Analysis
-
max time kernel
137s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 07:28
Static task
static1
Behavioral task
behavioral1
Sample
2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe
-
Size
209KB
-
MD5
2d3728194bb0fcdf013114f8c2d4b416
-
SHA1
c4e1856ba775abee83dc859fd435a7e71fa38d9f
-
SHA256
11d4ca0c5f76091f3423fb30ebd6adc6c9983609f46da62b0fe2056edd608cc0
-
SHA512
4891963b25f3b15a6ebbc5f97f73d57a8a16faa327ddb19153073f5e796c92fe8fcc54b5c6c708c52baf170a75dfd8f42b267ef1ec2027f14aa8fb2a6ded463c
-
SSDEEP
3072:iNu9h3eiLZT2UTOyU2qTq/yecrqyEIlyny4iio1t1oBM9/AC99kLNh11GJ+UEtE4:lh3eeTXFUnq/yesLEoynn7BMJSXtt34M
Malware Config
Signatures
-
Modifies security service 2 TTPs 20 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe -
Executes dropped EXE 10 IoCs
pid Process 768 Tilecomgm.com 1604 Tilecomgm.com 2748 Tilecomgm.com 1724 Tilecomgm.com 388 Tilecomgm.com 1700 Tilecomgm.com 1316 Tilecomgm.com 2804 Tilecomgm.com 2272 Tilecomgm.com 2284 Tilecomgm.com -
Loads dropped DLL 20 IoCs
pid Process 2140 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe 2140 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe 768 Tilecomgm.com 768 Tilecomgm.com 1604 Tilecomgm.com 1604 Tilecomgm.com 2748 Tilecomgm.com 2748 Tilecomgm.com 1724 Tilecomgm.com 1724 Tilecomgm.com 388 Tilecomgm.com 388 Tilecomgm.com 1700 Tilecomgm.com 1700 Tilecomgm.com 1316 Tilecomgm.com 1316 Tilecomgm.com 2804 Tilecomgm.com 2804 Tilecomgm.com 2272 Tilecomgm.com 2272 Tilecomgm.com -
Writes to the Master Boot Record (MBR) 1 TTPs 11 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 Tilecomgm.com File opened for modification \??\PhysicalDrive0 Tilecomgm.com File opened for modification \??\PhysicalDrive0 Tilecomgm.com File opened for modification \??\PhysicalDrive0 Tilecomgm.com File opened for modification \??\PhysicalDrive0 Tilecomgm.com File opened for modification \??\PhysicalDrive0 Tilecomgm.com File opened for modification \??\PhysicalDrive0 Tilecomgm.com File opened for modification \??\PhysicalDrive0 Tilecomgm.com File opened for modification \??\PhysicalDrive0 Tilecomgm.com File opened for modification \??\PhysicalDrive0 Tilecomgm.com -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com -
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 33 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com -
Runs .reg file with regedit 10 IoCs
pid Process 2624 regedit.exe 1112 regedit.exe 2320 regedit.exe 608 regedit.exe 2572 regedit.exe 288 regedit.exe 1480 regedit.exe 1112 regedit.exe 2672 regedit.exe 2684 regedit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2668 2140 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe 29 PID 2140 wrote to memory of 2668 2140 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe 29 PID 2140 wrote to memory of 2668 2140 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe 29 PID 2140 wrote to memory of 2668 2140 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe 29 PID 2668 wrote to memory of 1112 2668 cmd.exe 30 PID 2668 wrote to memory of 1112 2668 cmd.exe 30 PID 2668 wrote to memory of 1112 2668 cmd.exe 30 PID 2668 wrote to memory of 1112 2668 cmd.exe 30 PID 2140 wrote to memory of 768 2140 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe 31 PID 