Analysis

  • max time kernel
    68s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-05-2023 16:53

General

  • Target

    CCleaner.Technician.6.12.10490.Portable/App/CCleaner/CCleaner.exe

  • Size

    32.7MB

  • MD5

    79c9b293cfcf00a925b9c2de29551788

  • SHA1

    d9df445c7abb906ef54638865f3faabf2b054b38

  • SHA256

    8be625c9d9b17ec6529957221ef1ee951803fae647cf74c46382723b46fb626b

  • SHA512

    bfba25f62c480a21ae85911634cdd3c9f17a976bfcaed1130a5c253aa20a4b1612475c5ebb02b23978938979a7b3d393cb0e94592b81e192d1fcbedeead5deef

  • SSDEEP

    393216:I0OM+LR8MO0cz36nEy9larq8x2rxrxPCgQ/P9cND0oDtg8XrqNuIpfkl9hSkAePy:78LRFOr3hrD2rtZYHGVFIpg9PgKU

Score
6/10

Malware Config

Signatures

  • Checks for any installed AV software in registry 1 TTPs 11 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Loads dropped DLL 1 IoCs
  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\CCleaner.Technician.6.12.10490.Portable\App\CCleaner\CCleaner.exe
    "C:\Users\Admin\AppData\Local\Temp\CCleaner.Technician.6.12.10490.Portable\App\CCleaner\CCleaner.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:464
    • C:\Users\Admin\AppData\Local\Temp\CCleaner.Technician.6.12.10490.Portable\App\CCleaner\CCleaner64.exe
      "C:\Users\Admin\AppData\Local\Temp\CCleaner.Technician.6.12.10490.Portable\App\CCleaner\CCleaner.exe"
      2⤵
      • Checks for any installed AV software in registry
      • Writes to the Master Boot Record (MBR)
      • Loads dropped DLL
      • Checks processor information in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:3096

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\V01.log

    Filesize

    512KB

    MD5

    142bfbd3d27c28c128faa05ff0794f38

    SHA1

    11ad155dc565c24df344209220e535df30f04e7b

    SHA256

    27df224a20cc374f68ae4f3c2b992eb19382965d2f9ee6af79f0b231a0302026

    SHA512

    fa36812e9a4ef7188d953ea598ce77631a068008da0d61516e9777e52f43a0ca6f40705ff4d05c35914290d6a8dcf20b0a42e26379ec5c6d748e7af3936b8f01

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

    Filesize

    14.0MB

    MD5

    f88f5bc0be5e959feb95a6bafea8b5eb

    SHA1

    0c31075d1214f7000eb2ff0e77030cd390f84ba9

    SHA256

    4e8e839ac6806b2a89a81816546d4730ecc300176f6c067e3c508e9908b237a3

    SHA512

    b2fc883d8e7142781b3d0735640c601242389ffc47bf49ad7752a45c4e2eb7912de55bcc06dd5c3f9f1c6b28b703f7a63fa62fefdb2a111275a51c4c901c09d3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.jfm

    Filesize

    16KB

    MD5

    9167d3580b64618e1901c07eeac703c5

    SHA1

    b2fe8043c7d685b3c7fa48713e638354ff21b1f3

    SHA256

    f44b3e89d41a4c829ab6bd3b16c6e3d2da28c12110a3a0bb02176dd08fdd95db

    SHA512

    def2aedd00c6bc32cd6813a9a254ba29eb23f9798a61c0c984795a06073012aa64f910f562ddbb36dac77cdb14e92ebc20ba1cfcc32e28b03f05b9ee444d1988

  • C:\Users\Admin\AppData\Local\Temp\CCleaner.Technician.6.12.10490.Portable\App\CCleaner\gcapi_16846019433096.dll

    Filesize

    740KB

    MD5

    f17f96322f8741fe86699963a1812897

    SHA1

    a8433cab1deb9c128c745057a809b42110001f55

    SHA256

    8b6ce3a640e2d6f36b0001be2a1abb765ae51e62c314a15911e75138cbb544bb

    SHA512

    f10586f650a5d602287e6e7aeeaf688b275f0606e20551a70ea616999579acdf7ea2f10cebcfaa817dae4a2fc9076e7fa5b74d9c4b38878fbf590ffe0e7d81c9

  • memory/3096-175-0x00000251C62E0000-0x00000251C62E8000-memory.dmp

    Filesize

    32KB

  • memory/3096-176-0x00000251C62D0000-0x00000251C62D1000-memory.dmp

    Filesize

    4KB

  • memory/3096-139-0x00007FFED6220000-0x00007FFED6221000-memory.dmp

    Filesize

    4KB

  • memory/3096-140-0x00007FFED4790000-0x00007FFED4791000-memory.dmp

    Filesize

    4KB

  • memory/3096-137-0x00007FFED6210000-0x00007FFED6211000-memory.dmp

    Filesize

    4KB

  • memory/3096-149-0x00000251BDD60000-0x00000251BDD70000-memory.dmp

    Filesize

    64KB

  • memory/3096-155-0x00000251BDDC0000-0x00000251BDDD0000-memory.dmp

    Filesize

    64KB

  • memory/3096-173-0x00000251C6400000-0x00000251C6408000-memory.dmp

    Filesize

    32KB

  • memory/3096-133-0x00007FFED61E0000-0x00007FFED61E1000-memory.dmp

    Filesize

    4KB

  • memory/3096-138-0x00007FFED6280000-0x00007FFED6281000-memory.dmp

    Filesize

    4KB

  • memory/3096-178-0x00000251C62E0000-0x00000251C62E8000-memory.dmp

    Filesize

    32KB

  • memory/3096-181-0x00000251C62D0000-0x00000251C62D8000-memory.dmp

    Filesize

    32KB

  • memory/3096-184-0x00000251C6290000-0x00000251C6291000-memory.dmp

    Filesize

    4KB

  • memory/3096-136-0x00007FFED6250000-0x00007FFED6251000-memory.dmp

    Filesize

    4KB

  • memory/3096-196-0x00000251C6380000-0x00000251C6388000-memory.dmp

    Filesize

    32KB

  • memory/3096-198-0x00000251C63C0000-0x00000251C63C8000-memory.dmp

    Filesize

    32KB

  • memory/3096-201-0x00000251C62D0000-0x00000251C62D1000-memory.dmp

    Filesize

    4KB

  • memory/3096-205-0x00000251C6290000-0x00000251C6291000-memory.dmp

    Filesize

    4KB

  • memory/3096-135-0x00007FFED6200000-0x00007FFED6201000-memory.dmp

    Filesize

    4KB

  • memory/3096-134-0x00007FFED61F0000-0x00007FFED61F1000-memory.dmp

    Filesize

    4KB