Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2022 14:56
Static task
static1
Behavioral task
behavioral1
Sample
5573d5eb509dc3f68f674c95b3718dfb.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5573d5eb509dc3f68f674c95b3718dfb.exe
Resource
win10v2004-20220721-en
General
-
Target
5573d5eb509dc3f68f674c95b3718dfb.exe
-
Size
7.0MB
-
MD5
5573d5eb509dc3f68f674c95b3718dfb
-
SHA1
2d9e58b7c1f85355a50bb6fff7708be675d063c0
-
SHA256
4715de346335933da6b30b66030d0c574bfe464f332c327424b861e401f30cb6
-
SHA512
33df579b25a31aadd645e330196c973752362aa242df3bec56aec5528231440d034a1906f23d3a9fb8cc74c0f25b8e7a8fc38fce0f475c2c5cc4c9f13534b857
Malware Config
Extracted
raccoon
b411699deaa52994b115ef42d0917fdd
http://91.234.254.126/
Signatures
-
Raccoon Stealer payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/5028-130-0x0000000000670000-0x0000000001148000-memory.dmp family_raccoon behavioral2/memory/5028-132-0x0000000000670000-0x0000000001148000-memory.dmp family_raccoon behavioral2/memory/5028-217-0x0000000000670000-0x0000000001148000-memory.dmp family_raccoon -
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2464-223-0x0000000000BE0000-0x00000000019B9000-memory.dmp family_ytstealer behavioral2/memory/2464-225-0x0000000000BE0000-0x00000000019B9000-memory.dmp family_ytstealer -
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule C:\ProgramData\Dllhost\winlogson.exe xmrig C:\ProgramData\Dllhost\winlogson.exe xmrig -
Blocklisted process makes network request 3 IoCs
Processes:
schtasks.exeflow pid process 76 1180 schtasks.exe 78 1180 schtasks.exe 79 1180 schtasks.exe -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
Processes:
9p608FgO.exef94mjMm6.exedllhost.exedllhost.exe4QSCWX04.exewinlogson.exewinlogson.exepid process 2752 9p608FgO.exe 3844 f94mjMm6.exe 3320 dllhost.exe 4280 dllhost.exe 2464 4QSCWX04.exe 2044 winlogson.exe 460 winlogson.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\4QSCWX04.exe upx C:\Users\Admin\AppData\Local\Temp\4QSCWX04.exe upx behavioral2/memory/2464-218-0x0000000000BE0000-0x00000000019B9000-memory.dmp upx behavioral2/memory/2464-223-0x0000000000BE0000-0x00000000019B9000-memory.dmp upx behavioral2/memory/2464-225-0x0000000000BE0000-0x00000000019B9000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5573d5eb509dc3f68f674c95b3718dfb.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Control Panel\International\Geo\Nation 5573d5eb509dc3f68f674c95b3718dfb.exe -
Loads dropped DLL 3 IoCs
Processes:
5573d5eb509dc3f68f674c95b3718dfb.exepid process 5028 5573d5eb509dc3f68f674c95b3718dfb.exe 5028 5573d5eb509dc3f68f674c95b3718dfb.exe 5028 5573d5eb509dc3f68f674c95b3718dfb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
dllhost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe / file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
5573d5eb509dc3f68f674c95b3718dfb.exepid process 5028 5573d5eb509dc3f68f674c95b3718dfb.exe 5028 5573d5eb509dc3f68f674c95b3718dfb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3424 schtasks.exe 3700 schtasks.exe 3376 schtasks.exe 1724 schtasks.exe 2284 schtasks.exe 1224 schtasks.exe 4168 schtasks.exe 1180 schtasks.exe 4444 schtasks.exe 1984 schtasks.exe 2044 schtasks.exe 2556 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5573d5eb509dc3f68f674c95b3718dfb.exe9p608FgO.exepowershell.exef94mjMm6.exepowershell.exepowershell.exepowershell.exedllhost.exepowershell.exe4QSCWX04.exepid process 5028 5573d5eb509dc3f68f674c95b3718dfb.exe 5028 5573d5eb509dc3f68f674c95b3718dfb.exe 2752 9p608FgO.exe 2392 powershell.exe 2392 powershell.exe 3844 f94mjMm6.exe 4544 powershell.exe 4544 powershell.exe 4544 powershell.exe 3588 powershell.exe 3588 powershell.exe 3796 powershell.exe 3796 powershell.exe 3588 powershell.exe 3796 powershell.exe 3320 dllhost.exe 3320 dllhost.exe 3744 powershell.exe 3744 powershell.exe 3744 powershell.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 2464 4QSCWX04.exe 2464 4QSCWX04.exe 2464 4QSCWX04.exe 2464 4QSCWX04.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe 3320 dllhost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 664 -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
