Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13/06/2023, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
CloudDeviceATDLss.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
CloudDeviceATDLss.exe
Resource
win10v2004-20230220-en
General
-
Target
CloudDeviceATDLss.exe
-
Size
683KB
-
MD5
4e41ef79db3a3e90c60cff647c69a920
-
SHA1
61f01719de0c0fdbbcb0583d51ccf1559ccb0aa8
-
SHA256
486b43592b175081fe3ca5e1bad2be4338285bffaf3d3c4a496b8aa87ae81d62
-
SHA512
3c4caea7fe4654ae6b807e73511e2674374039e9f3d604d1ab7c58e1546efd6da5cce3bd14326e298af6fbfb273a5aaa9fa1335d22c8d806866ac16c9c1aaa6e
-
SSDEEP
6144:ktZEjNbRVNV6wdq5jE1p8S8kYadmkE8Xr4gp0iptw3NnbtB+8Xr4gp0i8tw3cnd:JDLdzXkgCwti3bXkgCVtr
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1880 dw20.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2024 2032 CloudDeviceATDLss.exe 28 PID 2032 wrote to memory of 2024 2032 CloudDeviceATDLss.exe 28 PID 2032 wrote to memory of 2024 2032 CloudDeviceATDLss.exe 28 PID 2032 wrote to memory of 2024 2032 CloudDeviceATDLss.exe 28 PID 2024 wrote to memory of 1452 2024 csc.exe 30 PID 2024 wrote to memory of 1452 2024 csc.exe 30 PID 2024 wrote to memory of 1452 2024 csc.exe 30 PID 2024 wrote to memory of 1452 2024 csc.exe 30 PID 2032 wrote to memory of 472 2032 CloudDeviceATDLss.exe 31 PID 2032 wrote to memory of 472 2032 CloudDeviceATDLss.exe 31 PID 2032 wrote to memory of 472 2032 CloudDeviceATDLss.exe 31 PID 2032 wrote to memory of 472 2032 CloudDeviceATDLss.exe 31 PID 472 wrote to memory of 840 472 csc.exe 33 PID 472 wrote to memory of 840 472 csc.exe 33 PID 472 wrote to memory of 840 472 csc.exe 33 PID 472 wrote to memory of 840 472 csc.exe 33 PID 2032 wrote to memory of 1880 2032 CloudDeviceATDLss.exe 34 PID 2032 wrote to memory of 1880 2032 CloudDeviceATDLss.exe 34 PID 2032 wrote to memory of 1880 2032 CloudDeviceATDLss.exe 34 PID 2032 wrote to memory of 1880 2032 CloudDeviceATDLss.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\CloudDeviceATDLss.exe"C:\Users\Admin\AppData\Local\Temp\CloudDeviceATDLss.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jy-gvwtz.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES466.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC465.tmp"3⤵PID:1452
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\teycnms2.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES88B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC88A.tmp"3⤵PID:840
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8162⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1880
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD545eb7ffc80c6e7d1cccf6fae1028e262
SHA1b152dfee41f0cc2880a9d88eb6622333ffbd118a
SHA256140785366168f13f96f1fe456f311b07e92d6ed1812369dbb9fda3fdfe8c5700
