Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
CCleaner.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
CCleaner.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
CCleaner64.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
CCleaner64.exe
Resource
win10v2004-20240426-en
General
-
Target
CCleaner.exe
-
Size
13.0MB
-
MD5
3a6159f8c9fe7feac3cc654f0f480102
-
SHA1
6f1538e24e39411a915077840c42c23cc734159c
-
SHA256
5fc24a79699229ef15b665209f92b635011eca25f0c7062aab64a87cb668db1a
-
SHA512
c2495a5661c39b1751cabc92a5b5a2baf0443858e60173761cc208319bed8b8d16c0273c1c7084927067d558d6ccbc56b31a58652579f617d6bc754aa75274b2
-
SSDEEP
196608:hm2nto8x4sLUnv0w4196WevtKaAmxrqNyzGLA9uB:hBntronvqDGYoxrqNyZu
Malware Config
Signatures
-
Checks for any installed AV software in registry 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Avira\AntiVir Desktop CCleaner64.exe Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\SOFTWARE\Avira\AntiVirus CCleaner64.exe Key opened \REGISTRY\MACHINE\Software\Avast Software\Avast CCleaner64.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Avast Software\Avast CCleaner64.exe Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Avast Software\Avast CCleaner64.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\AntiVir Desktop CCleaner64.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 CCleaner64.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor CCleaner64.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor CCleaner64.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 CCleaner64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString CCleaner64.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 CCleaner64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz CCleaner64.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main CCleaner64.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1724 CCleaner64.exe 1724 CCleaner64.exe 1724 CCleaner64.exe 1724 CCleaner64.exe 1724 CCleaner64.exe 1724 CCleaner64.exe 1724 CCleaner64.exe 1724 CCleaner64.exe 1724 CCleaner64.exe 1724 CCleaner64.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1724 CCleaner64.exe 1724 CCleaner64.exe 1724 CCleaner64.exe 1724 CCleaner64.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1724 1716 CCleaner.exe 28 PID 1716 wrote to memory of 1724 1716 CCleaner.exe 28 PID 1716 wrote to memory of 1724 1716 CCleaner.exe 28 PID 1716 wrote to memory of 1724 1716 CCleaner.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\CCleaner.exe"C:\Users\Admin\AppData\Local\Temp\CCleaner.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\CCleaner64.exe"C:\Users\Admin\AppData\Local\Temp\CCleaner.exe"2⤵
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1724
-