Overview
overview
7Static
static
3CCleanerPr...er.exe
windows7-x64
6CCleanerPr...er.exe
windows10-2004-x64
6CCleanerPr...64.exe
windows7-x64
7CCleanerPr...64.exe
windows10-2004-x64
7CCleanerPr...ng.dll
windows7-x64
1CCleanerPr...ng.dll
windows10-2004-x64
1�...��.url
windows7-x64
1�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 01:50
Static task
static1
Behavioral task
behavioral1
Sample
CCleanerPro_Ver.5.57.7182_Chs/CCleaner.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
CCleanerPro_Ver.5.57.7182_Chs/CCleaner.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
CCleanerPro_Ver.5.57.7182_Chs/CCleaner64.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
CCleanerPro_Ver.5.57.7182_Chs/CCleaner64.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
CCleanerPro_Ver.5.57.7182_Chs/branding.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
CCleanerPro_Ver.5.57.7182_Chs/branding.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
ͼ۸.url
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
ͼ۸.url
Resource
win10v2004-20240508-en
General
-
Target
CCleanerPro_Ver.5.57.7182_Chs/CCleaner64.exe
-
Size
22.0MB
-
MD5
30745c4f8e82d890fe58d3e5f8c496f3
-
SHA1
7c1e8e45b7364a81ac184a646908608bbdaaeecb
-
SHA256
8eeb2d1bf58fe0714ae2e5acb0dd4b7eb1f4227e439fa56c61c8d76f0f3c1c8b
-
SHA512
9896289c029d571caa648451876514710e0ab73303b18a79172c8fe2289e18302b0a9e065287e21b9f466cad622fd425c57ad7edb68dd1b1fcc42e491adc629d
-
SSDEEP
196608:KKG+kw+yVU2q/ll7n+Kqps5arqNIVUzjdfNUa1:RGl1silVnpqi5arqNM0jj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
CCleaner64.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation CCleaner64.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for any installed AV software in registry 1 TTPs 13 IoCs
Processes:
CCleaner64.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\KasperskyLab CCleaner64.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\AntiVir Desktop CCleaner64.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Avira\AntiVirus CCleaner64.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avast Software\Avast CCleaner64.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Avast Software\Avast CCleaner64.exe Key opened \REGISTRY\MACHINE\Software\Avira\AntiVir Desktop CCleaner64.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Avira\Antivirus CCleaner64.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\AntiVir Desktop CCleaner64.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\AVAST Software\Avast CCleaner64.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira\AntiVir Desktop CCleaner64.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira\Speedup CCleaner64.exe Key opened \REGISTRY\MACHINE\Software\Avast Software\Avast CCleaner64.exe Key opened \REGISTRY\MACHINE\Software\Avira\Speedup CCleaner64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
CCleaner64.exedescription ioc process File opened for modification \??\PhysicalDrive0 CCleaner64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
CCleaner64.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor CCleaner64.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor CCleaner64.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 CCleaner64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString CCleaner64.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 CCleaner64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz CCleaner64.exe -
Processes:
CCleaner64.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5 CCleaner64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 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 CCleaner64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 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 CCleaner64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\742C3192E607E424EB4549542BE1BBC53E6174E2 CCleaner64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\742C3192E607E424EB4549542BE1BBC53E6174E2\Blob = 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 CCleaner64.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
CCleaner64.exepid process 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
CCleaner64.exepid process 1320 CCleaner64.exe 1320 CCleaner64.exe 1320 CCleaner64.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\CCleanerPro_Ver.5.57.7182_Chs\CCleaner64.exe"C:\Users\Admin\AppData\Local\Temp\CCleanerPro_Ver.5.57.7182_Chs\CCleaner64.exe"1⤵
- Checks computer location settings
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD59b4ad318e70e3795c84a6eab0fb50000
SHA10ce1eeebbc96479ae9cad5b5c8c460d7866c7f89
SHA2565fedd471dbb3050d414f7858ff9e4f1d13df8d22ded871cba0093e165048376c
SHA512bf12a4ec2060e21181171a5530c4a8ed7b3564042a0a476feeb7c5a1598cbfeda4079dbc1b10b8f8901bb7feb5fd71c106ce5ae5647ed304b14741a17efac997
-
Filesize
14.0MB
MD56bdc4e87e5cf1773f8605b014aefc13e
SHA1761ef1831459c77d0b23840184f8e5a2ba5566e9
SHA256afaa14ed2f90a504d68b6b1872dd4182a800e59a866fb2bc32226dfd65329952
SHA5120a5d27af06709220a1645b3803febf32bd6b6f121824313a0d87824cb5a3d64a319f315814297f877029b2586cdf5f8408273c416d8216691f99352e77246b7e
-
Filesize
16KB
MD533ce07dfbc726757208a48d908e0a6d8
SHA1527c845fa23171ced19de86187846b062f5393ae
SHA256bd3e90a7761141e01a991850c0d54c693a06c175773b9e7d4d213a5bde2d4d7e
SHA51236a58d5e18dd31919df6e9dbde651853066071049bb5a56bccec4b6e23ac580c118401a64f0241d0db8d4037a81483d84ac56dc4667a97066934248f7343336d
-
Filesize
255B
MD5e8d6312d001eb0b88a45ccf2aef179e4
SHA144215039af287cad391e0ef48857f26a39545f3a
SHA256c4f0cec8d6b05e69b5c6ea0c301eac765ee2f7a94961dc98ee87b86df1b0306c
SHA5122ab093e61ba21cdca0308ef5a73ea72714a1dadd18d8044ade1f9c70e9737ffcac32e501849d67a0ae23d4f9b1463cc1f14303b9dd2f591e27e47b96ee4b2678
-
Filesize
403B
MD5c59dfd5d11200eabf04bf2e3f7f33eb5
SHA1bfeda2e8003583351cd77bd7361f82b31be57151
SHA25628b68b8da74533768ac1f45a24b63477d80b92ac4454a43687e6181798d31cfa
SHA512feaed2f7c3b07c79b66938776fbb53440764f463f44e6ed143977513942fee76740c1ef5188d67607f7f859ca5018eee020f652424f43cbf048bc8c0a4447d6b
-
Filesize
473B
MD5d18a99f3ed75c341336a0a25e65c8092
SHA1177fbee4bd57a39fc13981671bd56339bed8ae81
SHA256a5ec025885b8c7d132feba05f87284dddd805395f37162dd7734c5fb7532009c
SHA512579040d8312590f041fa8d3d04a4773aec155db881ad3e0d5819da79ee6c9d98438c38c07f52ffe7adf02fd1153a366da20e6e9cd562cd22fdab3f942732cbcd
-
Filesize
507B
MD51d91e63953dbbf8119b04d00a32747aa
SHA1d4be223916c7c833c54167697105e5ab9284d7ee
SHA256c42b089f9d47e1d6118acae7aead4e98b539e7c4862870cf56b651ba58ca6de0
SHA512d59b81bccb834a468192e1cb231d6a7a24061e635a26c29d23acd9cea4383481a38f14a5c27c8f1294bbf050708de6a2d61a2a16bf98f8943dec4ba32ef6334f
-
Filesize
280B
MD528f89c6b77b5fbedb4b9ec43eb6da269
SHA1f51dbd8ef1d4111daa52d13a777a35a859b5741b
SHA25628a4a3b1506e8f52fa575149ee689460e03d4ddf77247a3a89c1348b3784e8d7
SHA51240beab5c942715afa30639826768ca258c00cefb8e1ea4daec602418b41d6e5f17b6371b3aa2b94edcd0ca099b9bba4d9028e0de6607fb62da377482450333d0