Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2022, 15:43
Static task
static1
Behavioral task
behavioral1
Sample
AutoKeyClicker v1.2.4.exe
Resource
win7-20220812-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
AutoKeyClicker v1.2.4.exe
Resource
win10v2004-20220812-en
7 signatures
150 seconds
General
-
Target
AutoKeyClicker v1.2.4.exe
-
Size
77KB
-
MD5
13442c7e1d7bc3d95ef542fca0f66f75
-
SHA1
d686840c2e211679b08e1d708ea8689f38f91cb8
-
SHA256
656fcd08ff71f9bd1f5b84159e8eb2bd25f154b251b91c4e7ec7a4a7892c4a1d
-
SHA512
f6f33a3fc3c58ee1a92b137d21d87b77b64028f31c1b224f7fbd4beeae16a6cbdfbd5ed53e6529a23995e4b1a79e17c84b023fa63fcb259385912de8beee11d4
-
SSDEEP
1536:vVgqI2sqvMHDv5JCZ/00GP8tlEe43nzNG667N6oT7gkffOII:N1AjBJCd00GPelEe43nza4oT8yfOII
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3100 384 WerFault.exe 84 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 716 mspaint.exe 716 mspaint.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1800 AutoKeyClicker v1.2.4.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 1800 AutoKeyClicker v1.2.4.exe 1800 AutoKeyClicker v1.2.4.exe 1800 AutoKeyClicker v1.2.4.exe 1800 AutoKeyClicker v1.2.4.exe 1800 AutoKeyClicker v1.2.4.exe 1800 AutoKeyClicker v1.2.4.exe 1800 AutoKeyClicker v1.2.4.exe 1800 AutoKeyClicker v1.2.4.exe 1800 AutoKeyClicker v1.2.4.exe 1800 AutoKeyClicker v1.2.4.exe 1800 AutoKeyClicker v1.2.4.exe 1800 AutoKeyClicker v1.2.4.exe 1800 AutoKeyClicker v1.2.4.exe 716 mspaint.exe 716 mspaint.exe 716 mspaint.exe 716 mspaint.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AutoKeyClicker v1.2.4.exe"C:\Users\Admin\AppData\Local\Temp\AutoKeyClicker v1.2.4.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1800
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 460 -p 384 -ip 3841⤵PID:4236
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 384 -s 8601⤵
- Program crash
PID:3100
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:3012
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:3660
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\InitializeSuspend.rle"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:716
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:3120