SHA512dd2fd68a94c65f3c71bcc209bf8da3e21726b817c030485a13ef799a44c63fe0d418c81493ed20005f26a835c0533f2b13fa2e0608760873100ba49cecea28c4
-
Filesize
1KB
MD5eeef9fdf13cf586e18ec83457aed954c
SHA121eba599df4b46bb24ef3f7a5c5e350888438e5b
SHA2567606a01c98dfe2b28b6f74829eee9724e8a23f71cd105f818f9a33692b6581d6
SHA51215b8f1edc79c28f64fc05a3c7fd020cbc306c5c9b14fddd55faa44b633d638ac1a03810e74495a2f3a01034b5ac00fde5bfe4be56f4923db2cdaec3cba1402b6
-
Filesize
576KB
MD533aa0645bee08c4d494bd3c26c888a59
SHA18c13d2d19e10430f3813e02fa0766d7727a5bf10
SHA256066b9af08692e32fe3120cfaba712eabb6bf44d825d17b2312fe49f7ab9ad305
SHA512c07dae13647e7a2d56711a1d28007e543d51b3069f0ff19877337044f37b11e1cbf32b0463dc5ac8ed46b74f71f104eaa7213a08816c0e66907a5687da21211d
-
Filesize
88KB
MD52ed0abdf977ed4c4529f004faf9e9981
SHA1ee5b2a73844fbc5e7486226c589be3727d6d2307
SHA2568e310e5a01d5c54d93a7f6ab3ae49bcec69ac8d051c7dbe7b4b0d70ec516cbba
SHA512a0fc93e45285d457a52509794dd6f81e2bad4601e9dfa9e98e6dbb7211318fdc4038e2d1965e0268f4829e480ff1453fc6a1c6abb520a5c9a1b23d95d78f34ef
-
Filesize
652B
MD54cfbca653f64decd54b43f23c2160eb5
SHA1a1eb6c9239f95d2cbb6ea9ce04ff086fa37f4eaa
SHA256c7ecfa2f20fc11752c5c438b10a984c9cb22e3ec1f18623bcd6feda8753a297b
SHA512690740e799bedef3b58ae6b30f298aae288abf0a62533648d39ab61efb19e0e2d2459e2fed0dad18c0f880ffb6ece0b0b830223792c52a18a90d0f97bacfb218
-
Filesize
652B
MD5dfd4dcbc6ee27d9aaf0c36cce56abdbe
SHA101a8c6e08e023efc289644452015c7b505493578
SHA256d39d60039c8e2c1800798420e11d2203f2c6532c1c7c12e90571bbae844f2c69
SHA51298c6ad932eeddceb60fbb7002fdd8dad9e15c481fdbf0d5db9911a58d81a564bacf512b04702f1d41a4d93031ae6c7e4a7366745a7b1087e8ca67a93277accd3
-
Filesize
1.3MB
MD52333951c6abeb2e72488422e878af6c9
SHA100a7d8be0f9faed35922eb6b11c7e4c90727fdc6
SHA2561005292695d2f6abc8d2afc8c0bed9f5183b433e1eab2646dd666920e0692462
SHA51220a5300fe02f2963cf863a5ad4beba6d1e7201c53fd0d39351dbae01bdd0d30a64694ca82b8f64e4192e72cdfd02875afa87bbc44a474b28b3feb5d25be51eac
-
Filesize
676B
MD5fabf522c2b6e3bb01540216ec71755b6
SHA1b41a288c87909bbc3648dc8987afbda0699368b0
SHA2565aa448a81650001fe90bbe42b36d436ee48803e78da253b34ce85ca7ba57f3df
SHA512937412757966753b51428a6407c998ec5991de207b1ddbd4765d82449510e7725c91321a4ca80a3205fc6481c769e265be1d86d7dfb59c5a4230ee11bafd9f1f
-
Filesize
164KB
MD5107d41022309883ad1ce3b7576464197
SHA182cd3c19ff798d2c23afbf4eb4b862595b522822
SHA256a6e68ab3dbdfe89a6cbd4ded8132ebdd6cf8af8e514ba09547880b9d336bd50d
SHA512bbe510fd5ebc29a01a7e3863f1211cf3ce3aff2abe1e323e501c8f2dcf717ea5ca9726ea483b2b43ebad9b451cf96b2f03530fdade5b0193735997027aad063d
-
Filesize
676B
MD568aef6d3765233322067eae210111fc6
SHA130c1c0cc02055bc96c5fe9f7a98d4bf6a49461a6
SHA256a2126630199c58a4bb0e89e6727a429066eacaf9883a40819009f4ec47a21f10
SHA5127ad73446f2307caef4a59556168b5fbeddd280c97516c9378fb65f707d42942dc20d1f7142e689cc51ce52093bef0b03df6a63d7e6d9656d4cf5c39a4159ae73