Overview
overview
3Static
static
3TikTokRizz.zip
windows7-x64
1TikTokRizz.zip
windows10-2004-x64
1TikTokRizz....vsidx
windows7-x64
3TikTokRizz....vsidx
windows10-2004-x64
3TikTokRizz....vsidx
windows7-x64
3TikTokRizz....vsidx
windows10-2004-x64
3TikTokRizz....vsidx
windows7-x64
3TikTokRizz....vsidx
windows10-2004-x64
3TikTokRizz....vsidx
windows7-x64
3TikTokRizz....vsidx
windows10-2004-x64
3TikTokRizz...7/.suo
windows7-x64
3TikTokRizz...7/.suo
windows10-2004-x64
3TikTokRizz...t.json
windows7-x64
3TikTokRizz...t.json
windows10-2004-x64
3TikTokRizz...zz.sln
windows7-x64
3TikTokRizz...zz.sln
windows10-2004-x64
3TikTokRizz...config
windows7-x64
3TikTokRizz...config
windows10-2004-x64
3TikTokRizz...ner.cs
windows7-x64
3TikTokRizz...ner.cs
windows10-2004-x64
3TikTokRizz...rm1.cs
windows7-x64
3TikTokRizz...rm1.cs
windows10-2004-x64
3TikTokRizz...m1.vbs
windows7-x64
1TikTokRizz...m1.vbs
windows10-2004-x64
1TikTokRizz...ram.cs
windows7-x64
3TikTokRizz...ram.cs
windows10-2004-x64
3TikTokRizz...nfo.cs
windows7-x64
3TikTokRizz...nfo.cs
windows10-2004-x64
3TikTokRizz...er.vbs
windows7-x64
1TikTokRizz...er.vbs
windows10-2004-x64
1TikTokRizz...es.vbs
windows7-x64
1TikTokRizz...es.vbs
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
TikTokRizz.zip
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
TikTokRizz.zip
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
TikTokRizz/.vs/TikTokRizz/FileContentIndex/0c4aa1fd-6b50-4cc5-8d96-ce9083219a23.vsidx
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
TikTokRizz/.vs/TikTokRizz/FileContentIndex/0c4aa1fd-6b50-4cc5-8d96-ce9083219a23.vsidx
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
TikTokRizz/.vs/TikTokRizz/FileContentIndex/1038b269-7489-4412-8b9e-92cb85064898.vsidx
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
TikTokRizz/.vs/TikTokRizz/FileContentIndex/1038b269-7489-4412-8b9e-92cb85064898.vsidx
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
TikTokRizz/.vs/TikTokRizz/FileContentIndex/8819d140-dbb1-42f4-88e1-27502f877ffd.vsidx
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
TikTokRizz/.vs/TikTokRizz/FileContentIndex/8819d140-dbb1-42f4-88e1-27502f877ffd.vsidx
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
TikTokRizz/.vs/TikTokRizz/FileContentIndex/c3774f1e-57c8-4ee9-999c-373f4e24a054.vsidx
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
TikTokRizz/.vs/TikTokRizz/FileContentIndex/c3774f1e-57c8-4ee9-999c-373f4e24a054.vsidx
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
TikTokRizz/.vs/TikTokRizz/v17/.suo
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
TikTokRizz/.vs/TikTokRizz/v17/.suo
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
TikTokRizz/.vs/TikTokRizz/v17/DocumentLayout.json
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
TikTokRizz/.vs/TikTokRizz/v17/DocumentLayout.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
TikTokRizz/TikTokRizz.sln
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
TikTokRizz/TikTokRizz.sln
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
TikTokRizz/TikTokRizz/App.config
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
TikTokRizz/TikTokRizz/App.config
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
TikTokRizz/TikTokRizz/Form1.Designer.cs
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
TikTokRizz/TikTokRizz/Form1.Designer.cs
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
TikTokRizz/TikTokRizz/Form1.cs
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
TikTokRizz/TikTokRizz/Form1.cs
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
TikTokRizz/TikTokRizz/Form1.vbs
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
TikTokRizz/TikTokRizz/Form1.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
TikTokRizz/TikTokRizz/Program.cs
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
TikTokRizz/TikTokRizz/Program.cs
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
TikTokRizz/TikTokRizz/Properties/AssemblyInfo.cs
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
TikTokRizz/TikTokRizz/Properties/AssemblyInfo.cs
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
TikTokRizz/TikTokRizz/Properties/Resources.Designer.vbs
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
TikTokRizz/TikTokRizz/Properties/Resources.Designer.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
TikTokRizz/TikTokRizz/Properties/Resources.vbs
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
TikTokRizz/TikTokRizz/Properties/Resources.vbs
Resource
win10v2004-20240508-en
General
-
Target
TikTokRizz/TikTokRizz/Form1.Designer.cs
-
Size
10KB
-
MD5
a3913f8337f65a9f404f148032d2f9c1
-
SHA1
673b50e04ec6ec8118c18325cf921b22266e6259
-
SHA256
0a92045e352272b21bce585a7e15152cab09b6376d400ebf6db636cc0c77add7
-
SHA512
fc042adca5d600073a29a53a25f8431ea0f17bfe5065b4b9cfb9fe091373735cf598066134284faa3aeb5bbd040f53eeda98436b1e1c4e222639d52de9567342
-
SSDEEP
192:Cwa+zcqtY1GqwepZVIySCoD2EM4cg+d9MFrXeUmBhROJY1GqwJU+puUEEOUEE5Ce:Cw1zcq+58H2EM4cJd9MFr0hRRqlpuTOx
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2384 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2384 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2384 AcroRd32.exe 2384 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2384 2940 cmd.exe 29 PID 2940 wrote to memory of 2384 2940 cmd.exe 29 PID 2940 wrote to memory of 2384 2940 cmd.exe 29 PID 2940 wrote to memory of 2384 2940 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\TikTokRizz\TikTokRizz\Form1.Designer.cs1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\TikTokRizz\TikTokRizz\Form1.Designer.cs"2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50b842676c491822b29e7f3fb39d4f996
SHA18c0e2331a940e46fdf6f850cd31f3fa1586b4162
SHA25606b109e7d8de7b4f3b7ea4604d52c51e46da0eb4a7ab858d89897bee5adad04d
SHA512175c82a637cf072632445fcb2a1472db927af18878478592adb565c54da71510e091d1953a01120fa5bce4f180933ef65d55583f8bb333260e730e3dcad3cafc