Analysis
-
max time kernel
140s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28-03-2023 14:45
Behavioral task
behavioral1
Sample
adwcleaner.exe
Resource
win7-20230220-en
7 signatures
150 seconds
General
-
Target
adwcleaner.exe
-
Size
8.4MB
-
MD5
31eba5c542887dee4507780b2350eb82
-
SHA1
5da1addcef89747573e18d4cb361ed7d384cc3cb
-
SHA256
1f544da66675521a649e632108f86afb351ad336bd34b7b5c3d290827ebeef54
-
SHA512
19c08be4f321eabe5cb30c33f71a7f1dc5c27c4fa7d7bd4cb4cb7cf23cf73aa8c8b4b1e9ec0fb9fc2d0e538768c9f95c540aa7928705f6d6a44180ac537cefcc
-
SSDEEP
196608:TORsUVmq00uyojm7OpiJS40B7Ar7LA7/XAKf5e3Bvn2F8/E0BzAz:TN/kGiExB7Ar7L45oeFsAz
Score
7/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/696-54-0x0000000000AC0000-0x00000000020E4000-memory.dmp upx behavioral1/memory/696-56-0x0000000000AC0000-0x00000000020E4000-memory.dmp upx behavioral1/memory/696-61-0x0000000000AC0000-0x00000000020E4000-memory.dmp upx behavioral1/memory/696-64-0x0000000000AC0000-0x00000000020E4000-memory.dmp upx behavioral1/memory/696-65-0x0000000000AC0000-0x00000000020E4000-memory.dmp upx behavioral1/memory/696-66-0x0000000000AC0000-0x00000000020E4000-memory.dmp upx behavioral1/memory/696-67-0x0000000000AC0000-0x00000000020E4000-memory.dmp upx behavioral1/memory/696-68-0x0000000000AC0000-0x00000000020E4000-memory.dmp upx behavioral1/memory/696-69-0x0000000000AC0000-0x00000000020E4000-memory.dmp upx -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
adwcleaner.exepid process 696 adwcleaner.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
adwcleaner.exepid process 696 adwcleaner.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
adwcleaner.exepid process 696 adwcleaner.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
adwcleaner.exedescription pid process Token: SeBackupPrivilege 696 adwcleaner.exe Token: SeRestorePrivilege 696 adwcleaner.exe Token: SeTakeOwnershipPrivilege 696 adwcleaner.exe Token: SeBackupPrivilege 696 adwcleaner.exe Token: SeRestorePrivilege 696 adwcleaner.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
adwcleaner.exepid process 696 adwcleaner.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
adwcleaner.exepid process 696 adwcleaner.exe 696 adwcleaner.exe 696 adwcleaner.exe 696 adwcleaner.exe 696 adwcleaner.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\adwcleaner.exe"C:\Users\Admin\AppData\Local\Temp\adwcleaner.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/696-54-0x0000000000AC0000-0x00000000020E4000-memory.dmpFilesize
22.1MB
-
memory/696-55-0x0000000000190000-0x000000000019A000-memory.dmpFilesize
40KB
-
memory/696-56-0x0000000000AC0000-0x00000000020E4000-memory.dmpFilesize
22.1MB
-
memory/696-58-0x0000000000190000-0x000000000019A000-memory.dmpFilesize
40KB
-
memory/696-59-0x0000000000190000-0x000000000019A000-memory.dmpFilesize
40KB
-
memory/696-61-0x0000000000AC0000-0x00000000020E4000-memory.dmpFilesize
22.1MB
-
memory/696-64-0x0000000000AC0000-0x00000000020E4000-memory.dmpFilesize
22.1MB
-
memory/696-65-0x0000000000AC0000-0x00000000020E4000-memory.dmpFilesize
22.1MB
-
memory/696-66-0x0000000000AC0000-0x00000000020E4000-memory.dmpFilesize
22.1MB
-
memory/696-67-0x0000000000AC0000-0x00000000020E4000-memory.dmpFilesize
22.1MB
-
memory/696-68-0x0000000000AC0000-0x00000000020E4000-memory.dmpFilesize
22.1MB
-
memory/696-69-0x0000000000AC0000-0x00000000020E4000-memory.dmpFilesize
22.1MB