Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30/11/2024, 21:40
Static task
static1
Behavioral task
behavioral1
Sample
TikTokDesktop18.exe
Resource
win7-20240729-en
General
-
Target
TikTokDesktop18.exe
-
Size
17.9MB
-
MD5
81f6b6fe3201c3941bd49243c5896811
-
SHA1
8bd0d5bb78255fc9f2dcf70fde14dba16c66551c
-
SHA256
fa4f1c0b324654420f8758b8ab1d7e0db22f0eacbff0d2e14413ed904ca54aaf
-
SHA512
f3d22c84fb70a2c851f533037b74c45248b9074aa3042371672c89c3ee5229bbdbbc193e54840adbc5f17672430fbbc0b94dd12c8014f3a3ec93fece24e54d4f
-
SSDEEP
393216:7bbTRUBXu2+WlsaxtBXu2+WlsaxtBXu2+WlsaxtBXu2+Wlsax:7PKBX4mtfBX4mtfBX4mtfBX4mt
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2016 powershell.exe 2828 powershell.exe 2724 powershell.exe 2744 powershell.exe 2728 powershell.exe 1224 powershell.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2920 2388 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TikTokDesktop18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2016 powershell.exe 2828 powershell.exe 2724 powershell.exe 2744 powershell.exe 2728 powershell.exe 1224 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2388 TikTokDesktop18.exe Token: SeDebugPrivilege 2016 powershell.exe Token: SeDebugPrivilege 2828 powershell.exe Token: SeDebugPrivilege 2724 powershell.exe Token: SeDebugPrivilege 2744 powershell.exe Token: SeDebugPrivilege 2728 powershell.exe Token: SeDebugPrivilege 1224 powershell.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2016 2388 TikTokDesktop18.exe 32 PID 2388 wrote to memory of 2016 2388 TikTokDesktop18.exe 32 PID 2388 wrote to memory of 2016 2388 TikTokDesktop18.exe 32 PID 2388 wrote to memory of 2016 2388 TikTokDesktop18.exe 32 PID 2016 wrote to memory of 2828 2016 powershell.exe 34 PID 2016 wrote to memory of 2828 2016 powershell.exe 34 PID 2016 wrote to memory of 2828 2016 powershell.exe 34 PID 2016 wrote to memory of 2828 2016 powershell.exe 34 PID 2388 wrote to memory of 2724 2388 TikTokDesktop18.exe 35 PID 2388 wrote to memory of 2724 2388 TikTokDesktop18.exe 35 PID 2388 wrote to memory of 2724 2388 TikTokDesktop18.exe 35 PID 2388 wrote to memory of 2724 2388 TikTokDesktop18.exe 35 PID 2724 wrote to memory of 2744 2724 powershell.exe 37 PID 2724 wrote to memory of 2744 2724 powershell.exe 37 PID 2724 wrote to memory of 2744 2724 powershell.exe 37 PID 2724 wrote to memory of 2744 2724 powershell.exe 37 PID 2388 wrote to memory of 2728 2388 TikTokDesktop18.exe 38 PID 2388 wrote to memory of 2728 2388 TikTokDesktop18.exe 38 PID 2388 wrote to memory of 2728 2388 TikTokDesktop18.exe 38 PID 2388 wrote to memory of 2728 2388 TikTokDesktop18.exe 38 PID 2728 wrote to memory of 1224 2728 powershell.exe 40 PID 2728 wrote to memory of 1224 2728 powershell.exe 40 PID 2728 wrote to memory of 1224 2728 powershell.exe 40 PID 2728 wrote to memory of 1224 2728 powershell.exe 40 PID 2388 wrote to memory of 2920 2388 TikTokDesktop18.exe 41 PID 2388 wrote to memory of 2920 2388 TikTokDesktop18.exe 41 PID 2388 wrote to memory of 2920 2388 TikTokDesktop18.exe 41 PID 2388 wrote to memory of 2920 2388 TikTokDesktop18.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\TikTokDesktop18.exe"C:\Users\Admin\AppData\Local\Temp\TikTokDesktop18.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" powershell -Command "Add-MpPreference -ExclusionPath 'C:\XfkHhGue'"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath C:\XfkHhGue3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows'"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath C:\Windows3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users'"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath C:\Users3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 10922⤵
- Program crash
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD57a8bd43fd8beced77162230179b3a87f
SHA1c1f3a4fae8502fd125af29299522ffdc15a71562
SHA256518f4a6ccb20e3bac3bbca3adc5ffc4aeabf61fbc4ad298f83aa52b58147aab0
SHA512ffddfff6c998dfc797d0875fb08dc8b98bd98c61c1461e160c6c5403fc6e7a23847b2855aa60bbf46146345f7b0fda1f380d29e88d9357e89d672f7a041234f0