Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    12/12/2023, 13:04

General

  • Target

    clicker.exe

  • Size

    4.2MB

  • MD5

    b3bdceb2c15ce3952b511fe8cc05a9b6

  • SHA1

    7a22769b412d8cf9f313e6bf8a2711e9d4519555

  • SHA256

    867329c38f91cfb5e20eb24795549cb29e061db208cec7bfa516989ce12fc1d4

  • SHA512

    35b1240a681ef280e92fb7ba9c7e7ff372cb183f4f684a396fc86631a89ff63d1ed4e9743f96f10b48b70318fb8e261925940720a522b832472001c03e5ebd8d

  • SSDEEP

    49152:GaiAe5Z2jdId0hGnZgiRhsyMQ4jTNFNnQgd22nNzLq:HdbLq

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\clicker.exe
    "C:\Users\Admin\AppData\Local\Temp\clicker.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:2584

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2584-0-0x000000013F0C0000-0x000000013F67D000-memory.dmp

    Filesize

    5.7MB

  • memory/2584-1-0x000000013F0C0000-0x000000013F67D000-memory.dmp

    Filesize

    5.7MB