Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 22:12
Static task
static1
Behavioral task
behavioral1
Sample
4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe
Resource
win7-20240903-en
General
-
Target
4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe
-
Size
220KB
-
MD5
e700d0d7c9bcc8baf58e33747b0df4b0
-
SHA1
7e411f52a65e4cd92599ff86750b55a57e285724
-
SHA256
4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339
-
SHA512
6c954ef6c161cfd189bee3c50d04b723c420b2970aa4939e56201d73f53049a17d3644799b575c00ae0799026422f8afbf521856ffcd305d5364034164dd10bc
-
SSDEEP
3072:iNu9h3eiLZT2UTOyU2qTq/yecrqyEIlyny4iio1t1oBM9/AC99kLNh11GJ+UEtEj:lh3eeTXFUnq/yesLEoynn7BMJSXtt34
Malware Config
Signatures
-
Modifies security service 2 TTPs 16 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe -
Executes dropped EXE 8 IoCs
pid Process 1640 Tilecomgm.com 1140 Tilecomgm.com 2264 Tilecomgm.com 2304 Tilecomgm.com 1780 Tilecomgm.com 2576 Tilecomgm.com 2356 Tilecomgm.com 2844 Tilecomgm.com -
Loads dropped DLL 16 IoCs
pid Process 2336 4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe 2336 4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe 1640 Tilecomgm.com 1640 Tilecomgm.com 1140 Tilecomgm.com 1140 Tilecomgm.com 2264 Tilecomgm.com 2264 Tilecomgm.com 2304 Tilecomgm.com 2304 Tilecomgm.com 1780 Tilecomgm.com 1780 Tilecomgm.com 2576 Tilecomgm.com 2576 Tilecomgm.com 2356 Tilecomgm.com 2356 Tilecomgm.com -
Writes to the Master Boot Record (MBR) 1 TTPs 9 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Tilecomgm.com File opened for modification \??\PhysicalDrive0 Tilecomgm.com File opened for modification \??\PhysicalDrive0 Tilecomgm.com File opened for modification \??\PhysicalDrive0 Tilecomgm.com File opened for modification \??\PhysicalDrive0 Tilecomgm.com File opened for modification \??\PhysicalDrive0 Tilecomgm.com File opened for modification \??\PhysicalDrive0 4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe File opened for modification \??\PhysicalDrive0 Tilecomgm.com File opened for modification \??\PhysicalDrive0 Tilecomgm.com -
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com 4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com 4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com -
Modifies registry class 27 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com -
Runs .reg file with regedit 8 IoCs
pid Process 2172 regedit.exe 1620 regedit.exe 1844 regedit.exe 2880 regedit.exe 352 regedit.exe 1152 regedit.exe 1352 regedit.exe 1912 regedit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2336 wrote to memory of 784 2336 4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe 31 PID 2336 wrote to memory of 784 2336 4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe 31 PID 2336 wrote to memory of 784 2336 4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe 31 PID 2336 wrote to memory of 784 2336 4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe 31 PID 784 wrote to memory of 1912 784 cmd.exe 32 PID 784 wrote to memory of 1912 784 cmd.exe 32 PID 784 wrote to memory of 1912 784 cmd.exe 32 PID 784 wrote to memory of 1912 784 cmd.exe 32 PID 2336 wrote to memory of 1640 2336 4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe 33 PID 2336 wrote to memory of 1640 2336 4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe 33 PID 2336 wrote to memory of 1640 2336 4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe 33 PID 2336 wrote to memory of 1640 2336 4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe 33 PID 1640 wrote to memory of 1140 1640 Tilecomgm.com 34 PID 1640 wrote to memory of 1140 1640 Tilecomgm.com 34 PID 1640 wrote to memory of 1140 1640 Tilecomgm.com 34 PID 1640 wrote to memory of 1140 1640 Tilecomgm.com 34 PID 1140 wrote to memory of 1908 1140 Tilecomgm.com 35 PID 1140 wrote to memory of 1908 1140 Tilecomgm.com 35 PID 1140 wrote to memory of 1908 1140 