2140 wrote to memory of 768 2140 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe 31 PID 2140 wrote to memory of 768 2140 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe 31 PID 2140 wrote to memory of 768 2140 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe 31 PID 768 wrote to memory of 1604 768 Tilecomgm.com 32 PID 768 wrote to memory of 1604 768 Tilecomgm.com 32 PID 768 wrote to memory of 1604 768 Tilecomgm.com 32 PID 768 wrote to memory of 1604 768 Tilecomgm.com 32 PID 1604 wrote to memory of 280 1604 Tilecomgm.com 33 PID 1604 wrote to memory of 280 1604 Tilecomgm.com 33 PID 1604 wrote to memory of 280 1604 Tilecomgm.com 33 PID 1604 wrote to memory of 280 1604 Tilecomgm.com 33 PID 280 wrote to memory of 2320 280 cmd.exe 34 PID 280 wrote to memory of 2320 280 cmd.exe 34 PID 280 wrote to memory of 2320 280 cmd.exe 34 PID 280 wrote to memory of 2320 280 cmd.exe 34 PID 1604 wrote to memory of 2748 1604 Tilecomgm.com 35 PID 1604 wrote to memory of 2748 1604 Tilecomgm.com 35 PID 1604 wrote to memory of 2748 1604 Tilecomgm.com 35 PID 1604 wrote to memory of 2748 1604 Tilecomgm.com 35 PID 2748 wrote to memory of 2812 2748 Tilecomgm.com 36 PID 2748 wrote to memory of 2812 2748 Tilecomgm.com 36 PID 2748 wrote to memory of 2812 2748 Tilecomgm.com 36 PID 2748 wrote to memory of 2812 2748 Tilecomgm.com 36 PID 2812 wrote to memory of 608 2812 cmd.exe 37 PID 2812 wrote to memory of 608 2812 cmd.exe 37 PID 2812 wrote to memory of 608 2812 cmd.exe 37 PID 2812 wrote to memory of 608 2812 cmd.exe 37 PID 2748 wrote to memory of 1724 2748 Tilecomgm.com 38 PID 2748 wrote to memory of 1724 2748 Tilecomgm.com 38 PID 2748 wrote to memory of 1724 2748 Tilecomgm.com 38 PID 2748 wrote to memory of 1724 2748 Tilecomgm.com 38 PID 1724 wrote to memory of 1004 1724 Tilecomgm.com 39 PID 1724 wrote to memory of 1004 1724 Tilecomgm.com 39 PID 1724 wrote to memory of 1004 1724 Tilecomgm.com 39 PID 1724 wrote to memory of 1004 1724 Tilecomgm.com 39 PID 1004 wrote to memory of 2572 1004 cmd.exe 40 PID 1004 wrote to memory of 2572 1004 cmd.exe 40 PID 1004 wrote to memory of 2572 1004 cmd.exe 40 PID 1004 wrote to memory of 2572 1004 cmd.exe 40 PID 1724 wrote to memory of 388 1724 Tilecomgm.com 41 PID 1724 wrote to memory of 388 1724 Tilecomgm.com 41 PID 1724 wrote to memory of 388 1724 Tilecomgm.com 41 PID 1724 wrote to memory of 388 1724 Tilecomgm.com 41 PID 388 wrote to memory of 264 388 Tilecomgm.com 42 PID 388 wrote to memory of 264 388 Tilecomgm.com 42 PID 388 wrote to memory of 264 388 Tilecomgm.com 42 PID 388 wrote to memory of 264 388 Tilecomgm.com 42 PID 264 wrote to memory of 2672 264 cmd.exe 43 PID 264 wrote to memory of 2672 264 cmd.exe 43 PID 264 wrote to memory of 2672 264 cmd.exe 43 PID 264 wrote to memory of 2672 264 cmd.exe 43 PID 388 wrote to memory of 1700 388 Tilecomgm.com 44 PID 388 wrote to memory of 1700 388 Tilecomgm.com 44 PID 388 wrote to memory of 1700 388 Tilecomgm.com 44 PID 388 wrote to memory of 1700 388 Tilecomgm.com 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\cmd.execmd /c c:\AcD.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg3⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1112
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 480 "C:\Users\Admin\AppData\Local\Temp\2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 536 "C:\Windows\SysWOW64\Tilecomgm.com"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\cmd.execmd /c c:\AcD.bat4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg5⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2320
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 548 "C:\Windows\SysWOW64\Tilecomgm.com"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\cmd.execmd /c c:\AcD.bat5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg6⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:608
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 552 "C:\Windows\SysWOW64\Tilecomgm.com"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.execmd /c c:\AcD.bat6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg7⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2572
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 560 "C:\Windows\SysWOW64\Tilecomgm.com"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\cmd.execmd /c c:\AcD.bat7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg8⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2672
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 568 "C:\Windows\SysWOW64\Tilecomgm.com"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1700 -
C:\Windows\SysWOW64\cmd.execmd /c c:\AcD.bat8⤵
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg9⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2624
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 556 "C:\Windows\SysWOW64\Tilecomgm.com"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1316 -
C:\Windows\SysWOW64\cmd.execmd /c c:\AcD.bat9⤵
- System Location Discovery: System Language Discovery
PID:2260 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg10⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2684
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 564 "C:\Windows\SysWOW64\Tilecomgm.com"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2804 -
C:\Windows\SysWOW64\cmd.execmd /c c:\AcD.bat10⤵
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg11⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:288
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 572 "C:\Windows\SysWOW64\Tilecomgm.com"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2272 -
C:\Windows\SysWOW64\cmd.execmd /c c:\AcD.bat11⤵
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg12⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1480
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 576 "C:\Windows\SysWOW64\Tilecomgm.com"11⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2284 -
C:\Windows\SysWOW64\cmd.execmd /c c:\AcD.bat12⤵
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg13⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1112
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD50019a0451cc6b9659762c3e274bc04fb
SHA15259e256cc0908f2846e532161b989f1295f479b
SHA256ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904
-
Filesize
476B
MD5a5d4cddfecf34e5391a7a3df62312327
SHA104a3c708bab0c15b6746cf9dbf41a71c917a98b9
SHA2568961a4310b2413753851ba8afe2feb4c522c20e856c6a98537d8ab440f48853a
SHA51248024549d0fcb88e3bd46f7fb42715181142cae764a3daeb64cad07f10cf3bf14153731aeafba9a191557e29ddf1c5b62a460588823df215e2246eddaeff6643
