Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1190s
  • max time network
    843s
  • platform
    windows7_x64
  • resource
    win7-20240215-es
  • resource tags

    arch:x64arch:x86image:win7-20240215-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    13/03/2024, 18:53

General

  • Target

    adwcleaner_7.3.exe

  • Size

    6.7MB

  • MD5

    c9289ef6784bee67b66aa9fdd88a0464

  • SHA1

    f9bc48a44091e1524c4381a1004823c2c809cb1b

  • SHA256

    f3d9bfa8910f05bbfde1ba58abb264bf444f155be915a5246c360f304bfcdcd6

  • SHA512

    847fa5206c55fa9e2fb70f589d74030acbb5e018ee4786961cac54744bfd4ec208487b89db5c135d8f4be9d1e75fd1feca7023eb7ba1998da734a0fbe61f78aa

  • SSDEEP

    196608:NuG1IxfSByN43o+6AiplLlToE+FZm1PCDDUOyCWBAWAX78yl+Lxl+1:kG1g5kC9EE+ImQOvL8ycT+1

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adwcleaner_7.3.exe
    "C:\Users\Admin\AppData\Local\Temp\adwcleaner_7.3.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d77486ad6fda35a740e0a897367b16c5

    SHA1

    53a7314a5589741d3c3937b03afa94dd7d8bfb26

    SHA256

    647c64e8fe1cbe3ebfe4a8cb6adebe631982bf4ce1d3a7b2bb7fe7cbce1992ef

    SHA512

    86c8e055be69ab0e68c8d785c912293844631b7bc58165b44c47af2501ae8d82d4bbe1a7753c06b76ac8ff37c807a616bf72c83d30b1043065f0cec4f66bc4f0

  • C:\Users\Admin\AppData\Local\Temp\Tar2247.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • memory/1732-0-0x0000000000EC0000-0x0000000002115000-memory.dmp

    Filesize

    18.3MB

  • memory/1732-122-0x0000000000EC0000-0x0000000002115000-memory.dmp

    Filesize

    18.3MB

  • memory/1732-124-0x0000000000EC0000-0x0000000002115000-memory.dmp

    Filesize

    18.3MB

  • memory/1732-125-0x0000000000EC0000-0x0000000002115000-memory.dmp

    Filesize

    18.3MB