Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
18-09-2022 01:06
Static task
static1
Behavioral task
behavioral1
Sample
0d168fde3676899c1387ccd17587959e9df7037d6a91f8af5f832c1e179fbcb8.exe
Resource
win10-20220812-en
General
-
Target
0d168fde3676899c1387ccd17587959e9df7037d6a91f8af5f832c1e179fbcb8.exe
-
Size
720KB
-
MD5
b33e4d646a7893230f092eab995b02f9
-
SHA1
408d9728f5a679722bf755a6f66a32fb320eb5fd
-
SHA256
0d168fde3676899c1387ccd17587959e9df7037d6a91f8af5f832c1e179fbcb8
-
SHA512
760817581c21205775d887b093b0bb39483af75a4b436ace1e77111be2ff26d9f4c164b8542f29a81f0f05ef5b2c6c28f05ed33a4ec29364db90ead6b228163f
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4668 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3996 schtasks.exe 3960 schtasks.exe 4052 schtasks.exe 3536 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3488 powershell.exe 3488 powershell.exe 3488 powershell.exe 2540 powershell.exe 2540 powershell.exe 2540 powershell.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 2248 powershell.exe 4668 dllhost.exe 4668 dllhost.exe 4676 wermgr.exe 4676 wermgr.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3488 powershell.exe Token: SeDebugPrivilege 2976 0d168fde3676899c1387ccd17587959e9df7037d6a91f8af5f832c1e179fbcb8.exe Token: SeDebugPrivilege 2540 powershell.exe Token: SeDebugPrivilege 4668 dllhost.exe Token: SeDebugPrivilege 2248 powershell.exe Token: SeRestorePrivilege 2248 powershell.exe Token: SeBackupPrivilege 2248 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2976 wrote to memory of 4964 2976 0d168fde3676899c1387ccd17587959e9df7037d6a91f8af5f832c1e179fbcb8.exe 66 PID 2976 wrote to memory of 4964 2976 0d168fde3676899c1387ccd17587959e9df7037d6a91f8af5f832c1e179fbcb8.exe 66 PID 2976 wrote to memory of 4964 2976 0d168fde3676899c1387ccd17587959e9df7037d6a91f8af5f832c1e179fbcb8.exe 66 PID 4964 wrote to memory of 4396 4964 cmd.exe 68 PID 4964 wrote to memory of 4396 4964 cmd.exe 68 PID 4964 wrote to memory of 4396 4964 cmd.exe 68 PID 4964 wrote to memory of 3488 4964 cmd.exe 69 PID 4964 wrote to memory of 3488 4964 cmd.exe 69 PID 4964 wrote to memory of 3488 4964 cmd.exe 69 PID 4964 wrote to memory of 2540 4964 cmd.exe 70 PID 4964 wrote to memory of 2540 4964 cmd.exe 70 PID 4964 wrote to memory of 2540 4964 cmd.exe 70 PID 2976 wrote to memory of 4668 2976 0d168fde3676899c1387ccd17587959e9df7037d6a91f8af5f832c1e179fbcb8.exe 71 PID 2976 wrote to memory of 4668 2976 0d168fde3676899c1387ccd17587959e9df7037d6a91f8af5f832c1e179fbcb8.exe 71 PID 2976 wrote to memory of 4668 2976 0d168fde3676899c1387ccd17587959e9df7037d6a91f8af5f832c1e179fbcb8.exe 71 PID 4964 wrote to memory of 2248 4964 cmd.exe 72 PID 4964 wrote to memory of 2248 4964 cmd.exe 72 PID 4964 wrote to memory of 2248 4964 cmd.exe 72 PID 4668 wrote to memory of 2088 4668 dllhost.exe 73 PID 4668 wrote to memory of 2088 4668 dllhost.exe 73 PID 4668 wrote to memory of 2088 4668 dllhost.exe 73 PID 4668 wrote to memory of 1580 4668 dllhost.exe 74 PID 4668 wrote to memory of 1580 4668 dllhost.exe 74 PID 4668 wrote to memory of 1580 4668 dllhost.exe 74 PID 4668 wrote to memory of 2196 4668 dllhost.exe 75 PID 4668 wrote to memory of 2196 4668 dllhost.exe 75 PID 4668 wrote to memory of 2196 4668 dllhost.exe 75 PID 4668 wrote to memory of 868 4668 dllhost.exe 95 PID 4668 wrote to memory of 868 4668 dllhost.exe 95 PID 4668 wrote to memory of 868 4668 dllhost.exe 95 PID 4668 wrote to memory of 2160 4668 dllhost.exe 76 PID 4668 wrote to memory of 2160 4668 dllhost.exe 76 PID 4668 wrote to memory of 2160 4668 dllhost.exe 76 PID 4668 wrote to memory of 2636 4668 dllhost.exe 94 PID 4668 wrote to memory of 2636 4668 dllhost.exe 94 PID 4668 wrote to memory of 2636 4668 dllhost.exe 94 PID 4668 wrote to memory of 5032 4668 dllhost.exe 93 PID 4668 wrote to memory of 5032 4668 dllhost.exe 93 PID 4668 wrote to memory of 5032 4668 dllhost.exe 93 PID 4668 wrote to memory of 4268 4668 dllhost.exe 91 PID 4668 wrote to memory of 4268 4668 dllhost.exe 91 PID 4668 wrote to memory of 4268 4668 dllhost.exe 91 PID 4668 wrote to memory of 2320 4668 dllhost.exe 90 PID 4668 wrote to memory of 2320 4668 dllhost.exe 90 PID 4668 wrote to memory of 2320 4668 dllhost.exe 90 PID 4668 wrote to memory of 3496 4668 dllhost.exe 80 PID 4668 wrote to memory of 3496 4668 dllhost.exe 80 PID 4668 wrote to memory of 3496 4668 dllhost.exe 80 PID 4668 wrote to memory of 3964 4668 dllhost.exe 81 PID 4668 wrote to memory of 3964 4668 dllhost.exe 81 PID 4668 wrote to memory of 3964 4668 dllhost.exe 81 PID 4668 wrote to memory of 4888 4668 dllhost.exe 82 PID 4668 wrote to memory of 4888 4668 dllhost.exe 82 PID 4668 wrote to memory of 4888 4668 dllhost.exe 82 PID 1580 wrote to memory of 3996 1580 cmd.exe 96 PID 1580 wrote to memory of 3996 1580 cmd.exe 96 PID 1580 wrote to memory of 3996 1580 cmd.exe 96 PID 2196 wrote to memory of 3960 2196 cmd.exe 97 PID 2196 wrote to memory of 3960 2196 cmd.exe 97 PID 2196 wrote to memory of 3960 2196 cmd.exe 97 PID 2160 wrote to memory of 4052 2160 cmd.exe 98 PID 2160 wrote to memory of 4052 2160 cmd.exe 98 PID 2160 wrote to memory of 4052 2160 cmd.exe 98 PID 3964 wrote to memory of 3536 3964 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d168fde3676899c1387ccd17587959e9df7037d6a91f8af5f832c1e179fbcb8.exe"C:\Users\Admin\AppData\Local\Temp\0d168fde3676899c1387ccd17587959e9df7037d6a91f8af5f832c1e179fbcb8.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:4396
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2248 -
C:\Windows\SysWOW64\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "2248" "1760" "1748" "1688" "0" "0" "1756" "0" "0" "0" "0" "0"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2088
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3996
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3960
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4052
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk4096" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3496
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk6762" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk6762" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3536
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk8532" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4888
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk6719" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2320
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4268
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:5032
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2636
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:868
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:352
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4956
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:2804
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:5020
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:4892
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:2400
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
904KB
MD55f378788bcba94bdb868d53d330f38a0
SHA13ecf76da9ae935a303d4e192e64daed082da6476
SHA2563f622f0d7c54675ecb642b0c467b2fc35a4f7a6510d8d001974e90914925bd56
SHA5121b4e8576c3e0a40f5666e501e166534ebfda2cc4ab8cb5adcb1f938ec72c79190db9b67d51edfb72dd41b632254e6017f541115ba5e577a7e9788d282681f1e2
-
Filesize
904KB
MD55f378788bcba94bdb868d53d330f38a0
SHA13ecf76da9ae935a303d4e192e64daed082da6476
SHA2563f622f0d7c54675ecb642b0c467b2fc35a4f7a6510d8d001974e90914925bd56
SHA5121b4e8576c3e0a40f5666e501e166534ebfda2cc4ab8cb5adcb1f938ec72c79190db9b67d51edfb72dd41b632254e6017f541115ba5e577a7e9788d282681f1e2
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD592ec093f57e1595c6fc48c6142d59509
SHA16c527f61e3648b132aeea667bfa533c2acdb8e52
SHA256e5a95e1c9f1fea457637b645e0f318423fa2e2e18886cb2dcd416cf48fdab4d5
SHA5120500a58edcc7ee7d9d1cd50203d109661eaa7aa8511496f04d14f7b5953bbc8c7fc8792ffa518381f6dfdda86a49ac89f4945e722807a322617537ac196ec7ef