Overview
overview
7Static
static
3ccsetup626pro.exe
windows11-21h2-x64
7$PLUGINSDIR/INetC.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...gs.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3$PLUGINSDI...ss.dll
windows11-21h2-x64
3$_115_/lang-1025.dll
windows11-21h2-x64
1$_115_/lang-1026.dll
windows11-21h2-x64
1$_115_/lang-1027.dll
windows11-21h2-x64
1$_115_/lang-1028.dll
windows11-21h2-x64
1$_115_/lang-1029.dll
windows11-21h2-x64
1$_115_/lang-1030.dll
windows11-21h2-x64
1$_115_/lang-1031.dll
windows11-21h2-x64
1$_115_/lang-1032.dll
windows11-21h2-x64
1$_115_/lang-1034.dll
windows11-21h2-x64
1CCUpdate.exe
windows11-21h2-x64
6CCleaner.exe
windows11-21h2-x64
6CCleaner64.exe
windows11-21h2-x64
6Analysis
-
max time kernel
90s -
max time network
97s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
14-08-2024 03:46
Static task
static1
Behavioral task
behavioral1
Sample
ccsetup626pro.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/INetC.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
$_115_/lang-1025.dll
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
$_115_/lang-1026.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
$_115_/lang-1027.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
$_115_/lang-1028.dll
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
$_115_/lang-1029.dll
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
$_115_/lang-1030.dll
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
$_115_/lang-1031.dll
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
$_115_/lang-1032.dll
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
$_115_/lang-1034.dll
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
CCUpdate.exe
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
CCleaner.exe
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
CCleaner64.exe
Resource
win11-20240802-en
General
-
Target
CCUpdate.exe
-
Size
809KB
-
MD5
943a4f169e9a3303ed6defc1ac3690bd
-
SHA1
e0bd76b866624164c10b85d37efb6474b84164df
-
SHA256
e531742a357907248de84b99f68ed7e8edd70e7ca918d21b24cc17ee4c128240
-
SHA512
da29cafdd63fd3ab3d2378fc6c2810d7579ebd6b62a4f99248458094cd2e42dc0071b83f0aee4185ca1c81139dec2991212ac383d77a737937558bbcb29d688c
-
SSDEEP
24576:Jjtgw77IpNyggggMrSQ5hEGnh0lhSMXlLtBq7ZnP:JjtgI6yggggMrSQ52bbq7ZnP
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 CCUpdate.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\CCUpdate.ini CCUpdate.exe -
Loads dropped DLL 1 IoCs
pid Process 4348 CCUpdate.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CCUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CCUpdate.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1832 wrote to memory of 4348 1832 CCUpdate.exe 82 PID 1832 wrote to memory of 4348 1832 CCUpdate.exe 82 PID 1832 wrote to memory of 4348 1832 CCUpdate.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\CCUpdate.exe"C:\Users\Admin\AppData\Local\Temp\CCUpdate.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\CCUpdate.exeCCUpdate.exe /emupdater /applydll "C:\Users\Admin\AppData\Local\Temp\6df8ed85-352a-4878-9ad5-f1b90f07dbce.dll"2⤵
- Writes to the Master Boot Record (MBR)
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170B
MD52af9f69df769f876f6e02da18e966020
SHA15d21312d9bd23a498a294844778c49641a63d5e2
SHA256473d48a44a348f6c547aefd2c60dd4b9de0092e1fb94a7611bdd374783ef3b2c
SHA512a4705e5491cf03867fd46e63293181bf761d04fe0cccb86e373dd567c68d646634f64ef95d5b910d2266468b93bf7cdf6f9acbf576c6f42a4ff6c3caa09d2274
-
Filesize
469KB
MD5fe6f58fb55d9a93502528c3c9bb13a3f
SHA1516275dddbc9e2f056342201b03a0931d93a6239
SHA256c427bcf6b065edf06662e0540e3e9a21c07095184e7bb9d05926dc3b79fc3348
SHA5127f45f187d6c3156b89e2daf0c2bfdc60a59140ff94f8255fa672422abc43aa1252b0fe0fa0a3ef675f9e71c33b26424597c015db83dec7f5e20ee8769c61c619