Trojan.MSIL.Clicker.CCL
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.MSIL.Clicker.CCL |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
13aaa79539903ebf153b3d9b7805e6a8
SHA1:
3d2e59a0991dfcd572a8eea3de3bec704c4d340f
SHA256:
B8C09A5A5487A64E854F0BA08BCA565174E6BEA92BA4970C923285007A4A9829
File Size:
7.41 MB, 7408997 bytes
|
|
MD5:
8902da3de8fa322a4e8a6502ac3a4bf9
SHA1:
a3123edfdda3f7660c9cd5644d17089f3b29b11b
SHA256:
226D64E96D48CC52AE36EA19E3D0566329C6B574C655ABB79D37D52817232052
File Size:
7.08 MB, 7075759 bytes
|
|
MD5:
3943d8ef164112d1f561c233705d1f07
SHA1:
b7adfa594d778d72a2da27b44164a9066115a341
SHA256:
9AE5CA06FD6370AA4A37E7ABEB41AB7CCFCAB937A3C34D8AA214003D966B4F64
File Size:
5.81 MB, 5813742 bytes
|
|
MD5:
0271a892ac61c57d918d50be8bad62e2
SHA1:
0a43082db7ea2d9a787a59e79fa5cfe1a79cb146
SHA256:
28CAA5B9B8FA0D00533382D9A18D59EDB68CEE029F9C8ADEA790D87B4C42DFE3
File Size:
6.96 MB, 6963682 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
Show More
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| File Description |
|
| File Version |
|
| Legal Copyright |
|
| Original Filename |
|
| Product Name |
|
| Product Version |
|
File Traits
- .NET
- x86
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe | Generic Read,Write Attributes |
| \device\namedpipe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsabc70.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsca832.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nslbd99.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsqbd6a.tmp\nsexec.dll | Generic Write,Read Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 찜祲纴ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 䈧ḡꘚǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 坥ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 戽퐼ꙙǜ | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Anti Debug |
|
| User Data Access |
|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Syscall Use |
Show More
|
| Encryption Used |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Cfyxdhvj\AppData\Local\""
|
powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Yfgdlbbb\AppData\Local\""
|
powershell -Command "Add-MpPreferencaO27a1aO27a1 -ExclusionPath \"C:\Users\Tfztrnda\AppData\Local\""
|
powershell -Command "Add-MpPreferencaP70a1aP70a1 -ExclusionPath \"C:\Users\Fttdgesm\AppData\Local\""
|