Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
28/09/2022, 05:14
Static task
static1
Behavioral task
behavioral1
Sample
4fe57a62d804866e64aecac5e8b683bce473cab98a2a3f1fc4432aeb1ff6ba0d.exe
Resource
win10-20220901-en
General
-
Target
4fe57a62d804866e64aecac5e8b683bce473cab98a2a3f1fc4432aeb1ff6ba0d.exe
-
Size
727KB
-
MD5
faf5caa96b82f211912aa638c26f398b
-
SHA1
228bb1622cb81d9652ccee00e9afd1a77954cf8f
-
SHA256
4fe57a62d804866e64aecac5e8b683bce473cab98a2a3f1fc4432aeb1ff6ba0d
-
SHA512
5bd36f23ddc952ac981eef8e7768f0dae881499fc388a886afed27a175c352aa5a72b3f68029159123f28911b0c703b001848a75a5660ce62a938a9b0940eb6f
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 516 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4168 schtasks.exe 4252 schtasks.exe 3084 schtasks.exe 4224 schtasks.exe 4304 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1580 powershell.exe 1580 powershell.exe 1580 powershell.exe 2608 powershell.exe 2608 powershell.exe 2608 powershell.exe 516 dllhost.exe 2328 powershell.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 2328 powershell.exe 2328 powershell.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe 516 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1580 powershell.exe Token: SeDebugPrivilege 2916 4fe57a62d804866e64aecac5e8b683bce473cab98a2a3f1fc4432aeb1ff6ba0d.exe Token: SeDebugPrivilege 2608 powershell.exe Token: SeDebugPrivilege 516 dllhost.exe Token: SeDebugPrivilege 2328 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2916 wrote to memory of 1504 2916 4fe57a62d804866e64aecac5e8b683bce473cab98a2a3f1fc4432aeb1ff6ba0d.exe 66 PID 2916 wrote to memory of 1504 2916 4fe57a62d804866e64aecac5e8b683bce473cab98a2a3f1fc4432aeb1ff6ba0d.exe 66 PID 2916 wrote to memory of 1504 2916 4fe57a62d804866e64aecac5e8b683bce473cab98a2a3f1fc4432aeb1ff6ba0d.exe 66 PID 1504 wrote to memory of 4332 1504 cmd.exe 68 PID 1504 wrote to memory of 4332 1504 cmd.exe 68 PID 1504 wrote to memory of 4332 1504 cmd.exe 68 PID 1504 wrote to memory of 1580 1504 cmd.exe 69 PID 1504 wrote to memory of 1580 1504 cmd.exe 69 PID 1504 wrote to memory of 1580 1504 cmd.exe 69 PID 1504 wrote to memory of 2608 1504 cmd.exe 70 PID 1504 wrote to memory of 2608 1504 cmd.exe 70 PID 1504 wrote to memory of 2608 1504 cmd.exe 70 PID 2916 wrote to memory of 516 2916 4fe57a62d804866e64aecac5e8b683bce473cab98a2a3f1fc4432aeb1ff6ba0d.exe 71 PID 2916 wrote to memory of 516 2916 4fe57a62d804866e64aecac5e8b683bce473cab98a2a3f1fc4432aeb1ff6ba0d.exe 71 PID 2916 wrote to memory of 516 2916 4fe57a62d804866e64aecac5e8b683bce473cab98a2a3f1fc4432aeb1ff6ba0d.exe 71 PID 1504 wrote to memory of 2328 1504 cmd.exe 72 PID 1504 wrote to memory of 2328 1504 cmd.exe 72 PID 1504 wrote to memory of 2328 1504 cmd.exe 72 PID 516 wrote to memory of 2880 516 dllhost.exe 73 PID 516 wrote to memory of 2880 516 dllhost.exe 73 PID 516 wrote to memory of 2880 516 dllhost.exe 73 PID 516 wrote to memory of 2724 516 dllhost.exe 74 PID 516 wrote to memory of 2724 516 dllhost.exe 74 PID 516 wrote to memory of 2724 516 dllhost.exe 74 PID 516 wrote to memory of 1844 516 dllhost.exe 75 PID 516 wrote to memory of 1844 516 dllhost.exe 75 PID 516 wrote to memory of 1844 516 dllhost.exe 75 PID 516 wrote to memory of 2772 516 dllhost.exe 76 PID 516 wrote to memory of 2772 516 dllhost.exe 76 PID 516 wrote to memory of 2772 516 dllhost.exe 76 PID 516 wrote to memory of 3780 516 dllhost.exe 77 PID 516 wrote to memory of 3780 516 dllhost.exe 77 PID 516 wrote to memory of 3780 516 dllhost.exe 77 PID 516 wrote to memory of 5096 516 dllhost.exe 78 PID 516 wrote to memory of 5096 516 dllhost.exe 78 PID 516 wrote to memory of 5096 516 dllhost.exe 78 PID 516 wrote to memory of 3976 516 dllhost.exe 87 PID 516 wrote to memory of 3976 516 dllhost.exe 87 PID 516 wrote to memory of 3976 516 dllhost.exe 87 PID 516 wrote to memory of 1660 516 dllhost.exe 86 PID 516 wrote to memory of 1660 516 dllhost.exe 86 PID 516 wrote to memory of 1660 516 dllhost.exe 86 PID 516 wrote to memory of 4892 516 dllhost.exe 82 PID 516 wrote to memory of 4892 516 dllhost.exe 82 PID 516 wrote to memory of 4892 516 dllhost.exe 82 PID 516 wrote to memory of 4064 516 dllhost.exe 83 PID 516 wrote to memory of 4064 516 dllhost.exe 83 PID 516 wrote to memory of 4064 516 dllhost.exe 83 PID 516 wrote to memory of 940 516 dllhost.exe 89 PID 516 wrote to memory of 940 516 dllhost.exe 89 PID 516 wrote to memory of 940 516 dllhost.exe 89 PID 516 wrote to memory of 5052 516 dllhost.exe 90 PID 516 wrote to memory of 5052 516 dllhost.exe 90 PID 516 wrote to memory of 5052 516 dllhost.exe 90 PID 1844 wrote to memory of 4304 1844 cmd.exe 97 PID 1844 wrote to memory of 4304 1844 cmd.exe 97 PID 1844 wrote to memory of 4304 1844 cmd.exe 97 PID 2772 wrote to memory of 4168 2772 cmd.exe 98 PID 2772 wrote to memory of 4168 2772 cmd.exe 98 PID 2772 wrote to memory of 4168 2772 cmd.exe 98 PID 1660 wrote to memory of 4224 1660 cmd.exe 101 PID 1660 wrote to memory of 4224 1660 cmd.exe 101 PID 1660 wrote to memory of 4224 1660 cmd.exe 101 PID 3976 wrote to memory of 4252 3976 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fe57a62d804866e64aecac5e8b683bce473cab98a2a3f1fc4432aeb1ff6ba0d.exe"C:\Users\Admin\AppData\Local\Temp\4fe57a62d804866e64aecac5e8b683bce473cab98a2a3f1fc4432aeb1ff6ba0d.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:4332
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2880
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2724
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4304
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4168
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3780
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:5096
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk8771" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4892
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk8771" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3084
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3836" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4064
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4224
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4252
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9870" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:940
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk4057" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:5052
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:3712
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:3516
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:4764
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4252
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:4304
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:3556
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
932KB
MD55717c7257c131feea5ddb2dd74bf53ed
SHA1255114fd8097dc9003d4490edbb4880ce67f4b2f
SHA256ae703f72114ff0d86132a422cfd02ff095f64113f9020587e6e96cc43299efe0
SHA5122c4cf3cb18d38812821e5e9e8ff1b8114bbea4cae345fe2ec78ef909a50a401820558c46acb104566a823e46505fdf66d82cd202896cfb3e75b5633a7babd94c
-
Filesize
932KB
MD55717c7257c131feea5ddb2dd74bf53ed
SHA1255114fd8097dc9003d4490edbb4880ce67f4b2f
SHA256ae703f72114ff0d86132a422cfd02ff095f64113f9020587e6e96cc43299efe0
SHA5122c4cf3cb18d38812821e5e9e8ff1b8114bbea4cae345fe2ec78ef909a50a401820558c46acb104566a823e46505fdf66d82cd202896cfb3e75b5633a7babd94c
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD5ba77a86d5a687c76b29c5099ac163af9
SHA103059c20b4b6d25085de3b84892b46c4ead590e2
SHA2566f47cad0058bfac7938ebf6112f452c501e022edc5e644edbaffaaf51e947c73
SHA5123b6c1291c8e48d54e85c0d43388ea9ce23c01e5a160d5c5bd68df448a4048834315038acfcbce04e7049db9338056bd1a06c634f410c587e8bb9dd6675fca288
-
Filesize
18KB
MD5e339016a726e9300247c7e787a73a287
SHA147133e721cccba79a2d8a2efd5ff07a381767fac
SHA256b2733b142940ee135377c434622aaf83c0115bb11c4db09a436cc176be1ebba7
SHA512e9dc0558cfb0daa1f0af7512c0f83b3761d0c9f92c06a31446d0905b0bd419cddce54eceace49f2551d59eed4eda94cdfd612a0c4cabfea6036e7c6ad2023e66