Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
28/12/2024, 23:58
241228-31gfhawkay 528/12/2024, 23:55
241228-3yg91swje1 528/12/2024, 23:28
241228-3gb2nsvncz 5Analysis
-
max time kernel
63s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/12/2024, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
AutoClicker-3.0.exe
Resource
win11-20241007-en
General
-
Target
AutoClicker-3.0.exe
-
Size
844KB
-
MD5
7ecfc8cd7455dd9998f7dad88f2a8a9d
-
SHA1
1751d9389adb1e7187afa4938a3559e58739dce6
-
SHA256
2e67d5e7d96aec62a9dda4c0259167a44908af863c2b3af2a019723205abba9e
-
SHA512
cb05e82b17c0f7444d1259b661f0c1e6603d8a959da7475f35078a851d528c630366916c17a37db1a2490af66e5346309177c9e31921d09e7e795492868e678d
-
SSDEEP
12288:GaWzgMg7v3qnCiWErQohh0F49CJ8lnybQg9BFg9UmTRHlM:BaHMv6CGrjBnybQg+mmhG
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AutoClicker-3.0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3564 AutoClicker-3.0.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
pid Process 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe -
Suspicious use of SendNotifyMessage 50 IoCs
pid Process 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe 3564 AutoClicker-3.0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3564 AutoClicker-3.0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AutoClicker-3.0.exe"C:\Users\Admin\AppData\Local\Temp\AutoClicker-3.0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56B
MD5612965cb3119bfaf5545fa984a326daa
SHA10c5db6af6d6bd1209ed4e9073335d40d6d900ad4
SHA25672c09d7a69a23430a60ab4a8d78a08041d9aec17292c077aaa702d625764f0a4
SHA51269703859b2466c8a90913e60b6dcf41851dc522f609f2ff4f43527ac79e55464373a8e49a38dd9732c792c86381d16de495d7d29b165bf08002322cd4a34c1da
-
Filesize
4KB
MD5a20254ea7f9ef810c1681fa314edaa28
SHA1fdd3040411043fa1d93efd4298db8668458b6fb8
SHA2565375290e66a20bff81fb4d80346756f2d442184789681297cd1b84446a3fe80d
SHA5124c52a7f77930e6f1bfaa1fee7e39133f74675a8666902c71be752758a29d8d167157e34f89f729ab29855990bc41757a11031adc7560c4d6b9cd77000bbcf87c
-
Filesize
4KB
MD51111e06679f96ff28c1e229b06ce7b41
SHA19fe5a6c6014b561060a640d0db02a303a35b8832
SHA25659d5e9106e907fa61a560294a51c14abcde024fdd690e41a7f4d6c88db7287a6
SHA512077aff77bbf827b9920cf53dff38427475e590c07ab8901fc34ce7b7fb9e9409207e53aff06fa7d1e3984bcf127507d0fc19284d8e7203c76d67c9b98c1c8f37