Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:17
Static task
static1
Behavioral task
behavioral1
Sample
b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe
Resource
win10v2004-20241007-en
General
-
Target
b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe
-
Size
56KB
-
MD5
01fce7d77edd9cb87d7eda278c91f36c
-
SHA1
2f79a23eb9f5a67119cc15584642937fa2d83e18
-
SHA256
b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8
-
SHA512
3d9f81030dad3bbfc79c10a2610cc73c964719693ea492eb71d4ef04b7d52d1b83569e1b69356a1107708af55044576dcf61098833ea875a95ad90e3ab04a6b4
-
SSDEEP
768:VNuG777/+V36n9PcXYvn8KR1I3NznRAQZlh4VkpX179r+R5GOwekff:V8w2VS9Eovn8KRgWmhZpX1Qvwj
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" imoet.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Tiwi.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 35 IoCs
pid Process 2612 Tiwi.exe 3056 IExplorer.exe 1652 Tiwi.exe 2952 Tiwi.exe 1052 IExplorer.exe 2444 IExplorer.exe 860 Tiwi.exe 2344 winlogon.exe 2816 winlogon.exe 1728 IExplorer.exe 372 imoet.exe 1996 imoet.exe 1844 winlogon.exe 1860 cute.exe 2096 cute.exe 3024 imoet.exe 2760 winlogon.exe 2856 cute.exe 2772 Tiwi.exe 2288 Tiwi.exe 2780 imoet.exe 2812 IExplorer.exe 2640 IExplorer.exe 1676 Tiwi.exe 1524 cute.exe 1740 winlogon.exe 1804 IExplorer.exe 784 winlogon.exe 2168 imoet.exe 296 imoet.exe 1724 winlogon.exe 536 cute.exe 2432 cute.exe 1980 imoet.exe 592 cute.exe -
Loads dropped DLL 53 IoCs
pid Process 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 2612 Tiwi.exe 2612 Tiwi.exe 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 2612 Tiwi.exe 2612 Tiwi.exe 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 3056 IExplorer.exe 3056 IExplorer.exe 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 2612 Tiwi.exe 2612 Tiwi.exe 3056 IExplorer.exe 3056 IExplorer.exe 2612 Tiwi.exe 2612 Tiwi.exe 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 3056 IExplorer.exe 3056 IExplorer.exe 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 3056 IExplorer.exe 3056 IExplorer.exe 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 2344 winlogon.exe 2344 winlogon.exe 372 imoet.exe 372 imoet.exe 372 imoet.exe 372 imoet.exe 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 1860 cute.exe 1860 cute.exe 2344 winlogon.exe 2344 winlogon.exe 2344 winlogon.exe 372 imoet.exe 1860 cute.exe 1860 cute.exe 2344 winlogon.exe 2344 winlogon.exe 372 imoet.exe 372 imoet.exe 1860 cute.exe 1860 cute.exe 1860 cute.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe -
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" Tiwi.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File opened (read-only) \??\K: winlogon.exe File opened (read-only) \??\L: winlogon.exe File opened (read-only) \??\S: winlogon.exe File opened (read-only) \??\H: IExplorer.exe File opened (read-only) \??\J: imoet.exe File opened (read-only) \??\P: imoet.exe File opened (read-only) \??\Q: cute.exe File opened (read-only) \??\Y: Tiwi.exe File opened (read-only) \??\Y: IExplorer.exe File opened (read-only) \??\V: imoet.exe File opened (read-only) \??\W: imoet.exe File opened (read-only) \??\P: winlogon.exe File opened (read-only) \??\U: cute.exe File opened (read-only) \??\G: b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File opened (read-only) \??\K: b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File opened (read-only) \??\I: Tiwi.exe File opened (read-only) \??\Q: IExplorer.exe File opened (read-only) \??\J: winlogon.exe File opened (read-only) \??\E: Tiwi.exe File opened (read-only) \??\S: IExplorer.exe File opened (read-only) \??\E: winlogon.exe File opened (read-only) \??\E: imoet.exe File opened (read-only) \??\M: b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File opened (read-only) \??\H: winlogon.exe File opened (read-only) \??\I: imoet.exe File opened (read-only) \??\B: cute.exe File opened (read-only) \??\T: winlogon.exe File opened (read-only) \??\J: cute.exe File opened (read-only) \??\R: cute.exe File opened (read-only) \??\Q: b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File opened (read-only) \??\R: Tiwi.exe File opened (read-only) \??\L: IExplorer.exe File opened (read-only) \??\W: IExplorer.exe File opened (read-only) \??\M: winlogon.exe File opened (read-only) \??\W: cute.exe File opened (read-only) \??\R: b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File opened (read-only) \??\W: b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File opened (read-only) \??\O: winlogon.exe File opened (read-only) \??\B: imoet.exe File opened (read-only) \??\B: winlogon.exe File opened (read-only) \??\R: imoet.exe File opened (read-only) \??\N: b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File opened (read-only) \??\T: b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File opened (read-only) \??\X: b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File opened (read-only) \??\H: Tiwi.exe File opened (read-only) \??\I: IExplorer.exe File opened (read-only) \??\Z: Tiwi.exe File opened (read-only) \??\V: IExplorer.exe File opened (read-only) \??\U: imoet.exe File opened (read-only) \??\G: cute.exe File opened (read-only) \??\K: cute.exe File opened (read-only) \??\G: winlogon.exe File opened (read-only) \??\L: imoet.exe File opened (read-only) \??\T: imoet.exe File opened (read-only) \??\J: b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File opened (read-only) \??\M: Tiwi.exe File opened (read-only) \??\B: IExplorer.exe File opened (read-only) \??\K: IExplorer.exe File opened (read-only) \??\U: IExplorer.exe File opened (read-only) \??\V: Tiwi.exe File opened (read-only) \??\Q: imoet.exe File opened (read-only) \??\Z: imoet.exe File opened (read-only) \??\O: cute.exe -
Modifies WinLogon 2 TTPs 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" imoet.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File opened for modification C:\autorun.inf b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File created F:\autorun.inf b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File opened for modification F:\autorun.inf b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe -
Drops file in System32 directory 40 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe cute.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\tiwi.scr b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe cute.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File created C:\Windows\SysWOW64\IExplorer.exe b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr cute.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe imoet.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File opened for modification C:\Windows\SysWOW64\shell.exe Tiwi.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe Tiwi.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr imoet.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr Tiwi.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe winlogon.exe File created C:\Windows\SysWOW64\IExplorer.exe cute.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\shell.exe b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\tiwi.scr winlogon.exe File opened for modification C:\Windows\SysWOW64\shell.exe imoet.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe imoet.exe -
Drops file in Windows directory 26 IoCs
description ioc Process File created C:\Windows\tiwi.exe Tiwi.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe cute.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe Tiwi.exe File created C:\Windows\tiwi.exe IExplorer.exe File opened for modification C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\tiwi.exe winlogon.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\tiwi.exe imoet.exe File created C:\Windows\tiwi.exe imoet.exe File created C:\Windows\tiwi.exe cute.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imoet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tiwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cute.exe -
