Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2023, 16:53

General

  • Target

    CCleaner.Technician.6.12.10490.Portable/Other/_Include/Installer.bmp

  • Size

    51KB

  • MD5

    6e9d8e8699f0accc27aa9a1aac8b7e47

  • SHA1

    49caad3187ae8708b36889cad40a959679b52f25

  • SHA256

    fbddcd7882e0cf80452e58356e4d497ee6f08921665e27bd86049a0bb60d6be9

  • SHA512

    84f00c25371c6394e2a96640a344f1d7f9d35a2cf9080565cb03f3ae2f14bdbef05e3597a7943faadc201e847ada2ac0843347a375a58e267cb0948e397a226b

  • SSDEEP

    384:CaMEOFCq0dsgN/Lf53J/Q3BZCeVMz6aIlmXDT2lw6F0e53+Q09cPc/dSP:XMEyX0dF//Q3bCekBiFpHAi

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\CCleaner.Technician.6.12.10490.Portable\Other\_Include\Installer.bmp
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4476
    • C:\Windows\system32\mspaint.exe
      "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\CCleaner.Technician.6.12.10490.Portable\Other\_Include\Installer.bmp"
      2⤵
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4608
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
    1⤵
      PID:2244

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads