Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:10
Static task
static1
Behavioral task
behavioral1
Sample
e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe
Resource
win10v2004-20241007-en
General
-
Target
e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe
-
Size
64KB
-
MD5
4e0cf4ae6d67a0f7544148bc3a10deaa
-
SHA1
97a5175e1b4e11dd7248132be773eb1fb4de6477
-
SHA256
e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3
-
SHA512
718679ac586f512de52079edb16d3a7619a3a8e31e2c0d8d8bee3fca743fa77b62a319d1b4237019ec850b47508e3d93a7135c15333205b27df16d38ae12df4d
-
SSDEEP
768:VNuG777/+V36n9PcXYvn8KR1I3NznRAQZlh4VkpX179r+R5TOwekflNuG777/+VG:V8w2VS9Eovn8KRgWmhZpX1Q6wJ8w2VG
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" imoet.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cute.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cute.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 35 IoCs
pid Process 2552 Tiwi.exe 3012 IExplorer.exe 2764 winlogon.exe 2908 Tiwi.exe 2024 Tiwi.exe 3024 IExplorer.exe 1796 IExplorer.exe 772 Tiwi.exe 1680 winlogon.exe 2968 Tiwi.exe 2452 winlogon.exe 2972 imoet.exe 3040 IExplorer.exe 2636 IExplorer.exe 2204 imoet.exe 2924 cute.exe 1932 winlogon.exe 1056 cute.exe 2704 winlogon.exe 2824 imoet.exe 2880 imoet.exe 2820 imoet.exe 2948 Tiwi.exe 1596 cute.exe 2508 cute.exe 2068 cute.exe 1472 IExplorer.exe 840 Tiwi.exe 780 winlogon.exe 1952 IExplorer.exe 1612 imoet.exe 1232 cute.exe 2992 winlogon.exe 2904 imoet.exe 2916 cute.exe -
Loads dropped DLL 53 IoCs
pid Process 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 2552 Tiwi.exe 2552 Tiwi.exe 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 2552 Tiwi.exe 2552 Tiwi.exe 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 3012 IExplorer.exe 3012 IExplorer.exe 2764 winlogon.exe 2764 winlogon.exe 2552 Tiwi.exe 2552 Tiwi.exe 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 3012 IExplorer.exe 3012 IExplorer.exe 2552 Tiwi.exe 2764 winlogon.exe 2552 Tiwi.exe 3012 IExplorer.exe 3012 IExplorer.exe 2764 winlogon.exe 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 2764 winlogon.exe 2764 winlogon.exe 2764 winlogon.exe 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 3012 IExplorer.exe 3012 IExplorer.exe 2972 imoet.exe 2972 imoet.exe 2972 imoet.exe 2972 imoet.exe 2924 cute.exe 2924 cute.exe 2972 imoet.exe 2972 imoet.exe 2972 imoet.exe 2924 cute.exe 2924 cute.exe 2924 cute.exe 2924 cute.exe 2924 cute.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe -
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: winlogon.exe File opened (read-only) \??\S: imoet.exe File opened (read-only) \??\V: cute.exe File opened (read-only) \??\K: Tiwi.exe File opened (read-only) \??\M: Tiwi.exe File opened (read-only) \??\P: Tiwi.exe File opened (read-only) \??\M: imoet.exe File opened (read-only) \??\R: imoet.exe File opened (read-only) \??\I: cute.exe File opened (read-only) \??\K: cute.exe File opened (read-only) \??\U: cute.exe File opened (read-only) \??\Q: Tiwi.exe File opened (read-only) \??\T: IExplorer.exe File opened (read-only) \??\I: imoet.exe File opened (read-only) \??\P: IExplorer.exe File opened (read-only) \??\K: winlogon.exe File opened (read-only) \??\N: e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File opened (read-only) \??\U: e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File opened (read-only) \??\O: Tiwi.exe File opened (read-only) \??\B: cute.exe File opened (read-only) \??\T: Tiwi.exe File opened (read-only) \??\O: winlogon.exe File opened (read-only) \??\X: imoet.exe File opened (read-only) \??\G: cute.exe File opened (read-only) \??\Z: cute.exe File opened (read-only) \??\P: e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File opened (read-only) \??\U: Tiwi.exe File opened (read-only) \??\U: IExplorer.exe File opened (read-only) \??\R: Tiwi.exe File opened (read-only) \??\E: IExplorer.exe File opened (read-only) \??\W: winlogon.exe File opened (read-only) \??\N: cute.exe File opened (read-only) \??\H: e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File opened (read-only) \??\J: e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File opened (read-only) \??\X: e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File opened (read-only) \??\P: winlogon.exe File opened (read-only) \??\L: Tiwi.exe File opened (read-only) \??\B: winlogon.exe File opened (read-only) \??\I: winlogon.exe File opened (read-only) \??\Q: imoet.exe File opened (read-only) \??\Z: imoet.exe File opened (read-only) \??\V: e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File opened (read-only) \??\E: Tiwi.exe File opened (read-only) \??\R: winlogon.exe File opened (read-only) \??\Y: winlogon.exe File opened (read-only) \??\T: winlogon.exe File opened (read-only) \??\U: winlogon.exe File opened (read-only) \??\I: Tiwi.exe File opened (read-only) \??\W: IExplorer.exe File opened (read-only) \??\H: winlogon.exe File opened (read-only) \??\H: IExplorer.exe File opened (read-only) \??\E: winlogon.exe File opened (read-only) \??\B: imoet.exe File opened (read-only) \??\E: cute.exe File opened (read-only) \??\J: cute.exe File opened (read-only) \??\S: Tiwi.exe File opened (read-only) \??\X: Tiwi.exe File opened (read-only) \??\Z: Tiwi.exe File opened (read-only) \??\S: e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File opened (read-only) \??\Y: Tiwi.exe File opened (read-only) \??\L: winlogon.exe File opened (read-only) \??\K: e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File opened (read-only) \??\J: IExplorer.exe File opened (read-only) \??\G: imoet.exe -
Modifies WinLogon 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" winlogon.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created F:\autorun.inf e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File opened for modification F:\autorun.inf e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File created C:\autorun.inf e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File opened for modification C:\autorun.inf e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe -
Drops file in System32 directory 40 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\IExplorer.exe imoet.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr Tiwi.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\tiwi.scr e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe cute.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe imoet.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr imoet.exe File created C:\Windows\SysWOW64\IExplorer.exe cute.exe File opened for modification C:\Windows\SysWOW64\shell.exe e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr winlogon.exe File created C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe imoet.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr cute.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\shell.exe e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe cute.exe -
Drops file in Windows directory 26 IoCs
description ioc Process File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe Tiwi.exe File created C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe winlogon.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe imoet.exe File opened for modification C:\Windows\tiwi.exe e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File created C:\Windows\tiwi.exe e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe cute.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe Tiwi.exe File opened for modification C:\Windows\tiwi.exe IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe imoet.exe File created C:\Windows\tiwi.exe cute.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe -
Modifies Control Panel 54 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Mouse\SwapMouseButtons = "1" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\ Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\s1159 = "Tiwi" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\s2359 = "Tiwi" imoet.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Mouse\ imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Mouse\SwapMouseButtons = "1" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\s1159 = "Tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" cute.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Mouse\ winlogon.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Mouse\ e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\ IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" cute.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\s2359 = "Tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\s2359 = "Tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\s1159 = "Tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\s2359 = "Tiwi" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\s2359 = "Tiwi" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" imoet.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\ cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Mouse\SwapMouseButtons = "1" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\s1159 = "Tiwi" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Mouse\SwapMouseButtons = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Mouse\SwapMouseButtons = "1" imoet.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\ e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\s1159 = "Tiwi" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\ e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Mouse\ Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Mouse\SwapMouseButtons = "1" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\s2359 = "Tiwi" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Mouse\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\s1159 = "Tiwi" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Mouse\ cute.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\ e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." imoet.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\ cute.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" cute.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." IExplorer.exe -
Modifies Internet Explorer start page 1 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" imoet.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 2552 Tiwi.exe 2972 imoet.exe 2764 winlogon.exe 3012 IExplorer.exe 2924 cute.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
pid Process 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 2552 Tiwi.exe 3012 IExplorer.exe 2764 winlogon.exe 2908 Tiwi.exe 2024 Tiwi.exe 3024 IExplorer.exe 1796 IExplorer.exe 1680 winlogon.exe 772 Tiwi.exe 2452 winlogon.exe 2968 Tiwi.exe 3040 IExplorer.exe 2972 imoet.exe 2204 imoet.exe 2636 IExplorer.exe 1932 winlogon.exe 2924 cute.exe 2704 winlogon.exe 1056 cute.exe 2820 imoet.exe 2880 imoet.exe 2824 imoet.exe 1596 cute.exe 2948 Tiwi.exe 1472 IExplorer.exe 2068 cute.exe 2508 cute.exe 840 Tiwi.exe 780 winlogon.exe 1612 imoet.exe 1952 IExplorer.exe 1232 cute.exe 2992 winlogon.exe 2904 imoet.exe 2916 cute.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2552 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 31 PID 2380 wrote to memory of 2552 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 31 PID 2380 wrote to memory of 2552 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 31 PID 2380 wrote to memory of 2552 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 31 PID 2380 wrote to memory of 3012 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 32 PID 2380 wrote to memory of 3012 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 32 PID 2380 wrote to memory of 3012 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 32 PID 2380 wrote to memory of 3012 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 32 PID 2380 wrote to memory of 2764 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 33 PID 2380 wrote to memory of 2764 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 33 PID 2380 wrote to memory of 2764 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 33 PID 2380 wrote to memory of 2764 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 33 PID 2380 wrote to memory of 2908 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 34 PID 2380 wrote to memory of 2908 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 34 PID 2380 wrote to memory of 2908 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 34 PID 2380 