Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
07/09/2022, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
81300f78cc98e5c85fac771a022a06e65c0398a7d34e3296e094e698e4dac3c4.exe
Resource
win10-20220812-en
General
-
Target
81300f78cc98e5c85fac771a022a06e65c0398a7d34e3296e094e698e4dac3c4.exe
-
Size
711KB
-
MD5
b21cbf76ab4a71470c0465f51405aea1
-
SHA1
b7545ed6c06f87ab73b305e115af29761ce7148a
-
SHA256
81300f78cc98e5c85fac771a022a06e65c0398a7d34e3296e094e698e4dac3c4
-
SHA512
5970fd53444da8c8ad7f2bbdec251ba34faa90cc6f50cc6ce44fb67a91b56d2ae6439f724a1021c664affc2745e3f5389e246e867bfd7e16ae265cf27e7337f0
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1788 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3956 schtasks.exe 4548 schtasks.exe 4980 schtasks.exe 4372 schtasks.exe 4604 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2928 powershell.exe 2928 powershell.exe 2928 powershell.exe 2424 powershell.exe 2424 powershell.exe 2424 powershell.exe 1380 powershell.exe 1380 powershell.exe 1380 powershell.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe 1788 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2928 powershell.exe Token: SeDebugPrivilege 2700 81300f78cc98e5c85fac771a022a06e65c0398a7d34e3296e094e698e4dac3c4.exe Token: SeDebugPrivilege 2424 powershell.exe Token: SeDebugPrivilege 1380 powershell.exe Token: SeDebugPrivilege 1788 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2700 wrote to memory of 4708 2700 81300f78cc98e5c85fac771a022a06e65c0398a7d34e3296e094e698e4dac3c4.exe 66 PID 2700 wrote to memory of 4708 2700 81300f78cc98e5c85fac771a022a06e65c0398a7d34e3296e094e698e4dac3c4.exe 66 PID 2700 wrote to memory of 4708 2700 81300f78cc98e5c85fac771a022a06e65c0398a7d34e3296e094e698e4dac3c4.exe 66 PID 4708 wrote to memory of 4664 4708 cmd.exe 68 PID 4708 wrote to memory of 4664 4708 cmd.exe 68 PID 4708 wrote to memory of 4664 4708 cmd.exe 68 PID 4708 wrote to memory of 2928 4708 cmd.exe 69 PID 4708 wrote to memory of 2928 4708 cmd.exe 69 PID 4708 wrote to memory of 2928 4708 cmd.exe 69 PID 4708 wrote to memory of 2424 4708 cmd.exe 70 PID 4708 wrote to memory of 2424 4708 cmd.exe 70 PID 4708 wrote to memory of 2424 4708 cmd.exe 70 PID 4708 wrote to memory of 1380 4708 cmd.exe 71 PID 4708 wrote to memory of 1380 4708 cmd.exe 71 PID 4708 wrote to memory of 1380 4708 cmd.exe 71 PID 2700 wrote to memory of 1788 2700 81300f78cc98e5c85fac771a022a06e65c0398a7d34e3296e094e698e4dac3c4.exe 72 PID 2700 wrote to memory of 1788 2700 81300f78cc98e5c85fac771a022a06e65c0398a7d34e3296e094e698e4dac3c4.exe 72 PID 2700 wrote to memory of 1788 2700 81300f78cc98e5c85fac771a022a06e65c0398a7d34e3296e094e698e4dac3c4.exe 72 PID 1788 wrote to memory of 4364 1788 dllhost.exe 73 PID 1788 wrote to memory of 4364 1788 dllhost.exe 73 PID 1788 wrote to memory of 4364 1788 dllhost.exe 73 PID 1788 wrote to memory of 4460 1788 dllhost.exe 74 PID 1788 wrote to memory of 4460 1788 dllhost.exe 74 PID 1788 wrote to memory of 4460 1788 dllhost.exe 74 PID 1788 wrote to memory of 4060 1788 dllhost.exe 75 PID 1788 wrote to memory of 4060 1788 dllhost.exe 75 PID 1788 wrote to memory of 4060 1788 dllhost.exe 75 PID 1788 wrote to memory of 2152 1788 dllhost.exe 76 PID 1788 wrote to memory of 2152 1788 dllhost.exe 76 PID 1788 wrote to memory of 2152 1788 dllhost.exe 76 PID 1788 wrote to memory of 4780 1788 dllhost.exe 77 PID 1788 wrote to memory of 4780 1788 dllhost.exe 77 PID 1788 wrote to memory of 4780 1788 dllhost.exe 77 PID 1788 wrote to memory of 5048 1788 dllhost.exe 78 PID 1788 wrote to memory of 5048 1788 dllhost.exe 78 PID 1788 wrote to memory of 5048 1788 dllhost.exe 78 PID 1788 wrote to memory of 2208 1788 dllhost.exe 96 PID 1788 wrote to memory of 2208 1788 dllhost.exe 96 PID 1788 wrote to memory of 2208 1788 dllhost.exe 96 PID 1788 wrote to memory of 1356 1788 dllhost.exe 94 PID 1788 wrote to memory of 1356 1788 dllhost.exe 94 PID 1788 wrote to memory of 1356 1788 dllhost.exe 94 PID 1788 wrote to memory of 5012 1788 dllhost.exe 81 PID 1788 wrote to memory of 5012 1788 dllhost.exe 81 PID 1788 wrote to memory of 5012 1788 dllhost.exe 81 PID 1788 wrote to memory of 1688 1788 dllhost.exe 92 PID 1788 wrote to memory of 1688 1788 dllhost.exe 92 PID 1788 wrote to memory of 1688 1788 dllhost.exe 92 PID 1788 wrote to memory of 4104 1788 dllhost.exe 91 PID 1788 wrote to memory of 4104 1788 dllhost.exe 91 PID 1788 wrote to memory of 4104 1788 dllhost.exe 91 PID 1788 wrote to memory of 3576 1788 dllhost.exe 84 PID 1788 wrote to memory of 3576 1788 dllhost.exe 84 PID 1788 wrote to memory of 3576 1788 dllhost.exe 84 PID 4060 wrote to memory of 4980 4060 cmd.exe 99 PID 4060 wrote to memory of 4980 4060 cmd.exe 99 PID 4060 wrote to memory of 4980 4060 cmd.exe 99 PID 4364 wrote to memory of 3956 4364 cmd.exe 97 PID 4364 wrote to memory of 3956 4364 cmd.exe 97 PID 4364 wrote to memory of 3956 4364 cmd.exe 97 PID 4460 wrote to memory of 4548 4460 cmd.exe 98 PID 4460 wrote to memory of 4548 4460 cmd.exe 98 PID 4460 wrote to memory of 4548 4460 cmd.exe 98 PID 4780 wrote to memory of 4372 4780 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\81300f78cc98e5c85fac771a022a06e65c0398a7d34e3296e094e698e4dac3c4.exe"C:\Users\Admin\AppData\Local\Temp\81300f78cc98e5c85fac771a022a06e65c0398a7d34e3296e094e698e4dac3c4.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:4664
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3956
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4548
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4980
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2152
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4372
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:5048
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk4276" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:5012
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3281" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3576
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk4473" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4104
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk9271" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1688
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk9271" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4604
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1356
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2208
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:4808
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4360
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:3188
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:968
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:3932
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:5068
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
877KB
MD571041bd35b81281ad45762341fc06f03
SHA1e4126ba6742919c7e93ee7c1a793e8f4da75e6ea
SHA256e3e62c2af70211803d7ebb72dcdcda2bd6556a6720fcbfc3d60efe65c30e9fe2
SHA5124e88ba1eaf94992864314c18d747934cb466d2ac95066292d3f5d2c9a1e80b4e26bd62945a0ac854b1b41d8577e246daea4c1ac4e8fc868e43ee6321489ed7ea
-
Filesize
877KB
MD571041bd35b81281ad45762341fc06f03
SHA1e4126ba6742919c7e93ee7c1a793e8f4da75e6ea
SHA256e3e62c2af70211803d7ebb72dcdcda2bd6556a6720fcbfc3d60efe65c30e9fe2
SHA5124e88ba1eaf94992864314c18d747934cb466d2ac95066292d3f5d2c9a1e80b4e26bd62945a0ac854b1b41d8577e246daea4c1ac4e8fc868e43ee6321489ed7ea
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD5f7676e673e8e598b5ac2f1b6be51b0cb
SHA1d8bde18fbbddaad41ea28eab973381b39965a458
SHA25602d928b2604c46278036919073588ae07c4113c7cda3212fe8c905de2efc54ab
SHA5124bbbb1f2e31bea9ee9cf4f7860e3d513ec146de7a034dc38351d8c530eca38abae431fc1935e6ccc81914105d41dc1c6a5ae47a2c22e50bec2bfec69834416fe
-
Filesize
18KB
MD5e482a1167b2d3d9c788f0d75260cd75f
SHA10ccd407d62db5a6640e44626ba545a797bc7f95e
SHA256734d7d534a9c351550862f5b464b9524c07bd201661fcbce87b8ab4ab2944c41
SHA512b36468ce01e9a82aad675b5472e368feb5dcce0012b02051bb3ddecb6677d6f81d04a68904bb6dc4ad5c2fe0369c7ef9c98a63671c68774eb5ad83747273e9b7