Modifies Control Panel 54 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\s1159 = "Tiwi" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Mouse\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\ b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\s2359 = "Tiwi" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\s1159 = "Tiwi" imoet.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Mouse\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\s1159 = "Tiwi" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\s1159 = "Tiwi" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" cute.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Mouse\SwapMouseButtons = "1" cute.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\s2359 = "Tiwi" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" imoet.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\ imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Mouse\SwapMouseButtons = "1" imoet.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Mouse\ b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" cute.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\s2359 = "Tiwi" imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Mouse\SwapMouseButtons = "1" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\s1159 = "Tiwi" cute.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\ Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Mouse\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\s2359 = "Tiwi" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\s2359 = "Tiwi" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" cute.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\ cute.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Mouse\ Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\s2359 = "Tiwi" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\s1159 = "Tiwi" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Mouse\SwapMouseButtons = "1" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" imoet.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Mouse\ imoet.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Mouse\SwapMouseButtons = "1" Tiwi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Mouse\SwapMouseButtons = "1" IExplorer.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\ winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." winlogon.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\ imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\ Tiwi.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." cute.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\ b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\ cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" cute.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" imoet.exe -
Modifies Internet Explorer start page 1 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" Tiwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" imoet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" cute.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cute.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Tiwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command imoet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Tiwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 2612 Tiwi.exe 372 imoet.exe 2344 winlogon.exe 3056 IExplorer.exe 1860 cute.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
pid Process 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 2612 Tiwi.exe 3056 IExplorer.exe 1652 Tiwi.exe 2952 Tiwi.exe 1052 IExplorer.exe 2444 IExplorer.exe 860 Tiwi.exe 2344 winlogon.exe 2816 winlogon.exe 1728 IExplorer.exe 372 imoet.exe 1996 imoet.exe 1844 winlogon.exe 1860 cute.exe 2096 cute.exe 3024 imoet.exe 2760 winlogon.exe 2856 cute.exe 2288 Tiwi.exe 2772 Tiwi.exe 2640 IExplorer.exe 2780 imoet.exe 2812 IExplorer.exe 1676 Tiwi.exe 784 winlogon.exe 1740 winlogon.exe 1524 cute.exe 1804 IExplorer.exe 2168 imoet.exe 296 imoet.exe 1724 winlogon.exe 536 cute.exe 2432 cute.exe 1980 imoet.exe 592 cute.