Analysis

  • max time kernel
    112s
  • max time network
    88s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    15-01-2023 11:17

General

  • Target

    CCleaner_Patch22.exe

  • Size

    129KB

  • MD5

    f3f183ba8a3c43dfcbef0396ad5d917b

  • SHA1

    8a6edcfa27a7f29cab0d6e2f0595eec2c8b2c123

  • SHA256

    849d56ebcfdc2cb97c4a7ab9c961c3b7b80700d43963b7db2b6934609de6104d

  • SHA512

    2b997fa759e206ac1576615e048f0f11665c2ae57abe55e780022796c02214aaf66fbe6d7ea37152908f833ab8c6ddbdf9a53fa96910f499aa9850e6e3170c77

  • SSDEEP

    3072:uNDCOSp3CvdHOcJn+UAQBRnLEH+JkMZOuYfc0WN:kSpwlrJiARO+jOVfl

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CCleaner_Patch22.exe
    "C:\Users\Admin\AppData\Local\Temp\CCleaner_Patch22.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:840
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
    1⤵
      PID:516

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\dup2patcher.dll
      Filesize

      55KB

      MD5

      0aed5af9cae586f68e77d952e2df6e38

      SHA1

      6bfa5f7f33089145911ec87936aa2454a8a70455

      SHA256

      ec98d49254b648dae0dafc81f2ea9f2a71fee1c7c21a11640f30d9b9b501693c

      SHA512

      9dc72e67d04b2feb8b0ec03a48abe6bdf18696adf5fe479794080e8f3a48011e6b1b9948e49f1b5979f92e4cc9da7716d326009816e4af9d889b50e56c2b5253

    • memory/840-54-0x0000000075FF1000-0x0000000075FF3000-memory.dmp
      Filesize

      8KB

    • memory/840-56-0x00000000750A0000-0x00000000750C6000-memory.dmp
      Filesize

      152KB

    • memory/840-57-0x0000000074B41000-0x0000000074B43000-memory.dmp
      Filesize

      8KB