Analysis
-
max time kernel
148s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 07:28
Static task
static1
Behavioral task
behavioral1
Sample
2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe
-
Size
209KB
-
MD5
2d3728194bb0fcdf013114f8c2d4b416
-
SHA1
c4e1856ba775abee83dc859fd435a7e71fa38d9f
-
SHA256
11d4ca0c5f76091f3423fb30ebd6adc6c9983609f46da62b0fe2056edd608cc0
-
SHA512
4891963b25f3b15a6ebbc5f97f73d57a8a16faa327ddb19153073f5e796c92fe8fcc54b5c6c708c52baf170a75dfd8f42b267ef1ec2027f14aa8fb2a6ded463c
-
SSDEEP
3072:iNu9h3eiLZT2UTOyU2qTq/yecrqyEIlyny4iio1t1oBM9/AC99kLNh11GJ+UEtE4:lh3eeTXFUnq/yesLEoynn7BMJSXtt34M
Malware Config
Signatures
-
Modifies security service 2 TTPs 22 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe -
Executes dropped EXE 10 IoCs
pid Process 3920 Tilecomgm.com 944 Tilecomgm.com 468 Tilecomgm.com 4724 Tilecomgm.com 2892 Tilecomgm.com 3524 Tilecomgm.com 1180 Tilecomgm.com 1604 Tilecomgm.com 4420 Tilecomgm.com 4048 Tilecomgm.com -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File opened for modification C:\Windows\SysWOW64\Tilecomgm.com Tilecomgm.com File created C:\Windows\SysWOW64\Tilecomgm.com 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Tilecomgm.com 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tilecomgm.com -
Modifies registry class 33 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Tilecomgm.com -
Runs .reg file with regedit 11 IoCs
pid Process 3524 regedit.exe 3504 regedit.exe 3980 regedit.exe 3380 regedit.exe 1968 regedit.exe 2972 regedit.exe 1752 regedit.exe 492 regedit.exe 4828 regedit.exe 756 regedit.exe 2020 regedit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4776 wrote to memory of 468 4776 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe 83 PID 4776 wrote to memory of 468 4776 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe 83 PID 4776 wrote to memory of 468 4776 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe 83 PID 468 wrote to memory of 2972 468 cmd.exe 84 PID 468 wrote to memory of 2972 468 cmd.exe 84 PID 468 wrote to memory of 2972 468 cmd.exe 84 PID 4776 wrote to memory of 3920 4776 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe 85 PID 4776 wrote to memory of 3920 4776 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe 85 PID 4776 wrote to memory of 3920 4776 2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe 85 PID 3920 wrote to memory of 2112 3920 Tilecomgm.com 86 PID 3920 wrote to memory of 2112 3920 Tilecomgm.com 86 PID 3920 wrote to memory of 2112 3920 Tilecomgm.com 86 PID 2112 wrote to memory of 1752 2112 cmd.exe 87 PID 2112 wrote to memory of 1752 2112 cmd.exe 87 PID 2112 wrote to memory of 1752 2112 cmd.exe 87 PID 3920 wrote to memory of 944 3920 Tilecomgm.com 91 PID 3920 wrote to memory of 944 3920 Tilecomgm.com 91 PID 3920 wrote to memory of 944 3920 Tilecomgm.com 91 PID 944 wrote to memory of 1712 944 Tilecomgm.com 92 PID 944 wrote to memory of 1712 944 Tilecomgm.com 92 PID 944 wrote to memory of 1712 944 Tilecomgm.com 92 PID 1712 wrote to memory of 492 1712 cmd.exe 93 PID 1712 wrote to memory of 492 1712 cmd.exe 93 PID 1712 wrote to memory of 492 1712 cmd.exe 93 PID 944 wrote to memory of 468 944 Tilecomgm.com 96 PID 944 wrote to memory of 468 944 Tilecomgm.com 96 PID 944 wrote to memory of 468 944 Tilecomgm.com 96 PID 468 wrote to memory of 5096 468 Tilecomgm.com 97 PID 468 wrote to memory of 5096 468 Tilecomgm.com 97 PID 468 wrote to memory of 5096 468 Tilecomgm.com 97 PID 5096 wrote to memory of 3524 5096 cmd.exe 98 PID 5096 wrote to memory of 3524 5096 cmd.exe 98 PID 5096 wrote to memory of 3524 5096 cmd.exe 98 PID 468 wrote to memory of 4724 468 Tilecomgm.com 100 PID 468 wrote to memory of 4724 468 Tilecomgm.com 100 PID 468 wrote to memory of 4724 468 Tilecomgm.com 100 PID 4724 wrote to memory of 4972 4724 Tilecomgm.com 101 PID 4724 wrote to memory of 4972 4724 Tilecomgm.com 101 PID 4724 wrote to memory of 4972 4724 Tilecomgm.com 101 PID 4972 wrote to memory of 3504 4972 cmd.exe 102 PID 4972 wrote to memory of 3504 4972 cmd.exe 102 PID 4972 wrote to memory of 3504 4972 cmd.exe 102 PID 4724 wrote to memory of 2892 4724 Tilecomgm.com 103 PID 4724 wrote to memory of 2892 4724 Tilecomgm.com 103 PID 4724 wrote to memory of 2892 4724 Tilecomgm.com 103 PID 2892 wrote to memory of 3912 2892 Tilecomgm.com 104 PID 2892 wrote to memory of 3912 2892 Tilecomgm.com 104 PID 2892 wrote to memory of 3912 2892 Tilecomgm.com 104 PID 3912 wrote to memory of 3980 3912 cmd.exe 105 PID 3912 wrote to memory of 3980 3912 cmd.exe 105 PID 3912 wrote to memory of 3980 3912 cmd.exe 105 PID 2892 wrote to memory of 3524 2892 Tilecomgm.com 106 PID 2892 wrote to memory of 3524 2892 Tilecomgm.com 106 PID 2892 wrote to memory of 3524 2892 Tilecomgm.com 106 PID 3524 wrote to memory of 1384 3524 Tilecomgm.com 107 PID 3524 wrote to memory of 1384 3524 Tilecomgm.com 107 PID 3524 wrote to memory of 1384 3524 Tilecomgm.com 107 PID 1384 wrote to memory of 4828 1384 cmd.exe 108 PID 1384 wrote to memory of 4828 1384 cmd.exe 108 PID 1384 wrote to memory of 4828 1384 cmd.exe 108 PID 3524 wrote to memory of 1180 3524 Tilecomgm.com 109 PID 3524 wrote to memory of 1180 3524 Tilecomgm.com 109 PID 3524 wrote to memory of 1180 3524 Tilecomgm.com 109 PID 1180 wrote to memory of 2516 1180 Tilecomgm.com 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\AcD.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg3⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2972
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 1196 "C:\Users\Admin\AppData\Local\Temp\2d3728194bb0fcdf013114f8c2d4b416_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\AcD.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg4⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1752
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 1208 "C:\Windows\SysWOW64\Tilecomgm.com"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\AcD.bat4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg5⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:492
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 1180 "C:\Windows\SysWOW64\Tilecomgm.com"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\AcD.bat5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg6⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3524
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 1184 "C:\Windows\SysWOW64\Tilecomgm.com"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\AcD.bat6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg7⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3504
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 1176 "C:\Windows\SysWOW64\Tilecomgm.com"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\AcD.bat7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg8⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3980
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 1188 "C:\Windows\SysWOW64\Tilecomgm.com"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\AcD.bat8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg9⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:4828
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 1200 "C:\Windows\SysWOW64\Tilecomgm.com"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\AcD.bat9⤵
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg10⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3380
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 1192 "C:\Windows\SysWOW64\Tilecomgm.com"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\AcD.bat10⤵
- System Location Discovery: System Language Discovery
PID:4704 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg11⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1968
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 1204 "C:\Windows\SysWOW64\Tilecomgm.com"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\AcD.bat11⤵
- System Location Discovery: System Language Discovery
PID:5048 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg12⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:756
-
-
-
C:\Windows\SysWOW64\Tilecomgm.comC:\Windows\system32\Tilecomgm.com 1212 "C:\Windows\SysWOW64\Tilecomgm.com"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\AcD.bat12⤵
- System Location Discovery: System Language Discovery
PID:2068 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg13⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2020
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5eee5718ce97d259fd8acec31375fc375
SHA1989c64b0c9a049f1b7ad9e677c4566ab1559744f
SHA2561975123645c58e5160d63cc6ab8430f9dd0bc70d5cddafccf3687d655730dcfb
SHA5126c2e14846b20128ac8bea8470b4455fd4b65de7457c216824cfa7008fafa41c29445290de6780dc4f6f3beea97ec3137c02c9b7504877d6c845e573a7b7db610
-
Filesize
815B
MD5fadf3805f68986d2ee9c82f560a564e4
SHA187bcab6ab1fb66ace98eb1d36e54eb9c11628aa6
SHA256d6e4760c4554b061363e89648dc4144f8a9ba8a300dde1a1621f22ecc62ab759
SHA512e3e495385da6d181a2411554a61b27c480ff31fa49225e8b2dc46b9ec4f618343475a8d189786b956c91efc65bfb05be19065bfdf3288eb011c5ec427e764cb9
-
Filesize
3KB
MD59e5db93bd3302c217b15561d8f1e299d
SHA195a5579b336d16213909beda75589fd0a2091f30
SHA256f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a
-
Filesize
849B
MD5558ce6da965ba1758d112b22e15aa5a2
SHA1a365542609e4d1dc46be62928b08612fcabe2ede
SHA256c11beaac10a5e00391ef4b41be8c240f59c5a2dc930aead6d7db237fcd2641fb
SHA51237f7f10c3d201b11cc5224ae69c5990eb33b4430c601d3c21f6bec9323621120442e0cfa49e1f4eda459ea4ac750277e446dca78b9e44c1445bd891e4e460b5c
-
Filesize
2KB
MD561ec72543aaac5c7b336d2b22f919c07
SHA15bddb1f73b24c2113e9bf8268640f75fb0f3bd8d
SHA256088881ff28ef1240847decd884be366614865bf9660f862dbffa64d504467aea
SHA512e8ed6c1813218a542e0449f6bcda47b9464f2445a5d4b20e20b657d5328eb9fd5ddf859e61794a0b3d32057590ac029064c078d5743fe1a316ca8fdf254f7f62
-
Filesize
2KB
MD5f8a9a1aa9bab7821d25ae628e6d04f68
SHA1c3e7a9ccc9805ae94aabfd16e2cb461fde3fae5a
SHA25676ee7c489d11427af94d0334368ef2ed44df4a74984ffd4022c9ea9fae9c41fb
SHA5120fb3a29367fa3c3eb36c6a7e9ff217ccdd7cce18309964aa7068a00f500ea4ea49588344ebbc52ae77d83e5042c3fdb84f56fa1dae07b8bb774aed6fffd18c0a
-
Filesize
1011B
MD55088b4be1b90717121e76c1fc33c033a
SHA1090676b012c30e6b0d6493ca1e9a31f3093cad6f
SHA256d1d8c8ac4136082ac60938e8148c43d81fa91a124eccf34048e629d22daeef3a
SHA5120cac2dcf138b1a66f857a54c92afe467ef7544655cd1c4aec3b4084c92c9186d9ba10e0e74a54a6e43e676068d3747f668f7286d44fcefce7ee4d385a3a96962
-
Filesize
3KB
MD51daa413d1a8cd1692f2e4ae22b54c74a
SHA12e02e2a23cfaa62f301e29a117e291ff93cc5d31
SHA25610732e2612780d9694faf0bb9b27cdc6f3376ad327da7dfc346e9e5579493d33
SHA512b947c70c7c4af971e3fbdc66fb7175b6624ac68c6a723dac7ecb5cf5f43bbe210fa0fa61fd4b6153dccf7de077d003ca03f061e209dc37773546b038e6aef277
-
Filesize
1KB
MD5e2d37af73d5fe4a504db3f8c0d560e3d
SHA188c6bf5b485dd9c79283ccb5d2546ffbb95e563d
SHA256e615959931f345e611ac44be7534d697c1495c641d13e50ae919a7807c8ff008
SHA5128cb17131326361071a3ae2997cdfaa316ce10c481f48af23fa526380daffa39b2538251cbaa4cf3bd9a9c0014a9184be5a13a44cf45fb93591ba3180670ddb89
-
Filesize
298B
MD54117e5a9c995bab9cd3bce3fc2b99a46
SHA180144ccbad81c2efb1df64e13d3d5f59ca4486da
SHA25637b58c2d66ab2f896316ee0cdba30dcc9aac15a51995b8ba6c143c8ba34bf292
SHA512bdb721bd3dea641a9b1f26b46311c05199de01c6b0d7ea2b973aa71a4f796b292a6964ddef32ba9dfc4a545768943d105f110c5d60716e0ff6f82914affb507c
-
Filesize
3KB
MD5d085cde42c14e8ee2a5e8870d08aee42
SHA1c8e967f1d301f97dbcf252d7e1677e590126f994
SHA256a15d5dfd655de1214e0aae2292ead17eef1f1b211d39fac03276bbd6325b0d9f
SHA512de2cebd45d3cf053df17ae43466db6a8b2d816bf4b9a8deb5b577cfedf765b5dcdc5904145809ad3ca03ccff308f8893ec1faa309dd34afcab7cc1836d698d7b
-
Filesize
209KB
MD52d3728194bb0fcdf013114f8c2d4b416
SHA1c4e1856ba775abee83dc859fd435a7e71fa38d9f
SHA25611d4ca0c5f76091f3423fb30ebd6adc6c9983609f46da62b0fe2056edd608cc0
SHA5124891963b25f3b15a6ebbc5f97f73d57a8a16faa327ddb19153073f5e796c92fe8fcc54b5c6c708c52baf170a75dfd8f42b267ef1ec2027f14aa8fb2a6ded463c
-
Filesize
5KB
MD50019a0451cc6b9659762c3e274bc04fb
SHA15259e256cc0908f2846e532161b989f1295f479b
SHA256ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904