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2612 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 30 PID 3020 wrote to memory of 2612 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 30 PID 3020 wrote to memory of 2612 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 30 PID 3020 wrote to memory of 2612 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 30 PID 3020 wrote to memory of 3056 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 31 PID 3020 wrote to memory of 3056 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 31 PID 3020 wrote to memory of 3056 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 31 PID 3020 wrote to memory of 3056 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 31 PID 3020 wrote to memory of 1652 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 32 PID 3020 wrote to memory of 1652 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 32 PID 3020 wrote to memory of 1652 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 32 PID 3020 wrote to memory of 1652 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 32 PID 2612 wrote to memory of 2952 2612 Tiwi.exe 33 PID 2612 wrote to memory of 2952 2612 Tiwi.exe 33 PID 2612 wrote to memory of 2952 2612 Tiwi.exe 33 PID 2612 wrote to memory of 2952 2612 Tiwi.exe 33 PID 3020 wrote to memory of 1052 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 34 PID 3020 wrote to memory of 1052 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 34 PID 3020 wrote to memory of 1052 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 34 PID 3020 wrote to memory of 1052 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 34 PID 2612 wrote to memory of 2444 2612 Tiwi.exe 35 PID 2612 wrote to memory of 2444 2612 Tiwi.exe 35 PID 2612 wrote to memory of 2444 2612 Tiwi.exe 35 PID 2612 wrote to memory of 2444 2612 Tiwi.exe 35 PID 3056 wrote to memory of 860 3056 IExplorer.exe 36 PID 3056 wrote to memory of 860 3056 IExplorer.exe 36 PID 3056 wrote to memory of 860 3056 IExplorer.exe 36 PID 3056 wrote to memory of 860 3056 IExplorer.exe 36 PID 2612 wrote to memory of 2344 2612 Tiwi.exe 38 PID 2612 wrote to memory of 2344 2612 Tiwi.exe 38 PID 2612 wrote to memory of 2344 2612 Tiwi.exe 38 PID 2612 wrote to memory of 2344 2612 Tiwi.exe 38 PID 3020 wrote to memory of 2816 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 37 PID 3020 wrote to memory of 2816 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 37 PID 3020 wrote to memory of 2816 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 37 PID 3020 wrote to memory of 2816 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 37 PID 3056 wrote to memory of 1728 3056 IExplorer.exe 39 PID 3056 wrote to memory of 1728 3056 IExplorer.exe 39 PID 3056 wrote to memory of 1728 3056 IExplorer.exe 39 PID 3056 wrote to memory of 1728 3056 IExplorer.exe 39 PID 3020 wrote to memory of 1996 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 40 PID 3020 wrote to memory of 1996 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 40 PID 3020 wrote to memory of 1996 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 40 PID 3020 wrote to memory of 1996 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 40 PID 2612 wrote to memory of 372 2612 Tiwi.exe 41 PID 2612 wrote to memory of 372 2612 Tiwi.exe 41 PID 2612 wrote to memory of 372 2612 Tiwi.exe 41 PID 2612 wrote to memory of 372 2612 Tiwi.exe 41 PID 3056 wrote to memory of 1844 3056 IExplorer.exe 42 PID 3056 wrote to memory of 1844 3056 IExplorer.exe 42 PID 3056 wrote to memory of 1844 3056 IExplorer.exe 42 PID 3056 wrote to memory of 1844 3056 IExplorer.exe 42 PID 2612 wrote to memory of 1860 2612 Tiwi.exe 43 PID 2612 wrote to memory of 1860 2612 Tiwi.exe 43 PID 2612 wrote to memory of 1860 2612 Tiwi.exe 43 PID 2612 wrote to memory of 1860 2612 Tiwi.exe 43 PID 3020 wrote to memory of 2096 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 44 PID 3020 wrote to memory of 2096 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 44 PID 3020 wrote to memory of 2096 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 44 PID 3020 wrote to memory of 2096 3020 b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe 44 PID 3056 wrote to memory of 3024 3056 IExplorer.exe 45 PID 3056 wrote to memory of 3024 3056 IExplorer.exe 45 PID 3056 wrote to memory of 3024 3056 IExplorer.exe 45 PID 3056 wrote to memory of 3024 3056 IExplorer.exe 45 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Tiwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System imoet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" imoet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" cute.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe"C:\Users\Admin\AppData\Local\Temp\b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3020 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2612 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2952
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2444
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2344 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2288
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2812
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:784
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:296
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:536
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:372 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2640
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2168
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2432
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1860 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1676
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1804
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1724
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1980
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:592
-
-
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3056 -
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:860
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1728
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1844
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3024
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2856
-
-
-
C:\Windows\Tiwi.exeC:\Windows\Tiwi.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1652
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1052
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1996
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2096
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2760
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2780
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1524
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5c12211931123dc86c7e580f915e9c3a9
SHA1654cc5038247bb672a5ccb7f87ec91be36c3d1d6
SHA256ade20c8a8b0ae23079bc1601ea1d2d45e59ae34020901ee6dbf9a983d595df7a
SHA5123d4d3c0670d36a727eac5790a79c34868d4a9565b15feaca895fe6cce0cb7cc0d8cd5b146f63d73ce264d51d4c0b10c9146ce80c6133faf88a0b43ce0d8de328
-
Filesize
56KB
MD5feac2c1c90719dcb36877f60f6486fd9
SHA15c943df1466ec49f0182ed4aa2682a944e9d6511
SHA256c21b91d21ddda7908b1fbfb9b9583e56f3820000b281e124611e5ca303f3576c
SHA512c323fb05b6b020ad813bbcc63bd0db5acc5d62d57f7a385bd3bbbfd8c52a59fec0fb154a0bbb9b00f38424cb7633a585ef5765af98d589867bc1f8d49a42db5d
-
Filesize
56KB
MD5c694fc6c9b902db284cfd8534169c59e
SHA15dc084b4d018f53b889797a811f6900b8f7f9e1e
SHA2560faaa12fde6835e14dddbb8a5b624d1cc6a5ab7bab70ac09bb8a9437bbf1a1e3
SHA5126dee99cda6c6d53941faae5fe17196870db229e00eb78f4e3146229ec9a6d1ddca9ae799e29375d604b841f88df4a7dcebe64cb318f29766ffc14db40b75ded9
-
Filesize
56KB
MD558e10c281de1c4530d3f92b9f50739f3
SHA1ce5d73a53143c9520c1719ba50822987728e8ce4
SHA25623299859f3d8833176d4c4dc4b8fbc163f88fb03f14b9811d0a96b2b88d52227
SHA5126b2d496ee469cab884863684eee6579db87c60c32ffd81cd63e59b439699914846e7b8be68ce82fbd6dfc5cd86e76374f6ea21c489ba351f86067afbe58ece2a
-
Filesize
56KB
MD58e38567cb18592631c6c9232d59da58c
SHA13abd378639ff19cebf58e5ff3620be030e8b4420
SHA256e129fb3e6abb8ac8b1850ea97bebdb957177af3365fd99c21ddb2485560c5077
SHA5126dbe6a1e55961f9cee8ab3439bf1dda58ff2c3f3dafe9f48f02fc95d5b6326576b7d054b84f255173a296dbae62d4f3fbdb21b35235f9733b73c701668f95199
-
Filesize
45KB
MD50bdb59a8166ad09713cb359f6aebeb92
SHA1e39ce13583f80070c051a8d4aa8994a8ce390bba
SHA256855c5974a0f351ed5d013e762fe8b8871316455bdbd4b872456d4232b6262906
SHA51267aec60841753f2fa4c9e5b5ca9b58976a6e1cad009ee8fce26f93885f44a72ecce5629866b77f3d10b99da20064b8b65b9a15fb3949aad406fc469592b9181f
-
Filesize
45KB
MD5a29b95e1a7673ad758f2793e8bb2cd47
SHA18e81840c840d7cf244bf7cfd39a4593771ce9556
SHA256d137f7cec9a83d1b667962d332d8706b503c706e911e384e1ff50ad69113e735
SHA51201b1f4f5b46c583eac7e6a3c45d16532393f1bb496f2afb045f53bbf6a1392944491f1a4a596aaf5fae5545039b692fb9a69a875a026ede318739138982c84b7
-
Filesize
56KB
MD5777ed30b703cc8abeb3c4231bdb6d9c9
SHA108061b57dc3122fc2ee1633f0be4fbdbdc44cbda
SHA256ddaef05a711b120f41e6b963ca2a70409d05f952c4c5450b940d13ab5ed0e17f
