Static task
static1
Behavioral task
behavioral1
Sample
clicker.exe
Resource
win10v2004-20240802-en
General
-
Target
clicker.exe
-
Size
1.1MB
-
MD5
e2b2d8fdeeeee8978b0006ea3342b366
-
SHA1
154c48ad6752c4398ce98cbe36a44f98908235a1
-
SHA256
9507001df9846ceb02befcabe020e5af9fce07fe42662ad7f8a43872a07ed823
-
SHA512
542c01185b18abe83b9a6cf5b61e50e58fa1b5ca15b45b346252bf896cf511a56f7500b22cd21913c5619590ebb459b00f74c4d4bbd0904123b35219476c28df
-
SSDEEP
24576:vp7BbF36e3HzHE11t7yKFrkXomXUYjMZzU6nkV4PK:VBbJ6e3HMcKFr0lAzNnH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource clicker.exe
Files
-
clicker.exe.exe windows:6 windows x64 arch:x64
2568e960c509e795c353dfe819750896
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
d3d9
Direct3DCreate9
kernel32
GetProcessHeap
MultiByteToWideChar
LoadLibraryA
FreeLibrary
CreateFileW
Sleep
lstrcmpiW
GetModuleHandleW
GetComputerNameA
GetComputerNameExA
lstrcmpiA
GetWindowsDirectoryW
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
ExpandEnvironmentStringsW
SetLastError
CreateMutexA
GetTickCount64
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
TerminateProcess
IsDebuggerPresent
CheckRemoteDebuggerPresent
GetLogicalDrives
GetDriveTypeW
QueryDosDeviceW
DeviceIoControl
SetThreadPriority
GlobalAlloc
GlobalFree
GlobalLock
WideCharToMultiByte
GlobalUnlock
QueryPerformanceFrequency
QueryPerformanceCounter
GetStdHandle
SetConsoleTextAttribute
AllocConsole
GetConsoleWindow
SetConsoleTitleA
FreeConsole
SetPriorityClass
GetCurrentProcessId
GetACP
IsValidCodePage
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
FlsFree
GetModuleHandleA
FlsGetValue
FlsAlloc
ReadConsoleW
GetFileSizeEx
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
CreatePipe
GetExitCodeProcess
WaitForSingleObject
GetFileType
HeapFree
HeapAlloc
WriteFile
GetModuleFileNameW
ReadFile
FreeLibraryAndExitThread
ExitThread
CreateThread
GetModuleHandleExW
ExitProcess
CreateProcessW
DuplicateHandle
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
IsWow64Process
GetSystemFirmwareTable
K32GetModuleBaseNameW
OpenProcess
K32EnumProcesses
GlobalMemoryStatusEx
GetPhysicallyInstalledSystemMemory
GetDiskFreeSpaceExW
CloseHandle
GetCurrentProcess
GetLastError
GetFileAttributesA
GetSystemInfo
RaiseException
RtlPcToFileHeader
RtlUnwindEx
InitializeSListHead
GetStartupInfoW
SetEndOfFile
WriteConsoleW
HeapSize
SetStdHandle
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlUnwind
GetProcAddress
RtlCaptureContext
GetCPInfo
CompareStringEx
LCMapStringEx
DeleteCriticalSection
LeaveCriticalSection
LocalAlloc
LocalFree
VerifyVersionInfoW
VerSetConditionMask
GetOEMCP
FlsSetValue
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCurrentThreadId
GetNativeSystemInfo
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
AreFileApisANSI
GetFileInformationByHandleEx
FormatMessageA
GetLocaleInfoEx
GetStringTypeW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
InitializeCriticalSectionEx
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
EnterCriticalSection
GetCommandLineA
user32
GetWindowThreadProcessId
UpdateWindow
ShowWindow
CreateWindowExW
RegisterClassExW
DispatchMessageW
TranslateMessage
PeekMessageW
UnregisterClassW
DestroyWindow
DefWindowProcW
PostQuitMessage
PostMessageW
MoveWindow
GetWindowRect
SetWindowPos
GetKeyState
ScreenToClient
GetCapture
ClientToScreen
TrackMouseEvent
GetForegroundWindow
LoadCursorW
SetCapture
SetCursor
GetClientRect
SetProcessDPIAware
ReleaseCapture
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
SetClipboardData
SetCursorPos
PostMessageA
FindWindowA
GetAsyncKeyState
EnumWindows
CharUpperW
GetWindowTextW
FindWindowW
GetCursorPos
advapi32
RegOpenKeyExA
RegEnumKeyExW
RegQueryValueExA
RegOpenKeyExW
RegCloseKey
GetUserNameW
RegQueryValueExW
GetUserNameA
shell32
SHGetKnownFolderPath
SHGetSpecialFolderPathW
ole32
CoTaskMemFree
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
CoInitialize
CoUninitialize
CoSetProxyBlanket
oleaut32
VariantClear
VariantInit
SysAllocString
SysFreeString
iphlpapi
GetAdaptersInfo
shlwapi
PathCombineW
mpr
WNetGetProviderNameW
winmm
PlaySoundW
imm32
ImmSetCompositionWindow
ImmSetCandidateWindow
ImmReleaseContext
ImmGetContext
ImmAssociateContextEx
Sections
.text Size: 808KB - Virtual size: 807KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 320KB - Virtual size: 319KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