Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3ccsetup626pro.exe
windows11-21h2-x64
7$PLUGINSDIR/INetC.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...gs.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3$PLUGINSDI...ss.dll
windows11-21h2-x64
3$_115_/lang-1025.dll
windows11-21h2-x64
1$_115_/lang-1026.dll
windows11-21h2-x64
1$_115_/lang-1027.dll
windows11-21h2-x64
1$_115_/lang-1028.dll
windows11-21h2-x64
1$_115_/lang-1029.dll
windows11-21h2-x64
1$_115_/lang-1030.dll
windows11-21h2-x64
1$_115_/lang-1031.dll
windows11-21h2-x64
1$_115_/lang-1032.dll
windows11-21h2-x64
1$_115_/lang-1034.dll
windows11-21h2-x64
1CCUpdate.exe
windows11-21h2-x64
6CCleaner.exe
windows11-21h2-x64
6CCleaner64.exe
windows11-21h2-x64
6Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/08/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
ccsetup626pro.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/INetC.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
$_115_/lang-1025.dll
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
$_115_/lang-1026.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
$_115_/lang-1027.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
$_115_/lang-1028.dll
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
$_115_/lang-1029.dll
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
$_115_/lang-1030.dll
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
$_115_/lang-1031.dll
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
$_115_/lang-1032.dll
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
$_115_/lang-1034.dll
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
CCUpdate.exe
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
CCleaner.exe
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
CCleaner64.exe
Resource
win11-20240802-en
General
-
Target
CCleaner64.exe
-
Size
42.9MB
-
MD5
4ee9df4bef3571c74b1a4556e6afae6c
-
SHA1
4cd037edf6984b026f25572298e5c6345cbd7b0a
-
SHA256
c02731acaa708f929e4935da2338cda307afb4729c962722708e5a4e3b8aeb33
-
SHA512
a295f2d91639db79c496b31c3f03f175a9b1649d1f4c5342bdcb01c2e8871d3ef48938cfda72c57cc8724ad94d9284fb8f8e9135886e51d69f075b01a8d95085
-
SSDEEP
393216:OXA+q3dWyq9DcDD7laCZftAYU03aEi3I2sL1Zyx/tPE0ArqNdp1w+AJfRFhSp0D:OXVqN/9724u/BEiw+AJJFs1J
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 CCleaner64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString CCleaner64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz CCleaner64.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 CCleaner64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz CCleaner64.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 CCleaner64.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 420 CCleaner64.exe 420 CCleaner64.exe 420 CCleaner64.exe 420 CCleaner64.exe 420 CCleaner64.exe 420 CCleaner64.exe 420 CCleaner64.exe 420 CCleaner64.exe 420 CCleaner64.exe 420 CCleaner64.exe 420 CCleaner64.exe 420 CCleaner64.exe 420 CCleaner64.exe 420 CCleaner64.exe 420 CCleaner64.exe 420 CCleaner64.exe 420 CCleaner64.exe 420 CCleaner64.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 420 CCleaner64.exe Token: SeShutdownPrivilege 420 CCleaner64.exe Token: SeCreatePagefilePrivilege 420 CCleaner64.exe Token: SeShutdownPrivilege 420 CCleaner64.exe Token: SeCreatePagefilePrivilege 420 CCleaner64.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 420 CCleaner64.exe 420 CCleaner64.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\CCleaner64.exe"C:\Users\Admin\AppData\Local\Temp\CCleaner64.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:420