Analysis
-
max time kernel
156s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 00:51
Static task
static1
Behavioral task
behavioral1
Sample
1762277978acc108cd28b0ae35b447710ccf75408af9db257dcd77e8a802f95c.exe
Resource
win10v2004-20220812-en
General
-
Target
1762277978acc108cd28b0ae35b447710ccf75408af9db257dcd77e8a802f95c.exe
-
Size
721KB
-
MD5
30757631e873c1fff3de4870ec5648ae
-
SHA1
32036879fcbb65021d34136300142b2041394279
-
SHA256
1762277978acc108cd28b0ae35b447710ccf75408af9db257dcd77e8a802f95c
-
SHA512
551701c4121add38ccf9c3f98e07b5e3660e099e96596a1b8b7f01d41a4d6a0c0016550368f610535e8732c99ce548da4e5d194996c140492e783c0958713d6a
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 964 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2372 schtasks.exe 1964 schtasks.exe 4964 schtasks.exe 776 schtasks.exe 2972 schtasks.exe 2376 schtasks.exe 4356 schtasks.exe 1956 schtasks.exe 3224 schtasks.exe 4492 schtasks.exe 1412 schtasks.exe 1960 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1852 powershell.exe 1852 powershell.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe 964 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3136 1762277978acc108cd28b0ae35b447710ccf75408af9db257dcd77e8a802f95c.exe Token: SeDebugPrivilege 1852 powershell.exe Token: SeDebugPrivilege 964 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3136 wrote to memory of 3400 3136 1762277978acc108cd28b0ae35b447710ccf75408af9db257dcd77e8a802f95c.exe 81 PID 3136 wrote to memory of 3400 3136 1762277978acc108cd28b0ae35b447710ccf75408af9db257dcd77e8a802f95c.exe 81 PID 3136 wrote to memory of 3400 3136 1762277978acc108cd28b0ae35b447710ccf75408af9db257dcd77e8a802f95c.exe 81 PID 3400 wrote to memory of 4496 3400 cmd.exe 83 PID 3400 wrote to memory of 4496 3400 cmd.exe 83 PID 3400 wrote to memory of 4496 3400 cmd.exe 83 PID 3400 wrote to memory of 1852 3400 cmd.exe 84 PID 3400 wrote to memory of 1852 3400 cmd.exe 84 PID 3400 wrote to memory of 1852 3400 cmd.exe 84 PID 3136 wrote to memory of 964 3136 1762277978acc108cd28b0ae35b447710ccf75408af9db257dcd77e8a802f95c.exe 91 PID 3136 wrote to memory of 964 3136 1762277978acc108cd28b0ae35b447710ccf75408af9db257dcd77e8a802f95c.exe 91 PID 3136 wrote to memory of 964 3136 1762277978acc108cd28b0ae35b447710ccf75408af9db257dcd77e8a802f95c.exe 91 PID 964 wrote to memory of 1892 964 dllhost.exe 92 PID 964 wrote to memory of 1892 964 dllhost.exe 92 PID 964 wrote to memory of 1892 964 dllhost.exe 92 PID 964 wrote to memory of 1700 964 dllhost.exe 94 PID 964 wrote to memory of 1700 964 dllhost.exe 94 PID 964 wrote to memory of 1700 964 dllhost.exe 94 PID 964 wrote to memory of 5092 964 dllhost.exe 96 PID 964 wrote to memory of 5092 964 dllhost.exe 96 PID 964 wrote to memory of 5092 964 dllhost.exe 96 PID 964 wrote to memory of 1768 964 dllhost.exe 97 PID 964 wrote to memory of 1768 964 dllhost.exe 97 PID 964 wrote to memory of 1768 964 dllhost.exe 97 PID 964 wrote to memory of 4840 964 dllhost.exe 98 PID 964 wrote to memory of 4840 964 dllhost.exe 98 PID 964 wrote to memory of 4840 964 dllhost.exe 98 PID 964 wrote to memory of 5084 964 dllhost.exe 109 PID 964 wrote to memory of 5084 964 dllhost.exe 109 PID 964 wrote to memory of 5084 964 dllhost.exe 109 PID 964 wrote to memory of 4064 964 dllhost.exe 99 PID 964 wrote to memory of 4064 964 dllhost.exe 99 PID 964 wrote to memory of 4064 964 dllhost.exe 99 PID 964 wrote to memory of 3532 964 dllhost.exe 100 PID 964 wrote to memory of 3532 964 dllhost.exe 100 PID 964 wrote to memory of 3532 964 dllhost.exe 100 PID 964 wrote to memory of 1404 964 dllhost.exe 102 PID 964 wrote to memory of 1404 964 dllhost.exe 102 PID 964 wrote to memory of 1404 964 dllhost.exe 102 PID 964 wrote to memory of 492 964 dllhost.exe 103 PID 964 wrote to memory of 492 964 dllhost.exe 103 PID 964 wrote to memory of 492 964 dllhost.exe 103 PID 964 wrote to memory of 2168 964 dllhost.exe 105 PID 964 wrote to memory of 2168 964 dllhost.exe 105 PID 964 wrote to memory of 2168 964 dllhost.exe 105 PID 964 wrote to memory of 1116 964 dllhost.exe 114 PID 964 wrote to memory of 1116 964 dllhost.exe 114 PID 964 wrote to memory of 1116 964 dllhost.exe 114 PID 3532 wrote to memory of 4492 3532 cmd.exe 116 PID 3532 wrote to memory of 4492 3532 cmd.exe 116 PID 3532 wrote to memory of 4492 3532 cmd.exe 116 PID 1700 wrote to memory of 2972 1700 cmd.exe 118 PID 1700 wrote to memory of 2972 1700 cmd.exe 118 PID 1700 wrote to memory of 2972 1700 cmd.exe 118 PID 492 wrote to memory of 1412 492 cmd.exe 117 PID 492 wrote to memory of 1412 492 cmd.exe 117 PID 492 wrote to memory of 1412 492 cmd.exe 117 PID 4840 wrote to memory of 4356 4840 cmd.exe 120 PID 4840 wrote to memory of 4356 4840 cmd.exe 120 PID 4840 wrote to memory of 4356 4840 cmd.exe 120 PID 1768 wrote to memory of 2376 1768 cmd.exe 119 PID 1768 wrote to memory of 2376 1768 cmd.exe 119 PID 1768 wrote to memory of 2376 1768 cmd.exe 119 PID 1404 wrote to memory of 3224 1404 cmd.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\1762277978acc108cd28b0ae35b447710ccf75408af9db257dcd77e8a802f95c.exe"C:\Users\Admin\AppData\Local\Temp\1762277978acc108cd28b0ae35b447710ccf75408af9db257dcd77e8a802f95c.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:4496
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1892
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1964
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2972
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:5092
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1960
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2376
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4356
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4064
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1956
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4492
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1307" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1307" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3224
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk1575" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk1575" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1412
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk8199" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2168
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk8199" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:776
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:5084
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4964
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk2422" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1116
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk2422" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2372
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:1080
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4824
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:4408
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:3736
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD54d868a222d7123e9e3e5ab9ab26ad5e5
SHA17fda8aba29fcfc749dca986eb8883b96a5ff612c
SHA25692532fed585ffb25d81fddbf4b32b0a3b8949555fe16488ad93316f2a72cef15
SHA5127d51c6bc1449097f19f7621fabcb502bb7baea66d7eb65d4867995c0f4fe1ac54fa376b278e249512dbca717b57c2887ee47aacdb024fad2a65f3b31a0fc0f55
-
Filesize
907KB
MD54d868a222d7123e9e3e5ab9ab26ad5e5
SHA17fda8aba29fcfc749dca986eb8883b96a5ff612c
SHA25692532fed585ffb25d81fddbf4b32b0a3b8949555fe16488ad93316f2a72cef15
SHA5127d51c6bc1449097f19f7621fabcb502bb7baea66d7eb65d4867995c0f4fe1ac54fa376b278e249512dbca717b57c2887ee47aacdb024fad2a65f3b31a0fc0f55
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc