.exe PID 1168 wrote to memory of 372 1168 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe winlogon.exe PID 940 wrote to memory of 4108 940 IExplorer.exe imoet.exe PID 940 wrote to memory of 4108 940 IExplorer.exe imoet.exe PID 940 wrote to memory of 4108 940 IExplorer.exe imoet.exe PID 2944 wrote to memory of 4056 2944 imoet.exe IExplorer.exe PID 2944 wrote to memory of 4056 2944 imoet.exe IExplorer.exe PID 2944 wrote to memory of 4056 2944 imoet.exe IExplorer.exe PID 3772 wrote to memory of 3420 3772 winlogon.exe winlogon.exe -
System policy modification 1 TTPs 12 IoCs
Processes:
cute.exeimoet.exe98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exeTiwi.exeIExplorer.exewinlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe"C:\Users\Admin\AppData\Local\Temp\98d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1168 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4800 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4808
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3312
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3324
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3996
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4300
-
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:940 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1716
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1652
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1552
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4108
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4564
-
-
-
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1676
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3000
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3772 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4812
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2336
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3420
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4904
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4948
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2944 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3124
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4056
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4232
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4100
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4748
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1828 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5076
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1500
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1520
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4460
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2512
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:372
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1476
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3688
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5f1dcdf03754a3b9c686a1e838d4f35ed
SHA11920f1a3dc14bfde91e0062bbfa6b06907a0700b
SHA256c105cfb7cfee22e99c63229cb1840dd4e81fb90c785cc9c394828554af3bab88
SHA51234c32d39a90591e818dd2e0f77095e1705b01d1fefd32819ad73e58cb8278e1a9967018460dc669d707e8a961325cecb3d5ea6d4b277acdde7c5003ef565d769
-
Filesize
45KB
MD52344bbe2ce7232e31c0861d086a151df
SHA199f965d1208f1113abfc7e2d53701fdd940df418
SHA2561b8b1ff1cbb7dab53f17b5fffe374355df07e4e67617b235a01be9081de18b34
SHA512b703197ab97f9b2bb95fcb4104f2eddabbb5f28a095bb938be7b4737f8c33c298c9386ad3c806727b55df8a40b93eb41727d236a749d8757f0cb01d5b03473ec
-
Filesize
64KB
MD5e738bb87297505071e50b4f994456978
SHA1b9d44266e683a27854393c02effac6c06bb016d6
SHA256bb1c43bc8df91f69ce6de676c11aabd769609d17a71e6be9a9acef140f3c1603
SHA51262257f8dd75462563266be1c4400c953a0ed0637cfabbd681eb7a36d46ea115639a508576d95f0e0acda71cf4292081fe8cec24e90bbd689e5a1d0fa7dd395e0
-
Filesize
64KB
MD56150a4e56854e01ee1447ea3e3af40b4
SHA1ebe49f2e0a357bced59661262cc25f95bfcc334e
SHA256ff64ced9fabcfeac5a9a083b418fabf47d3b06d299e1ee0ff17fb7706b957ec0
SHA5125b0d99f73c45f5ae6e67e2d5b7813520e08e05d81d090c12fbdc981b8cfb31b379f2de09a0794c0cb52be8684e487c357b6f5b73af452b95ceeea726b07ca177
-
Filesize
64KB
MD509e2c51e3df5d6a5938349a0fa5aee03
SHA1e9473c56539a7179f95177b948120349751a36cb
SHA256fe5cef98419046a244f0daa0fed20413b90e9cd7f96df64565f2e06dda4d5d84
SHA512b9eab69c926ba8478460b95643bd97d8dcc292906ea7a1a12a65d5520a8f627b702ab8ed94b0c20bca40a4d39275b4c1ec6fab51f4339ba38be5fdd093ab1554
-
Filesize
45KB
MD5deba6f6d8382189682d428e9201d80cc
SHA13025fa4516819bef81fbfb6c97b08f8ec216baee
SHA25660e6834f9783b77b2299d010e00f24b5b994f470394997de7633a743a0521ed7
