Resubmissions
08/01/2025, 01:36
250108-b1nq2azpfk 712/12/2024, 00:15
241212-akazkaxrem 712/12/2024, 00:14
241212-ajhb9atlbz 701/10/2024, 22:49
241001-2r2jmsthpn 7Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 22:49
Behavioral task
behavioral1
Sample
DontClick.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DontClick.exe
Resource
win10v2004-20240802-en
General
-
Target
DontClick.exe
-
Size
30.6MB
-
MD5
bb86ada11f147a39b91237bfa34bb28f
-
SHA1
de9a1beea91226e559734c770284f3c66cbb10ba
-
SHA256
e91220d07862f79cc950299782a3e173d0064137be8d2ac89c91430e357b2748
-
SHA512
298246e5460756193b4e173e03ede9cc3cee2a2ab908024035e451af87b89f2431b8fd0069b6f35f914c65f85e6a02ce668776d195865f743a689e863687e9b2
-
SSDEEP
786432:iVW8Aq1QtI++nUU0sc6ydsa8DZcSW55VxhlS/eE5I2:+W12iI+sOX6ydd6FAxhp
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2416 DontClick.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2416 DontClick.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2416 1800 DontClick.exe 30 PID 1800 wrote to memory of 2416 1800 DontClick.exe 30 PID 1800 wrote to memory of 2416 1800 DontClick.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\DontClick.exe"C:\Users\Admin\AppData\Local\Temp\DontClick.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\DontClick.exe"C:\Users\Admin\AppData\Local\Temp\DontClick.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2416
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD53c388ce47c0d9117d2a50b3fa5ac981d
SHA1038484ff7460d03d1d36c23f0de4874cbaea2c48
SHA256c98ba3354a7d1f69bdca42560feec933ccba93afcc707391049a065e1079cddb
SHA512e529c5c1c028be01e44a156cd0e7cad0a24b5f91e5d34697fafc395b63e37780dc0fac8f4c5d075ad8fe4bd15d62a250b818ff3d4ead1e281530a4c7e3ce6d35
-
Filesize
4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
1023B
MD5141643e11c48898150daa83802dbc65f
SHA10445ed0f69910eeaee036f09a39a13c6e1f37e12
SHA25686da0f01aeae46348a3c3d465195dc1ceccde79f79e87769a64b8da04b2a4741
SHA512ef62311602b466397baf0b23caca66114f8838f9e78e1b067787ceb709d09e0530e85a47bbcd4c5a0905b74fdb30df0cc640910c6cc2e67886e5b18794a3583f
-
Filesize
92B
MD543136dde7dd276932f6197bb6d676ef4
SHA16b13c105452c519ea0b65ac1a975bd5e19c50122
SHA256189eedfe4581172c1b6a02b97a8f48a14c0b5baa3239e4ca990fbd8871553714
SHA512e7712ba7d36deb083ebcc3b641ad3e7d19fb071ee64ae3a35ad6a50ee882b20cd2e60ca1319199df12584fe311a6266ec74f96a3fb67e59f90c7b5909668aee1