9p608FgO.exepowershell.exef94mjMm6.exepowershell.exepowershell.exepowershell.exedllhost.exedllhost.exepowershell.exewinlogson.exedescription pid process Token: SeDebugPrivilege 2752 9p608FgO.exe Token: SeDebugPrivilege 2392 powershell.exe Token: SeDebugPrivilege 3844 f94mjMm6.exe Token: SeDebugPrivilege 4544 powershell.exe Token: SeDebugPrivilege 3588 powershell.exe Token: SeDebugPrivilege 3796 powershell.exe Token: SeDebugPrivilege 3320 dllhost.exe Token: SeDebugPrivilege 4280 dllhost.exe Token: SeDebugPrivilege 3744 powershell.exe Token: SeLockMemoryPrivilege 460 winlogson.exe Token: SeLockMemoryPrivilege 460 winlogson.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winlogson.exepid process 460 winlogson.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5573d5eb509dc3f68f674c95b3718dfb.exe9p608FgO.execmd.exef94mjMm6.execmd.exedllhost.exedescription pid process target process PID 5028 wrote to memory of 2752 5028 5573d5eb509dc3f68f674c95b3718dfb.exe 9p608FgO.exe PID 5028 wrote to memory of 2752 5028 5573d5eb509dc3f68f674c95b3718dfb.exe 9p608FgO.exe PID 5028 wrote to memory of 2752 5028 5573d5eb509dc3f68f674c95b3718dfb.exe 9p608FgO.exe PID 5028 wrote to memory of 3844 5028 5573d5eb509dc3f68f674c95b3718dfb.exe f94mjMm6.exe PID 5028 wrote to memory of 3844 5028 5573d5eb509dc3f68f674c95b3718dfb.exe f94mjMm6.exe PID 5028 wrote to memory of 3844 5028 5573d5eb509dc3f68f674c95b3718dfb.exe f94mjMm6.exe PID 2752 wrote to memory of 4184 2752 9p608FgO.exe cmd.exe PID 2752 wrote to memory of 4184 2752 9p608FgO.exe cmd.exe PID 2752 wrote to memory of 4184 2752 9p608FgO.exe cmd.exe PID 4184 wrote to memory of 1016 4184 cmd.exe chcp.com PID 4184 wrote to memory of 1016 4184 cmd.exe chcp.com PID 4184 wrote to memory of 1016 4184 cmd.exe chcp.com PID 4184 wrote to memory of 2392 4184 cmd.exe powershell.exe PID 4184 wrote to memory of 2392 4184 cmd.exe powershell.exe PID 4184 wrote to memory of 2392 4184 cmd.exe powershell.exe PID 3844 wrote to memory of 4460 3844 f94mjMm6.exe cmd.exe PID 3844 wrote to memory of 4460 3844 f94mjMm6.exe cmd.exe PID 3844 wrote to memory of 4460 3844 f94mjMm6.exe cmd.exe PID 4460 wrote to memory of 4992 4460 cmd.exe chcp.com PID 4460 wrote to memory of 4992 4460 cmd.exe chcp.com PID 4460 wrote to memory of 4992 4460 cmd.exe chcp.com PID 4460 wrote to memory of 4544 4460 cmd.exe powershell.exe PID 4460 wrote to memory of 4544 4460 cmd.exe powershell.exe PID 4460 wrote to memory of 4544 4460 cmd.exe powershell.exe PID 4184 wrote to memory of 3588 4184 cmd.exe powershell.exe PID 4184 wrote to memory of 3588 4184 cmd.exe powershell.exe PID 4184 wrote to memory of 3588 4184 cmd.exe powershell.exe PID 4460 wrote to memory of 3796 4460 cmd.exe powershell.exe PID 4460 wrote to memory of 3796 4460 cmd.exe powershell.exe PID 4460 wrote to memory of 3796 4460 cmd.exe powershell.exe PID 3844 wrote to memory of 3320 3844 f94mjMm6.exe dllhost.exe PID 3844 wrote to memory of 3320 3844 f94mjMm6.exe dllhost.exe PID 3844 wrote to memory of 3320 3844 f94mjMm6.exe dllhost.exe PID 3320 wrote to memory of 2640 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 2640 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 2640 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 2364 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 2364 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 2364 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 1344 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 1344 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 1344 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 4296 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 4296 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 4296 