wrote to memory of 2908 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 34 PID 2552 wrote to memory of 2024 2552 Tiwi.exe 35 PID 2552 wrote to memory of 2024 2552 Tiwi.exe 35 PID 2552 wrote to memory of 2024 2552 Tiwi.exe 35 PID 2552 wrote to memory of 2024 2552 Tiwi.exe 35 PID 2380 wrote to memory of 3024 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 36 PID 2380 wrote to memory of 3024 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 36 PID 2380 wrote to memory of 3024 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 36 PID 2380 wrote to memory of 3024 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 36 PID 2552 wrote to memory of 1796 2552 Tiwi.exe 37 PID 2552 wrote to memory of 1796 2552 Tiwi.exe 37 PID 2552 wrote to memory of 1796 2552 Tiwi.exe 37 PID 2552 wrote to memory of 1796 2552 Tiwi.exe 37 PID 3012 wrote to memory of 772 3012 IExplorer.exe 38 PID 3012 wrote to memory of 772 3012 IExplorer.exe 38 PID 3012 wrote to memory of 772 3012 IExplorer.exe 38 PID 3012 wrote to memory of 772 3012 IExplorer.exe 38 PID 2380 wrote to memory of 1680 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 39 PID 2380 wrote to memory of 1680 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 39 PID 2380 wrote to memory of 1680 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 39 PID 2380 wrote to memory of 1680 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 39 PID 2552 wrote to memory of 2452 2552 Tiwi.exe 40 PID 2552 wrote to memory of 2452 2552 Tiwi.exe 40 PID 2552 wrote to memory of 2452 2552 Tiwi.exe 40 PID 2552 wrote to memory of 2452 2552 Tiwi.exe 40 PID 2764 wrote to memory of 2968 2764 winlogon.exe 41 PID 2764 wrote to memory of 2968 2764 winlogon.exe 41 PID 2764 wrote to memory of 2968 2764 winlogon.exe 41 PID 2764 wrote to memory of 2968 2764 winlogon.exe 41 PID 2380 wrote to memory of 2972 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 42 PID 2380 wrote to memory of 2972 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 42 PID 2380 wrote to memory of 2972 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 42 PID 2380 wrote to memory of 2972 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 42 PID 3012 wrote to memory of 3040 3012 IExplorer.exe 43 PID 3012 wrote to memory of 3040 3012 IExplorer.exe 43 PID 3012 wrote to memory of 3040 3012 IExplorer.exe 43 PID 3012 wrote to memory of 3040 3012 IExplorer.exe 43 PID 2764 wrote to memory of 2636 2764 winlogon.exe 44 PID 2764 wrote to memory of 2636 2764 winlogon.exe 44 PID 2764 wrote to memory of 2636 2764 winlogon.exe 44 PID 2764 wrote to memory of 2636 2764 winlogon.exe 44 PID 2552 wrote to memory of 2204 2552 Tiwi.exe 45 PID 2552 wrote to memory of 2204 2552 Tiwi.exe 45 PID 2552 wrote to memory of 2204 2552 Tiwi.exe 45 PID 2552 wrote to memory of 2204 2552 Tiwi.exe 45 PID 2380 wrote to memory of 2924 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 46 PID 2380 wrote to memory of 2924 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 46 PID 2380 wrote to memory of 2924 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 46 PID 2380 wrote to memory of 2924 2380 e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe 46 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System imoet.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe"C:\Users\Admin\AppData\Local\Temp\e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2380 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2552 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2024
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1796
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2452
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2204
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1056
-
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3012 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:772
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3040
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1932
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2068
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2764 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2968
