Analysis

  • max time kernel
    32s
  • max time network
    37s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2024, 06:20

General

  • Target

    4ks_clicker.exe

  • Size

    4.2MB

  • MD5

    57336600d73cfacce884c62e707fcbcd

  • SHA1

    5ec4401ac09532692b5cb7171bbf58c62325ee3a

  • SHA256

    88b12d6b833263a48c7c577b9da131d6a15b21c5721762c146f2453ace12aaaf

  • SHA512

    234bb57185e15d8b38798eb1bbf643d44d0a775799272d3c26a189d0f32377deb4094233c1a9d60355bfd449ab25ee65f0edf13c5f8a2d78b150d41e44d83611

  • SSDEEP

    49152:9JFlyynaBxljUGRQkbk0z2Zd5Vs7UWgd29nBz/:H/ob

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ks_clicker.exe
    "C:\Users\Admin\AppData\Local\Temp\4ks_clicker.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:2104

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2104-0-0x00007FF6809E0000-0x00007FF680F9C000-memory.dmp

    Filesize

    5.7MB

  • memory/2104-1-0x00007FF6809E0000-0x00007FF680F9C000-memory.dmp

    Filesize

    5.7MB