Tilecomgm.com 35 PID 1140 wrote to memory of 1908 1140 Tilecomgm.com 35 PID 1908 wrote to memory of 2172 1908 cmd.exe 36 PID 1908 wrote to memory of 2172 1908 cmd.exe 36 PID 1908 wrote to memory of 2172 1908 cmd.exe 36 PID 1908 wrote to memory of 2172 1908 cmd.exe 36 PID 1140 wrote to memory of 2264 1140 Tilecomgm.com 37 PID 1140 wrote to memory of 2264 1140 Tilecomgm.com 37 PID 1140 wrote to memory of 2264 1140 Tilecomgm.com 37 PID 1140 wrote to memory of 2264 1140 Tilecomgm.com 37 PID 2264 wrote to memory of 1716 2264 Tilecomgm.com 38 PID 2264 wrote to memory of 1716 2264 Tilecomgm.com 38 PID 2264 wrote to memory of 1716 2264 Tilecomgm.com 38 PID 2264 wrote to memory of 1716 2264 Tilecomgm.com 38 PID 1716 wrote to memory of 1620 1716 cmd.exe 39 PID 1716 wrote to memory of 1620 1716 cmd.exe 39 PID 1716 wrote to memory of 1620 1716 cmd.exe 39 PID 1716 wrote to memory of 1620 1716 cmd.exe 39 PID 2264 wrote to memory of 2304 2264 Tilecomgm.com 40 PID 2264 wrote to memory of 2304 2264 Tilecomgm.com 40 PID 2264 wrote to memory of 2304 2264 Tilecomgm.com 40 PID 2264 wrote to memory of 2304 2264 Tilecomgm.com 40 PID 2304 wrote to memory of 2792 2304 Tilecomgm.com 41 PID 2304 wrote to memory of 2792 2304 Tilecomgm.com 41 PID 2304 wrote to memory of 2792 2304 Tilecomgm.com 41 PID 2304 wrote to memory of 2792 2304 Tilecomgm.com 41 PID 2792 wrote to memory of 1844 2792 cmd.exe 42 PID 2792 wrote to memory of 1844 2792 cmd.exe 42 PID 2792 wrote to memory of 1844 2792 cmd.exe 42 PID 2792 wrote to memory of 1844 2792 cmd.exe 42 PID 2304 wrote to memory of 1780 2304 Tilecomgm.com 43 PID 2304 wrote to memory of 1780 2304 Tilecomgm.com 43 PID 2304 wrote to memory of 1780 2304 Tilecomgm.com 43 PID 2304 wrote to memory of 1780 2304 Tilecomgm.com 43 PID 1780 wrote to memory of 2384 1780 Tilecomgm.com 44 PID 1780 wrote to memory of 2384 1780 Tilecomgm.com 44 PID 1780 wrote to memory of 2384 1780 Tilecomgm.com 44 PID 1780 wrote to memory of 2384 1780 Tilecomgm.com 44 PID 2384 wrote to memory of 2880 2384 cmd.exe 45 PID 2384 wrote to memory of 2880 2384 cmd.exe 45 PID 2384 wrote to memory of 2880 2384 cmd.exe 45 PID 2384 wrote to memory of 2880 2384 cmd.exe 45 PID 1780 wrote to memory of 2576 1780 Tilecomgm.com 46 PID 1780 wrote to memory of 2576 1780 Tilecomgm.com 46 PID 1780 wrote to memory of 2576 1780 Tilecomgm.com 46 PID 1780 wrote to memory of 2576 1780 Tilecomgm.com 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe"C:\Users\Admin\AppData\Local\Temp\4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\cmd.execmd /c c:\AcD.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg3⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1912
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 556 "C:\Users\Admin\AppData\Local\Temp\4360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339N.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 544 "C:\Windows\SysWOW64\Tilecomgm.com"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\cmd.execmd /c c:\AcD.bat4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg5⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2172
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 560 "C:\Windows\SysWOW64\Tilecomgm.com"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\cmd.execmd /c c:\AcD.bat5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg6⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1620
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 564 "C:\Windows\SysWOW64\Tilecomgm.com"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\cmd.execmd /c c:\AcD.bat6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg7⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1844
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 572 "C:\Windows\SysWOW64\Tilecomgm.com"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\cmd.execmd /c c:\AcD.bat7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg8⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2880
