Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2022 20:54
Behavioral task
behavioral1
Sample
taskhostw.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
taskhostw.exe
Resource
win10v2004-20220812-en
General
-
Target
taskhostw.exe
-
Size
44.5MB
-
MD5
c80de2166e297418ceac6dd1e3733f09
-
SHA1
e4bd7d38e3dc7ca0d9b85d2b20b7a9f012ea1a82
-
SHA256
4116562a1ee0fa7fc1119971b1c73afca0bb4e45104948d3b61303fbbab64660
-
SHA512
27a85b4e16953fc83160cc76557855624e1780ac62aeae46d98a6b0a117772122c60e08d707ed29ad6e2d7a66f47eec45abc03634efd5cf555834df423866f85
-
SSDEEP
786432:cgJ9RzMFawRf0ac415LIzsW0w/+bm+5qGwMEeBkmM3g6F388qkEfEs8Ne7Ctwy:cGMYO+4hw/+r03MEeBNIT388va5WWy
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
taskhostw.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostw.exe -
Drops file in Drivers directory 1 IoCs
Processes:
taskhostw.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts taskhostw.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
taskhostw.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostw.exe -
Processes:
resource yara_rule behavioral2/memory/2512-132-0x00007FF704520000-0x00007FF707A8D000-memory.dmp themida behavioral2/memory/2512-134-0x00007FF704520000-0x00007FF707A8D000-memory.dmp themida behavioral2/memory/2512-135-0x00007FF704520000-0x00007FF707A8D000-memory.dmp themida behavioral2/memory/2512-136-0x00007FF704520000-0x00007FF707A8D000-memory.dmp themida behavioral2/memory/2512-137-0x00007FF704520000-0x00007FF707A8D000-memory.dmp themida behavioral2/memory/2512-138-0x00007FF704520000-0x00007FF707A8D000-memory.dmp themida behavioral2/memory/2512-139-0x00007FF704520000-0x00007FF707A8D000-memory.dmp themida behavioral2/memory/2512-140-0x00007FF704520000-0x00007FF707A8D000-memory.dmp themida behavioral2/memory/2512-141-0x00007FF704520000-0x00007FF707A8D000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
taskhostw.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run taskhostw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio = "C:\\ProgramData\\RealtekHD\\taskhostw.exe" taskhostw.exe -
Processes:
taskhostw.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/2512-135-0x00007FF704520000-0x00007FF707A8D000-memory.dmp autoit_exe behavioral2/memory/2512-136-0x00007FF704520000-0x00007FF707A8D000-memory.dmp autoit_exe behavioral2/memory/2512-137-0x00007FF704520000-0x00007FF707A8D000-memory.dmp autoit_exe behavioral2/memory/2512-138-0x00007FF704520000-0x00007FF707A8D000-memory.dmp autoit_exe behavioral2/memory/2512-139-0x00007FF704520000-0x00007FF707A8D000-memory.dmp autoit_exe behavioral2/memory/2512-140-0x00007FF704520000-0x00007FF707A8D000-memory.dmp autoit_exe behavioral2/memory/2512-141-0x00007FF704520000-0x00007FF707A8D000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
taskhostw.exepid process 2512 taskhostw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskhostw.exepid process 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe 2512 taskhostw.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskhostw.exepid process 2512 taskhostw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\taskhostw.exe"C:\Users\Admin\AppData\Local\Temp\taskhostw.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2512