Resubmissions

18-10-2022 22:20

221018-18773sdhh4 8

03-10-2022 07:47

221003-jmlcradge5 8

General

  • Target

    CCleaner 6.00.9727 (x64) Professional Edition Multilingual.zip

  • Size

    46.5MB

  • Sample

    221003-jmlcradge5

  • MD5

    c4f6b7208dd86c37e3e914e1355ee128

  • SHA1

    2d6243373836f27a2f90ede02bd1b18c5a72c970

  • SHA256

    e61e4307479b59fff371109891bea3b99b1a59c35cc6aae6b70eb067fac28a19

  • SHA512

    afe5a37f46549d727d5ab7ae9ec7e03aa9b9d533f17835ae3bdf0469434f04a9652da6a236caf61a831363b6d3e28058229151d22bb8b36114e6c3f46b00058f

  • SSDEEP

    786432:QW5LbUwZoT0zQjxg84E39DEzvm3FnX3QQ/93ejTn0VdKgjX50W7yaxovZ1H:Q+LM0AxxjEDm1nV980VdKm5le3vZ1H

Malware Config

Targets

    • Target

      CCleaner 6.00.9727 (x64) Professional Edition Multilingual/ccsetup600pro.exe

    • Size

      46.5MB

    • MD5

      9a991c5bc89c23008a67f5e419348f61

    • SHA1

      3c16710b775648009d371e8315d2f1e4dbf3e157

    • SHA256

      67da9a2829a99e9392817d1b7092d77b7416d4b1c1581a8ecea1c53a6d8060b6

    • SHA512

      f5d47c9175aee4b3948af9f781a490b84f0ebf30d94d93c3192dc57ad7cdd52d9221f3ebe647cc2de40aaf8ac2f74aec6e6e1f19c3cfceb8f770836d565feb50

    • SSDEEP

      786432:Y7T+cuipUg01kfCRrr6p7411oscDHWOIqkeePWO0M8aAKh3YGJazY1/eQn6I9bf+:Y+JaV02fCRrO5Ijczva8an3YGJazWeI0

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Target

      BlockerKeyVerificator.cmd

    • Size

      4KB

    • MD5

      6ba5c46261ff52e7438f21ccef5f8c7e

    • SHA1

      acdf309fbfebecb7a93b78068fc1498fae4d9e62

    • SHA256

      f7d87d0a3977d9ed4ed6eaa2da2fe2aea9564f58cf062f828dec0aa21d9ec11e

    • SHA512

      106b05fbeca31c78e5e5f33cbd62580aac1b4ef781a78ac2cbe80f92eb01f75beeaa480772dcf2f9f2bbea178e681aff2247dd3d08387b35ca507b90b4a5cc43

    • SSDEEP

      96:zGXTD6E4YsQlPtYyjZW0vQH5aROc37gC9r2of6:zeDn4YsQlPtYyjZW0vQH5aROc37gC9rA

    Score
    8/10
    • Drops file in Drivers directory

    • Possible privilege escalation attempt

    • Modifies file permissions

    • Target

      patch.exe

    • Size

      129KB

    • MD5

      f3f183ba8a3c43dfcbef0396ad5d917b

    • SHA1

      8a6edcfa27a7f29cab0d6e2f0595eec2c8b2c123

    • SHA256

      849d56ebcfdc2cb97c4a7ab9c961c3b7b80700d43963b7db2b6934609de6104d

    • SHA512

      2b997fa759e206ac1576615e048f0f11665c2ae57abe55e780022796c02214aaf66fbe6d7ea37152908f833ab8c6ddbdf9a53fa96910f499aa9850e6e3170c77

    • SSDEEP

      3072:uNDCOSp3CvdHOcJn+UAQBRnLEH+JkMZOuYfc0WN:kSpwlrJiARO+jOVfl

    Score
    7/10
    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Bootkit

1
T1067

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

File Permissions Modification

1
T1222

Hidden Files and Directories

1
T1158

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Security Software Discovery

1
T1063

Collection

Data from Local System

1
T1005

Tasks