Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
18s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
ccd934c7dd80e3c5281f6912e8e5923e.exe
Resource
win7-20230831-en
General
-
Target
ccd934c7dd80e3c5281f6912e8e5923e.exe
-
Size
3.4MB
-
MD5
ccd934c7dd80e3c5281f6912e8e5923e
-
SHA1
8312f5101416a5a740a1de07882c662624c16b40
-
SHA256
0dc7d8248f6ce6c32678640c7451424cd02ceb26b53123d05998e48cce556b04
-
SHA512
ffec04a0e8d23eaf845a79d32fe0ddd68421c4b4e5103c7081d204b66ab6740c2960797164769c9a65971c257638d4ea4db84a43efaa8ca77145a360e969da88
-
SSDEEP
98304:yIk/dVyE8L2EQLuGKR70la1O9g5Ws4/ITyH29hH:rk1MPL5QLE7Qa09g+IT9
Malware Config
Signatures
-
Detect ZGRat V1 6 IoCs
resource yara_rule behavioral2/files/0x0008000000023246-12.dat family_zgrat_v1 behavioral2/files/0x0008000000023246-11.dat family_zgrat_v1 behavioral2/memory/4240-13-0x0000000000EE0000-0x0000000001274000-memory.dmp family_zgrat_v1 behavioral2/files/0x000200000001e6e2-95.dat family_zgrat_v1 behavioral2/files/0x000200000001e6e2-123.dat family_zgrat_v1 behavioral2/files/0x000200000001e6e2-122.dat family_zgrat_v1 -
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1012 4116 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 752 4116 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2188 4116 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1700 4116 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3340 4116 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3016 4116 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2196 4116 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1676 4116 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4644 4116 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 556 4116 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1508 4116 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2612 4116 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3620 4116 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4716 4116 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4536 4116 schtasks.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 752 schtasks.exe 3340 schtasks.exe 1676 schtasks.exe 2612 schtasks.exe 4536 schtasks.exe 1700 schtasks.exe 3016 schtasks.exe 2196 schtasks.exe 4644 schtasks.exe 1508 schtasks.exe 1012 schtasks.exe 2188 schtasks.exe 556 schtasks.exe 3620 schtasks.exe 4716 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000_Classes\Local Settings Process not Found -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1712 PING.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1776 wrote to memory of 4828 1776 Process not Found 84 PID 1776 wrote to memory of 4828 1776 Process not Found 84 PID 1776 wrote to memory of 4828 1776 Process not Found 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccd934c7dd80e3c5281f6912e8e5923e.exe"C:\Users\Admin\AppData\Local\Temp\ccd934c7dd80e3c5281f6912e8e5923e.exe"1⤵PID:1776
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\BridgeportWebDllNet\cMC3vG7uf0oG.vbe"2⤵PID:4828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\BridgeportWebDllNet\b7te9U2.bat" "3⤵PID:4816
-
C:\Users\Admin\AppData\Roaming\BridgeportWebDllNet\agentServerComponent.exe"C:\Users\Admin\AppData\Roaming\BridgeportWebDllNet/agentServerComponent.exe"4⤵PID:4240
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\idzlyfws\idzlyfws.cmdline"5⤵PID:516
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA350.tmp" "c:\Windows\System32\CSC1493A8AF2A944127854A2EEFF3EE4055.TMP"6⤵PID:232
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\KM1EQg0VNB.bat"5⤵PID:4844
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:4444
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
PID:1712
-
-
C:\Users\All Users\USOShared\Logs\User\conhost.exe"C:\Users\All Users\USOShared\Logs\User\conhost.exe"6⤵PID:632