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2636
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2704
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2508
-
-
-
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2908
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3024
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1680
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2972 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2948
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1472
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:780
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1612
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1232
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2924 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:840
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1952
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2992
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2904
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2916
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1596
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5e9657a4383c1d7545a7ec9b93c098ccb
SHA17c8bbcbc5ff4de3001b3e42bd2fca9aed34e79a5
SHA2561b33f73c8b5bb7d0191c11b422fab79510ffcca59d3e285d4a0cc5343de0c863
SHA51297264da83973116d1ba124cf3201e74be6b886f76a97292ae7546525d67443dd993219b4c34028088fe24899005e7e6a305b81934402edf6bc821df4a290f596
-
Filesize
64KB
MD5c2718686d85efc135e8a873af259bf1f
SHA1f9a53f49eb1f3e9f63e6ade1e41c97b86d8cbd2c
SHA25633d58c03c26b6d41a6d38169b920485517467dfb8d5a55c0d19be7bbdeadf43d
SHA5123d12bbfa30dea4d5453dab32744beeb3d8ddd46c73bb472931b353836e2fc897f1cdaf914d5e40bd47d4612a3b13a1a94e0bfdd984ed6981ff7dccdd7948aa48
-
Filesize
64KB
MD5cb5d7eff4114ee5a9a177a43c350d87f
SHA1eee85c8ac59c5abe6816c93bf21e74a2433b2487
SHA256b1983f79f6a466f3af0f3205364a14dc2d89ba84c14ab6fafeddd6111bd37b95
SHA51217d46de58ca9c1a41a5757aab94c3ca9ff93670cbd5ea303dbfe71292f48d546bec447cb4c232d516bdd60c1df57fc3c8d0fa1dd8fea6c951c4352981a4d534a
-
Filesize
64KB
MD537c5c83ff11b2af6bc0f8c6c33b6c19f
SHA1830d21f036b82f317d7ebb38722cd0d0b3bd6f6d
SHA2562622abd7149789772a7156bf3195ac6952f4978e95852f58bd825e5e8594bddc
SHA512da1830d3a69cb0fb69cc2e43ec5304881145ecbfd8884d5bb68662bcf78ac6248835ca8532dd4641342a7aeb2761e9c89579e39c9e74e127172ce7645c6fabec
-
Filesize
64KB
MD52509ad230b4c497d931b7ac44985322c
SHA1325ba784e228a6c4c8290bbf9813a214093abdc9
SHA256aa2bbd08d5bfd3a29de21ee0d3881f0400e74a54a19ac01ebc2317d6bd35f999
SHA51292f2f146178d4c2eddfa4dcf4fad24af202d7836b577ed80636c4d3d5337a5a042a4aa46e0ed6fb4853d399ad731bf19b563ee3dc81063363a4594f68d510dbc
-
Filesize
64KB
MD58147b3e394c23e7b6dad4ba4ed9f07f3
SHA16eccfecede806f2c01c19d845a423b8f1cc0c5bf
SHA256504e823328dcfce2c6d07b16ab84d7d5a819259a2609ff796ebcaf42dcb77aed
SHA512abc884ea40dcf064e6ee08daf370758ef41e0ca0f89cb3b76de4be93246e45559825b214d886fed2de9e0c31d8ea4417dcbf22113741131694da128d6cf0743c
-
Filesize
45KB
MD5e6f3041208d555cab9d8e4f9d186caf8
SHA16b8c04855e11bbcd6be283b6ff0816f6883fbaed
SHA256e52ffa75c1a12c666d81ee2d50452a263bf62ccb23600bbc31ef0ee35b60b761
SHA5126ff6282b1817465d5c06b68f2a0b0fb07cb0dc6afffd36cea1b1c3cd98f3d93e9478b2ce25ae79ff992e56bed39a136a211be01e72b257b6d557ebc4a022ad37
-
Filesize
45KB
MD55e7ac2dc92e9ae10ddeaa44454d551a3
SHA1a1ac992383b9c610e60d51a9e3fcefb68dbb752d
SHA25627254fb828cadbb442c659680121fec16df55bd461554c2307d2df4e4bba35c1
SHA51231165905c483d51cb0bd6564567d6241404f6f29ab4875db36a9365c5d5f4660b7f5965ab100c61cdb1b38d3a4ec136d2319beab0a008a2ccc3217e0e675841c
-
Filesize
45KB
MD50bb3cd22fb3132c045b3bf8539b8b2eb
SHA1b1942af0f0004124a2b5b82e97c5ae27f1c61e32
SHA256cb31bec3f805ed6ec69a347a577f29250098cee57a1ad09a7570ba30d84543e3
SHA512e9ad87176b21a2dcbdb07c0e9036ea6d702654dd26d70dbe2436301ee64e4ce274d63797c81b562d62920d00426225d6a91f5ff6cb418360236b245c986bef1c
-
Filesize
64KB
MD55e27b7888ea08daaaa5f1758c588ee71
SHA1e59d9058797f474a575d0b3dc101c5e38ebf231c
SHA25686acdb91c368f5cb04a8bae5b3d4ffe79d449c5ce48d217492e8712579c36953
SHA5126e825e6db8dfcce15ac6a2d53de701b7af2d8f2f6910a9f79dccbfa9239eca7ac7026203153c584bfd55fdacfeb99771e117c0d6b344d404732402a8f32b1711
