Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 20:34
Static task
static1
Behavioral task
behavioral1
Sample
MUAutoClicker/MUAutoClicker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
MUAutoClicker/MUAutoClicker.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
MUAutoClicker/help/index.html
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
MUAutoClicker/help/index.html
Resource
win10v2004-20231215-en
General
-
Target
MUAutoClicker/MUAutoClicker.exe
-
Size
1.2MB
-
MD5
87ad9dc7858d2ce62272481ff8a3d92a
-
SHA1
84159e08517436bc0be5ee2a337a713d2f800183
-
SHA256
c8cfac61e1efeb3f42ebc4b868c69658623afb2229335952d1186ef5f5284b23
-
SHA512
0724624380a0769c325fcc420f74dd419f4d53e05b31297c8a4d21cb4c38862ff250a6256dba5d24268baec69a05d489fd8c8a2174b06fa6ae5fa7385f9242f3
-
SSDEEP
24576:+tTVAPMCvCMByFv2hmXVk1Xv85d+WAjF7O7ijfpOLd7Qpfefhizv:+tTVAPMWct2mX+Xv85d+bBjfpOLd7Qpd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation MUAutoClicker.exe -
Loads dropped DLL 3 IoCs
pid Process 3872 rundll32.exe 3872 rundll32.exe 3872 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3872 rundll32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3872 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3872 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 552 wrote to memory of 3872 552 MUAutoClicker.exe 44 PID 552 wrote to memory of 3872 552 MUAutoClicker.exe 44 PID 552 wrote to memory of 3872 552 MUAutoClicker.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\MUAutoClicker\MUAutoClicker.exe"C:\Users\Admin\AppData\Local\Temp\MUAutoClicker\MUAutoClicker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" Bootstrapper.dll,Load22⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD50618931d9158a4c436f2821840d5bffa
SHA1ac4cd470e897236ba04c179321b3d386701dbb4b
SHA256b28d34b3112bae2f3097dd78e238aea6b64dabed394539098e7a87c87ee76ec0
SHA51246402bd778be8fe3f572bc51239ee5176b4e9f2d037bb1091125afba2371f7b588f0ce61bde4dd592ec1e79964c641f9e31252de4ac05684728978e0427142ed
-
Filesize
747KB
MD563c9decac4abc6d5a29a00bf14f9636d
SHA1370f82e4ed5c9b536a5cb667e2d9414e1bcbfd19
SHA256ff0ef0015b1a80af4e4ea4c87e3ea7df529ea10145deed5dc6d751c772965252
SHA51227c48cee16566900ec66593b5d639ea8c5290fe1bfd7087b9575798538c47d6a72cd20e23f25bd3fa45a891d10c730e15546f6934a43d3cc1dda02d502044c25
-
Filesize
430KB
MD5dda9fd8377e8c22c436930cdb22783c8
SHA15a02ed93d2e12830ce83975a11bd8c4a581bf9d7
SHA256972fb15830da5a5d2d5c75b0d06548a49920184cb5fd69c12a3863aabdb1a0ef
SHA512197441c57db58003aabc491e35ec65d236bc5546b2a86d9db9a63236063d25b0b8920185ba23e1abc94d00e537219c64c121ce8104a370100968ff8fe10c4b5f
-
Filesize
923KB
MD5abfbb875de4aaea0cd6d7044d7af9f44
SHA1942384f203948ee9f21b2cc175ad0fb212a73324
SHA2561f00b0c5e3b0f0fe96b41ec7f10dfe65d1a694f820166b956000a845e4e36b32
SHA512b15e904dbb4df5142115a424178d336d837b874effe999e6944a1fa9d2e1a517dea0b3e1334dec18a302e25e953282c8f0a543e731cf6fff590616bcbc69a8b6