Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 15:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Akira_Clicker.exe
Resource
win7-20241010-en
6 signatures
150 seconds
General
-
Target
Akira_Clicker.exe
-
Size
8.3MB
-
MD5
5ceab1157735e1f04f8c3ddfec67711a
-
SHA1
864c6f6a2177c88b68582c8794715507ff3c17dd
-
SHA256
c73ca441ef581322524920065784e7da7431f693034eddabd7652b4915390580
-
SHA512
34cc2f48f8ed21876dfc9db49e10339dcc52a1afe62e947b1cbe4a00677158faf6ff5b1b5d84bacd17ea9d759ea68fa4f1e426f17eca40c3a3b58eb02e13ae75
-
SSDEEP
196608:X+ToyV0QhZ2VEJX/VHtlcjsVLZW+b04pcfpuNXMM:WVn/VHtGsVLZWacfpuxMM
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Akira_Clicker.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Akira_Clicker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Akira_Clicker.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Akira_Clicker.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2380 Akira_Clicker.exe 2380 Akira_Clicker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 2380 Akira_Clicker.exe Token: SeDebugPrivilege 2380 Akira_Clicker.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2380 wrote to memory of 832 2380 Akira_Clicker.exe 31 PID 2380 wrote to memory of 832 2380 Akira_Clicker.exe 31 PID 2380 wrote to memory of 832 2380 Akira_Clicker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Akira_Clicker.exe"C:\Users\Admin\AppData\Local\Temp\Akira_Clicker.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2380 -s 2802⤵PID:832
-