Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
28/09/2022, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
b7aeabe45c92bb9a6895ade1bc978c60d92b1d5e459dc148653f9f9415384d75.exe
Resource
win10-20220812-en
General
-
Target
b7aeabe45c92bb9a6895ade1bc978c60d92b1d5e459dc148653f9f9415384d75.exe
-
Size
728KB
-
MD5
fd846f5b1981c8ba56e08ba2d6e7399f
-
SHA1
b1e084486a3293d61f0e71bd1a8c1983f2b80e34
-
SHA256
b7aeabe45c92bb9a6895ade1bc978c60d92b1d5e459dc148653f9f9415384d75
-
SHA512
41a156f6a33dae7a6aaaeb7152693cf9c728888e7b4174c85686116bebc6cad88d677ac42d97b46c69087fe90f553f93fd5192608944f0a31108f880f9672925
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4416 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1680 schtasks.exe 364 schtasks.exe 304 schtasks.exe 2696 schtasks.exe 1832 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3664 powershell.exe 3664 powershell.exe 3664 powershell.exe 3928 powershell.exe 3928 powershell.exe 3928 powershell.exe 3384 powershell.exe 3384 powershell.exe 3384 powershell.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe 4416 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3664 powershell.exe Token: SeDebugPrivilege 1524 b7aeabe45c92bb9a6895ade1bc978c60d92b1d5e459dc148653f9f9415384d75.exe Token: SeDebugPrivilege 3928 powershell.exe Token: SeDebugPrivilege 3384 powershell.exe Token: SeDebugPrivilege 4416 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1524 wrote to memory of 4248 1524 b7aeabe45c92bb9a6895ade1bc978c60d92b1d5e459dc148653f9f9415384d75.exe 69 PID 1524 wrote to memory of 4248 1524 b7aeabe45c92bb9a6895ade1bc978c60d92b1d5e459dc148653f9f9415384d75.exe 69 PID 1524 wrote to memory of 4248 1524 b7aeabe45c92bb9a6895ade1bc978c60d92b1d5e459dc148653f9f9415384d75.exe 69 PID 4248 wrote to memory of 2588 4248 cmd.exe 68 PID 4248 wrote to memory of 2588 4248 cmd.exe 68 PID 4248 wrote to memory of 2588 4248 cmd.exe 68 PID 4248 wrote to memory of 3664 4248 cmd.exe 67 PID 4248 wrote to memory of 3664 4248 cmd.exe 67 PID 4248 wrote to memory of 3664 4248 cmd.exe 67 PID 4248 wrote to memory of 3928 4248 cmd.exe 70 PID 4248 wrote to memory of 3928 4248 cmd.exe 70 PID 4248 wrote to memory of 3928 4248 cmd.exe 70 PID 4248 wrote to memory of 3384 4248 cmd.exe 71 PID 4248 wrote to memory of 3384 4248 cmd.exe 71 PID 4248 wrote to memory of 3384 4248 cmd.exe 71 PID 1524 wrote to memory of 4416 1524 b7aeabe45c92bb9a6895ade1bc978c60d92b1d5e459dc148653f9f9415384d75.exe 72 PID 1524 wrote to memory of 4416 1524 b7aeabe45c92bb9a6895ade1bc978c60d92b1d5e459dc148653f9f9415384d75.exe 72 PID 1524 wrote to memory of 4416 1524 b7aeabe45c92bb9a6895ade1bc978c60d92b1d5e459dc148653f9f9415384d75.exe 72 PID 4416 wrote to memory of 5104 4416 dllhost.exe 73 PID 4416 wrote to memory of 5104 4416 dllhost.exe 73 PID 4416 wrote to memory of 5104 4416 dllhost.exe 73 PID 4416 wrote to memory of 3232 4416 dllhost.exe 74 PID 4416 wrote to memory of 3232 4416 dllhost.exe 74 PID 4416 wrote to memory of 3232 4416 dllhost.exe 74 PID 4416 wrote to memory of 3744 4416 dllhost.exe 75 PID 4416 wrote to memory of 3744 4416 dllhost.exe 75 PID 4416 wrote to memory of 3744 4416 dllhost.exe 75 PID 4416 wrote to memory of 4720 4416 dllhost.exe 76 PID 4416 wrote to memory of 4720 4416 dllhost.exe 76 PID 4416 wrote to memory of 4720 4416 dllhost.exe 76 PID 4416 wrote to memory of 4640 4416 dllhost.exe 77 PID 4416 wrote to memory of 4640 4416 dllhost.exe 77 PID 4416 wrote to memory of 4640 4416 dllhost.exe 77 PID 4416 wrote to memory of 4868 4416 dllhost.exe 78 PID 4416 wrote to memory of 4868 4416 dllhost.exe 78 PID 4416 wrote to memory of 4868 4416 dllhost.exe 78 PID 4416 wrote to memory of 1368 4416 dllhost.exe 95 PID 4416 wrote to memory of 1368 4416 dllhost.exe 95 PID 4416 wrote to memory of 1368 4416 dllhost.exe 95 PID 4416 wrote to memory of 3832 4416 dllhost.exe 94 PID 4416 wrote to memory of 3832 4416 dllhost.exe 94 PID 4416 wrote to memory of 3832 4416 dllhost.exe 94 PID 4416 wrote to memory of 3860 4416 dllhost.exe 81 PID 4416 wrote to memory of 3860 4416 dllhost.exe 81 PID 4416 wrote