Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
AkiraClicker.exe
Resource
win7-20240708-en
General
-
Target
AkiraClicker.exe
-
Size
9.0MB
-
MD5
9b99f63c77d66e41e6e435e531e48825
-
SHA1
a0b344957f91c78b16ec3d015c15ecc39f13a1eb
-
SHA256
efcd4f8c31d59be174353659ba0643ad2e9192261be4e34fab86444525c77152
-
SHA512
c29bad5cbe47602d7745deb7844529d87c51412e1d5331717ef2cbee7ddff2d886f5602297a0de7acb61420a1edea1e396461a801548588d0b17858369276634
-
SSDEEP
196608:TYgXCjFPBV8megHA9o/B6f98l8gP3i46sJoF1oTp1poAO4WvlrI:TYgIdBV8jgKIB6f98aIOeTp0AO4SZI
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AkiraClicker.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AkiraClicker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AkiraClicker.exe -
Loads dropped DLL 1 IoCs
pid Process 1380 AkiraClicker.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AkiraClicker.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\system32\BsSndRpt64.exe AkiraClicker.exe File opened for modification C:\Windows\system32\BsSndRpt64.exe AkiraClicker.exe File created C:\Windows\system32\BugSplatHD64.exe AkiraClicker.exe File opened for modification C:\Windows\system32\BugSplatHD64.exe AkiraClicker.exe File created C:\Windows\system32\BugSplatRc64.dll AkiraClicker.exe File opened for modification C:\Windows\system32\BugSplatRc64.dll AkiraClicker.exe File created C:\Windows\system32\BugSplat64.dll AkiraClicker.exe File opened for modification C:\Windows\system32\BugSplat64.dll AkiraClicker.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1380 AkiraClicker.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1380 wrote to memory of 2408 1380 AkiraClicker.exe 31 PID 1380 wrote to memory of 2408 1380 AkiraClicker.exe 31 PID 1380 wrote to memory of 2408 1380 AkiraClicker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\AkiraClicker.exe"C:\Users\Admin\AppData\Local\Temp\AkiraClicker.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1380 -s 2002⤵PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
630KB
MD5115dd4de97741631fae55f18354bbd04
SHA15e09a092516ecc780bca17d63cf1131871faa31d
SHA2569a3537eaa545d37e24b19a172292235a4f3ee20fbd4a48e8c6c7ecae2eacd669
SHA512041df392fde1046cd763286368ff0e77d34119e21996de4d49517a54006910eda6ba761933ae82b0d5ecb85fc7155c4cc28051a8215cebf35e9bec3b82750e8d