Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2025, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
CCleaner64.exe
Resource
win10v2004-20250314-en
General
-
Target
CCleaner64.exe
-
Size
43.3MB
-
MD5
eb3f46bce05231e76b5d419de44f04b7
-
SHA1
51bb120c8d8c15e0be036a0f569752a2fd2367fd
-
SHA256
7dc6fae7550e79701c54df21d4a2f9804e51c3a44b6e50fb405dfb081389e1b5
-
SHA512
768ab087ac41b7593f0f322a1410d044b6913c3810c8764a5a2f196af82d9f3866f6be739c3a528c5602833f7392663b887da0c082aba5d8bd2f949d3f31e069
-
SSDEEP
393216:moD2J2695Op4gT/ADHIpWR96HJEoEkc+unfmGffVgSKoJ9jLcsWrqNZTSP+R42u1:moZ69syDEuneGFKon/SP+R4dws1J
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 50 5696 CCleaner64.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation CCleaner64.exe -
Loads dropped DLL 1 IoCs
pid Process 5696 CCleaner64.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for any installed AV software in registry 1 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\AntiVir Desktop CCleaner64.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Avira\AntiVirus CCleaner64.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Speedup CCleaner64.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avast Software\Avast CCleaner64.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\AntiVir Desktop CCleaner64.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\Speedup CCleaner64.exe Key opened \REGISTRY\MACHINE\Software\Avast Software\Avast CCleaner64.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Avast Software\Avast CCleaner64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 CCleaner64.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer CCleaner64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName CCleaner64.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\addinutil.exe.log CCleaner64.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification C:\Windows\Logs\MoSetup\UpdateAgent.Old.log CCleaner64.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log CCleaner64.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log CCleaner64.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edbtmp.log CCleaner64.exe File opened for modification C:\Windows\security\logs\scesetup.log CCleaner64.exe File opened for modification C:\Windows\Logs\CBS\CbsPersist_20250401161817.log CCleaner64.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log CCleaner64.exe File opened for modification C:\Windows\DtcInstall.log CCleaner64.exe File opened for modification C:\Windows\setupact.log CCleaner64.exe File opened for modification C:\Windows\Debug\NetSetup.LOG CCleaner64.exe File opened for modification C:\Windows\Debug\PASSWD.LOG CCleaner64.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log CCleaner64.exe File opened for modification C:\Windows\Logs\CBS\CBS.log CCleaner64.exe File opened for modification C:\Windows\Logs\DISM\dism.log CCleaner64.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.log CCleaner64.exe File opened for modification C:\Windows\lsasetup.log CCleaner64.exe File opened for modification C:\Windows\setuperr.log CCleaner64.exe File opened for modification C:\Windows\Debug\sammui.log CCleaner64.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.log CCleaner64.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.log CCleaner64.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log CCleaner64.exe File opened for modification C:\Windows\Panther\setupact.log CCleaner64.exe File opened for modification C:\Windows\Panther\setuperr.log CCleaner64.exe File opened for modification C:\Windows\WindowsUpdate.log CCleaner64.exe File opened for modification C:\Windows\Logs\MoSetup\UpdateAgent.log CCleaner64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz CCleaner64.