-
Filesize
64KB
MD5d112c4ae28d06358866dac27f184e2a0
SHA1ad20afa0018582016b028212505a3520d77a5637
SHA2562ae96d5819974befe6666e31b23c0a7c4909061753bbfdb6abcab4b275bd58c0
SHA51218bdcc1d627a7b426e6c840c053650799547808baca92ce74d32954c65b73f247c42ef0110da966549fc682a264af63b82d6257a4f5def8046c0d8b170b94ba3
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
64KB
MD5083628c8201b58bf507997fa9df7d9f6
SHA199d2c3b868b58436016a02953057617af7a9979c
SHA256c5eb86fa16e8a7483187810ea79131cbbfa39ff82cee328e24f3052a897575fe
SHA5122d039201a1be82f55ca37b04180ce79ba3203dea29dfe2b7eba8a20922575528b57cd9b194f93adb65a70025d8812bb0bb897935b03cd72cb1dca387f4b53cdf
-
Filesize
64KB
MD5d56bb6c6bbadbb90387c42128475f42a
SHA13caa53ea8528162738c433a610d2c2012efd6f9a
SHA256f5371fa816e07e7491045a69a37e6f149c99219554b4fc894f9d8949a14523bd
SHA512ba7ccde0bd864acc9bb818e5334ae54b595a83bbbcef1bd140ceb6994011f29f3eb2b769f14ee422ef2945f1934133369f378beb6b934b8b4b84f9f610620716
-
Filesize
64KB
MD54e0cf4ae6d67a0f7544148bc3a10deaa
SHA197a5175e1b4e11dd7248132be773eb1fb4de6477
SHA256e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3
SHA512718679ac586f512de52079edb16d3a7619a3a8e31e2c0d8d8bee3fca743fa77b62a319d1b4237019ec850b47508e3d93a7135c15333205b27df16d38ae12df4d
-
Filesize
64KB
MD59daf07328762cfe61d174ea430ea9d45
SHA10b0551861cd41bd2d24d1503c33450a13df753c4
SHA25643a0c23e6aa6b5fcafdf86f9ecc17f3cc6c5043acb49977b697604b490b61758
SHA51203073f37fa6c82c57e24ba6cdb5340b8e30c7c68b55f0753b8f1d89df123254e4ad33c43ae19996515e019f2031730ca0f9df60eba79509bc4d6c3a289c0a5bc
-
Filesize
64KB
MD53b0c56a51f6a115976582aac9f20432a
SHA1a1f75403454f14baa0b06d94b352a03d551fa828
SHA256d496241476fea40b364c1a79b73b66617a5689ef915ce9a0cd94ac8cf029c0b7
SHA51295afef8115f6de5eb09ac0c13a78fbc894dd463a5af07deedca2da3ca13042fca2371eb4abebf8bde2598e66b4645642428fc91a5ce5c4fba272b523f26f17ba
-
Filesize
64KB
MD5323a46e727868c492beed95ae121a1a6
SHA10f8501e06225adb19661314290c0af1a99fa4879
SHA25662a7ff4906c8d2fbe0f589cad000ec01ed4f5fb4d30de503fe6db856d44e971e
SHA5127e978d8389758ff2ea705b2ac17d17143bc3b47661f25eaaf1b16573e6d1752403a965247ba65a57e8c6006674f6775ed57cb86d35327f328f26b8c6350eae6e
-
Filesize
729B
MD58e3c734e8dd87d639fb51500d42694b5
SHA1f76371d31eed9663e9a4fd7cb95f54dcfc51f87f
SHA256574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad
SHA51206ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853
-
Filesize
64KB
MD518eb5541f1bb36fddb9896ab1209441e
SHA1988023a07de13d3b4c828e00d4b9bb96e76737d3
SHA256a968549bbd76bcfa7f3ac601cfa4f14bd45554f245aad58fb14cae2a5c4c397e
SHA512553cc89c84c52ee047c90f55145f5f29dec806f602427ff864353dcc295b707e49a583d54c2af7404941b73779cd902f1adbdcf19b23b11e27ac0bc621a10164
-
Filesize
64KB
MD5dfe094df805957aa4831a74cf83992ed
SHA1e4fad8633c818d7cca9e0ae0a1a0caed4ca91631
SHA2567e17f10f4c76f75ad4f5011b43987aafe6d243bad02107ffdcbf6776eaeac360
SHA51251d1119649f3dff2b35fb7c560ecc27c3d9b3021dd785b0ab4ac3b24043913d09e064816ded82bc5d62798a32bd516c9100e510fdd7def5eebcb22e3029ccf4d
-
Filesize
39B
MD5415c421ba7ae46e77bdee3a681ecc156
SHA1b0db5782b7688716d6fc83f7e650ffe1143201b7
SHA256e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e
SHA512dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62
-
Filesize
64KB
MD5901b36a70ad36d999d00246e30350731
SHA1133a7f9c8404651f30924500c7748c167d4a006f
SHA256937117aaa6b8775b47086173be4ff3541c7687932d6a4969ca48d77ecca13301
SHA512fb7b099eea8df1c5d2b904accd2dc211926f9fb11013f5deaa8cf814ec1ce6b75ca3a423470f2b13852ce0a84f5015a538269f4da2323beb876c2c0b864c82ab
-
Filesize
64KB
MD56a76a0389a4dc69c168270941980b936
SHA1743f1ce57466c6bc4b69c9fb69b653a65a7ee9e8
SHA2562318afee3955b19135129fdbcebfc1bc2e25a4769feb9aea2f6ca302ff5f4194
SHA5128621ce0339e465183481b4075e0eb4829ed77f7fdf55489f72708b6b52e0d403124ebf09fe76e2d6f992cccd533528b00c9805099a9fdaa1cf846d48f20c90ae
-
Filesize
64KB
MD5c341fb7e2bd7b5b50032bff5e9822672
SHA153aa20b2ce4e8cc62d8b003af22d1c5baa086888
SHA256fdc9aac4977367d87250dc42ae4629cb9b0686e45209650cba7210e2b8ebcbc4
SHA5120d3e30be66f11f075edfea7bd1a24d64c4ed28b0013a2ff9215725c4c6d808a7d0f58d268e2e4c35240730363333a7f57be4ffbb9fed789c425c622240c366e2