Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 20:34

General

  • Target

    MUAutoClicker/MUAutoClicker.exe

  • Size

    1.2MB

  • MD5

    87ad9dc7858d2ce62272481ff8a3d92a

  • SHA1

    84159e08517436bc0be5ee2a337a713d2f800183

  • SHA256

    c8cfac61e1efeb3f42ebc4b868c69658623afb2229335952d1186ef5f5284b23

  • SHA512

    0724624380a0769c325fcc420f74dd419f4d53e05b31297c8a4d21cb4c38862ff250a6256dba5d24268baec69a05d489fd8c8a2174b06fa6ae5fa7385f9242f3

  • SSDEEP

    24576:+tTVAPMCvCMByFv2hmXVk1Xv85d+WAjF7O7ijfpOLd7Qpfefhizv:+tTVAPMWct2mX+Xv85d+bBjfpOLd7Qpd

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MUAutoClicker\MUAutoClicker.exe
    "C:\Users\Admin\AppData\Local\Temp\MUAutoClicker\MUAutoClicker.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe" Bootstrapper.dll,Load2
      2⤵
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:3056

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Bootstrapper.dll

          Filesize

          1.1MB

          MD5

          0618931d9158a4c436f2821840d5bffa

          SHA1

          ac4cd470e897236ba04c179321b3d386701dbb4b

          SHA256

          b28d34b3112bae2f3097dd78e238aea6b64dabed394539098e7a87c87ee76ec0

          SHA512

          46402bd778be8fe3f572bc51239ee5176b4e9f2d037bb1091125afba2371f7b588f0ce61bde4dd592ec1e79964c641f9e31252de4ac05684728978e0427142ed

        • C:\Users\Admin\AppData\Local\Temp\MUAutoClicker.dll

          Filesize

          747KB

          MD5

          63c9decac4abc6d5a29a00bf14f9636d

          SHA1

          370f82e4ed5c9b536a5cb667e2d9414e1bcbfd19

          SHA256

          ff0ef0015b1a80af4e4ea4c87e3ea7df529ea10145deed5dc6d751c772965252

          SHA512

          27c48cee16566900ec66593b5d639ea8c5290fe1bfd7087b9575798538c47d6a72cd20e23f25bd3fa45a891d10c730e15546f6934a43d3cc1dda02d502044c25

        • C:\Users\Admin\AppData\Local\Temp\MUAutoLoader.dll

          Filesize

          923KB

          MD5

          abfbb875de4aaea0cd6d7044d7af9f44

          SHA1

          942384f203948ee9f21b2cc175ad0fb212a73324

          SHA256

          1f00b0c5e3b0f0fe96b41ec7f10dfe65d1a694f820166b956000a845e4e36b32

          SHA512

          b15e904dbb4df5142115a424178d336d837b874effe999e6944a1fa9d2e1a517dea0b3e1334dec18a302e25e953282c8f0a543e731cf6fff590616bcbc69a8b6

        • C:\Users\Admin\AppData\Local\Temp\MUEliteClicker.dll

          Filesize

          430KB

          MD5

          dda9fd8377e8c22c436930cdb22783c8

          SHA1

          5a02ed93d2e12830ce83975a11bd8c4a581bf9d7

          SHA256

          972fb15830da5a5d2d5c75b0d06548a49920184cb5fd69c12a3863aabdb1a0ef

          SHA512

          197441c57db58003aabc491e35ec65d236bc5546b2a86d9db9a63236063d25b0b8920185ba23e1abc94d00e537219c64c121ce8104a370100968ff8fe10c4b5f

        • memory/3056-13-0x00000000000C0000-0x00000000000C1000-memory.dmp

          Filesize

          4KB

        • memory/3056-14-0x00000000000C0000-0x00000000000C1000-memory.dmp

          Filesize

          4KB

        • memory/3056-17-0x0000000000270000-0x000000000029E000-memory.dmp

          Filesize

          184KB