Analysis
-
max time kernel
92s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 06:36
Static task
static1
Behavioral task
behavioral1
Sample
CCleaner.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
CCleaner.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
CCleaner64.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
CCleaner64.exe
Resource
win10v2004-20240426-en
General
-
Target
CCleaner64.exe
-
Size
17.5MB
-
MD5
c7bab4fb92edd4ec40f20c0951168360
-
SHA1
dcb42f8964e93e13a2d2d05fb2d229bf9e48f4f2
-
SHA256
ef9139178ada1bcb0813c319acc2489f507b6048d93a182feccb05fba11b9ece
-
SHA512
ebfb65122f2433b6a49e56074957361d6023b4eae650f5db321f34a0e74090d1a52d72b5b901712a9d9d7fd7a96a88ebf905c79fd3108d4b327f7054646ade7a
-
SSDEEP
98304:hFbG5jIqxuVHEAINRFAl/Bf5S9g8peGVErqN0EV+RzI6ES2InIgIkSVftdH3cHvv:LsjIKuVdIn+rf50lpErqNJD2GLA9J
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation CCleaner64.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for any installed AV software in registry 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Avira\AntiVirus CCleaner64.exe Key opened \REGISTRY\MACHINE\Software\Avast Software\Avast CCleaner64.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avast Software\Avast CCleaner64.exe Key opened \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Software\Avast Software\Avast CCleaner64.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\AntiVir Desktop CCleaner64.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\AntiVir Desktop CCleaner64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 CCleaner64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz CCleaner64.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor CCleaner64.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor CCleaner64.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 CCleaner64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString CCleaner64.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 CCleaner64.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4648 CCleaner64.exe 4648 CCleaner64.exe 4648 CCleaner64.exe 4648 CCleaner64.exe 4648 CCleaner64.exe 4648 CCleaner64.exe 4648 CCleaner64.exe 4648 CCleaner64.exe 4648 CCleaner64.exe 4648 CCleaner64.exe 4648 CCleaner64.exe 4648 CCleaner64.exe 4648 CCleaner64.exe 4648 CCleaner64.exe 4648 CCleaner64.exe 4648 CCleaner64.exe 4648 CCleaner64.exe 4648 CCleaner64.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4648 CCleaner64.exe 4648 CCleaner64.exe 4648 CCleaner64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CCleaner64.exe"C:\Users\Admin\AppData\Local\Temp\CCleaner64.exe"1⤵
- Checks computer location settings
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4648