Analysis

  • max time kernel
    151s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2023 19:57

General

  • Target

    AutoClickers.exe

  • Size

    939KB

  • MD5

    27d5a6c9274255cf89b38f28480edcf0

  • SHA1

    88036bf7a8956dd7f7e53ffabb6d29a7508060dc

  • SHA256

    cbe005a1b13a85b5f6bed4fa213e1bb837b222521f8e83ac3879d5bf791d5288

  • SHA512

    46997fde9001405998beca19ee0be329743dc5aee7cda525add25309c795dfee0e5859ef4c4b1bf9e1cdce21f2ac5e90f1f336ee1f0b9e5372581c7f254ec075

  • SSDEEP

    12288:UaWzgMg7v3qnCijErQohh0F4CCJ8lnyEQzHlV0RlPWhq2zXfu4uS0:LaHMv6C/rjinyEQzr0XP0q2zXfu4U

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AutoClickers.exe
    "C:\Users\Admin\AppData\Local\Temp\AutoClickers.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1752
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:836
  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:800

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    1KB

    MD5

    132944710913f7c0fdc8e1b8dc2f2525

    SHA1

    1a8e54afe628adc2cddf1b2b0ede233ab9c717f6

    SHA256

    5552262c10c0c68b707fa2b1c7f50ef2ef06b3f7efe0e25c5f755973b6a3c598

    SHA512

    b9e0474561fb9ce07d1a1abe2a2a18464283a229c14eff366ceb0ac78e4495b29f622ab4605ccbfe6b1a92140db4a39ab1d314384af0081812e438c8db15fd24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    416B

    MD5

    f49dae5cda070c954feaba8415bbe203

    SHA1

    fa8fae369c736d3dd9d1b79989f0fc5414466865

    SHA256

    f983da5a86c4c3028809791447cd26752066a41cd89be422d3c6940c4f6c5b40

    SHA512

    83520f8ec57bd20b9299e9e35f81b6eb105c89ddab143d73ceb13c0d0508efec08330e9867f11c5737233d5779095355a951a062045e3ae8415667efd8b813f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    02c5aca35f2495c71b52d5b6d1a5a663

    SHA1

    a472ffc78d6a7e90bc87bc7b707c6eb34e901666

    SHA256

    d463df97523dfb8ad73811b68ff6c172b9d003cd11e52ab1bf3b876f501e6bac

    SHA512

    fb98b0cd227bfe616f94275477b490135478cc0e93892f4ad3b6661b52be8c8fc94d54d89fd2fba61748187c7de201660dc956a5eb91fcf46c00f348716e732d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat

    Filesize

    12KB

    MD5

    8897a21f612fc073e1fe2a3dd6ebd797

    SHA1

    550d3974f7a80387bf5725d8fb7d778820b7439b

    SHA256

    2ba240033d3c72d9b8715d98e50b51a23b535976ecdc0feb7005430d57c0702a

    SHA512

    7585df9fa31bedaec7760e99bd0e26c1204b43c57e5eed53adb7c91e27a576e088de65a8c16aa66023085944c5ffe3187cc2af0d3ff7dddfb8359c6e6c0ca9b0

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat

    Filesize

    12KB

    MD5

    8897a21f612fc073e1fe2a3dd6ebd797

    SHA1

    550d3974f7a80387bf5725d8fb7d778820b7439b

    SHA256

    2ba240033d3c72d9b8715d98e50b51a23b535976ecdc0feb7005430d57c0702a

    SHA512

    7585df9fa31bedaec7760e99bd0e26c1204b43c57e5eed53adb7c91e27a576e088de65a8c16aa66023085944c5ffe3187cc2af0d3ff7dddfb8359c6e6c0ca9b0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SRZ6M4S3.txt

    Filesize

    606B

    MD5

    082bdaa13d691f9285bad472283a20e3

    SHA1

    35a1237278521674d06639114dc9104aee2d72bf

    SHA256

    740c64f050c5aee542769695cfed5edfa1e6dcd14f343248cbeeccf90cf217ac

    SHA512

    228ba5240b555924a20b06913945727ab295b3e7f099bb46d72cbc11c446b58393f7aea2d752daa18fcf1a4d1068a764d7361acf12d4f8801fdf2b8afab49b40

  • memory/800-61-0x000007FEFBD91000-0x000007FEFBD93000-memory.dmp

    Filesize

    8KB

  • memory/1752-54-0x0000000076681000-0x0000000076683000-memory.dmp

    Filesize

    8KB