Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
11/09/2022, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
ba3d6c9b734a7c2220390abfe82bc936b3d2d8ba1e7e736f4cf9a263ed4ccca1.exe
Resource
win10-20220812-en
General
-
Target
ba3d6c9b734a7c2220390abfe82bc936b3d2d8ba1e7e736f4cf9a263ed4ccca1.exe
-
Size
716KB
-
MD5
e8fa5cd1687500abe27df1575e785312
-
SHA1
0f4da79a6cd178854e53a2bd86c6984809ba1903
-
SHA256
ba3d6c9b734a7c2220390abfe82bc936b3d2d8ba1e7e736f4cf9a263ed4ccca1
-
SHA512
11aa1706630d3aeed3d791eb4c9309d11acebc2935faa226c8ddbf2a42e01d9dbef375e0879628633a547716a3de5ba4dd8d752726155977832407f68cd3deb0
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4036 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 808 schtasks.exe 1448 schtasks.exe 1860 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4336 powershell.exe 4336 powershell.exe 4336 powershell.exe 2496 powershell.exe 2496 powershell.exe 2496 powershell.exe 1164 powershell.exe 1164 powershell.exe 1164 powershell.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe 4036 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4336 powershell.exe Token: SeDebugPrivilege 3844 ba3d6c9b734a7c2220390abfe82bc936b3d2d8ba1e7e736f4cf9a263ed4ccca1.exe Token: SeDebugPrivilege 2496 powershell.exe Token: SeDebugPrivilege 1164 powershell.exe Token: SeDebugPrivilege 4036 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3844 wrote to memory of 1996 3844 ba3d6c9b734a7c2220390abfe82bc936b3d2d8ba1e7e736f4cf9a263ed4ccca1.exe 66 PID 3844 wrote to memory of 1996 3844 ba3d6c9b734a7c2220390abfe82bc936b3d2d8ba1e7e736f4cf9a263ed4ccca1.exe 66 PID 3844 wrote to memory of 1996 3844 ba3d6c9b734a7c2220390abfe82bc936b3d2d8ba1e7e736f4cf9a263ed4ccca1.exe 66 PID 1996 wrote to memory of 4156 1996 cmd.exe 68 PID 1996 wrote to memory of 4156 1996 cmd.exe 68 PID 1996 wrote to memory of 4156 1996 cmd.exe 68 PID 1996 wrote to memory of 4336 1996 cmd.exe 69 PID 1996 wrote to memory of 4336 1996 cmd.exe 69 PID 1996 wrote to memory of 4336 1996 cmd.exe 69 PID 1996 wrote to memory of 2496 1996 cmd.exe 70 PID 1996 wrote to memory of 2496 1996 cmd.exe 70 PID 1996 wrote to memory of 2496 1996 cmd.exe 70 PID 1996 wrote to memory of 1164 1996 cmd.exe 71 PID 1996 wrote to memory of 1164 1996 cmd.exe 71 PID 1996 wrote to memory of 1164 1996 cmd.exe 71 PID 3844 wrote to memory of 4036 3844 ba3d6c9b734a7c2220390abfe82bc936b3d2d8ba1e7e736f4cf9a263ed4ccca1.exe 72 PID 3844 wrote to memory of 4036 3844 ba3d6c9b734a7c2220390abfe82bc936b3d2d8ba1e7e736f4cf9a263ed4ccca1.exe 72 PID 3844 wrote to memory of 4036 3844 ba3d6c9b734a7c2220390abfe82bc936b3d2d8ba1e7e736f4cf9a263ed4ccca1.exe 72 PID 4036 wrote to memory of 4460 4036 dllhost.exe 73 PID 4036 wrote to memory of 4460 4036 dllhost.exe 73 PID 4036 wrote to memory of 4460 4036 dllhost.exe 73 PID 4036 wrote to memory of 2552 4036 dllhost.exe 74 PID 4036 wrote to memory of 2552 4036 dllhost.exe 74 PID 4036 wrote to memory of 2552 4036 dllhost.exe 74 PID 4036 wrote to memory of 3904 4036 dllhost.exe 94 PID 4036 wrote to memory of 3904 4036 dllhost.exe 94 PID 4036 wrote to memory of 3904 4036 dllhost.exe 94 PID 4036 wrote to memory of 1136 4036 dllhost.exe 93 PID 4036 wrote to memory of 1136 4036 dllhost.exe 93 PID 4036 wrote to memory of 1136 4036 dllhost.exe 93 PID 4036 wrote to memory of 4236 4036 dllhost.exe 75 PID 4036 wrote to memory of 4236 4036 dllhost.exe 75 PID 4036 wrote to memory of 4236 4036 dllhost.exe 75 PID 4036 wrote to memory of 4088 4036 dllhost.exe 76 PID 4036 wrote to memory of 4088 4036 dllhost.exe 76 PID 4036 wrote to memory of 4088 4036 dllhost.exe 76 PID 4036 wrote to memory of 4352 4036 dllhost.exe 77 PID 4036 wrote to memory of 4352 4036 dllhost.exe 77 PID 4036 wrote to memory of 4352 4036 dllhost.exe 77 PID 4036 wrote to memory of 4208 4036 dllhost.exe 78 PID 4036 wrote to memory of 4208 4036 dllhost.exe 78 PID 4036 wrote to memory of 4208 4036 dllhost.exe 78 PID 4036 wrote to memory of 3732 