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\USOShared\Logs\User\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\All Users\USOShared\Logs\User\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\USOShared\Logs\User\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Public\Videos\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Videos\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Videos\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "agentServerComponenta" /sc MINUTE /mo 10 /tr "'C:\Windows\ShellComponents\agentServerComponent.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "agentServerComponent" /sc ONLOGON /tr "'C:\Windows\ShellComponents\agentServerComponent.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "agentServerComponenta" /sc MINUTE /mo 9 /tr "'C:\Windows\ShellComponents\agentServerComponent.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\Pictures\Camera Roll\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Users\Admin\Pictures\Camera Roll\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\Pictures\Camera Roll\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD54b6bf7e06b6f4b01999a6febcddc09b7
SHA1639ee42edde44f4ebe892aa0ac4fbddc49e144b8
SHA25610dbba3481930c060fbcadfa77ff358e058578cf8cd12688e712bec4bfd99bc8
SHA51236228e618307dd8d84939414f26dff00b8e003287af43ff7690cdb5b01e30e54958d33afb2938917d3013ef334367d30ce935d5bb48fa5b01e1321e09309bca8
-
Filesize
3.5MB
MD54b6bf7e06b6f4b01999a6febcddc09b7
SHA1639ee42edde44f4ebe892aa0ac4fbddc49e144b8
SHA25610dbba3481930c060fbcadfa77ff358e058578cf8cd12688e712bec4bfd99bc8
SHA51236228e618307dd8d84939414f26dff00b8e003287af43ff7690cdb5b01e30e54958d33afb2938917d3013ef334367d30ce935d5bb48fa5b01e1321e09309bca8
-
Filesize
178B
MD5112f8037486ff1b365de86dedf85e896
SHA1328a4664a344e65811ed91cad17f982086290b00
SHA256b2c8b7070e7637b1fae164bcf3106adef069bcf5f89bf7b6836c546c14942dc9
SHA51274bd9efacba29c4c11d99a43f05e8f475d814a7bfa2af1446b8cf0ecfd3e97f0df3845ef18331d70cc99823f3e89834e93d7e3e41c601fe9d431413693b13eef
-
Filesize
3.5MB
MD54b6bf7e06b6f4b01999a6febcddc09b7
SHA1639ee42edde44f4ebe892aa0ac4fbddc49e144b8
SHA25610dbba3481930c060fbcadfa77ff358e058578cf8cd12688e712bec4bfd99bc8
SHA51236228e618307dd8d84939414f26dff00b8e003287af43ff7690cdb5b01e30e54958d33afb2938917d3013ef334367d30ce935d5bb48fa5b01e1321e09309bca8
-
Filesize
3.5MB
MD54b6bf7e06b6f4b01999a6febcddc09b7
SHA1639ee42edde44f4ebe892aa0ac4fbddc49e144b8
SHA25610dbba3481930c060fbcadfa77ff358e058578cf8cd12688e712bec4bfd99bc8
SHA51236228e618307dd8d84939414f26dff00b8e003287af43ff7690cdb5b01e30e54958d33afb2938917d3013ef334367d30ce935d5bb48fa5b01e1321e09309bca8
-
Filesize
93B
MD5b32388f95a1ac97cfca0a1a41c47604d
SHA1568a535fd5a9175f4ed27c6716d65f917ca893df
SHA25649d7bc2b118c854658c90b0fa9c47de42eb9f2426833e86b049bb33733bea5b9
SHA512bcd9531dfd247542633c9cecacf1a46c7be70173a2ed6845386bd567ea7cb0c49aec4d3ed315ee80aaabd3ca96cee0c6e762e42d85b74b59793a4d766b83edc5
-
Filesize
211B
MD54d658105afcc52322262e2c793a8083a
SHA1c81a04e2cf3ce5cdeab1c54673d9f9bdf646c43d
SHA256e6ff322411e42d01aeb523e70b1fa1023d5427e1c6eed2d19a8b2eaa1b26acda
SHA512a47b97494f1ca7528026adc4aabfbdc73e944e6342beb380022f0f3f72ce8b603517863cf31340068a9ee10229feca3a7e77f34644609c514b5568e49e29c7be
-
Filesize
3.5MB
MD54b6bf7e06b6f4b01999a6febcddc09b7
SHA1639ee42edde44f4ebe892aa0ac4fbddc49e144b8
SHA25610dbba3481930c060fbcadfa77ff358e058578cf8cd12688e712bec4bfd99bc8
SHA51236228e618307dd8d84939414f26dff00b8e003287af43ff7690cdb5b01e30e54958d33afb2938917d3013ef334367d30ce935d5bb48fa5b01e1321e09309bca8
-
Filesize
371B
MD586183cd3e44687282ba02d61616fa639
SHA1f92d6809c0b418bb07afc0700af95f7e9fd3f4fe
SHA256b64b41a0ee2b5bf4d606918ae60bf90eb4aa925fa02d985bc2fe25b8b0c1cf51
SHA51274cb758a8dc2d402d86701b1f1f5eebf3fbeba33abf51c57035dc8ad8535d2ac45c5749e9987d9983d7a76f8b53468c83159a23b46c1e74f38ac4dc0eb38e710
-
Filesize
235B
MD5366929b31a19b891c3ff08afdf8ad2fa
SHA16d8d1e153ad16279db3342eecc944d0a05c3e0da
SHA25651340494396cf4c80483b411db5db2af7e1629534dbfdbafc7edd3307e5c7738
SHA512271926da88b80484db8060c45270e47169df9abb8e3d2d8a5dbc06105c16b82cbd058a8cd8eef0a14b01701c722f9983da6a6f950357969b8ea3ae5c47031cc4