Adware.ConvertAd.AJ
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 507 |
| Threat Level: | 20 % (Normal) |
| Infected Computers: | 5,333 |
| First Seen: | October 22, 2024 |
| Last Seen: | April 12, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Adware.ConvertAd.AJ |
|---|---|
| Packers: | UPX! |
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
a14fdde27ae4506ac5ef3cb452f0e2e1
SHA1:
c3b14555c4b7033381356dc45542d73718d89767
SHA256:
87406835AABD9C09829ED273BA2C2891A32C63D27145B94B33E711BA572F44C6
File Size:
2.03 MB, 2032128 bytes
|
|
MD5:
c4dd3241c34551d764bcb561f1792b93
SHA1:
81b96812bcdb23ad515e219ac26d581b6d63d748
SHA256:
B6BC7B34FB04D68F97F7AA9E36EF0C1D216CD88D02DA6CCF39641A837C201F7D
File Size:
2.06 MB, 2056704 bytes
|
|
MD5:
0e387f13c0f0fb1862b75ea3eccf3040
SHA1:
c5b2e2c86f6d783fada4828184f56f8ef66386ff
SHA256:
6BB76D87C54FF4A2637262A55029551009E36D993E74A13BDE93C44BFAFD0137
File Size:
2.03 MB, 2031104 bytes
|
|
MD5:
69a284cb9900bf88281c52a78f396668
SHA1:
17b84dc55fdcc8f4cf7a017592452a0509b729b0
SHA256:
0D69A26C4AF157F1D441924F07023B2C67C06BFF8211E6A26010C20A2F5C2358
File Size:
2.03 MB, 2032640 bytes
|
|
MD5:
e6f641aa2003631a1658267225d58de2
SHA1:
1a4215e03190c82fb959befde58e8f93626b4bf8
SHA256:
16B02AEFDD67DEA20CFE4A8678678EEF4EBC8C97B7D841AEDE3803FACF9323AD
File Size:
2.06 MB, 2056704 bytes
|
Show More
|
MD5:
cec0416b1128e6418c14bfa88c2fa33d
SHA1:
f6d7e19c9be23a9768b43a349876a277f4a05bc1
SHA256:
BD2E767FD851F9207D12FA130D7B9576E873CC6277266E6DBBBCB3EC32BCD8A1
File Size:
2.03 MB, 2030592 bytes
|
|
MD5:
4a4b3a162abf4acb46b6bca41d093da2
SHA1:
cde52ebec44f352d4d32d688887e2546b7ce7892
SHA256:
514DF1E3D2367F738DA9DD225EB645B0DD189D9D5CDA062FAA37C24AD4831B1B
File Size:
3.88 MB, 3883536 bytes
|
|
MD5:
052a38ee82731c6c6ad3a8dbaccc0b80
SHA1:
7454d6797aae56f05bd5199190ea8f6301922888
SHA256:
48236124309B83D34899A371D5F705346928CF1B6D0790C82D88E8D92F961AE7
File Size:
3.91 MB, 3909048 bytes
|
|
MD5:
31363f53c409284b593c914f4220956d
SHA1:
5803ef8bedeba6a62ac2aa3087c21632aa42dd2f
SHA256:
5AB5F67E5A59CF69575D9A74C00927310F996A79B6BE835A005F1E22ADDFE264
File Size:
3.88 MB, 3883640 bytes
|
|
MD5:
930c821094994752e45cbd630bbc9e91
SHA1:
3006dac4d1aa9bc360287a2270496b0b93f66ec5
SHA256:
65331FD7AD1B54CAD7E7A4DF8740ABB6F1E4566B10A6FFF064E684F4368A1599
File Size:
2.03 MB, 2030592 bytes
|
|
MD5:
cf9982d03362d273b3d9c9dbf2764829
SHA1:
16d7405cdb6a1a6ca3eb35a663b528aaac449f93
SHA256:
05BC0C95F0F1AEB7526CC0D1CF9C3A6EC6756DC2F2A3F126A4CB023D4D654022
File Size:
3.88 MB, 3880464 bytes
|
|
MD5:
3dbab62c6eab84578cfc0a95564c9745
SHA1:
d1e7780e57bb239f709bb9363f13e849b97ae4ef
SHA256:
0AB18BD0B399A26667124D0FBE078D82BEFA71E0962499B8020F2FA452201375
File Size:
4.27 MB, 4271104 bytes
|
|
MD5:
6d352ebc6a71dddebb2c697359d9069c
SHA1:
ece0f94d3ca1af901b6fbc5ae92341f68d66d34e
SHA256:
BF7F0BC1188A90781E54F68A50C8FF5423A775EE2687BA4D04C036EBDC35F1AF
File Size:
4.27 MB, 4268032 bytes
|
|
MD5:
9e4472b5fe82b36a10d01577fa43d683
SHA1:
73beeb356912a1e2f8f402993b1cb3299f8d861b
SHA256:
FDD172B0ABFC6F10553E5532667DD588C2380BB7DF1D5B392ABD82AE40115CCB
File Size:
2.07 MB, 2072576 bytes
|
|
MD5:
2aecbcd9fa50575432aba34d4d218f52
SHA1:
3b1b7348c7b74a7e294ad4ee8c9fc3ebf23e5119
SHA256:
EB19553E9AD93B54AC05ADB5ECA36D53F87FFAD751A7A4456649A514F1C88F79
File Size:
2.04 MB, 2043400 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has been packed
- File has exports table
- File has TLS information
- File is 32-bit executable
- File is either console or GUI application
Show More
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Company Name |
|
| File Description |
|
| File Version |
Show More
|
| Internal Name |
|
| Legal Copyright |
|
| Original Filename | uTorrent.exe |
| Product Name |
|
| Product Version |
Show More
|
| Special Build | stable34 stable |
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| BitTorrent Inc | DigiCert Trusted Root G4 | Root Not Trusted |
| BitTorrent Inc | DigiCert Trusted Root G4 | Hash Mismatch |
| Rainberry Inc | DigiCert Trusted Root G4 | Root Not Trusted |
File Traits
- 2+ executable sections
- Badsig nsis
- BINinO
- HighEntropy
- Installer Manifest
- MZ (In Overlay)
- Nullsoft Installer
- packed
- SusSec
- upx
Show More
- UPX!
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 10,571 |
|---|---|
| Potentially Malicious Blocks: | 4,661 |
| Whitelisted Blocks: | 5,909 |
| Unknown Blocks: | 1 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- ConvertAd.AJ
- Gametool.ADA
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| c:\users\user\appdata\local\temp\nsk43f8.tmp\inetc.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsk43f8.tmp\nsisfirewall.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsk43f8.tmp\nsislog.txt | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsk43f8.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsk43f8.tmp\utorrent.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsk43f8.tmp\utwin_install.log | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsq3584.tmp\bt_datachannel.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsq3584.tmp\inetc.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsq3584.tmp\nsisfirewall.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsq3584.tmp\nsislog.txt | Generic Write,Read Attributes |
Show More
| c:\users\user\appdata\local\temp\nsq3584.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsq3584.tmp\utorrent.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsq3584.tmp\utwin_install.log | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsvbe27.tmp\nsisfirewall.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsvbe27.tmp\nsislog.txt | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsvbe27.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsvbe27.tmp\utorrent.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\utt41f7.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3119368278-1123331430-659265220-1001\1f91d2d17ea675d4c2c3192e241743f9_bfeb5820-9643-42ad-a79f-071dff4d8e64 | Generic Write,Read Attributes |
| c:\users\user\appdata\roaming\utorrent\46942-utorrent.7cf4.dmp | Generic Write,Read Attributes |
| c:\users\user\appdata\roaming\utorrent\bt_datachannel.dll | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\users\user\appdata\roaming\utorrent\updates.dat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\roaming\utorrent\updates\3.6.0_46942.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\content::cacheprefix | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\cookies::cacheprefix | Cookie: | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\history::cacheprefix | Visited: | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Anti Debug |
|
| User Data Access |
|
| Network Wininet |
|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Network Winsock2 |
|
| Other Suspicious |
|
| Encryption Used |
|
| Network Winsock |
|
| Cert Store Read |
|
| Cert Store Write |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
(NULL) C:\Users\Wsabcibk\AppData\Local\Temp\nsk43F8.tmp\utorrent.exe
|
(NULL) C:\Users\Yxibvcuq\AppData\Local\Temp\nsq3584.tmp\utorrent.exe
|