Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06/09/2022, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
4934a9babede2e4e32a6aa5d8fbd7d4b0db3d522b78b5fe2f6f73b12dfd0285c.exe
Resource
win10-20220812-en
General
-
Target
4934a9babede2e4e32a6aa5d8fbd7d4b0db3d522b78b5fe2f6f73b12dfd0285c.exe
-
Size
711KB
-
MD5
f40d956f73295f78b5a296a798a99c21
-
SHA1
917db740652b101a952271c3d009fcd90b7ba41a
-
SHA256
4934a9babede2e4e32a6aa5d8fbd7d4b0db3d522b78b5fe2f6f73b12dfd0285c
-
SHA512
8c6c3dd30958700a05597b6a05285d57562ba191b3a2f351809677b04abca82b56b1e91dc9eb44f366827b4fdd8a83795ef5b6ba373660968990471515bfb5dc
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4112 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2300 schtasks.exe 2552 schtasks.exe 2284 schtasks.exe 4184 schtasks.exe 3184 schtasks.exe 684 schtasks.exe 2296 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4888 powershell.exe 4888 powershell.exe 4888 powershell.exe 504 powershell.exe 504 powershell.exe 504 powershell.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe 4112 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4888 powershell.exe Token: SeDebugPrivilege 1148 4934a9babede2e4e32a6aa5d8fbd7d4b0db3d522b78b5fe2f6f73b12dfd0285c.exe Token: SeDebugPrivilege 504 powershell.exe Token: SeDebugPrivilege 4112 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1148 wrote to memory of 2716 1148 4934a9babede2e4e32a6aa5d8fbd7d4b0db3d522b78b5fe2f6f73b12dfd0285c.exe 66 PID 1148 wrote to memory of 2716 1148 4934a9babede2e4e32a6aa5d8fbd7d4b0db3d522b78b5fe2f6f73b12dfd0285c.exe 66 PID 1148 wrote to memory of 2716 1148 4934a9babede2e4e32a6aa5d8fbd7d4b0db3d522b78b5fe2f6f73b12dfd0285c.exe 66 PID 2716 wrote to memory of 4880 2716 cmd.exe 68 PID 2716 wrote to memory of 4880 2716 cmd.exe 68 PID 2716 wrote to memory of 4880 2716 cmd.exe 68 PID 2716 wrote to memory of 4888 2716 cmd.exe 69 PID 2716 wrote to memory of 4888 2716 cmd.exe 69 PID 2716 wrote to memory of 4888 2716 cmd.exe 69 PID 2716 wrote to memory of 504 2716 cmd.exe 70 PID 2716 wrote to memory of 504 2716 cmd.exe 70 PID 2716 wrote to memory of 504 2716 cmd.exe 70 PID 1148 wrote to memory of 4112 1148 4934a9babede2e4e32a6aa5d8fbd7d4b0db3d522b78b5fe2f6f73b12dfd0285c.exe 71 PID 1148 wrote to memory of 4112 1148 4934a9babede2e4e32a6aa5d8fbd7d4b0db3d522b78b5fe2f6f73b12dfd0285c.exe 71 PID 1148 wrote to memory of 4112 1148 4934a9babede2e4e32a6aa5d8fbd7d4b0db3d522b78b5fe2f6f73b12dfd0285c.exe 71 PID 4112 wrote to memory of 4540 4112 dllhost.exe 72 PID 4112 wrote to memory of 4540 4112 dllhost.exe 72 PID 4112 wrote to memory of 4540 4112 dllhost.exe 72 PID 4112 wrote to memory of 4516 4112 dllhost.exe 73 PID 4112 wrote to memory of 4516 4112 dllhost.exe 73 PID 4112 wrote to memory of 4516 4112 dllhost.exe 73 PID 4112 wrote to memory of 804 4112 dllhost.exe 85 PID 4112 wrote to memory of 804 4112 dllhost.exe 85 PID 4112 wrote to memory of 804 4112 dllhost.exe 85 PID 4112 wrote to memory of 3812 4112 dllhost.exe 74 PID 4112 wrote to memory of 3812 4112 dllhost.exe 74 PID 4112 wrote to memory of 3812 4112 dllhost.exe 74 PID 4112 wrote to memory of 2276 4112 dllhost.exe 75 PID 4112 wrote to memory of 2276 4112 dllhost.exe 75 PID 4112 wrote to memory of 2276 4112 dllhost.exe 75 PID 4112 wrote to memory of 2304 4112 dllhost.exe 76 PID 4112 wrote to memory of 2304 4112 dllhost.exe 76 PID 4112 wrote to memory of 2304 4112 dllhost.exe 76 PID 4112 wrote to memory of 3328 4112 dllhost.exe 84 PID 4112 wrote to memory of 3328 4112 dllhost.exe 84 PID 4112 wrote to memory of 3328 4112 dllhost.exe 84 PID 4112 wrote to memory of 4132 4112 dllhost.exe 77 PID 4112 wrote to memory of 4132 4112 dllhost.exe 77 PID 4112 wrote to memory of 4132 4112 dllhost.exe 77 PID 4112 wrote to memory of 4152 4112 dllhost.exe 81 PID 4112 wrote to memory of 4152 4112 dllhost.exe 81 PID 4112 wrote to memory of 4152 4112 