Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
21/09/2022, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
e3fde44e6e45cd9434ae882fe7394827d592c8f04fe89447ea3a214c8b6caad5.exe
Resource
win10-20220812-en
General
-
Target
e3fde44e6e45cd9434ae882fe7394827d592c8f04fe89447ea3a214c8b6caad5.exe
-
Size
722KB
-
MD5
154dfd7c782601d0ce1c891c1d5bd12e
-
SHA1
17c91c7b33d2a08531f570f3cd2808dd2ef385e4
-
SHA256
e3fde44e6e45cd9434ae882fe7394827d592c8f04fe89447ea3a214c8b6caad5
-
SHA512
c27119f40e062cacff3999282a78f07b23afaa5483471ebc163d0df584cc7a1bbc55f0e0cf6a94e0db2fa6233323c4290f534431729b3a0e1ad61b139abc6b2c
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4316 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1292 schtasks.exe 1544 schtasks.exe 1288 schtasks.exe 1368 schtasks.exe 3560 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3384 powershell.exe 3384 powershell.exe 3384 powershell.exe 2892 powershell.exe 2892 powershell.exe 2892 powershell.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe 4316 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3384 powershell.exe Token: SeDebugPrivilege 2016 e3fde44e6e45cd9434ae882fe7394827d592c8f04fe89447ea3a214c8b6caad5.exe Token: SeDebugPrivilege 2892 powershell.exe Token: SeDebugPrivilege 4316 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2016 wrote to memory of 4652 2016 e3fde44e6e45cd9434ae882fe7394827d592c8f04fe89447ea3a214c8b6caad5.exe 66 PID 2016 wrote to memory of 4652 2016 e3fde44e6e45cd9434ae882fe7394827d592c8f04fe89447ea3a214c8b6caad5.exe 66 PID 2016 wrote to memory of 4652 2016 e3fde44e6e45cd9434ae882fe7394827d592c8f04fe89447ea3a214c8b6caad5.exe 66 PID 4652 wrote to memory of 1492 4652 cmd.exe 68 PID 4652 wrote to memory of 1492 4652 cmd.exe 68 PID 4652 wrote to memory of 1492 4652 cmd.exe 68 PID 4652 wrote to memory of 3384 4652 cmd.exe 69 PID 4652 wrote to memory of 3384 4652 cmd.exe 69 PID 4652 wrote to memory of 3384 4652 cmd.exe 69 PID 4652 wrote to memory of 2892 4652 cmd.exe 70 PID 4652 wrote to memory of 2892 4652 cmd.exe 70 PID 4652 wrote to memory of 2892 4652 cmd.exe 70 PID 2016 wrote to memory of 4316 2016 e3fde44e6e45cd9434ae882fe7394827d592c8f04fe89447ea3a214c8b6caad5.exe 71 PID 2016 wrote to memory of 4316 2016 e3fde44e6e45cd9434ae882fe7394827d592c8f04fe89447ea3a214c8b6caad5.exe 71 PID 2016 wrote to memory of 4316 2016 e3fde44e6e45cd9434ae882fe7394827d592c8f04fe89447ea3a214c8b6caad5.exe 71 PID 4316 wrote to memory of 4428 4316 dllhost.exe 72 PID 4316 wrote to memory of 4428 4316 dllhost.exe 72 PID 4316 wrote to memory of 4428 4316 dllhost.exe 72 PID 4316 wrote to memory of 4420 4316 dllhost.exe 73 PID 4316 wrote to memory of 4420 4316 dllhost.exe 73 PID 4316 wrote to memory of 4420 4316 dllhost.exe 73 PID 4316 wrote to memory of 1900 4316 dllhost.exe 74 PID 4316 wrote to memory of 1900 4316 dllhost.exe 74 PID 4316 wrote to memory of 1900 4316 dllhost.exe 74 PID 4316 wrote to memory of 3988 4316 dllhost.exe 75 PID 4316 wrote to memory of 3988 4316 dllhost.exe 75 PID 4316 wrote to memory of 3988 4316 dllhost.exe 75 PID 4316 wrote to memory of 5060 4316 dllhost.exe 92 PID 4316 wrote to memory of 5060 4316 dllhost.exe 92 PID 4316 wrote to memory of 5060 4316 dllhost.exe 92 PID 4316 wrote to memory of 4968 4316 dllhost.exe 91 PID 4316 wrote to memory of 4968 4316 dllhost.exe 91 PID 4316 wrote to memory of 4968 4316 dllhost.exe 91 PID 4316 wrote to memory of 4200 4316 dllhost.exe 90 PID 4316 wrote to memory of 4200 4316 dllhost.exe 90 PID 4316 wrote to memory of 4200 4316 dllhost.exe 90 PID 4316 wrote to memory of 4556 4316 dllhost.exe 78 PID 4316 wrote to memory of 4556 4316 dllhost.exe 78 PID 4316 wrote to memory of 4556 4316 dllhost.exe 78 PID 4316 wrote to memory of 4732 4316 dllhost.exe 84 PID 4316 wrote to memory of 4732 4316 dllhost.exe 84 PID 4316 wrote to memory of 4732 4316 dllhost.exe 84 PID 4316 wrote to memory of 1904 4316 dllhost.exe 82 PID 4316 wrote to memory of 1904 4316 dllhost.exe 82 PID 4316 wrote to memory of 1904 4316 dllhost.exe 82 PID 4316 wrote to memory of 4404 4316 dllhost.exe 81 PID 4316 wrote to memory of 4404 4316 dllhost.exe 81 PID 4316 wrote to memory of 4404 4316 dllhost.exe 81 PID 4316 wrote to memory of 896 4316 dllhost.exe 85 PID 4316 wrote to memory of 896 4316 dllhost.exe 85 PID 4316 wrote to memory of 896 4316 dllhost.exe 85 PID 3988 wrote to memory of 1292 3988 cmd.exe 98 PID 3988 wrote to memory of 1292 3988 cmd.exe 98 PID 3988 wrote to memory of 1292 3988 cmd.exe 98 PID 4428 wrote to memory of 1288 4428 cmd.exe 95 PID 4428 wrote to memory of 1288 4428 cmd.exe 95 PID 4428 wrote to memory of 1288 4428 cmd.exe 95 PID 4420 wrote to memory of 1368 4420 cmd.exe 96 PID 4420 wrote to memory of 1368 4420 cmd.exe 96 PID 4420 wrote to memory of 1368 4420 cmd.exe 96 PID 4968 wrote to memory of 3560 4968 cmd.exe 97 PID 4968 wrote to memory of 3560 4968 cmd.exe 97 PID 4968 wrote to memory of 3560 4968 cmd.exe 97 PID 4556 wrote to memory of 1544 4556 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3fde44e6e45cd9434ae882fe7394827d592c8f04fe89447ea3a214c8b6caad5.exe"C:\Users\Admin\AppData\Local\Temp\e3fde44e6e45cd9434ae882fe7394827d592c8f04fe89447ea3a214c8b6caad5.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:1492
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1288
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1368
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1900
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1292
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1544
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9449" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4404
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3460" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1904
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1639" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4732
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk276" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:896
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4200
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3560
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:5060
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:4696
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:852
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:212
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:3340
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
912KB
MD5fec2fc3cd9611fc817e7f28f38e68879
SHA12ff56f6b4eda77bd83d93cb6151b9753ed7ae924
SHA256e2e5e2881f8f9fa15692510818653a20d1880070615fdb98bd32bb4f0c4bee4f
SHA512970727762e2ed88d3c496ab0a74dde1dd4607ee0c0f7d53763b2bc6fadd96e88edc8d264bad3fa0e4d978d3c2f956c1b3845e862c03bc4ef49cb746d398a17de
-
Filesize
912KB
MD5fec2fc3cd9611fc817e7f28f38e68879
SHA12ff56f6b4eda77bd83d93cb6151b9753ed7ae924
SHA256e2e5e2881f8f9fa15692510818653a20d1880070615fdb98bd32bb4f0c4bee4f
SHA512970727762e2ed88d3c496ab0a74dde1dd4607ee0c0f7d53763b2bc6fadd96e88edc8d264bad3fa0e4d978d3c2f956c1b3845e862c03bc4ef49cb746d398a17de
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD5f72ceca249896509328fce276b5ef8a0
SHA1dbcf48ec0d95405fbc0b2a91058bd90e106b6479
SHA256a9ac79dae1e72e1b3416a427c93ed3ee2b71cf8f649a06bef3a390ea57d36016
SHA512ca0c3c8210b297cd3158412918026824579a61fc48b15bffcea0e7eb7ff212ca7c4333ff359dbadfb039ea2f283182a8b4f639130774ef4c9d274581a16d4a25