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 568 "C:\Windows\SysWOW64\Tilecomgm.com"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2576 -
C:\Windows\SysWOW64\cmd.execmd /c c:\AcD.bat8⤵
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg9⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:352
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 580 "C:\Windows\SysWOW64\Tilecomgm.com"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2356 -
C:\Windows\SysWOW64\cmd.execmd /c c:\AcD.bat9⤵
- System Location Discovery: System Language Discovery
PID:956 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg10⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1152
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 576 "C:\Windows\SysWOW64\Tilecomgm.com"9⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2844 -
C:\Windows\SysWOW64\cmd.execmd /c c:\AcD.bat10⤵
- System Location Discovery: System Language Discovery
PID:2764 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg11⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1352
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD50019a0451cc6b9659762c3e274bc04fb
SHA15259e256cc0908f2846e532161b989f1295f479b
SHA256ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904
-
Filesize
3KB
MD59e5db93bd3302c217b15561d8f1e299d
SHA195a5579b336d16213909beda75589fd0a2091f30
SHA256f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a
-
Filesize
701B
MD5e427a32326a6a806e7b7b4fdbbe0ed4c
SHA1b10626953332aeb7c524f2a29f47ca8b0bee38b1
SHA256b5cfd1100679c495202229aede417b8a385405cb9d467d2d89b936fc99245839
SHA5126bd679341bec6b224962f3d0d229cff2d400e568e10b7764eb4e0903c66819a8fa99927249ab9b4c447b2d09ea0d98eb9823fb2c5f7462112036049795a5d8bd
-
Filesize
3KB
MD5d085cde42c14e8ee2a5e8870d08aee42
SHA1c8e967f1d301f97dbcf252d7e1677e590126f994
SHA256a15d5dfd655de1214e0aae2292ead17eef1f1b211d39fac03276bbd6325b0d9f
SHA512de2cebd45d3cf053df17ae43466db6a8b2d816bf4b9a8deb5b577cfedf765b5dcdc5904145809ad3ca03ccff308f8893ec1faa309dd34afcab7cc1836d698d7b
-
Filesize
300B
MD59e1df6d58e6c905e4628df434384b3c9
SHA1e67dd641da70aa9654ed24b19ed06a3eb8c0db43
SHA25625bb4f644e47b4b64b0052ec7edfd4c27f370d07ef884078fea685f30b9c1bb0
SHA51293c9f24dc530e08c85776955c200be468d099d8f1d2efe5e20cbb3a1d803fe23e0ba9b589df2498832082a283d79f6f1053a26d15f49e31a0da395ecc7225ad3
-
Filesize
1KB
MD5b99b0dc7cab4e69d365783a5c4273a83
SHA15fcc44aa2631c923e9961266a2e0dbeaaabe84da
SHA2561fc967a5c8f7859ba0c410978d165085f241195fe4a31d61a127e38c30d435e4
SHA512495474416f5eccd40829d42f050464903273d564cb862b1bd0657262485e634b5d466363cac085406c6d830f42a2f7b5648818b2efe6db1a90833a4b90a6a14d
-
Filesize
1KB
MD5bf7ee07851e04b2a0dbe554db62dc3aa
SHA1cad155b66053cd7ce2b969a0eb20a8f4812b1f46
SHA25613dc8dc70b7bb240f6f4cf6be5ff0ec55c606267a328bb9c9e34e5fa70cce0d9
SHA5129ed79305c81287cf01d0138d87c6ec981b5bdd9195c56f8def4c74fdbc9b4816661d084fc1314f99b40102945b61d05121f4eaadec6403d4295a80847b797bc4
-
Filesize
476B
MD5a5d4cddfecf34e5391a7a3df62312327
SHA104a3c708bab0c15b6746cf9dbf41a71c917a98b9
SHA2568961a4310b2413753851ba8afe2feb4c522c20e856c6a98537d8ab440f48853a
SHA51248024549d0fcb88e3bd46f7fb42715181142cae764a3daeb64cad07f10cf3bf14153731aeafba9a191557e29ddf1c5b62a460588823df215e2246eddaeff6643
-
Filesize
1KB
MD5614dc91c25423b19711b270e1e5a49ad
SHA1f66496dcf9047ae934bdc4a65f697be55980b169
SHA256cd2b70a70c7da79d5136e4268d6c685e81d925b9387b9ed9e1b3189118e2de5e
SHA51227a8649bb02ab6a67a1f2482662a6c690aefca551eec3575ea9aeee645d318b23d0dc6d5d2db239583ddb5f04ba13d94e5180a184566416291b7180fab0029e7
-
Filesize
220KB
MD5e700d0d7c9bcc8baf58e33747b0df4b0
SHA17e411f52a65e4cd92599ff86750b55a57e285724
SHA2564360a2092acd1ac59d8ef810bf7f487547732fdbfb2e82f64b35411b4ab45339
SHA5126c954ef6c161cfd189bee3c50d04b723c420b2970aa4939e56201d73f53049a17d3644799b575c00ae0799026422f8afbf521856ffcd305d5364034164dd10bc