Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
11/09/2022, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
d5a4818b7ebbf62025635c4d91f429f97b70fd33b5cd9f898a92a6d31b29c204.exe
Resource
win10-20220812-en
General
-
Target
d5a4818b7ebbf62025635c4d91f429f97b70fd33b5cd9f898a92a6d31b29c204.exe
-
Size
716KB
-
MD5
eea9cfbeeec946cffe0d6778145e8c34
-
SHA1
500b530217ad62f20dabd417c55f548058bae4a1
-
SHA256
d5a4818b7ebbf62025635c4d91f429f97b70fd33b5cd9f898a92a6d31b29c204
-
SHA512
99987db272a35d9dcd2dd4ba826a14fca459547cd3e8cc75f9620674aa86dfe78314afafa5bb8030d518c3d5b0f610dc63653eda0cdf5c82dfd1fe30cd6291f5
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4308 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3960 schtasks.exe 1868 schtasks.exe 4284 schtasks.exe 4036 schtasks.exe 2412 schtasks.exe 3976 schtasks.exe 3856 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3712 powershell.exe 3712 powershell.exe 3712 powershell.exe 2672 powershell.exe 2672 powershell.exe 2672 powershell.exe 1260 powershell.exe 1260 powershell.exe 1260 powershell.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe 4308 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3712 powershell.exe Token: SeDebugPrivilege 3040 d5a4818b7ebbf62025635c4d91f429f97b70fd33b5cd9f898a92a6d31b29c204.exe Token: SeDebugPrivilege 2672 powershell.exe Token: SeDebugPrivilege 1260 powershell.exe Token: SeDebugPrivilege 4308 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3040 wrote to memory of 4104 3040 d5a4818b7ebbf62025635c4d91f429f97b70fd33b5cd9f898a92a6d31b29c204.exe 66 PID 3040 wrote to memory of 4104 3040 d5a4818b7ebbf62025635c4d91f429f97b70fd33b5cd9f898a92a6d31b29c204.exe 66 PID 3040 wrote to memory of 4104 3040 d5a4818b7ebbf62025635c4d91f429f97b70fd33b5cd9f898a92a6d31b29c204.exe 66 PID 4104 wrote to memory of 2880 4104 cmd.exe 68 PID 4104 wrote to memory of 2880 4104 cmd.exe 68 PID 4104 wrote to memory of 2880 4104 cmd.exe 68 PID 4104 wrote to memory of 3712 4104 cmd.exe 69 PID 4104 wrote to memory of 3712 4104 cmd.exe 69 PID 4104 wrote to memory of 3712 4104 cmd.exe 69 PID 4104 wrote to memory of 2672 4104 cmd.exe 70 PID 4104 wrote to memory of 2672 4104 cmd.exe 70 PID 4104 wrote to memory of 2672 4104 cmd.exe 70 PID 4104 wrote to memory of 1260 4104 cmd.exe 71 PID 4104 wrote to memory of 1260 4104 cmd.exe 71 PID 4104 wrote to memory of 1260 4104 cmd.exe 71 PID 3040 wrote to memory of 4308 3040 d5a4818b7ebbf62025635c4d91f429f97b70fd33b5cd9f898a92a6d31b29c204.exe 72 PID 3040 wrote to memory of 4308 3040 d5a4818b7ebbf62025635c4d91f429f97b70fd33b5cd9f898a92a6d31b29c204.exe 72 PID 3040 wrote to memory of 4308 3040 d5a4818b7ebbf62025635c4d91f429f97b70fd33b5cd9f898a92a6d31b29c204.exe 72 PID 4308 wrote to memory of 4816 4308 dllhost.exe 73 PID 4308 wrote to memory of 4816 4308 dllhost.exe 73 PID 4308 wrote to memory of 4816 4308 dllhost.exe 73 PID 4308 wrote to memory of 4820 4308 dllhost.exe 74 PID 4308 wrote to memory of 4820 4308 dllhost.exe 74 PID 4308 wrote to memory of 4820 4308 dllhost.exe 74 PID 4308 wrote to memory of 4852 4308 dllhost.exe 75 PID 4308 wrote to memory of 4852 4308 dllhost.exe 75 PID 4308 wrote to memory of 4852 4308 dllhost.exe 75 PID 4308 wrote to memory of 4844 4308 dllhost.exe 76 PID 4308 wrote to memory of 4844 4308 dllhost.exe 76 PID 4308 wrote to memory of 4844 4308 dllhost.exe 76 PID 4308 wrote to memory of 4780 4308 dllhost.exe 77 PID 4308 wrote to memory of 4780 4308 dllhost.exe 77 PID 4308 wrote to memory of 4780 4308 dllhost.exe 77 PID 4308 wrote to memory of 396 4308 dllhost.exe 78 PID 4308 wrote to memory of 396 4308 dllhost.exe 78 PID 4308 wrote to memory of 396 4308 dllhost.exe 78 PID 4308 wrote to memory of 676 4308 dllhost.exe 79 PID 4308 wrote to memory of 676 4308 dllhost.exe 79 PID 4308 wrote to memory of 676 4308 dllhost.exe 79 PID 4308 wrote to memory of 1428 4308 dllhost.exe 80 PID 4308 wrote to memory of 1428 4308 dllhost.exe 80 PID 4308 wrote to memory of 1428 4308 dllhost.exe 80 PID 4308 wrote to memory of 5076 4308 dllhost.exe 81 PID 4308 wrote to memory of 5076 4308 dllhost.exe 81 PID 4308 