Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2023 20:34

General

  • Target

    MUAutoClicker/MUAutoClicker.exe

  • Size

    1.2MB

  • MD5

    87ad9dc7858d2ce62272481ff8a3d92a

  • SHA1

    84159e08517436bc0be5ee2a337a713d2f800183

  • SHA256

    c8cfac61e1efeb3f42ebc4b868c69658623afb2229335952d1186ef5f5284b23

  • SHA512

    0724624380a0769c325fcc420f74dd419f4d53e05b31297c8a4d21cb4c38862ff250a6256dba5d24268baec69a05d489fd8c8a2174b06fa6ae5fa7385f9242f3

  • SSDEEP

    24576:+tTVAPMCvCMByFv2hmXVk1Xv85d+WAjF7O7ijfpOLd7Qpfefhizv:+tTVAPMWct2mX+Xv85d+bBjfpOLd7Qpd

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MUAutoClicker\MUAutoClicker.exe
    "C:\Users\Admin\AppData\Local\Temp\MUAutoClicker\MUAutoClicker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:552
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe" Bootstrapper.dll,Load2
      2⤵
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:3872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Bootstrapper.dll

    Filesize

    1.1MB

    MD5

    0618931d9158a4c436f2821840d5bffa

    SHA1

    ac4cd470e897236ba04c179321b3d386701dbb4b

    SHA256

    b28d34b3112bae2f3097dd78e238aea6b64dabed394539098e7a87c87ee76ec0

    SHA512

    46402bd778be8fe3f572bc51239ee5176b4e9f2d037bb1091125afba2371f7b588f0ce61bde4dd592ec1e79964c641f9e31252de4ac05684728978e0427142ed

  • C:\Users\Admin\AppData\Local\Temp\MUAutoClicker.dll

    Filesize

    747KB

    MD5

    63c9decac4abc6d5a29a00bf14f9636d

    SHA1

    370f82e4ed5c9b536a5cb667e2d9414e1bcbfd19

    SHA256

    ff0ef0015b1a80af4e4ea4c87e3ea7df529ea10145deed5dc6d751c772965252

    SHA512

    27c48cee16566900ec66593b5d639ea8c5290fe1bfd7087b9575798538c47d6a72cd20e23f25bd3fa45a891d10c730e15546f6934a43d3cc1dda02d502044c25

  • C:\Users\Admin\AppData\Local\Temp\MUEliteClicker.dll

    Filesize

    430KB

    MD5

    dda9fd8377e8c22c436930cdb22783c8

    SHA1

    5a02ed93d2e12830ce83975a11bd8c4a581bf9d7

    SHA256

    972fb15830da5a5d2d5c75b0d06548a49920184cb5fd69c12a3863aabdb1a0ef

    SHA512

    197441c57db58003aabc491e35ec65d236bc5546b2a86d9db9a63236063d25b0b8920185ba23e1abc94d00e537219c64c121ce8104a370100968ff8fe10c4b5f

  • C:\Users\Admin\AppData\Local\Temp\xLnNmEcFkO.dll

    Filesize

    923KB

    MD5

    abfbb875de4aaea0cd6d7044d7af9f44

    SHA1

    942384f203948ee9f21b2cc175ad0fb212a73324

    SHA256

    1f00b0c5e3b0f0fe96b41ec7f10dfe65d1a694f820166b956000a845e4e36b32

    SHA512

    b15e904dbb4df5142115a424178d336d837b874effe999e6944a1fa9d2e1a517dea0b3e1334dec18a302e25e953282c8f0a543e731cf6fff590616bcbc69a8b6

  • memory/3872-11-0x0000000001660000-0x0000000001661000-memory.dmp

    Filesize

    4KB

  • memory/3872-15-0x00000000016A0000-0x00000000016CE000-memory.dmp

    Filesize

    184KB

  • memory/3872-10-0x0000000001660000-0x0000000001661000-memory.dmp

    Filesize

    4KB