Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
75s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07/05/2023, 15:03
Behavioral task
behavioral1
Sample
adwcleaner.exe
Resource
win7-20230220-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
adwcleaner.exe
Resource
win10v2004-20230220-en
8 signatures
150 seconds
General
-
Target
adwcleaner.exe
-
Size
8.4MB
-
MD5
31eba5c542887dee4507780b2350eb82
-
SHA1
5da1addcef89747573e18d4cb361ed7d384cc3cb
-
SHA256
1f544da66675521a649e632108f86afb351ad336bd34b7b5c3d290827ebeef54
-
SHA512
19c08be4f321eabe5cb30c33f71a7f1dc5c27c4fa7d7bd4cb4cb7cf23cf73aa8c8b4b1e9ec0fb9fc2d0e538768c9f95c540aa7928705f6d6a44180ac537cefcc
-
SSDEEP
196608:TORsUVmq00uyojm7OpiJS40B7Ar7LA7/XAKf5e3Bvn2F8/E0BzAz:TN/kGiExB7Ar7L45oeFsAz
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1048-54-0x0000000000840000-0x0000000001E64000-memory.dmp upx behavioral1/memory/1048-57-0x0000000000840000-0x0000000001E64000-memory.dmp upx behavioral1/memory/1048-62-0x0000000000840000-0x0000000001E64000-memory.dmp upx behavioral1/memory/1048-65-0x0000000000840000-0x0000000001E64000-memory.dmp upx -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1048 adwcleaner.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1048 adwcleaner.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1048 adwcleaner.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeBackupPrivilege 1048 adwcleaner.exe Token: SeRestorePrivilege 1048 adwcleaner.exe Token: SeTakeOwnershipPrivilege 1048 adwcleaner.exe Token: SeBackupPrivilege 1048 adwcleaner.exe Token: SeRestorePrivilege 1048 adwcleaner.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1048 adwcleaner.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1048 adwcleaner.exe 1048 adwcleaner.exe 1048 adwcleaner.exe 1048 adwcleaner.exe 1048 adwcleaner.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\adwcleaner.exe"C:\Users\Admin\AppData\Local\Temp\adwcleaner.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1048