4036 dllhost.exe 90 PID 4036 wrote to memory of 3732 4036 dllhost.exe 90 PID 4036 wrote to memory of 3732 4036 dllhost.exe 90 PID 4036 wrote to memory of 4740 4036 dllhost.exe 80 PID 4036 wrote to memory of 4740 4036 dllhost.exe 80 PID 4036 wrote to memory of 4740 4036 dllhost.exe 80 PID 4036 wrote to memory of 3776 4036 dllhost.exe 81 PID 4036 wrote to memory of 3776 4036 dllhost.exe 81 PID 4036 wrote to memory of 3776 4036 dllhost.exe 81 PID 4036 wrote to memory of 4644 4036 dllhost.exe 82 PID 4036 wrote to memory of 4644 4036 dllhost.exe 82 PID 4036 wrote to memory of 4644 4036 dllhost.exe 82 PID 4460 wrote to memory of 1860 4460 cmd.exe 96 PID 4460 wrote to memory of 1860 4460 cmd.exe 96 PID 4460 wrote to memory of 1860 4460 cmd.exe 96 PID 4208 wrote to memory of 808 4208 cmd.exe 97 PID 4208 wrote to memory of 808 4208 cmd.exe 97 PID 4208 wrote to memory of 808 4208 cmd.exe 97 PID 4740 wrote to memory of 1448 4740 cmd.exe 98 PID 4740 wrote to memory of 1448 4740 cmd.exe 98 PID 4740 wrote to memory of 1448 4740 cmd.exe 98 PID 4036 wrote to memory of 3208 4036 dllhost.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba3d6c9b734a7c2220390abfe82bc936b3d2d8ba1e7e736f4cf9a263ed4ccca1.exe"C:\Users\Admin\AppData\Local\Temp\ba3d6c9b734a7c2220390abfe82bc936b3d2d8ba1e7e736f4cf9a263ed4ccca1.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:4156
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2552
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4236
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4088
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4352
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:808
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk4619" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk4619" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1448
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9500" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3776
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk180" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4644
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk6390" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3732
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1136
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3904
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:3208
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:2568
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:4820
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4608
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:1820
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:420
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
890KB
MD5e7b147ae1df2277650277bee4fa27e44
SHA11a7d89edf4282e6a45108141c10cbad2c0e71254
SHA256f1ce9b2f0b7e929cd2c0a131a432088f246045413e0b6bef2346cb86f4ee06cb
SHA5124bccfcba9e7400dbb2b98539df88f8457288d878c7e51bfb032e7e8b52f1a96190ef6c1b12d61589a27d486ade4bb11e7e00421e7dc5bbf96247145aaa77b4cb
-
Filesize
890KB
MD5e7b147ae1df2277650277bee4fa27e44
SHA11a7d89edf4282e6a45108141c10cbad2c0e71254
SHA256f1ce9b2f0b7e929cd2c0a131a432088f246045413e0b6bef2346cb86f4ee06cb
SHA5124bccfcba9e7400dbb2b98539df88f8457288d878c7e51bfb032e7e8b52f1a96190ef6c1b12d61589a27d486ade4bb11e7e00421e7dc5bbf96247145aaa77b4cb
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD585c265474281e50c42ba4bbd0642092e
SHA13cab209a2e8c954c6020fb9d6ed6c7ea1bcc1941
SHA256b7f861fc85b222cdfa81ed73396dabf2a952daa0b9157e8aac410e147130b4ca
SHA512f3e23c359ebd7d53bbf30f922ce45898e42453adc04493b93bbdc46eb67fa4c7b9c84a4b3f535b612ace47c05fff551b42d60a6259de9f51efa76d7b6203e380
-
Filesize
18KB
MD575e832f90fa6deb81365c381575264d7
SHA135ac3741cfce1accbc3cfa0b96861a189beed799
SHA25649897fdb2d8bba222e88a130cfbd5128afe04671896efbc35d70baf0765c9d04
SHA5126047dbb5b8cc03796aa5c885119553b322cf41ef8bdd5c5b5e73f6226a7d73bb2956696f1ae42fecc50899fe8587cb3c203d4cb70c0453d65dc5efc228e5cd8f