Resubmissions

29-03-2023 00:32

230329-av3sbsea95 7

29-03-2023 00:28

230329-asjxfafg4s 7

Analysis

  • max time kernel
    125s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    29-03-2023 00:28

General

  • Target

    CCleaner64.exe

  • Size

    37.3MB

  • MD5

    2989ffd5783532fb2d49588c9fc8b1c6

  • SHA1

    d5b87c5402debd0434c02b2366fc2de50f47485e

  • SHA256

    9d4b19b0723b350860614548f2c8342802fc115acff93ef63b580db189e57c2d

  • SHA512

    1e666a6fed67b8aa492c3ca8de023bebb8ea842f4f67512c9876628d0a9f14efa1fce3b1abec32b9833470040dbd94c210a97b9241818fba8cfcdae036d7185a

  • SSDEEP

    393216:Fud5EHypOO1QQsn5FHz8CeoF4c/rqNZ+gIItlxhSEAewYnhO:Fu7EbOC/Homk+gIIzx7Hw

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\CCleaner64.exe
    "C:\Users\Admin\AppData\Local\Temp\CCleaner64.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Checks system information in the registry
    • Checks processor information in registry
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1568

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

4
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416
    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
    Filesize

    230B

    MD5

    10dbc0efe0dd460c668d0de24e921c3c

    SHA1

    5ab0f170df174a5d8361e6212a299abd54d5d689

    SHA256

    a49f46512ee89aa18a6dd401ad58eaadc30a4f22ffb2baea85feb04e21da4798

    SHA512

    9dbf231640d99d7854150a078ad990e79edd7beb50db372fa7c4dedef3759b7afb0cb3c71bad3838d51a861d64f6264ad94b3d3ef5b4468eb1059bfdbbfb85d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    eb1f4f0df10e42ab19360d6a3c9feec4

    SHA1

    beea1f2129199a73d9522bdadfcadf686c164dba

    SHA256

    0c1dd4a0e273f72c82b3d347fba3fe3a8349d728850a0ddecc645ab21a392962

    SHA512

    3deca6e24fec9bd23eda29cf0b385cd1e1ace4f323c1e00377279a7e61ec710af703469fbcbc42116feed82a6ead89571d9ee81656be97a64fb9128e054233c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    399a6efdaa283af47b086f21ed1c51c5

    SHA1

    99d041335bf67578dcb2cd994b026f76eea61d0a

    SHA256

    131667f8ad37f5ae31d2d30daf245039f2763dce3befa3b1dee2349dc9b1602e

    SHA512

    a49737b20faf00da5d056eae9b774d9f1739a317ba9907ce7642465d952329ed47e31952c761f0d74a7e97029c0ac13946d83a6a34ec542956490886086f4de5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    34bbc5af4458abf9496d9d61452a3cc2

    SHA1

    3834250f10f8bf81df8b6df7a0dc4000d6c64a04

    SHA256

    9c94a3807ea12799242f523db8cdaf8af70812acc40026b787ba2f586c59a0ae

    SHA512

    49a7caf559f45ef6fec616bd9abded6f54ca9aff7a9a688a012290f59b2f1bdbc1d00c5532f1ff2ad144b0617f5dd62ea40304c000c5a4a7829ad3a0e1f420ff

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\V01.log
    Filesize

    512KB

    MD5

    8ddb26cfe0492f2869d4b24b5ae4d674

    SHA1

    be1c002502dd6da2c05c6f7fc2ca9ef3f7df476d

    SHA256

    38cb14b9dff8b66650dfeefa91fcc879f1aff72d7c6cd594009fbac75a481f98

    SHA512

    4272b09b10f25a3ebbe91c89094b0af802e5534283e566fdff592e75811a0fc16b6719f0b121c7cf24b3f3797f98bf34a9905dec3d922f70b4bf716e13717117

  • C:\Users\Admin\AppData\Local\Temp\Cab3C56.tmp
    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar3C6C.tmp
    Filesize

    161KB

    MD5

    73b4b714b42fc9a6aaefd0ae59adb009

    SHA1

    efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

    SHA256

    c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

    SHA512

    73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

  • C:\Users\Admin\AppData\Local\Temp\Tar3D9B.tmp
    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • \Users\Admin\AppData\Local\Temp\gcapi_16800569311568.dll
    Filesize

    740KB

    MD5

    f17f96322f8741fe86699963a1812897

    SHA1

    a8433cab1deb9c128c745057a809b42110001f55

    SHA256

    8b6ce3a640e2d6f36b0001be2a1abb765ae51e62c314a15911e75138cbb544bb

    SHA512

    f10586f650a5d602287e6e7aeeaf688b275f0606e20551a70ea616999579acdf7ea2f10cebcfaa817dae4a2fc9076e7fa5b74d9c4b38878fbf590ffe0e7d81c9

  • memory/1568-100-0x00000000048F0000-0x00000000048F8000-memory.dmp
    Filesize

    32KB

  • memory/1568-54-0x0000000002570000-0x0000000002571000-memory.dmp
    Filesize

    4KB

  • memory/1568-68-0x00000000029A0000-0x00000000029A1000-memory.dmp
    Filesize

    4KB

  • memory/1568-103-0x0000000004C60000-0x0000000004C68000-memory.dmp
    Filesize

    32KB

  • memory/1568-105-0x00000000048E0000-0x00000000048E1000-memory.dmp
    Filesize

    4KB

  • memory/1568-110-0x00000000035E0000-0x00000000035E1000-memory.dmp
    Filesize

    4KB

  • memory/1568-61-0x0000000002960000-0x0000000002961000-memory.dmp
    Filesize

    4KB

  • memory/1568-77-0x0000000004BE0000-0x0000000004BF0000-memory.dmp
    Filesize

    64KB

  • memory/1568-60-0x0000000002650000-0x0000000002651000-memory.dmp
    Filesize

    4KB

  • memory/1568-59-0x0000000002640000-0x0000000002641000-memory.dmp
    Filesize

    4KB

  • memory/1568-69-0x0000000004A80000-0x0000000004A90000-memory.dmp
    Filesize

    64KB

  • memory/1568-58-0x0000000002630000-0x0000000002631000-memory.dmp
    Filesize

    4KB

  • memory/1568-57-0x0000000002620000-0x0000000002621000-memory.dmp
    Filesize

    4KB

  • memory/1568-56-0x0000000002590000-0x0000000002591000-memory.dmp
    Filesize

    4KB

  • memory/1568-55-0x0000000002580000-0x0000000002581000-memory.dmp
    Filesize

    4KB

  • memory/1568-473-0x00000000029A0000-0x00000000029A1000-memory.dmp
    Filesize

    4KB