Resubmissions
06/04/2025, 12:48
250406-p11mgs1my2 506/04/2025, 11:12
250406-naz3lazjt2 1006/04/2025, 11:10
250406-m9sbcsyr15 506/04/2025, 10:54
250406-mzvnqswyat 1006/04/2025, 10:45
250406-mtjpaaypz4 1006/04/2025, 10:41
250406-mq7xpsypy4 1006/04/2025, 10:38
250406-mpjtgsypx8 1006/04/2025, 10:26
250406-mgmv6syps3 1006/04/2025, 10:19
250406-mcrcssyny6 1006/04/2025, 10:07
250406-l5tg7awvdv 10Analysis
-
max time kernel
86s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 11:10
Static task
static1
Behavioral task
behavioral1
Sample
AutoClicker-3.1.exe
Resource
win10v2004-20250314-en
General
-
Target
AutoClicker-3.1.exe
-
Size
860KB
-
MD5
c208a15591828ac1b1c825f33fd55c8a
-
SHA1
bea4a247ece1a749d0994fc085fbd2d7c90a21e7
-
SHA256
a6ee6130d83bbe55e9dacdff2005950d69fc2d3c54e28467b82c148e274d90da
-
SHA512
b78d8055fc64bac1cdd366cdb339df2e081228bd998fdb5450a6832b0720c1b321568aabd7535ce62c16067ad20c86e51712c3e78bc40945adc05c63565fd889
-
SSDEEP
12288:2aWzgMg7v3qnCipErQohh0F4xCJ8lnydQEzFGZ3dRP6yWD:RaHMv6C1rjpnydQEOPdWD
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AutoClicker-3.1.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2328 WINWORD.EXE 2328 WINWORD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4468 AutoClicker-3.1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 2328 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe 4468 AutoClicker-3.1.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2328 WINWORD.EXE 2328 WINWORD.EXE 2328 WINWORD.EXE 2328 WINWORD.EXE 2328 WINWORD.EXE 2328 WINWORD.EXE 2328 WINWORD.EXE 2328 WINWORD.EXE 2328 WINWORD.EXE 2328 WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\AutoClicker-3.1.exe"C:\Users\Admin\AppData\Local\Temp\AutoClicker-3.1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4468
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\ConnectSkip.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2328
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\ConnectSkip.docx" /o ""1⤵PID:3204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
395B
MD5c91e761d7dd1ea3b87d1c342ebd84d6f
SHA1ed968c17facda8ae82b8206de9fad0aa0d5c1888
SHA2565e85be3b28bba21fca81b3195291ee3e36277b0d810c78bbba26d04ed21a9517
SHA512fe411f187b6af0aa10a4c7e746bd0fa17165b469d25af2c40564a08bd07f690c468192035d4534ea2acacfd2c42cd465da39775421458cfde0d316766786bc33
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize2KB
MD5a527c3debc9a403b5915006a2128974a
SHA1c5ea7eb56b76beb49cabbd99134c5f7acbfd878e
SHA2561a1b1a63a6d1ee6b95844511e75d26d8582fe6e616bd7c705e4b44e367cda961
SHA51202f1b13d81beb3134d7e7e61c56dd4fb0f8d962f24c640333ef1fdecaba0124b2a729a3c8e3d52ad81c0dd116d3962915743734f73ebced4ce4380c9b25200b2