wrote to memory of 5076 4308 dllhost.exe 81 PID 4308 wrote to memory of 2532 4308 dllhost.exe 93 PID 4308 wrote to memory of 2532 4308 dllhost.exe 93 PID 4308 wrote to memory of 2532 4308 dllhost.exe 93 PID 4308 wrote to memory of 1160 4308 dllhost.exe 83 PID 4308 wrote to memory of 1160 4308 dllhost.exe 83 PID 4308 wrote to memory of 1160 4308 dllhost.exe 83 PID 4308 wrote to memory of 1432 4308 dllhost.exe 87 PID 4308 wrote to memory of 1432 4308 dllhost.exe 87 PID 4308 wrote to memory of 1432 4308 dllhost.exe 87 PID 4820 wrote to memory of 4036 4820 cmd.exe 99 PID 4820 wrote to memory of 4036 4820 cmd.exe 99 PID 4820 wrote to memory of 4036 4820 cmd.exe 99 PID 4844 wrote to memory of 1868 4844 cmd.exe 97 PID 4844 wrote to memory of 1868 4844 cmd.exe 97 PID 4844 wrote to memory of 1868 4844 cmd.exe 97 PID 4816 wrote to memory of 4284 4816 cmd.exe 98 PID 4816 wrote to memory of 4284 4816 cmd.exe 98 PID 4816 wrote to memory of 4284 4816 cmd.exe 98 PID 4780 wrote to memory of 2412 4780 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5a4818b7ebbf62025635c4d91f429f97b70fd33b5cd9f898a92a6d31b29c204.exe"C:\Users\Admin\AppData\Local\Temp\d5a4818b7ebbf62025635c4d91f429f97b70fd33b5cd9f898a92a6d31b29c204.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:2880
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4284
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4036
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4852
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1868
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2412
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:396
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3976
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:676
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1428
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3856
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk709" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:5076
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk1879" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1160
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk2872" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1432
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk2872" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3960
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk5113" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2532
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:3116
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:2600
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:4540
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4984
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:5024
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:584
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
890KB
MD566c0fc6f8a012a438398cc447c7f7bab
SHA132d86eba176eb408a34d3390b17e19183fc1a14a
SHA256168aa45539c782947ee0c1adb3665468467c27fc98e1306a63298af7f3fd286c
SHA51221f1add6b98fd7c95c1190f34f8c8a57f974e7b0a49e00f51a0fafcf3e976f44cb45912d4539226d94c302fe72efeb73648be12ec1657e4b0f0878a160cc1f10
-
Filesize
890KB
MD566c0fc6f8a012a438398cc447c7f7bab
SHA132d86eba176eb408a34d3390b17e19183fc1a14a
SHA256168aa45539c782947ee0c1adb3665468467c27fc98e1306a63298af7f3fd286c
SHA51221f1add6b98fd7c95c1190f34f8c8a57f974e7b0a49e00f51a0fafcf3e976f44cb45912d4539226d94c302fe72efeb73648be12ec1657e4b0f0878a160cc1f10
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD53619bf61dac40c5a4e1da5491ad5b017
SHA15a15330d807ca3a34c571f1db2be532d1241f351
SHA2562faa6afe9921eb1b5ec7305db2b09c4fb219d44b19510c2a82a7c0d0b5977c00
SHA51267e860ea794d3e55a7b95f2a3fb92d9f51989921c6fc479ddddeb3df353861b4a790a56e354600d6c9335d08423c6973ffdd8351c1e8cd63aa4d2cf693cc5292
-
Filesize
18KB
MD5ea002c10b1c9ef58124f54a0a1b7722e
SHA13f69c010ed52cf89fbd2cc26a83d4bd3fef5c6b3
SHA256861e69bdaa25292db60706273b9d44b44bec9329b5c48a2f9e0690933f916489
SHA512d7d3f682166ac03efba98fb5eb6c589be7b889a46f46a648a95f9c7c082bca8d409786164b0c1e19039ae4ebca370425c26443c7321c707c5f67b9c82a99bf2a