-
Filesize
3KB
MD59e5db93bd3302c217b15561d8f1e299d
SHA195a5579b336d16213909beda75589fd0a2091f30
SHA256f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a
-
Filesize
208B
MD567a0c98a371995d5434cb9788ee1c42f
SHA17171d3dca52f038ca9d9e8b13f356462dbc8f3cc
SHA2562ac5bd7466724458c6f36bbbe6be697bfbc95d3b8f8ad486b83d595bd295dbc3
SHA512f5b31a9e68044db25853f9a158dd4ff1da717beb5802dd11a6d3b705b5bf065304c98df3c81c8487e922d4f94690ecfb2662077bffb50cba036bcd8e50935191
-
Filesize
703B
MD5e2564fc59a86ea85b7485ab7288c68c4
SHA1bc1544d9a03d1adafe399067ac32bf8d1cedbdb0
SHA25668e8d8ef14bfbe96ebad3fb391fd4c1e57068a7f950dd31840884f6d58b078a8
SHA512e09c6741d99ec41763e939aa39adb4e0f8508d37556c52251eec268849e85960da42ace7e9b82f1927de5bcf29ebec205189b113d2bb123025f3e6615b28ff0a
-
Filesize
2KB
MD5501effddf60a974e98b67dc8921aa7e8
SHA1734dfe4b508dbc1527ec92e91821a1251aec5b2e
SHA256672e3c47827c2fc929fc92cd7d2a61d9ba41e847f876a1e5486e2701cbc3cb06
SHA51228081046c5b0eb6a5578134e19af2a447d38afda338bd3ae4c2fc0054460580d47f9ab6d8c9001ff605e76df462e7bbcab80be15deaf3ca6264e20717dfb9c1c
-
Filesize
2KB
MD5e6d8af5aed642209c88269bf56af50ae
SHA1633d40da997074dc0ed10938ebc49a3aeb3a7fc8
SHA256550abc09abce5b065d360dfea741ab7dd8abbe2ea11cd46b093632860775baec
SHA5126949fc255c1abf009ecbe0591fb6dbfd96409ee98ae438dbac8945684ccf694c046d5b51d2bf7679c1e02f42e8f32e8e29a9b7bdbc84442bec0497b64dfa84cf
-
Filesize
1KB
MD55f6aefafda312b288b7d555c1fc36dc9
SHA1f25e2fdea9dd714d0fae68af71cace7bb49302ce
SHA25660f6d3cbf831857bf18e46a43ff403a03e2035d9430a72d768ea9cec1947917a
SHA51297f0250ba79b008d7632a2f32a7b851d9ca87f116b2854d5343c120511cfd55551a1f3eb3e0959602656b39b3f86003a0f9d04243ceb8b73d28eb9bb9449a6de
-
Filesize
815B
MD5fadf3805f68986d2ee9c82f560a564e4
SHA187bcab6ab1fb66ace98eb1d36e54eb9c11628aa6
SHA256d6e4760c4554b061363e89648dc4144f8a9ba8a300dde1a1621f22ecc62ab759
SHA512e3e495385da6d181a2411554a61b27c480ff31fa49225e8b2dc46b9ec4f618343475a8d189786b956c91efc65bfb05be19065bfdf3288eb011c5ec427e764cb9
-
Filesize
1KB
MD53637baf389a0d79b412adb2a7f1b7d09
SHA1f4b011a72f59cf98a325f12b7e40ddd0548ccc16
SHA256835336f5d468ac1d8361f9afbc8e69ff1538c51b0b619d641b4b41dcfaa39cba
SHA512ea71a49c3673e9ce4f92d0f38441b3bc5b3b9ef6649caa21972648e34b6cec8694fa8fb7fc0ddad1e58f0464e0ba917c4500090a3db3fc07e1d258079c1c2506
-
Filesize
3KB
MD56b0182442d6e09100c34904ae6d8ee0c
SHA16255e65587505629521ea048a4e40cc48b512f2c
SHA256cb34af7065e6c95f33fee397991045dae5dfae9d510660e6981ee6263542f9a4
SHA51264395a0c6fce50a64a2067522b798f9b27c577da96e8d68f830a075ba833f1d644af27a9c6fc941ebb3d79999ac31576763378c9997a5b38eb5fdf075918eb46
-
Filesize
851B
MD5a13ff758fc4326eaa44582bc9700aead
SHA1a4927b4a3b84526c5c42a077ade4652ab308f83f
SHA256c0915178e63bf84c54e9c942b5cc80327c24d84125042767d7e1e2ef3e004588
SHA51286c336086a1d0ca689e133df8e3c3ec83eeef86649dbf8b9d367c3e543358ad54f69d1a20d56c56200e294f22b2741186db0f359051159b4e670d3e9b5861842
-
Filesize
209KB
MD52d3728194bb0fcdf013114f8c2d4b416
SHA1c4e1856ba775abee83dc859fd435a7e71fa38d9f
SHA25611d4ca0c5f76091f3423fb30ebd6adc6c9983609f46da62b0fe2056edd608cc0
SHA5124891963b25f3b15a6ebbc5f97f73d57a8a16faa327ddb19153073f5e796c92fe8fcc54b5c6c708c52baf170a75dfd8f42b267ef1ec2027f14aa8fb2a6ded463c