SHA512f0295088d4965c46c43328907852cad28308e1a830ae9f3f09964eeccc27c18b66840fa03b04dab1a39d22cc99900bb326c93c9a1a7f4307ef0038775c8f5819
-
Filesize
56KB
MD54482f69dbd262a217fb9e78ca77f824a
SHA1d93be51c2fecf63358a76513192fb194e296d55f
SHA256ceeff24ce2ce489cad5b50020654af3571dc9fc09f7a51f26913dd905dd6bd5f
SHA512f50ea3710789ce307d93aff116ff1edca6159e6008dd6258f989bb8d99abf7a75995ac8ab4bc6cb39cde1e02b6ec4cb7e58f685960cd65f42b1ad3c40caf5c6c
-
Filesize
56KB
MD56d16161d14c7e314fd37f6e875a75ca7
SHA1452dc7d652f553e583fc302aaf2f65cf80122ea9
SHA256dbaa599bd5f42cbcbfadd29174107cb44968e9f9dbcae26d03258f3cc0995b78
SHA5127ad8f3613a51beb979b15c211bbeb6b0d8d3dcac30de898d0c56acc4cd798940951b2c47789cede8b147919048ee3a7c4306ab82ef69c755accbc89e1246b892
-
Filesize
56KB
MD5ff987f51c48808a96e888cde8bfa1bfb
SHA12ffe1fc9fb3663e60e4f5f2086b09594f7ef85ee
SHA2566ac8f56cd9d242294b5ccf382f30cea11c2d8803b562226a0fb277c61f68b253
SHA512b3d6df00d166cadf0a8823490b01455bfb3bcc798ebe4f564bcc88783fb6822bb3a518249285249f60d783c41f6a16a845a6e09345e830653f7c2e7d4c6b80e5
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
56KB
MD52aee59ec684aaf81fd2a6d489f315b0f
SHA19fd6945f747287e92def8a20ecfc0ce12e94d3de
SHA256669d3aa4620a21e9860460a76ae5df005d61d29001abcccce3106915cc87e285
SHA5121380db469ca21c249da194247d562ba1d865c81531b72a9ced80f5a86b4328b815c502ccfad405da50f3f9af24726d80bbb5a69534ca62a1da640f3b4092d464
-
Filesize
56KB
MD52f62227bf8c12b650861e9f159e9cbaa
SHA1ee35afa291145f15effa471aa78804149104d946
SHA256d8bad07dce2d4cf31d2b84f7372c922910a822ac3d991deb023f966a3b2715a0
SHA512914af745da80b276c67e2c5c06f1de4137a10eb50b365a1671f690e74972a534c7bed55b205618b88a16300781fdf38b7cc8c9149b451b094298934f65180536
-
Filesize
56KB
MD5c71c4f1ada77624e0df3e2265d6deae0
SHA13519a32e3c3018707316dba9b2a46a020110a65a
SHA25645ac9165a04f4f842b97b26e2dab6ee5d270d12aea444d63ef3f8fc6f7492e7e
SHA512d506acd67de52ca5e83dd21a13e4ea3a4b92bf780a60729f70039f2dd4162a3f088168aa72b40046da87492c38cdd2a3528f972ef8ce468c2590c9cbcb881b27
-
Filesize
56KB
MD501fce7d77edd9cb87d7eda278c91f36c
SHA12f79a23eb9f5a67119cc15584642937fa2d83e18
SHA256b283a03560d69a54742c2b78e27727f91a13e4c4c26b4054b7020cacfa0900b8
SHA5123d9f81030dad3bbfc79c10a2610cc73c964719693ea492eb71d4ef04b7d52d1b83569e1b69356a1107708af55044576dcf61098833ea875a95ad90e3ab04a6b4
-
Filesize
56KB
MD54fcb1c26b404a45ed6cfb189f48fea50
SHA1663391e4aecb4f83df3c9b603422bbeec4f9980c
SHA25605e15902d74646ce81d4d47003f0d145ac76df9dd96d046d6bc5b0ab16193fb3
SHA5127efef694e7d015d7d1a0c70ccb79664b40417485b713e439c031ded84cfe02fe40d68452e52477a6e6d4357aedeea8b7eb2f34de7f386a9c40195c717dcc5c32
-
Filesize
56KB
MD5ecac598af3e64d66837e97a339bdd71d
SHA1cd38bdce399c778b6aab4c096d43605ceb990fa7
SHA256a252584a300b11d17cd49391205b4862cf0a8404fa6cc3a0beaaf1827f876e25
SHA5123d467a99feb7f8a8c9a8ccce9f69349811edf7d62003c71abb5851713815c83bdb751e758519ca235bfd5c897eada6b67e4a5edf1395a0894e49941c6c3f9071
-
Filesize
56KB
MD5b0b95e8ce22d4e86638921457c903cc1
SHA1b9bb7daa3d2e53a0d14b3415946b254f77813293
SHA256ee600a3170880201638b606f2025fc38eb3d520da08b0a9dba8cc061b6dfde62
SHA512d7264f5ecc5f7138842ddf00651827a430c7a7d2247b7ae7a3f02a9a17625b38de1cac590e5519abab63481598be6bb1157bce9d52ac74331771db6de7adfa48
-
Filesize
729B
MD58e3c734e8dd87d639fb51500d42694b5
SHA1f76371d31eed9663e9a4fd7cb95f54dcfc51f87f
SHA256574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad
SHA51206ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853
-
Filesize
56KB
MD517395eed72bb773668282932c535a48e
SHA1bcf6bf75fade96f66d9b4ca7d2fc8067eb1a58d8
SHA256a1637cde34beb80fcb9bd9ca11e44d28468ae9a33f152b5241d1fa3cfb55a4d2
SHA5129492df22af0ca7092eed3e088be729cfb8b5225510d0cee46e026a13329271b5d6c8689b6e2150cf8d102ea8b685f4d498089437add5aaa630b15113f894142a
-
Filesize
56KB
MD539806a75949aba07dc297719a5f11674
SHA1ccc652458878d44892aed5c3c748fb90932caae7
SHA2568b31ba11ca86aecbda5782868d5737beb8201235ca031fd925955e318863edcf
SHA512aa62b9d0550d35d75c7cd8f16b5e534ee7eeb4d00e77d32a2c217c637429fde6d8cd69fad26bce310aab933054a214b3623f43f02a09b2d00879b4d52b4a2155
-
Filesize
39B
MD5415c421ba7ae46e77bdee3a681ecc156
SHA1b0db5782b7688716d6fc83f7e650ffe1143201b7
SHA256e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e
SHA512dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62