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 CCleaner64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString CCleaner64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz CCleaner64.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor CCleaner64.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor CCleaner64.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 CCleaner64.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe 5696 CCleaner64.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 5696 CCleaner64.exe Token: SeShutdownPrivilege 5696 CCleaner64.exe Token: SeCreatePagefilePrivilege 5696 CCleaner64.exe Token: SeShutdownPrivilege 5696 CCleaner64.exe Token: SeCreatePagefilePrivilege 5696 CCleaner64.exe Token: SeShutdownPrivilege 5696 CCleaner64.exe Token: SeCreatePagefilePrivilege 5696 CCleaner64.exe Token: SeShutdownPrivilege 5696 CCleaner64.exe Token: SeCreatePagefilePrivilege 5696 CCleaner64.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5696 CCleaner64.exe 5696 CCleaner64.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\CCleaner64.exe"C:\Users\Admin\AppData\Local\Temp\CCleaner64.exe"1⤵
- Downloads MZ/PE file
- Checks computer location settings
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks system information in the registry
- Drops file in System32 directory
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5418358a22ad603c2cae146bacd6a6d16
SHA1d1e85a0a0554c800c96580ce649b6f24c0fe0db1
SHA2567a8ea37574f9c3a159672a259d63e6336bad72be981bf9c395330832f3f08598
SHA512f0be23719ea6dd6721d89c3de02ee749389663fdcb92324e9bce580e6a8bdf31f227b18c87d44a81c2d697260f046b329e79f1d50a4462a1fa34ef5165b4db2b
-
Filesize
14.0MB
MD50de8ca5c166f483b8f1f2c5b7351c20a
SHA1af558fc69983ef6365aa2e1feb3d3a0ec0ad9d24
SHA2561412b58685031709e3cce8cb201e09ee58d07ad70aa2f6b186c27e8801a7d609
SHA512098b6b4c9f9d022f574b7b491c33af71e4e5af22071b7e750d7d1965213b06e19a20e8e8bf84840c7c8c8b7a99127f0d48fc3fe73f13950d8c120f880d8ff50f
-
Filesize
14.0MB
MD5104e5d3b1ffe08a93030419991dfa198
SHA11f64f167ba615cbe7cc5cf1465e8f5a5c1f0c75f
SHA2562a1e3811011e0377425c8ce8f9e16ba33d640d2931ff015d721a23e2d0dccfc9
SHA512e042045ddae14e10be2dba200bc148c1d2f63cc970b01cc3c43b8100d5bf5b432e1daedfabdb1de465e348fb4afbbf98b9c618fc6fd8b548f77633e029b2a059
-
Filesize
14.0MB
MD513e697f0a4ac8fb813ff61e29a15afe1
SHA1f2b93271ecc575974fd65b6c6a08ae1d59a9497a
SHA256d81bf0cc8c0394d10d16f885e6d9e1621936f2e2dac28d923e2a227496f80937
SHA5127cb951d5c6fd1a799015af99fe64a7137df504bce9fb9bdab743c15aa1286d45df29c8841faedfb063597cfb4aa68b80675d9f425f68b30996d447b7303cb9e9
-
Filesize
16KB
MD5b2a9fea1f48f17954e3f3cb2735928d5
SHA11ae3fbe00b8b40df370a3dffde8a5fef1771a617
SHA25642798855b1b97baec23e362adf9de80893dd40691f6fe6d4d5959a5ee6163e81
SHA512baa12fb716763ddd7a6ae8976f220436f511ea5b75dc3cf8efe336ca4101338752172c4fc03586434b93ad276e1c8565974f6581b4d043a0284e889508dfd361
-
Filesize
16KB
MD5f29ccf7cb355adcba4253c3ec0678413
SHA149de962d5e20ec8e19be4129769a6c70d2bcc648
SHA256585a2fbb63177e87bcca83a964c217d1d3b467fbad5b0c2a57d160bcdbbf7f53
SHA5127e97fb95c55d6474fe6d3198c05e0428faeb7d8cb7a82bae0ffce36c90661d3849b7a2ca6f1ed3fdcb0a81f58290f86f2d2b212a3fa60a642c6e958fccdac187
-
Filesize
740KB
MD5f17f96322f8741fe86699963a1812897
SHA1a8433cab1deb9c128c745057a809b42110001f55
SHA2568b6ce3a640e2d6f36b0001be2a1abb765ae51e62c314a15911e75138cbb544bb
SHA512f10586f650a5d602287e6e7aeeaf688b275f0606e20551a70ea616999579acdf7ea2f10cebcfaa817dae4a2fc9076e7fa5b74d9c4b38878fbf590ffe0e7d81c9