Analysis

  • max time kernel
    132s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/05/2024, 13:10

General

  • Target

    TikTokRizz/TikTokRizz/Form1.Designer.cs

  • Size

    10KB

  • MD5

    a3913f8337f65a9f404f148032d2f9c1

  • SHA1

    673b50e04ec6ec8118c18325cf921b22266e6259

  • SHA256

    0a92045e352272b21bce585a7e15152cab09b6376d400ebf6db636cc0c77add7

  • SHA512

    fc042adca5d600073a29a53a25f8431ea0f17bfe5065b4b9cfb9fe091373735cf598066134284faa3aeb5bbd040f53eeda98436b1e1c4e222639d52de9567342

  • SSDEEP

    192:Cwa+zcqtY1GqwepZVIySCoD2EM4cg+d9MFrXeUmBhROJY1GqwJU+puUEEOUEE5Ce:Cw1zcq+58H2EM4cJd9MFr0hRRqlpuTOx

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\TikTokRizz\TikTokRizz\Form1.Designer.cs
    1⤵
    • Modifies registry class
    PID:4428
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3300
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1036,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=3868 /prefetch:8
    1⤵
      PID:1440

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads