Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
09/09/2022, 15:37
Static task
static1
Behavioral task
behavioral1
Sample
dc9078cb9607b321b9025d9d32d552329d4112b423a783f15196ccdea3d5d494.exe
Resource
win10-20220812-en
General
-
Target
dc9078cb9607b321b9025d9d32d552329d4112b423a783f15196ccdea3d5d494.exe
-
Size
714KB
-
MD5
433721c4a55cfb7865e1cc3584cd1da2
-
SHA1
0a568e804aaaad7258cb1d9feca69c43582ea42d
-
SHA256
dc9078cb9607b321b9025d9d32d552329d4112b423a783f15196ccdea3d5d494
-
SHA512
d28d3b068fb19607b135e6416d1ddd55ff21160a65de6b2b7170e091230ba76bac53f8695608a824b5a523bac90d5b0334e1335ce48278d447cc336b60e61734
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3092 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4456 schtasks.exe 4692 schtasks.exe 4384 schtasks.exe 2212 schtasks.exe 2188 schtasks.exe 2664 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4368 powershell.exe 4368 powershell.exe 4368 powershell.exe 2660 powershell.exe 2660 powershell.exe 2660 powershell.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe 3092 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4368 powershell.exe Token: SeDebugPrivilege 2500 dc9078cb9607b321b9025d9d32d552329d4112b423a783f15196ccdea3d5d494.exe Token: SeDebugPrivilege 2660 powershell.exe Token: SeDebugPrivilege 3092 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2012 2500 dc9078cb9607b321b9025d9d32d552329d4112b423a783f15196ccdea3d5d494.exe 66 PID 2500 wrote to memory of 2012 2500 dc9078cb9607b321b9025d9d32d552329d4112b423a783f15196ccdea3d5d494.exe 66 PID 2500 wrote to memory of 2012 2500 dc9078cb9607b321b9025d9d32d552329d4112b423a783f15196ccdea3d5d494.exe 66 PID 2012 wrote to memory of 3304 2012 cmd.exe 68 PID 2012 wrote to memory of 3304 2012 cmd.exe 68 PID 2012 wrote to memory of 3304 2012 cmd.exe 68 PID 2012 wrote to memory of 4368 2012 cmd.exe 69 PID 2012 wrote to memory of 4368 2012 cmd.exe 69 PID 2012 wrote to memory of 4368 2012 cmd.exe 69 PID 2012 wrote to memory of 2660 2012 cmd.exe 70 PID 2012 wrote to memory of 2660 2012 cmd.exe 70 PID 2012 wrote to memory of 2660 2012 cmd.exe 70 PID 2500 wrote to memory of 3092 2500 dc9078cb9607b321b9025d9d32d552329d4112b423a783f15196ccdea3d5d494.exe 71 PID 2500 wrote to memory of 3092 2500 dc9078cb9607b321b9025d9d32d552329d4112b423a783f15196ccdea3d5d494.exe 71 PID 2500 wrote to memory of 3092 2500 dc9078cb9607b321b9025d9d32d552329d4112b423a783f15196ccdea3d5d494.exe 71 PID 3092 wrote to memory of 3968 3092 dllhost.exe 72 PID 3092 wrote to memory of 3968 3092 dllhost.exe 72 PID 3092 wrote to memory of 3968 3092 dllhost.exe 72 PID 3092 wrote to memory of 4020 3092 dllhost.exe 74 PID 3092 wrote to memory of 4020 3092 dllhost.exe 74 PID 3092 wrote to memory of 4020 3092 dllhost.exe 74 PID 3092 wrote to memory of 4208 3092 dllhost.exe 73 PID 3092 wrote to memory of 4208 3092 dllhost.exe 73 PID 3092 wrote to memory of 4208 3092 dllhost.exe 73 PID 3092 wrote to memory of 5092 3092 dllhost.exe 75 PID 3092 wrote to memory of 5092 3092 dllhost.exe 75 PID 3092 wrote to memory of 5092 3092 dllhost.exe 75 PID 3092 wrote to memory of 5016 3092 dllhost.exe 76 PID 3092 wrote to memory of 5016 3092 dllhost.exe 76 PID 3092 wrote to memory of 5016 3092 dllhost.exe 76 PID 3092 wrote to memory of 2232 3092 dllhost.exe 78 PID 3092 wrote to memory of 2232 3092 dllhost.exe 78 PID 3092 wrote to memory of 2232 3092 dllhost.exe 78 PID 3092 wrote to memory of 3176 3092 dllhost.exe 79 PID 3092 wrote to memory of 3176 3092 dllhost.exe 79 PID 3092 wrote to memory of 3176 3092 dllhost.exe 79 PID 3092 wrote to memory of 2244 3092 dllhost.exe 85 PID 3092 wrote to memory of 2244 3092 dllhost.exe 85 PID 3092 wrote to memory of 2244 3092 dllhost.exe 85 PID 3092 wrote to memory of 4452 3092 dllhost.exe 84 PID 3092 wrote to memory of 4452 3092 dllhost.exe 84 PID 3092 wrote to memory of 4452 3092 dllhost.exe 84 PID 3092 wrote to memory of 4636 3092 dllhost.exe 83 PID 3092 wrote to memory of 4636 3092 dllhost.exe 83 PID 3092 wrote to memory of 4636 3092 dllhost.exe 83 PID 3092 wrote to memory of 4704 3092 dllhost.exe 87 PID 3092 wrote to memory of 4704 3092 dllhost.exe 87 PID 3092 wrote to memory of 4704 3092 dllhost.exe 87 PID 3092 wrote to memory of 4808 3092 dllhost.exe 88 PID 3092 wrote to memory of 4808 3092 dllhost.exe 88 PID 3092 wrote to memory of 4808 3092 dllhost.exe 88 PID 4208 wrote to memory of 2212 4208 cmd.exe 98 PID 4208 wrote to memory of 2212 4208 cmd.exe 98 PID 4208 wrote to memory of 2212 4208 cmd.exe 98 PID 4020 wrote to memory of 4456 4020 cmd.exe 95 PID 4020 wrote to memory of 4456 4020 cmd.exe 95 PID 4020 wrote to memory of 4456 4020 cmd.exe 95 PID 3968 wrote to memory of 4384 3968 cmd.exe 97 PID 3968 wrote to memory of 4384 3968 cmd.exe 97 PID 3968 wrote to memory of 4384 3968 cmd.exe 97 PID 5016 wrote to memory of 4692 5016 cmd.exe 96 PID 5016 wrote to memory of 4692 5016 cmd.exe 96 PID 5016 wrote to memory of 4692 5016 cmd.exe 96 PID 4808 wrote to memory of 2188 4808 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc9078cb9607b321b9025d9d32d552329d4112b423a783f15196ccdea3d5d494.exe"C:\Users\Admin\AppData\Local\Temp\dc9078cb9607b321b9025d9d32d552329d4112b423a783f15196ccdea3d5d494.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:3304
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4384
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2212
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4456
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:5092
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4692
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2232
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3176
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2664
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk204" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4636
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk9318" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4452
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2244
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk2826" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4704
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk8125" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk8125" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2188
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:600
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:660
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:1588
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4648
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
884KB
MD5c2ff4e5f9aeed8218a91d93cbdbd2212
SHA16ef6ed9d67f99da06fb8c89bf1463d10e25bcfd4
SHA2563433d142d279ae1f36b8bc7c51dbccff9ed520753751e302e070fa076392beeb
SHA5123c2c6181543bd66050bed4b25cd0f13e8442b1444a5ac384af396bfc33dded7330e1906edfbd3e489ddb92431afe2c24d7e0c93f7d201936caf728036b29c4bd
-
Filesize
884KB
MD5c2ff4e5f9aeed8218a91d93cbdbd2212
SHA16ef6ed9d67f99da06fb8c89bf1463d10e25bcfd4
SHA2563433d142d279ae1f36b8bc7c51dbccff9ed520753751e302e070fa076392beeb
SHA5123c2c6181543bd66050bed4b25cd0f13e8442b1444a5ac384af396bfc33dded7330e1906edfbd3e489ddb92431afe2c24d7e0c93f7d201936caf728036b29c4bd
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
Filesize
18KB
MD5fbdae60fa9da656c5eeafbf351e9732d
SHA1d909813790393215dca194cf7209cf3222cf672d
SHA256575f0f3be93ce84762dc93c9200993c44d663947973fe48901ab9d201f4197e0
SHA512928bf1bb5c3d89d2f20895aed916f2421b38be9f38b5503e0080415adce578b7d080529f714cc14d495109c61965fbd5ce79b964f5bfc3b988cb819eb94c9465