SHA5128c1c4d6dc06e40f2f9bfc495f78e1ea6227e12aa19a5a388b01796470e4f2309b6784a5bd1011cb39379776486fb874a111e6f678eb8f74f0f68c914fbeab8fd
-
Filesize
45KB
MD52f2ec7a0d1693262ef6f5d9bb07f27d2
SHA1db74ba1ef5d9abdc0b45c61a4a30e5b8c26bdc26
SHA25672f6cf2cf108d8cec7575f85fa0ca901f8589a1215bfeeea13c35bca57e9d757
SHA512b4e6d42f4e993e97c0d1e1006abbc282e083d54376e367f571c3d8e5e434d6cdf8a171f9bb135901ab6f3f7ee59d6cef6177c8a9b974a2512a6fbf704e02f95f
-
Filesize
45KB
MD55679a2ab3026a644f4127f8c2975af8f
SHA1f258df780b7c861985e5e2d0c89aad5361ca46db
SHA256d51d6dc58dfbc148d51af8aecb9766f657c1eb48c43cec5698146f5f5e0da59a
SHA512ce29d989d1374aa1ca5b365e719207221a0b635cea675e78b80bc2569a622b41865b6407cd18477b79d5bb08d277ba4b362b76e3042e6e132f4722215875ff83
-
Filesize
64KB
MD55b1b70924ff6bcbe7545b6482a6a9976
SHA1a78c6785657726c2a1d082fd15af6fa6a77c15e1
SHA256b57888f050336d909dc102c2845e650fca0fb6269d6e5de8efc26c040e67bc97
SHA5127ff405642c9f2d0c97437388c273d6a734a4359c4eb54fb7ab1f5bc698bed9e4933481eb4d2aad46e9d79bc869c694c75731b6bea19b7763c21a6387dde84864
-
Filesize
64KB
MD5806ca0cf7cfa920ad8c5ee43d007508f
SHA14dfda52903f9bdb8e1dca0383ead8ab8b35a3e26
SHA25642a99267ade4e02785b6656d50dd3bee1ceb2643d650a2fa24833ffc6f83e681
SHA5128323fe88282e67c7d6f138b595cf8de6f6b0090355bd64d024abce19ec071433d62d5a33f00da2d768f8c5fd275929957df7127e59413c4f1542961593d8e968
-
Filesize
64KB
MD5b1795ed321432161c0a4d5bed9901aa2
SHA1cf3571797702eee9e2c61401690559b0dcacb4ba
SHA256578631b083e070c05d0c3d6390d8932245a23efbe9888b3d3f7cad7eb1b9dc78
SHA5127a05b598407e17eef9cbd48f71e168ab31a2cec1e2fd7c629701f9928a0be35bc8bd8cb6cbf5442f54c3099ab03b5192b18daa6b11dbc3a68f59b7055b43f714
-
Filesize
64KB
MD517db496108093714d8f49a441678ad27
SHA1a6b4c267bbaf861a33d5512a769c61582f7ac6b9
SHA2562702b852e8ffc27fdc40580bab8008cb74eaad254a326b4c89bb5a38cb26c7ab
SHA51247b4b13e44b1927a6f1c79a93688fb037edef2e00cfc1a44dbcc86235483d26ff718ddf0905098491e210f2014099d2a337aa6970bddc3b306add5eab95463c0
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
64KB
MD59e85b19330108ed72cfba22c65c23000
SHA16743410f6f1e9650d90b9e003346aa737a942bb0
SHA2569248244a047474e85851382c396457abcb043bb934764f3cb84d4e0d44b16e2d
SHA512e02b2c8d58caef18fe226539110fd3ad212ad91cc0dfc1757a52a597307f3f1eaf0cd89fb16681d8a23330625ad55a8ce5e667d903cb56079e95c15712fd0301
-
Filesize
64KB
MD57a5704eca81572360469a71ee1ee9dec
SHA1eed5fee0064b4ed8d0a532c10a64ec87a123e607
SHA2566e0cf873b8dc818cafbf3631ca0fd6d0614dd638786223be52264e3198ee6774
SHA51240d4aeec58ff220aff39a938797d70aa2b222a6ebdbf61af8f40b9aec36d2ff9d3be9dc47b12f1e52ad4b5c4cc18ff4f5a292df0a3c6c8e9ef66da1bdc6d8640
-
Filesize
64KB
MD5339ed763d4978b08c3ee73e7c888f2fc
SHA164bcd6d5d27f123531d7b1f9a23db45fbc04b490
SHA25698d5d126535fef107bdf843a0bda2f9a354dc42a68c92957178398ee13a9f5d1
SHA5125207562db4a104cf52b35cc94de57dc386801baa457adb72398a67068f07db41152df2a5ac81dc2d06baf70d3db730d38b4053868f2d44bf9628716037d01b54
-
Filesize
64KB
MD56bde9d8a5f267e2ef5252321bd81d15b
SHA196d4fc6b7cd2d2e2d6cf1714e88414c3fd4792bc
SHA25600f17a8206b290fda65a0fa436055c410dfaa7bc6edd513277fe4f638664bbcd
SHA512a5ce2b949987514dc3319d19a379b81ead2199bf79b64816f45366bd06e73f7ba233ce4ac955f2506b12c9836ce07551eae7f1a7411accdaa7795afb1d3ba6de
-
Filesize
64KB
MD59b7ac2f30cce3a51ba8a189a16a2e807
SHA14f955be52bf45ac65505719696c889272a24fe66
SHA256f04c29d0e409df362df1cfba801627165cea58df12af810a558dbc26d1e5ab4b
SHA512ed7a2cbe7ed64b0ea162e246c1326c47b833cd32013ada92d3acb2c04e65ce5cea1590add8a2d00af2a47cc32e22b3573722b72dd45f1e1db1ddf6e05ebf0a49
-
Filesize
64KB
MD56e449320eb030d3544bfb8751c43399a
SHA14075781780970f65dc2d6392ab09ea52eaa27ab0
SHA25671e3160cb6393b0686f231431eef46ec034668272b0a8387875799cf98bd7cbe
SHA512013d50feed184c62b0e4f3d1fb8a7c126af87d1f60ce95661813049ebd52759659bd672a313635fc7a34434844d911779edd7eae1c8d8e02b7dc1c9b97caceb4
-
Filesize
39B
MD5415c421ba7ae46e77bdee3a681ecc156
SHA1b0db5782b7688716d6fc83f7e650ffe1143201b7
SHA256e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e
SHA512dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62
-
Filesize
729B
MD58e3c734e8dd87d639fb51500d42694b5
SHA1f76371d31eed9663e9a4fd7cb95f54dcfc51f87f
SHA256574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad
SHA51206ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853
-
Filesize
64KB
MD517daad23acc956a05ab29b830ff907e5
SHA155fd3d17a04b197a7ac495dee1e7db4093cf5449
SHA256b7339fcbeef88a33386ff737bb30f1533d351a8d0c49a838c9b2d6b01349177a
SHA512ed38573ab28edf5903fa11fde36db514aab42056e41d9043d40fe1496bb4c018af7a2a37ba880167291608202915673b9d832695e993ceea911e4b928ab4293d