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 624 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 624 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 624 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 4840 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 4840 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 4840 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 4192 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 4192 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 4192 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 1668 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 1668 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 1668 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 4164 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 4164 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 4164 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 3148 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 3148 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 3148 3320 dllhost.exe cmd.exe PID 3320 wrote to memory of 1008 3320 dllhost.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5573d5eb509dc3f68f674c95b3718dfb.exe"C:\Users\Admin\AppData\Local\Temp\5573d5eb509dc3f68f674c95b3718dfb.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\9p608FgO.exe"C:\Users\Admin\AppData\Local\Temp\9p608FgO.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData"3⤵
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:1016
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3744
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
-
C:\Users\Admin\AppData\Local\Temp\f94mjMm6.exe"C:\Users\Admin\AppData\Local\Temp\f94mjMm6.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData"3⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4992
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵PID:2640
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
- Blocklisted process makes network request
- Creates scheduled task(s)
PID:1180
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵PID:2364
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
- Creates scheduled task(s)
PID:4168
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵PID:1344
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
- Creates scheduled task(s)
PID:4444
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵PID:4296
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
- Creates scheduled task(s)
PID:3700
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵PID:4840
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
- Creates scheduled task(s)
PID:1224
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵PID:624
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
- Creates scheduled task(s)
PID:3376
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵PID:4192
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
- Creates scheduled task(s)
PID:1984
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk8536" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵PID:4164
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk8536" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
- Creates scheduled task(s)
PID:2284
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk33" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵PID:3148
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk33" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
- Creates scheduled task(s)
PID:3424
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵PID:1668
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
- Creates scheduled task(s)
PID:1724
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk4462" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵PID:1008
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk4462" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
- Creates scheduled task(s)
PID:2556
