Analysis

  • max time kernel
    30s
  • max time network
    32s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2025, 16:17

General

  • Target

    CCleaner64.exe

  • Size

    43.3MB

  • MD5

    eb3f46bce05231e76b5d419de44f04b7

  • SHA1

    51bb120c8d8c15e0be036a0f569752a2fd2367fd

  • SHA256

    7dc6fae7550e79701c54df21d4a2f9804e51c3a44b6e50fb405dfb081389e1b5

  • SHA512

    768ab087ac41b7593f0f322a1410d044b6913c3810c8764a5a2f196af82d9f3866f6be739c3a528c5602833f7392663b887da0c082aba5d8bd2f949d3f31e069

  • SSDEEP

    393216:moD2J2695Op4gT/ADHIpWR96HJEoEkc+unfmGffVgSKoJ9jLcsWrqNZTSP+R42u1:moZ69syDEuneGFKon/SP+R4dws1J

Malware Config

Signatures

  • Downloads MZ/PE file 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks for any installed AV software in registry 1 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 25 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\CCleaner64.exe
    "C:\Users\Admin\AppData\Local\Temp\CCleaner64.exe"
    1⤵
    • Downloads MZ/PE file
    • Checks computer location settings
    • Loads dropped DLL
    • Checks for any installed AV software in registry
    • Writes to the Master Boot Record (MBR)
    • Checks system information in the registry
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:5696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\V01.log

    Filesize

    512KB

    MD5

    418358a22ad603c2cae146bacd6a6d16

    SHA1

    d1e85a0a0554c800c96580ce649b6f24c0fe0db1

    SHA256

    7a8ea37574f9c3a159672a259d63e6336bad72be981bf9c395330832f3f08598

    SHA512

    f0be23719ea6dd6721d89c3de02ee749389663fdcb92324e9bce580e6a8bdf31f227b18c87d44a81c2d697260f046b329e79f1d50a4462a1fa34ef5165b4db2b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

    Filesize

    14.0MB

    MD5

    0de8ca5c166f483b8f1f2c5b7351c20a

    SHA1

    af558fc69983ef6365aa2e1feb3d3a0ec0ad9d24

    SHA256

    1412b58685031709e3cce8cb201e09ee58d07ad70aa2f6b186c27e8801a7d609

    SHA512

    098b6b4c9f9d022f574b7b491c33af71e4e5af22071b7e750d7d1965213b06e19a20e8e8bf84840c7c8c8b7a99127f0d48fc3fe73f13950d8c120f880d8ff50f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

    Filesize

    14.0MB

    MD5

    104e5d3b1ffe08a93030419991dfa198

    SHA1

    1f64f167ba615cbe7cc5cf1465e8f5a5c1f0c75f

    SHA256

    2a1e3811011e0377425c8ce8f9e16ba33d640d2931ff015d721a23e2d0dccfc9

    SHA512

    e042045ddae14e10be2dba200bc148c1d2f63cc970b01cc3c43b8100d5bf5b432e1daedfabdb1de465e348fb4afbbf98b9c618fc6fd8b548f77633e029b2a059

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

    Filesize

    14.0MB

    MD5

    13e697f0a4ac8fb813ff61e29a15afe1

    SHA1

    f2b93271ecc575974fd65b6c6a08ae1d59a9497a

    SHA256

    d81bf0cc8c0394d10d16f885e6d9e1621936f2e2dac28d923e2a227496f80937

    SHA512

    7cb951d5c6fd1a799015af99fe64a7137df504bce9fb9bdab743c15aa1286d45df29c8841faedfb063597cfb4aa68b80675d9f425f68b30996d447b7303cb9e9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.jfm

    Filesize

    16KB

    MD5

    b2a9fea1f48f17954e3f3cb2735928d5

    SHA1

    1ae3fbe00b8b40df370a3dffde8a5fef1771a617

    SHA256

    42798855b1b97baec23e362adf9de80893dd40691f6fe6d4d5959a5ee6163e81

    SHA512

    baa12fb716763ddd7a6ae8976f220436f511ea5b75dc3cf8efe336ca4101338752172c4fc03586434b93ad276e1c8565974f6581b4d043a0284e889508dfd361

