Resubmissions

18-10-2022 22:20

221018-18773sdhh4 8

03-10-2022 07:47

221003-jmlcradge5 8

General

  • Target

    CCleaner 6.00.9727 (x64) Professional Edition Multilingual.zip

  • Size

    46.5MB

  • Sample

    221018-18773sdhh4

  • MD5

    c4f6b7208dd86c37e3e914e1355ee128

  • SHA1

    2d6243373836f27a2f90ede02bd1b18c5a72c970

  • SHA256

    e61e4307479b59fff371109891bea3b99b1a59c35cc6aae6b70eb067fac28a19

  • SHA512

    afe5a37f46549d727d5ab7ae9ec7e03aa9b9d533f17835ae3bdf0469434f04a9652da6a236caf61a831363b6d3e28058229151d22bb8b36114e6c3f46b00058f

  • SSDEEP

    786432:QW5LbUwZoT0zQjxg84E39DEzvm3FnX3QQ/93ejTn0VdKgjX50W7yaxovZ1H:Q+LM0AxxjEDm1nV980VdKm5le3vZ1H

Malware Config

Targets

    • Target

      CCleaner 6.00.9727 (x64) Professional Edition Multilingual.zip

    • Size

      46.5MB

    • MD5

      c4f6b7208dd86c37e3e914e1355ee128

    • SHA1

      2d6243373836f27a2f90ede02bd1b18c5a72c970

    • SHA256

      e61e4307479b59fff371109891bea3b99b1a59c35cc6aae6b70eb067fac28a19

    • SHA512

      afe5a37f46549d727d5ab7ae9ec7e03aa9b9d533f17835ae3bdf0469434f04a9652da6a236caf61a831363b6d3e28058229151d22bb8b36114e6c3f46b00058f

    • SSDEEP

      786432:QW5LbUwZoT0zQjxg84E39DEzvm3FnX3QQ/93ejTn0VdKgjX50W7yaxovZ1H:Q+LM0AxxjEDm1nV980VdKm5le3vZ1H

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Bootkit

1
T1067

Hidden Files and Directories

1
T1158

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Hidden Files and Directories

1
T1158

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Security Software Discovery

1
T1063

Collection

Data from Local System

1
T1005

Tasks