ttdinject.exe

  • File Path: C:\WINDOWS\SysWOW64\ttdinject.exe
  • Description: Time Traver Debugging Application Injector

Hashes

Type Hash
MD5 C67E321DF3C854C94AB7CB5FCC6F0626
SHA1 0A0471E64324F34A348A6E737A5F684614CA575C
SHA256 F0A44D3C9EBC66E484E113088A9082F8939EDAD691F36C21BE85CBFD994D1D99
SHA384 6925BD8AE64553D09F6CF2846482A4AEC0212DD6E6E8AD98B5C2DF1175428CF8FE44F10A695A46DCA550626ADB6BE68B
SHA512 A2D6825E90D8FEE2BD0DDFB9273A6C3A44825DA8966546D2B383F5A7195E0095CD2CDB3D4829CF10E425667C2F80C0A0C5FDCCA4E8D2054182B62959C647C696
SSDEEP 6144:Pg0AzmAEoMXdXuNBgimzCsr08stSYy+EgSLC9:PyHEowdIyzjr05SYyzzC9
IMP 294C30F07BD18071315CF9C16B25BF24
PESHA1 4BB8A61E29EB42C50B87B7A55F1F4FB2A0B6A4F4
PE256 BD0A2225E15CC8DE197AA60D4C6EF13E35FC8D76175FBF02C6A7182512C6C798

Runtime Data

Usage (stdout):

Microsoft (R) TTDInject Launcher 1.01.07
Release: 10.0.22000.1
Copyright (C) Microsoft Corporation. All rights reserved.


Usage (stderr):

!!! Unexpected string 'help' after 'C:\WINDOWS\SysWOW64\ttdinject.exe'


Loaded Modules:

Path
C:\WINDOWS\SYSTEM32\ntdll.dll
C:\WINDOWS\System32\wow64.dll
C:\WINDOWS\System32\wow64base.dll
C:\WINDOWS\System32\wow64con.dll
C:\WINDOWS\System32\wow64cpu.dll
C:\WINDOWS\System32\wow64win.dll
C:\WINDOWS\SysWOW64\ttdinject.exe

Signature

  • Status: Signature verified.
  • Serial: 33000002ED2C45E4C145CF48440000000002ED
  • Thumbprint: 312860D2047EB81F8F58C29FF19ECDB4C634CF6A
  • Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
  • Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

File Metadata

  • Original Filename: TTDInject.EXE
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 10.0.22000.1 (WinBuild.160101.0800)
  • Product Version: 10.0.22000.1
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.
  • Machine Type: 32-bit

File Scan

  • VirusTotal Detections: 0/73
  • VirusTotal Link: https://www.virustotal.com/gui/file/f0a44d3c9ebc66e484e113088a9082f8939edad691f36c21be85cbfd994d1d99/detection

Possible Misuse

The following table contains possible examples of ttdinject.exe being misused. While ttdinject.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
LOLBAS Ttdinject.yml Name: Ttdinject.exe  
LOLBAS Ttdinject.yml - Command: TTDInject.exe /ClientParams "7 tmp.run 0 0 0 0 0 0 0 0 0 0" /Launch "C:/Windows/System32/calc.exe"  
LOLBAS Ttdinject.yml Description: Execute calc using ttdinject.exe. Requires administrator privileges. A log file will be created in tmp.run. The log file can be changed, but the length (7) has to be updated.  
LOLBAS Ttdinject.yml - Command: ttdinject.exe /ClientScenario TTDRecorder /ddload 0 /ClientParams "7 tmp.run 0 0 0 0 0 0 0 0 0 0" /launch "C:/Windows/System32/calc.exe"  
LOLBAS Ttdinject.yml - Path: C:\Windows\System32\ttdinject.exe  
LOLBAS Ttdinject.yml - Path: C:\Windows\Syswow64\ttdinject.exe  
LOLBAS Ttdinject.yml - IOC: Parent child relationship. Ttdinject.exe parent for executed command  
LOLBAS Ttdinject.yml - IOC: Multiple queries made to the IFEO registry key of an untrusted executable (Ex. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\payload.exe") from the ttdinject.exe process  

MIT License. Copyright (c) 2020-2021 Strontic.