dllhost.exe 81 PID 4112 wrote to memory of 4824 4112 dllhost.exe 79 PID 4112 wrote to memory of 4824 4112 dllhost.exe 79 PID 4112 wrote to memory of 4824 4112 dllhost.exe 79 PID 4112 wrote to memory of 4724 4112 dllhost.exe 86 PID 4112 wrote to memory of 4724 4112 dllhost.exe 86 PID 4112 wrote to memory of 4724 4112 dllhost.exe 86 PID 4112 wrote to memory of 4768 4112 dllhost.exe 92 PID 4112 wrote to memory of 4768 4112 dllhost.exe 92 PID 4112 wrote to memory of 4768 4112 dllhost.exe 92 PID 2276 wrote to memory of 2296 2276 cmd.exe 99 PID 2276 wrote to memory of 2296 2276 cmd.exe 99 PID 2276 wrote to memory of 2296 2276 cmd.exe 99 PID 4152 wrote to memory of 684 4152 cmd.exe 98 PID 4152 wrote to memory of 684 4152 cmd.exe 98 PID 4152 wrote to memory of 684 4152 cmd.exe 98 PID 4132 wrote to memory of 2300 4132 cmd.exe 100 PID 4132 wrote to memory of 2300 4132 cmd.exe 100 PID 4132 wrote to memory of 2300 4132 cmd.exe 100 PID 3812 wrote to memory of 2284 3812 cmd.exe 95 PID 3812 wrote to memory of 2284 3812 cmd.exe 95 PID 3812 wrote to memory of 2284 3812 cmd.exe 95 PID 4540 wrote to memory of 3184 4540 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\4934a9babede2e4e32a6aa5d8fbd7d4b0db3d522b78b5fe2f6f73b12dfd0285c.exe"C:\Users\Admin\AppData\Local\Temp\4934a9babede2e4e32a6aa5d8fbd7d4b0db3d522b78b5fe2f6f73b12dfd0285c.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:4880
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:504
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3184
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4516
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2284
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2296
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2304
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2300
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk8314" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4824
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk767" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk767" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:684
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3328
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:804
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4184
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9811" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4724
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk4745" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4768
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk4745" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2552
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:4536
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:1880
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:984
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:2860
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
877KB
MD5d567d23781c33b3bfe30215e1faec755
SHA173176f30e460122deba73167817393d896d0298e
SHA256002ed9ec3a72e97c37bac676d895e4f6df605bb2e45c4784b1cb48e29c4f35c2
SHA512a9f0456e332944c322c615aa0eee902071a388929db6078152ecbe0e5589224fe0bbab60108d47ea24b17db234f4234786584034919458c3b893a579ad6135d3
-
Filesize
877KB
MD5d567d23781c33b3bfe30215e1faec755
SHA173176f30e460122deba73167817393d896d0298e
SHA256002ed9ec3a72e97c37bac676d895e4f6df605bb2e45c4784b1cb48e29c4f35c2
SHA512a9f0456e332944c322c615aa0eee902071a388929db6078152ecbe0e5589224fe0bbab60108d47ea24b17db234f4234786584034919458c3b893a579ad6135d3
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
Filesize
18KB
MD52ae407c69af8a223d92062da4bd1594f
SHA10cd7864bae833e19f188c96b1ab15eeb9ea5cdd9
SHA256f3d308898a30fbe409158c67a1add06447661fe9ed771874d3ec81dfa851e838
SHA512a5db86a54543f4f112b60fd7b221ac18997db3c5b6bd691fd96e24943bf6a27baa4344d9828d60004efaa4888e088eafb699695cbfca91fd0f0f49e8f4983c19