Analysis

  • max time kernel
    100s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/12/2023, 13:04

General

  • Target

    clicker.exe

  • Size

    4.2MB

  • MD5

    b3bdceb2c15ce3952b511fe8cc05a9b6

  • SHA1

    7a22769b412d8cf9f313e6bf8a2711e9d4519555

  • SHA256

    867329c38f91cfb5e20eb24795549cb29e061db208cec7bfa516989ce12fc1d4

  • SHA512

    35b1240a681ef280e92fb7ba9c7e7ff372cb183f4f684a396fc86631a89ff63d1ed4e9743f96f10b48b70318fb8e261925940720a522b832472001c03e5ebd8d

  • SSDEEP

    49152:GaiAe5Z2jdId0hGnZgiRhsyMQ4jTNFNnQgd22nNzLq:HdbLq

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\clicker.exe
    "C:\Users\Admin\AppData\Local\Temp\clicker.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:3552

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3552-0-0x00007FF765760000-0x00007FF765D1D000-memory.dmp

          Filesize

          5.7MB

        • memory/3552-1-0x00007FF765760000-0x00007FF765D1D000-memory.dmp

          Filesize

          5.7MB