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk8672" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵PID:3768
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk8672" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
- Creates scheduled task(s)
PID:2044
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json4⤵PID:820
-
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:3436
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json4⤵PID:4236
-
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:2404
-
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe -c config.json5⤵
- Executes dropped EXE
PID:2044
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json4⤵PID:1652
-
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:4648
-
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe -c config.json5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:460
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4QSCWX04.exe"C:\Users\Admin\AppData\Local\Temp\4QSCWX04.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2464 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\4QSCWX04.exe3⤵PID:1396
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 04⤵PID:4936
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
953KB
MD57dadec75c72d9ca68ad351b147ce82d7
SHA1258718e852b80a293ea8505b2946190dcb3cd806
SHA25612deb4d3b58a9102ba0a9493ce1e2ea38a57a50214e1da4261b1e2b3d7f5539a
SHA512655e72a33457425b08592b7db8ab62ed232114355079de20fca23535e69e59bef13e971f48af83a382070abbb7620499b32bd8da5ad6b79f0e5f8502266ccf0d
-
Filesize
953KB
MD57dadec75c72d9ca68ad351b147ce82d7
SHA1258718e852b80a293ea8505b2946190dcb3cd806
SHA25612deb4d3b58a9102ba0a9493ce1e2ea38a57a50214e1da4261b1e2b3d7f5539a
SHA512655e72a33457425b08592b7db8ab62ed232114355079de20fca23535e69e59bef13e971f48af83a382070abbb7620499b32bd8da5ad6b79f0e5f8502266ccf0d
-
Filesize
953KB
MD57dadec75c72d9ca68ad351b147ce82d7
SHA1258718e852b80a293ea8505b2946190dcb3cd806
SHA25612deb4d3b58a9102ba0a9493ce1e2ea38a57a50214e1da4261b1e2b3d7f5539a
SHA512655e72a33457425b08592b7db8ab62ed232114355079de20fca23535e69e59bef13e971f48af83a382070abbb7620499b32bd8da5ad6b79f0e5f8502266ccf0d
-
Filesize
7.9MB
MD5ae6c92c8073b1239390369d3ed93538f
SHA1a76ea83bdcfa472cd593363e9bb254df494a5577
SHA256d8d0e8ce7d532250713c7ac9c3e3d144463ce9f47bbf5bd6fc3bb939c739c1a0
SHA51259de08ea3849243addb3b6aaa2b3ebf71a271eee77239bea0dd190d446a6eec56fd7c5b4fa3668c14074f33f06ab1f011baa0ac2266f6d2d33eb59847841c350
-
Filesize
7.9MB
MD5ae6c92c8073b1239390369d3ed93538f
SHA1a76ea83bdcfa472cd593363e9bb254df494a5577
SHA256d8d0e8ce7d532250713c7ac9c3e3d144463ce9f47bbf5bd6fc3bb939c739c1a0
SHA51259de08ea3849243addb3b6aaa2b3ebf71a271eee77239bea0dd190d446a6eec56fd7c5b4fa3668c14074f33f06ab1f011baa0ac2266f6d2d33eb59847841c350
-
Filesize
312B
MD54cf075c2fe2b39747343c7c4a4cf0286
SHA16c495f1d01222770fe3e48ce239660b3ce05b156
SHA256515be10d6ef679866272addc5d3d0a784aa13980471d2c33114b76fda5dd2d84
SHA51253ac1ef2186fe59750a2f23489026dc800d308511aff681a31d0f0ddb93192efbd4cdbdc32a42b33e263922c61b2b7b9e4422001f84c85dea2626958974942e3
-
Filesize
1KB
MD5f0b10ced353cc0cb9297f116aa5d1990
SHA105776891a3a88e15525d5968b1bd918fa5252346
SHA256c6400e3c5c3e957c98c13d683150a5cde51487627f950622f3c61738dcfc7431
SHA512cbdbcdbcd65a39438120da6af2d2b657d0c4ddd174dee1f41a88af47b4952a37584fbb1705141fc5be09893f43ed511bd29180961e8ea25b214abddb813bde49
-
Filesize
1KB
MD5f0b10ced353cc0cb9297f116aa5d1990
SHA105776891a3a88e15525d5968b1bd918fa5252346
SHA256c6400e3c5c3e957c98c13d683150a5cde51487627f950622f3c61738dcfc7431
SHA512cbdbcdbcd65a39438120da6af2d2b657d0c4ddd174dee1f41a88af47b4952a37584fbb1705141fc5be09893f43ed511bd29180961e8ea25b214abddb813bde49
-
Filesize
1KB
MD5f0b10ced353cc0cb9297f116aa5d1990
SHA105776891a3a88e15525d5968b1bd918fa5252346
SHA256c6400e3c5c3e957c98c13d683150a5cde51487627f950622f3c61738dcfc7431
SHA512cbdbcdbcd65a39438120da6af2d2b657d0c4ddd174dee1f41a88af47b4952a37584fbb1705141fc5be09893f43ed511bd29180961e8ea25b214abddb813bde49
-
Filesize
612KB
MD5f07d9977430e762b563eaadc2b94bbfa
SHA1da0a05b2b8d269fb73558dfcf0ed5c167f6d3877
SHA2564191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862
SHA5126afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf
-
Filesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5
-
Filesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD551bb4282005266dad70ef81e908c7d02
SHA189e3f50f86ae65ec14a77fd85a6db74fb435838b
SHA25655adb7108064a78e60cfd9f4ea101da558b738f6cbd5ffa4211906ad738e800b
SHA5122b02df3042d3e701a45a20e440cf77e3762a36c61688270eb49b69164f2ba3d2eac12005f0ab712baeb3bf09f93ca443b94d6a5371cf16d6a97f4c0e737ca472
-
Filesize
18KB
MD551bb4282005266dad70ef81e908c7d02
SHA189e3f50f86ae65ec14a77fd85a6db74fb435838b
SHA25655adb7108064a78e60cfd9f4ea101da558b738f6cbd5ffa4211906ad738e800b
SHA5122b02df3042d3e701a45a20e440cf77e3762a36c61688270eb49b69164f2ba3d2eac12005f0ab712baeb3bf09f93ca443b94d6a5371cf16d6a97f4c0e737ca472
-
Filesize
18KB
MD5afd585edabc7da5dfd8b9c7757d75ca0
SHA1956416c21d023b25a9069bddaf26e33df92af0c3
SHA256c9b778d26ce56e192b840e80a60d24f76ebec8b2cd1b1c30392bd6433343f135
SHA5129003ed59f1d331bac0620e39cc8142aabb85047a70cb780eb89a790892a4dbc2197cd67a3c51358c35e78f8018a5933b45acfbfd56ed76de077335556431ee2b
-
Filesize
18KB
MD5afd585edabc7da5dfd8b9c7757d75ca0
SHA1956416c21d023b25a9069bddaf26e33df92af0c3
SHA256c9b778d26ce56e192b840e80a60d24f76ebec8b2cd1b1c30392bd6433343f135
SHA5129003ed59f1d331bac0620e39cc8142aabb85047a70cb780eb89a790892a4dbc2197cd67a3c51358c35e78f8018a5933b45acfbfd56ed76de077335556431ee2b
-
Filesize
4.0MB
MD5b09ec6718a34a70a182f3412b89f6777
SHA1e730645db18339897aeddb4f21ce662911e03444
SHA25621c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2
SHA5125d0f9eb9fcfe8a5d6c42db552d35411116ec0b405e747537a75fd50fb6e9f1d1fc1bf95c169c5ef7c2d217b7cc5d647a6ed36f130e0382a71f919c5e09ec7881
-
Filesize
4.0MB
MD5b09ec6718a34a70a182f3412b89f6777
SHA1e730645db18339897aeddb4f21ce662911e03444
SHA25621c2f78a2ba5891c4dbdc1b50283844c7720ecd3f1187fb9269015524cad2da2
SHA5125d0f9eb9fcfe8a5d6c42db552d35411116ec0b405e747537a75fd50fb6e9f1d1fc1bf95c169c5ef7c2d217b7cc5d647a6ed36f130e0382a71f919c5e09ec7881
-
Filesize
71KB
MD56a2c31f3e79e02f1c9cfd86856b3f500
SHA16dc720b0dde45798b8a87f45ffcfef14f62106d5
SHA2561e61931d3d39560b2cc36e64db35a999158d63e68a253378598932e28a06e52e
SHA5126ca3593b27cea6d8d3a8e85df292a9592792d8f396ef74a25e85f6e2f79eb15d20fbe0941f67052468153f23e89b046760e2fa9db151462932494e662a4e408a
-
Filesize
71KB
MD56a2c31f3e79e02f1c9cfd86856b3f500
SHA16dc720b0dde45798b8a87f45ffcfef14f62106d5
SHA2561e61931d3d39560b2cc36e64db35a999158d63e68a253378598932e28a06e52e
SHA5126ca3593b27cea6d8d3a8e85df292a9592792d8f396ef74a25e85f6e2f79eb15d20fbe0941f67052468153f23e89b046760e2fa9db151462932494e662a4e408a
-
Filesize
71KB
MD57a3ba0531c114bd1d437d8efa43df152
SHA18de0f533f44f5fbe1bc3642524f947829c98e151
SHA256bbeda5dad37bb824221d83dcb2867b6c05007be3df1354ff9c8c28d60a1b9820
SHA512d47929706a15b3da41fba601d07b0abc9c6731b08d898560f25b2f89ff876c33c699017aebf63005ce3bce822ae134b2fa02d5bfe79637106a7336ea28d5be67
-
Filesize
71KB
MD57a3ba0531c114bd1d437d8efa43df152
SHA18de0f533f44f5fbe1bc3642524f947829c98e151
SHA256bbeda5dad37bb824221d83dcb2867b6c05007be3df1354ff9c8c28d60a1b9820
SHA512d47929706a15b3da41fba601d07b0abc9c6731b08d898560f25b2f89ff876c33c699017aebf63005ce3bce822ae134b2fa02d5bfe79637106a7336ea28d5be67
-
Filesize
1KB
MD5f0b10ced353cc0cb9297f116aa5d1990
SHA105776891a3a88e15525d5968b1bd918fa5252346
SHA256c6400e3c5c3e957c98c13d683150a5cde51487627f950622f3c61738dcfc7431
SHA512cbdbcdbcd65a39438120da6af2d2b657d0c4ddd174dee1f41a88af47b4952a37584fbb1705141fc5be09893f43ed511bd29180961e8ea25b214abddb813bde49
-
Filesize
1KB
MD5f0b10ced353cc0cb9297f116aa5d1990
SHA105776891a3a88e15525d5968b1bd918fa5252346
SHA256c6400e3c5c3e957c98c13d683150a5cde51487627f950622f3c61738dcfc7431
SHA512cbdbcdbcd65a39438120da6af2d2b657d0c4ddd174dee1f41a88af47b4952a37584fbb1705141fc5be09893f43ed511bd29180961e8ea25b214abddb813bde49