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.jfm

    Filesize

    16KB

    MD5

    f29ccf7cb355adcba4253c3ec0678413

    SHA1

    49de962d5e20ec8e19be4129769a6c70d2bcc648

    SHA256

    585a2fbb63177e87bcca83a964c217d1d3b467fbad5b0c2a57d160bcdbbf7f53

    SHA512

    7e97fb95c55d6474fe6d3198c05e0428faeb7d8cb7a82bae0ffce36c90661d3849b7a2ca6f1ed3fdcb0a81f58290f86f2d2b212a3fa60a642c6e958fccdac187

  • C:\Users\Admin\AppData\Local\Temp\gcapi_17435242975696.dll

    Filesize

    740KB

    MD5

    f17f96322f8741fe86699963a1812897

    SHA1

    a8433cab1deb9c128c745057a809b42110001f55

    SHA256

    8b6ce3a640e2d6f36b0001be2a1abb765ae51e62c314a15911e75138cbb544bb

    SHA512

    f10586f650a5d602287e6e7aeeaf688b275f0606e20551a70ea616999579acdf7ea2f10cebcfaa817dae4a2fc9076e7fa5b74d9c4b38878fbf590ffe0e7d81c9

  • memory/5696-46-0x0000028BD7750000-0x0000028BD7751000-memory.dmp

    Filesize

    4KB

  • memory/5696-5-0x00007FFEEBDF0000-0x00007FFEEBDF1000-memory.dmp

    Filesize

    4KB

  • memory/5696-24-0x0000028BC7230000-0x0000028BC7240000-memory.dmp

    Filesize

    64KB

  • memory/5696-19-0x0000028BC71E0000-0x0000028BC71F0000-memory.dmp

    Filesize

    64KB

  • memory/5696-42-0x0000028BD7870000-0x0000028BD7878000-memory.dmp

    Filesize

    32KB

  • memory/5696-44-0x0000028BD78E0000-0x0000028BD78E8000-memory.dmp

    Filesize

    32KB

  • memory/5696-45-0x0000028BD7760000-0x0000028BD7768000-memory.dmp

    Filesize

    32KB

  • memory/5696-0-0x00007FFEEBD50000-0x00007FFEEBD51000-memory.dmp

    Filesize

    4KB

  • memory/5696-48-0x0000028BD7760000-0x0000028BD7768000-memory.dmp

    Filesize

    32KB

  • memory/5696-51-0x0000028BD7750000-0x0000028BD7758000-memory.dmp

    Filesize

    32KB

  • memory/5696-54-0x0000028BD7700000-0x0000028BD7701000-memory.dmp

    Filesize

    4KB

  • memory/5696-4-0x00007FFEEBD80000-0x00007FFEEBD81000-memory.dmp

    Filesize

    4KB

  • memory/5696-66-0x0000028BD7790000-0x0000028BD7798000-memory.dmp

    Filesize

    32KB

  • memory/5696-68-0x0000028BD7840000-0x0000028BD7848000-memory.dmp

    Filesize

    32KB

  • memory/5696-71-0x0000028BD7750000-0x0000028BD7751000-memory.dmp

    Filesize

    4KB

  • memory/5696-75-0x0000028BD7700000-0x0000028BD7701000-memory.dmp

    Filesize

    4KB

  • memory/5696-6-0x00007FFEEBD90000-0x00007FFEEBD91000-memory.dmp

    Filesize

    4KB

  • memory/5696-7-0x00007FFEEA440000-0x00007FFEEA441000-memory.dmp

    Filesize

    4KB

  • memory/5696-3-0x00007FFEEBDC0000-0x00007FFEEBDC1000-memory.dmp

    Filesize

    4KB

  • memory/5696-1-0x00007FFEEBD60000-0x00007FFEEBD61000-memory.dmp

    Filesize

    4KB

  • memory/5696-2-0x00007FFEEBD70000-0x00007FFEEBD71000-memory.dmp

    Filesize

    4KB