Static task
static1
Behavioral task
behavioral1
Sample
clicker.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
clicker.exe
Resource
win10v2004-20220812-en
General
-
Target
clicker.exe
-
Size
527KB
-
MD5
00ff3fbc49de3a2b4d76eaaa1d485616
-
SHA1
9f55926080baec6bbdd40ec5d92f5c4c5e0bf1ed
-
SHA256
55122a009f3d8c7e7d8be75a9a4dd07ada3a51665f50bffe8ec567084f3ed851
-
SHA512
80c27bdd801b8f7a645268dd266af0f5f64498727a67eea13f264203f75b6979167471825fe0ebe05046dae01f26c0c2ec07da8127911b167770fcba21969109
-
SSDEEP
12288:9w+sI8URklUnn8zlmUa/f3rU6N3UQHinyM:9w+sFokl8HVfdpVCnP
Malware Config
Signatures
Files
-
clicker.exe.exe windows x64
fe7fd90b165fc0ea5f5a7bd80253b991
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
d3d9
Direct3DCreate9
kernel32
WideCharToMultiByte
GlobalUnlock
LoadLibraryA
QueryPerformanceFrequency
GetProcAddress
FreeLibrary
QueryPerformanceCounter
CloseHandle
VirtualQueryEx
CreateToolhelp32Snapshot
Process32First
Process32Next
CreateProcessA
GetCurrentProcessId
OpenProcess
CreateFileA
DeviceIoControl
GetModuleFileNameA
Beep
GetModuleHandleA
GlobalLock
GetSystemTimeAsFileTime
GetCurrentThreadId
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GlobalFree
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
FormatMessageA
LocalFree
GetFileInformationByHandleEx
MoveFileExW
GetLastError
AreFileApisANSI
SetFileInformationByHandle
GetFileAttributesExW
FindNextFileW
FindFirstFileExW
FindClose
CreateFileW
GlobalAlloc
MultiByteToWideChar
CreateDirectoryW
InitializeSListHead
GetModuleHandleW
user32
GetMessageA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
DestroyWindow
DispatchMessageA
TranslateMessage
PeekMessageA
UpdateWindow
UnregisterClassA
CreateWindowExA
RegisterClassExA
DefWindowProcA
PostQuitMessage
GetAsyncKeyState
ShowWindow
SetWindowPos
GetWindowRect
GetCursorInfo
GetForegroundWindow
FindWindowA
SendMessageA
GetCursorPos
SetClipboardData
GetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
GetWindowThreadProcessId
GetWindowTextA
SetCursorPos
ReleaseCapture
GetClientRect
SetCursor
GetKeyState
SetCapture
IsChild
ClientToScreen
LoadCursorA
GetCapture
ScreenToClient
shell32
SHParseDisplayName
SHGetKnownFolderPath
SHOpenFolderAndSelectItems
ord155
ShellExecuteA
ole32
CoTaskMemFree
msvcp140
_Cnd_do_broadcast_at_thread_exit
_Query_perf_counter
_Query_perf_frequency
_Thrd_sleep
_Xtime_get_ticks
?_Syserror_map@std@@YAPEBDH@Z
?_Xlength_error@std@@YAXPEBD@Z
?_Winerror_map@std@@YAHH@Z
?_Xout_of_range@std@@YAXPEBD@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?always_noconv@codecvt_base@std@@QEBA_NXZ
??1_Lockit@std@@QEAA@XZ
??0_Lockit@std@@QEAA@H@Z
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
??Bid@locale@std@@QEAA_KXZ
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z
?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z
?_Throw_Cpp_error@std@@YAXH@Z
ntdll
NtReadVirtualMemory
NtWriteVirtualMemory
imm32
ImmGetContext
ImmSetCompositionWindow
ImmReleaseContext
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_terminate
memmove
__std_exception_copy
__std_exception_destroy
strstr
__C_specific_handler
__current_exception
memcpy
__current_exception_context
memcmp
memchr
_CxxThrowException
memset
api-ms-win-crt-runtime-l1-1-0
_invalid_parameter_noinfo_noreturn
_beginthreadex
_register_thread_local_exe_atexit_callback
_c_exit
terminate
_exit
_initterm_e
_initterm
_get_narrow_winmain_command_line
_set_app_type
_seh_filter_exe
_cexit
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
exit
api-ms-win-crt-utility-l1-1-0
qsort
rand
api-ms-win-crt-stdio-l1-1-0
fclose
_set_fmode
__p__commode
fflush
setvbuf
__stdio_common_vsscanf
__stdio_common_vsprintf
_wfopen
fsetpos
fseek
__acrt_iob_func
_fseeki64
ftell
fwrite
_get_stream_buffer_pointers
fputc
ungetc
fgetc
fread
fgetpos
api-ms-win-crt-filesystem-l1-1-0
_lock_file
_unlock_file
api-ms-win-crt-string-l1-1-0
strncpy
tolower
strcpy_s
strcmp
isspace
api-ms-win-crt-heap-l1-1-0
malloc
_callnewh
_set_new_mode
free
api-ms-win-crt-convert-l1-1-0
atof
api-ms-win-crt-time-l1-1-0
_time64
api-ms-win-crt-math-l1-1-0
log
sqrtf
floorf
acosf
ceilf
logf
log2f
cosf
pow
fmodf
sinf
__setusermatherr
powf
api-ms-win-crt-locale-l1-1-0
___lc_codepage_func
_configthreadlocale
Sections
.text Size: 306KB - Virtual size: 306KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 202KB - Virtual size: 201KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