Analysis
-
max time kernel
137s -
max time network
129s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
10-10-2023 11:31
Static task
static1
1 signatures
General
-
Target
AutoClicker.exe
-
Size
854KB
-
MD5
c500a7318204cc39a9e4b544fbf4f4ff
-
SHA1
f35013967cb5ff638491edb409eee863c5f8ada0
-
SHA256
45bd2a14ac56f7a71d9c8b358cc0769972b5477edd1744e1f2085961558040a8
-
SHA512
f57d2c6ad185bff1824ddfcdd1f8fea9da6a832c6ef421cbd8645b7ac78a9d5b4d0d321ebbf6559729d470c05ef579020bb2411fa361e9b0acf51e640e4e1580
-
SSDEEP
12288:maWzgMg7v3qnCiWErQohh0F49CJ8lnybQg9BFg9UmTRHlvh:haHMv6CGrjBnybQg+mmhJh
Malware Config
Signatures
-
Possible privilege escalation attempt 4 IoCs
pid Process 2180 takeown.exe 196 takeown.exe 5044 icacls.exe 4104 icacls.exe -
Modifies file permissions 1 TTPs 4 IoCs
pid Process 2180 takeown.exe 196 takeown.exe 5044 icacls.exe 4104 icacls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1504 AutoClicker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2180 takeown.exe Token: SeTakeOwnershipPrivilege 196 takeown.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1504 AutoClicker.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1344 wrote to memory of 2180 1344 cmd.exe 75 PID 1344 wrote to memory of 2180 1344 cmd.exe 75 PID 1344 wrote to memory of 196 1344 cmd.exe 76 PID 1344 wrote to memory of 196 1344 cmd.exe 76 PID 1344 wrote to memory of 5044 1344 cmd.exe 77 PID 1344 wrote to memory of 5044 1344 cmd.exe 77 PID 1344 wrote to memory of 4104 1344 cmd.exe 78 PID 1344 wrote to memory of 4104 1344 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\AutoClicker.exe"C:\Users\Admin\AppData\Local\Temp\AutoClicker.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1504
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4464
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\System32\takeown.exetakeown /f logoncli.dll2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\Windows\System32\takeown.exetakeown /f LogonUI.exe2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:196
-
-
C:\Windows\System32\icacls.exeicacls2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5044
-
-
C:\Windows\System32\icacls.exeicacls LogonUI.exe /grant Administrator:(D,WDAC)2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4104
-