Analysis
-
max time kernel
300s -
max time network
271s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
16/09/2022, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe
Resource
win10-20220901-en
General
-
Target
517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe
-
Size
72KB
-
MD5
cbd413acc2ea9f241888e7e735b1ffee
-
SHA1
17c6239d14f8d78e45158e982494c910bc1aeeda
-
SHA256
517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc
-
SHA512
79985342269e514301040b502648d3dc6a9a4e020036ba82e898d8cdeeafa208227ad99b6850fa338cfb6f2d79e1fb79234e79bd0ff97dab83966407fcfc0f29
-
SSDEEP
1536:Ori+Y9uzEJnM7n9aLf8n7j8zbr2Iout+NE8EXra:OhY9VMLI8n7Izbr2Iout+NiO
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/files/0x000600000001b018-1135.dat xmrig behavioral2/files/0x000600000001b018-1136.dat xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 3968 dllhost.exe 788 winlogson.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe / file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2212 schtasks.exe 4004 schtasks.exe 1180 schtasks.exe 3200 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2744 517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe 4112 powershell.exe 4112 powershell.exe 4112 powershell.exe 2132 powershell.exe 2132 powershell.exe 2132 powershell.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe 3968 dllhost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 628 Process not Found -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2744 517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe Token: SeDebugPrivilege 4112 powershell.exe Token: SeDebugPrivilege 2132 powershell.exe Token: SeDebugPrivilege 3968 dllhost.exe Token: SeLockMemoryPrivilege 788 winlogson.exe Token: SeLockMemoryPrivilege 788 winlogson.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 788 winlogson.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2744 wrote to memory of 4608 2744 517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe 68 PID 2744 wrote to memory of 4608 2744 517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe 68 PID 2744 wrote to memory of 4608 2744 517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe 68 PID 4608 wrote to memory of 4672 4608 cmd.exe 70 PID 4608 wrote to memory of 4672 4608 cmd.exe 70 PID 4608 wrote to memory of 4672 4608 cmd.exe 70 PID 4608 wrote to memory of 4112 4608 cmd.exe 71 PID 4608 wrote to memory of 4112 4608 cmd.exe 71 PID 4608 wrote to memory of 4112 4608 cmd.exe 71 PID 4608 wrote to memory of 2132 4608 cmd.exe 72 PID 4608 wrote to memory of 2132 4608 cmd.exe 72 PID 4608 wrote to memory of 2132 4608 cmd.exe 72 PID 2744 wrote to memory of 3968 2744 517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe 73 PID 2744 wrote to memory of 3968 2744 517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe 73 PID 2744 wrote to memory of 3968 2744 517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe 73 PID 3968 wrote to memory of 1032 3968 dllhost.exe 74 PID 3968 wrote to memory of 1032 3968 dllhost.exe 74 PID 3968 wrote to memory of 1032 3968 dllhost.exe 74 PID 3968 wrote to memory of 320 3968 dllhost.exe 75 PID 3968 wrote to memory of 320 3968 dllhost.exe 75 PID 3968 wrote to memory of 320 3968 dllhost.exe 75 PID 3968 wrote to memory of 1680 3968 dllhost.exe 76 PID 3968 wrote to memory of 1680 3968 dllhost.exe 76 PID 3968 wrote to memory of 1680 3968 dllhost.exe 76 PID 3968 wrote to memory of 304 3968 dllhost.exe 80 PID 3968 wrote to memory of 304 3968 dllhost.exe 80 PID 3968 wrote to memory of 304 3968 dllhost.exe 80 PID 3968 wrote to memory of 3300 3968 dllhost.exe 77 PID 3968 wrote to memory of 3300 3968 dllhost.exe 77 PID 3968 wrote to memory of 3300 3968 dllhost.exe 77 PID 3968 wrote to memory of 2220 3968 dllhost.exe 79 PID 3968 wrote to memory of 2220 3968 dllhost.exe 79 PID 3968 wrote to memory of 2220 3968 dllhost.exe 79 PID 3968 wrote to memory of 1788 3968 dllhost.exe 82 PID 3968 wrote to memory of 1788 3968 dllhost.exe 82 PID 3968 wrote to memory of 1788 3968 dllhost.exe 82 PID 3968 wrote to memory of 2088 3968 dllhost.exe 91 PID 3968 wrote to memory of 2088 3968 dllhost.exe 91 PID 3968 wrote to memory of 2088 3968 dllhost.exe 91 PID 3968 wrote to memory of 2200 3968 dllhost.exe 87 PID 3968 wrote to memory of 2200 3968 dllhost.exe 87 PID 3968 wrote to memory of 2200 3968 dllhost.exe 87 PID 3968 wrote to memory of 3416 3968 dllhost.exe 86 PID 3968 wrote to memory of 3416 3968 dllhost.exe 86 PID 3968 wrote to memory of 3416 3968 dllhost.exe 86 PID 3968 wrote to memory of 3964 3968 dllhost.exe 88 PID 3968 wrote to memory of 3964 3968 dllhost.exe 88 PID 3968 wrote to memory of 3964 3968 dllhost.exe 88 PID 3968 wrote to memory of 2596 3968 dllhost.exe 89 PID 3968 wrote to memory of 2596 3968 dllhost.exe 89 PID 3968 wrote to memory of 2596 3968 dllhost.exe 89 PID 1032 wrote to memory of 2212 1032 cmd.exe 98 PID 1032 wrote to memory of 2212 1032 cmd.exe 98 PID 1032 wrote to memory of 2212 1032 cmd.exe 98 PID 1788 wrote to memory of 4004 1788 cmd.exe 99 PID 1788 wrote to memory of 4004 1788 cmd.exe 99 PID 1788 wrote to memory of 4004 1788 cmd.exe 99 PID 2220 wrote to memory of 1180 2220 cmd.exe 100 PID 2220 wrote to memory of 1180 2220 cmd.exe 100 PID 2220 wrote to memory of 1180 2220 cmd.exe 100 PID 2200 wrote to memory of 3200 2200 cmd.exe 101 PID 2200 wrote to memory of 3200 2200 cmd.exe 101 PID 2200 wrote to memory of 3200 2200 cmd.exe 101 PID 3968 wrote to memory of 204 3968 dllhost.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe"C:\Users\Admin\AppData\Local\Temp\517fc88e9ea298cc1310657c46100319ddee92f86b3ac29fdc9244b4d6b1aefc.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData"2⤵
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:4672
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2212
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:320
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1680
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3300
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1180
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:304
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4004
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk1367" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3416
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk7179" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk7179" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3200
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk7973" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3964
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk594" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2596
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2088
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json3⤵PID:204
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json3⤵PID:1704
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:748
-
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe -c config.json4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:788
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5867daf758e471cf769fd32fd29d9f492
SHA1c92a3fe10ccba22318a4d2b1dafc41f58dc46ab9
SHA2567377aa70b1775c0a5fd0ad6d274b2d9ce11e5a0a417eaca88924d619ab294054
SHA51296447dad486a55c0f2c4e6286e350e6557f00031f850c39cec38a127257bcda42910669a6b06fe02b747f3ffb59ee70f2bb535682735a5f084ed4f64570bf671
-
Filesize
80KB
MD5867daf758e471cf769fd32fd29d9f492
SHA1c92a3fe10ccba22318a4d2b1dafc41f58dc46ab9
SHA2567377aa70b1775c0a5fd0ad6d274b2d9ce11e5a0a417eaca88924d619ab294054
SHA51296447dad486a55c0f2c4e6286e350e6557f00031f850c39cec38a127257bcda42910669a6b06fe02b747f3ffb59ee70f2bb535682735a5f084ed4f64570bf671
-
Filesize
5.1MB
MD52a0d26b8b02bb2d17994d2a9a38d61db
SHA1889a9cb0a044c1f675e63ea6ea065a8cf914e2ab
SHA2563c54646213638e7bd8d0538c28e414824f5eaf31faf19a40eec608179b1074f1
SHA51207245fb329b5fc9b68e1e88a52b7ab464bafd45442193e4b61cf6788ec0e10cdec2cfa2f59f49fe4a3f8a78a205d62ec0701a3b82a5e8f4257016821fee524ee
-
Filesize
5.1MB
MD52a0d26b8b02bb2d17994d2a9a38d61db
SHA1889a9cb0a044c1f675e63ea6ea065a8cf914e2ab
SHA2563c54646213638e7bd8d0538c28e414824f5eaf31faf19a40eec608179b1074f1
SHA51207245fb329b5fc9b68e1e88a52b7ab464bafd45442193e4b61cf6788ec0e10cdec2cfa2f59f49fe4a3f8a78a205d62ec0701a3b82a5e8f4257016821fee524ee
-
Filesize
311B
MD5eced04709d59f36a68146129dd12b3c8
SHA117b5d51935398d0ed6e240dd304cecf3cda29299
SHA256d0ad369683b9fec5a4f947cd8b943d10b0b86c7c3fd6e7d4978949eac8dbb0fd
SHA512ffdd7647b39dc0b0e3a9e0e536c309d1519383e69d1cc52fd7aade3e8737bce761e3314e83c8b92441376d4b50c409bd27d2b2da017a3979514d8ef1eefda285
-
Filesize
1KB
MD519b0b20b6d51ad83568c89fa6b110407
SHA1ac17a7051b2b8a380c6376711c1925cd81b2fb20
SHA2564d49441abf46930296aca0f7f521bf94800d7c9dc65e49d649e7865491a64f3e
SHA512861f259e2f4c8a7f6da82b8b36f41f3581acc667c68e764e2079808312a5cf80e82efbad26e64a430e22e37b405c3706bd1c2798c32087df901255332df90107
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD5c1aa014723bf5f6c7c1549a69c580321
SHA1f8d2a90204ba194c6a627c40f9c443c126b8257c
SHA2560f0ead4b0ed0e7690551f0e276ba70d109223c16a5535cb6b4f36018fdc3bc50
SHA5123995ef85bb24496823257dfeddb79cfbde39d1edf3a794e98d0e218c2fd88c9b1eec64a62ade541cc7cfe725fbe3f9ac7a85b40e9bf3755b8d868fb0bfc2e10c