Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/09/2024, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
tiktok.py
Resource
win7-20240708-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
tiktok.py
Resource
win10v2004-20240802-en
12 signatures
150 seconds
General
-
Target
tiktok.py
-
Size
11KB
-
MD5
14363e4dd4fb2f25b2aaab98111f62d1
-
SHA1
f314f9dbba38666e9085a8c1d40204f3404577c4
-
SHA256
c40030dd1a021b9562af2b186258e5c67a968b9832ee0444f66655297e2cac70
-
SHA512
10faa42ae1fc2c6876131680d5151714ae2f425ee827e36aafd6166fc022a51012c55b642a1d3737c2a3effe7e187f2d0bb32ac8aa5867322ee7ddceb4dacca5
-
SSDEEP
192:OD5sIVAQoMlAg/D/o/jNMW/qB0zyLV/9pAVE1FafA+675x5N1q8:OD5NqMhBCywi1sAfv7t
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2764 2908 cmd.exe 31 PID 2908 wrote to memory of 2764 2908 cmd.exe 31 PID 2908 wrote to memory of 2764 2908 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\tiktok.py1⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\tiktok.py2⤵
- Modifies registry class
PID:2764
-