to memory of 3860 4416 dllhost.exe 81 PID 4416 wrote to memory of 4300 4416 dllhost.exe 93 PID 4416 wrote to memory of 4300 4416 dllhost.exe 93 PID 4416 wrote to memory of 4300 4416 dllhost.exe 93 PID 4416 wrote to memory of 1464 4416 dllhost.exe 83 PID 4416 wrote to memory of 1464 4416 dllhost.exe 83 PID 4416 wrote to memory of 1464 4416 dllhost.exe 83 PID 4416 wrote to memory of 4204 4416 dllhost.exe 92 PID 4416 wrote to memory of 4204 4416 dllhost.exe 92 PID 4416 wrote to memory of 4204 4416 dllhost.exe 92 PID 3232 wrote to memory of 1832 3232 cmd.exe 97 PID 3232 wrote to memory of 1832 3232 cmd.exe 97 PID 3232 wrote to memory of 1832 3232 cmd.exe 97 PID 3744 wrote to memory of 1680 3744 cmd.exe 98 PID 3744 wrote to memory of 1680 3744 cmd.exe 98 PID 3744 wrote to memory of 1680 3744 cmd.exe 98 PID 3832 wrote to memory of 364 3832 cmd.exe 99 PID 3832 wrote to memory of 364 3832 cmd.exe 99 PID 3832 wrote to memory of 364 3832 cmd.exe 99 PID 1464 wrote to memory of 304 1464 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7aeabe45c92bb9a6895ade1bc978c60d92b1d5e459dc148653f9f9415384d75.exe"C:\Users\Admin\AppData\Local\Temp\b7aeabe45c92bb9a6895ade1bc978c60d92b1d5e459dc148653f9f9415384d75.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:5104
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1832
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1680
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4720
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4640
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4868
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk7056" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3860
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3357" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3357" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:304
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk311" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4204
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk311" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2696
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk4619" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4300
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:364
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1368
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:4060
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:2312
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:1400
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:3344
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:708
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:960
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3664
-
C:\Windows\SysWOW64\chcp.comchcp 12511⤵PID:2588
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
933KB
MD532e1513e1263b4e3882900d437b5b09f
SHA1825a6a5afdbf3f80e5d5ca73966511410c92afc8
SHA256f506518de695ae4c0c708cac2be954b2620b424611a37cfcbf730361a2299830
SHA51283c931f552e9c5f034db8cd99c15909451a120594d1681840c0f0e857d1a3687df7a91718929f844963589d0f1d731cf64b69d2bc1c5ff9e71d1fceea20f3b7b
-
Filesize
933KB
MD532e1513e1263b4e3882900d437b5b09f
SHA1825a6a5afdbf3f80e5d5ca73966511410c92afc8
SHA256f506518de695ae4c0c708cac2be954b2620b424611a37cfcbf730361a2299830
SHA51283c931f552e9c5f034db8cd99c15909451a120594d1681840c0f0e857d1a3687df7a91718929f844963589d0f1d731cf64b69d2bc1c5ff9e71d1fceea20f3b7b
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD53e528373bc2160dbe5bf813317a26272
SHA1ebb83d48b660de751c019229b44dc5d3dc59e241
SHA256a8cdc58178ec8c0eab8f284c8e41ec298c5a718b8e649a9e2d762e1b9bceabaf
SHA512fc1b4c161dd665f82a3a1db191d606496938bb7d4f7d79a8ff2dd855f5eb2887206b9d5e1ed15ee973528ed480e5f9cbc868b5cad7b72e5ad0ffe1a46a65f50b
-
Filesize
18KB
MD5af816874ce0fed4b1f0f63bff43c206e
SHA108b4a19b651e97a5cba20ae92c73b9f9354fdcaf
SHA256c92c7517468e0859c761882cf7ce5b67d4c0554e2a8da7d9ac0ecd5233acd111
SHA5122c758e88516cdf7cd6509e5c61c9498baf0a260be3004b5d5f6e1e08690fc42f65cf5c4755a5e7f8ce5cba39d90d680b13238c93f6f3d784c3f9cd0d6ec37b27