Overview
overview
3Static
static
3TikTokRizz.zip
windows7-x64
1TikTokRizz.zip
windows10-2004-x64
1TikTokRizz....vsidx
windows7-x64
3TikTokRizz....vsidx
windows10-2004-x64
3TikTokRizz....vsidx
windows7-x64
3TikTokRizz....vsidx
windows10-2004-x64
3TikTokRizz....vsidx
windows7-x64
3TikTokRizz....vsidx
windows10-2004-x64
3TikTokRizz....vsidx
windows7-x64
3TikTokRizz....vsidx
windows10-2004-x64
3TikTokRizz...7/.suo
windows7-x64
3TikTokRizz...7/.suo
windows10-2004-x64
3TikTokRizz...t.json
windows7-x64
3TikTokRizz...t.json
windows10-2004-x64
3TikTokRizz...zz.sln
windows7-x64
3TikTokRizz...zz.sln
windows10-2004-x64
3TikTokRizz...config
windows7-x64
3TikTokRizz...config
windows10-2004-x64
3TikTokRizz...ner.cs
windows7-x64
3TikTokRizz...ner.cs
windows10-2004-x64
3TikTokRizz...rm1.cs
windows7-x64
3TikTokRizz...rm1.cs
windows10-2004-x64
3TikTokRizz...m1.vbs
windows7-x64
1TikTokRizz...m1.vbs
windows10-2004-x64
1TikTokRizz...ram.cs
windows7-x64
3TikTokRizz...ram.cs
windows10-2004-x64
3TikTokRizz...nfo.cs
windows7-x64
3TikTokRizz...nfo.cs
windows10-2004-x64
3TikTokRizz...er.vbs
windows7-x64
1TikTokRizz...er.vbs
windows10-2004-x64
1TikTokRizz...es.vbs
windows7-x64
1TikTokRizz...es.vbs
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 13:10
Static task
static1
Behavioral task
behavioral1
Sample
TikTokRizz.zip
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
TikTokRizz.zip
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
TikTokRizz/.vs/TikTokRizz/FileContentIndex/0c4aa1fd-6b50-4cc5-8d96-ce9083219a23.vsidx
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
TikTokRizz/.vs/TikTokRizz/FileContentIndex/0c4aa1fd-6b50-4cc5-8d96-ce9083219a23.vsidx
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
TikTokRizz/.vs/TikTokRizz/FileContentIndex/1038b269-7489-4412-8b9e-92cb85064898.vsidx
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
TikTokRizz/.vs/TikTokRizz/FileContentIndex/1038b269-7489-4412-8b9e-92cb85064898.vsidx
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
TikTokRizz/.vs/TikTokRizz/FileContentIndex/8819d140-dbb1-42f4-88e1-27502f877ffd.vsidx
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
TikTokRizz/.vs/TikTokRizz/FileContentIndex/8819d140-dbb1-42f4-88e1-27502f877ffd.vsidx
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
TikTokRizz/.vs/TikTokRizz/FileContentIndex/c3774f1e-57c8-4ee9-999c-373f4e24a054.vsidx
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
TikTokRizz/.vs/TikTokRizz/FileContentIndex/c3774f1e-57c8-4ee9-999c-373f4e24a054.vsidx
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
TikTokRizz/.vs/TikTokRizz/v17/.suo
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
TikTokRizz/.vs/TikTokRizz/v17/.suo
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
TikTokRizz/.vs/TikTokRizz/v17/DocumentLayout.json
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
TikTokRizz/.vs/TikTokRizz/v17/DocumentLayout.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
TikTokRizz/TikTokRizz.sln
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
TikTokRizz/TikTokRizz.sln
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
TikTokRizz/TikTokRizz/App.config
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
TikTokRizz/TikTokRizz/App.config
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
TikTokRizz/TikTokRizz/Form1.Designer.cs
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
TikTokRizz/TikTokRizz/Form1.Designer.cs
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
TikTokRizz/TikTokRizz/Form1.cs
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
TikTokRizz/TikTokRizz/Form1.cs
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
TikTokRizz/TikTokRizz/Form1.vbs
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
TikTokRizz/TikTokRizz/Form1.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
TikTokRizz/TikTokRizz/Program.cs
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
TikTokRizz/TikTokRizz/Program.cs
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
TikTokRizz/TikTokRizz/Properties/AssemblyInfo.cs
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
TikTokRizz/TikTokRizz/Properties/AssemblyInfo.cs
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
TikTokRizz/TikTokRizz/Properties/Resources.Designer.vbs
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
TikTokRizz/TikTokRizz/Properties/Resources.Designer.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
TikTokRizz/TikTokRizz/Properties/Resources.vbs
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
TikTokRizz/TikTokRizz/Properties/Resources.vbs
Resource
win10v2004-20240508-en
General
-
Target
TikTokRizz/.vs/TikTokRizz/v17/.suo
-
Size
47KB
-
MD5
0853fa5344604bfbd75e8c03fc8966c9
-
SHA1
aeaa3e1073300e1dce6a794f338c025bfe09177a
-
SHA256
f75fdee3639974c55de1709f7d75cc8c98d762c21237332099f9681bce5d2fa5
-
SHA512
33638b31cef253e715777b863eb991a953138e3d33b9d18745484e8bf58fd9759cfd93a3dd9683e2e7e5e27f46caa9b6861342287c318838d239065a570426f0
-
SSDEEP
384:ESaeDlI+qU1+D5Y37jJxMINIpDDXzl4Lc/A3N7atbqa3P8gYBxa4Y37jJxMINIpq:EZeu+qUod/Zhqa3P8gYBo4/ox
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\suo_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\suo_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\suo_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.suo\ = "suo_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.suo rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\suo_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\suo_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\suo_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2644 AcroRd32.exe 2644 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1336 wrote to memory of 2588 1336 cmd.exe 29 PID 1336 wrote to memory of 2588 1336 cmd.exe 29 PID 1336 wrote to memory of 2588 1336 cmd.exe 29 PID 2588 wrote to memory of 2644 2588 rundll32.exe 30 PID 2588 wrote to memory of 2644 2588 rundll32.exe 30 PID 2588 wrote to memory of 2644 2588 rundll32.exe 30 PID 2588 wrote to memory of 2644 2588 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\TikTokRizz\.vs\TikTokRizz\v17\.suo1⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\TikTokRizz\.vs\TikTokRizz\v17\.suo2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\TikTokRizz\.vs\TikTokRizz\v17\.suo"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d525f38697780f8dcebdf2d0d7e033f0
SHA1d7a0f8248661f89916bc9ab1b21b07c0f0d6788f
SHA256b99ab5346f74e1eb04d1e6bca06b929e86c65dd8452ac72171fd06252bc1b180
SHA512e8158cbac3b7f7ab9b156926109dc354718a763963f7af2b965e1a3c56a9b5786b5e928bfd9e87890dfd34226227bcc63b38644bc70e071c8346f57885a29883