Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
70s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
03/10/2022, 07:53
Static task
static1
Behavioral task
behavioral1
Sample
64b7c530f7fb7a8a6665e464720865b330d4a71bc118a70dd7545fc6e082b2ff.exe
Resource
win10-20220812-en
General
-
Target
64b7c530f7fb7a8a6665e464720865b330d4a71bc118a70dd7545fc6e082b2ff.exe
-
Size
730KB
-
MD5
9c328d4e9d308c96d6c73832b4e92447
-
SHA1
3cb5b2da8ecdb39635826ca3994f15ede45e5ad6
-
SHA256
64b7c530f7fb7a8a6665e464720865b330d4a71bc118a70dd7545fc6e082b2ff
-
SHA512
66345286b7b001068f0cc7eb26ad6d4abb997e3e9153b329fab7ce2cc1d527e57e314292d8652982da14c9a2c8b17994914b25cc0358df42072f72411b63dffe
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4948 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4260 schtasks.exe 4652 schtasks.exe 3828 schtasks.exe 4616 schtasks.exe 4624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4872 powershell.exe 4872 powershell.exe 4872 powershell.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe 4948 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4872 powershell.exe Token: SeDebugPrivilege 2580 64b7c530f7fb7a8a6665e464720865b330d4a71bc118a70dd7545fc6e082b2ff.exe Token: SeDebugPrivilege 4948 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2580 wrote to memory of 4664 2580 64b7c530f7fb7a8a6665e464720865b330d4a71bc118a70dd7545fc6e082b2ff.exe 66 PID 2580 wrote to memory of 4664 2580 64b7c530f7fb7a8a6665e464720865b330d4a71bc118a70dd7545fc6e082b2ff.exe 66 PID 2580 wrote to memory of 4664 2580 64b7c530f7fb7a8a6665e464720865b330d4a71bc118a70dd7545fc6e082b2ff.exe 66 PID 4664 wrote to memory of 2888 4664 cmd.exe 68 PID 4664 wrote to memory of 2888 4664 cmd.exe 68 PID 4664 wrote to memory of 2888 4664 cmd.exe 68 PID 4664 wrote to memory of 4872 4664 cmd.exe 69 PID 4664 wrote to memory of 4872 4664 cmd.exe 69 PID 4664 wrote to memory of 4872 4664 cmd.exe 69 PID 2580 wrote to memory of 4948 2580 64b7c530f7fb7a8a6665e464720865b330d4a71bc118a70dd7545fc6e082b2ff.exe 70 PID 2580 wrote to memory of 4948 2580 64b7c530f7fb7a8a6665e464720865b330d4a71bc118a70dd7545fc6e082b2ff.exe 70 PID 2580 wrote to memory of 4948 2580 64b7c530f7fb7a8a6665e464720865b330d4a71bc118a70dd7545fc6e082b2ff.exe 70 PID 4948 wrote to memory of 1180 4948 dllhost.exe 71 PID 4948 wrote to memory of 1180 4948 dllhost.exe 71 PID 4948 wrote to memory of 1180 4948 dllhost.exe 71 PID 4948 wrote to memory of 3056 4948 dllhost.exe 72 PID 4948 wrote to memory of 3056 4948 dllhost.exe 72 PID 4948 wrote to memory of 3056 4948 dllhost.exe 72 PID 4948 wrote to memory of 456 4948 dllhost.exe 73 PID 4948 wrote to memory of 456 4948 dllhost.exe 73 PID 4948 wrote to memory of 456 4948 dllhost.exe 73 PID 4948 wrote to memory of 4200 4948 dllhost.exe 74 PID 4948 wrote to memory of 4200 4948 dllhost.exe 74 PID 4948 wrote to memory of 4200 4948 dllhost.exe 74 PID 4948 wrote to memory of 2136 4948 dllhost.exe 75 PID 4948 wrote to memory of 2136 4948 dllhost.exe 75 PID 4948 wrote to memory of 2136 4948 dllhost.exe 75 PID 4948 wrote to memory of 3012 4948 dllhost.exe 76 PID 4948 wrote to memory of 3012 4948 dllhost.exe 76 PID 4948 wrote to memory of 3012 4948 dllhost.exe 76 PID 4948 wrote to memory of 2308 4948 dllhost.exe 94 PID 4948 wrote to memory of 2308 4948 dllhost.exe 94 PID 4948 wrote to memory of 2308 4948 dllhost.exe 94 PID 4948 wrote to memory of 2156 4948 dllhost.exe 78 PID 4948 wrote to memory of 2156 4948 dllhost.exe 78 PID 4948 wrote to memory of 2156 4948 dllhost.exe 78 PID 4948 wrote to memory of 2840 4948 dllhost.exe 79 PID 4948 wrote to memory of 2840 4948 dllhost.exe 79 PID 4948 wrote to memory of 2840 4948 dllhost.exe 79 PID 4948 wrote to memory of 1488 4948 dllhost.exe 82 PID 4948 wrote to memory of 1488 4948 dllhost.exe 82 PID 4948 wrote to memory of 1488 4948 dllhost.exe 82 PID 4948 wrote to memory of 4964 4948 dllhost.exe 86 PID 4948 wrote to memory of 4964 4948 dllhost.exe 86 PID 4948 wrote to memory of 4964 4948 dllhost.exe 86 PID 4948 wrote to memory of 4012 4948 dllhost.exe 83 PID 4948 wrote to memory of 4012 4948 dllhost.exe 83 PID 4948 wrote to memory of 4012 4948 dllhost.exe 83 PID 1180 wrote to memory of 4624 1180 cmd.exe 98 PID 3012 wrote to memory of 4616 3012 cmd.exe 97 PID 1180 wrote to memory of 4624 1180 cmd.exe 98 PID 1180 wrote to memory of 4624 1180 cmd.exe 98 PID 3012 wrote to memory of 4616 3012 cmd.exe 97 PID 3012 wrote to memory of 4616 3012 cmd.exe 97 PID 3056 wrote to memory of 4652 3056 cmd.exe 95 PID 3056 wrote to memory of 4652 3056 cmd.exe 95 PID 3056 wrote to memory of 4652 3056 cmd.exe 95 PID 456 wrote to memory of 3828 456 cmd.exe 96 PID 456 wrote to memory of 3828 456 cmd.exe 96 PID 456 wrote to memory of 3828 456 cmd.exe 96 PID 4964 wrote to memory of 4260 4964 cmd.exe 99 PID 4964 wrote to memory of 4260 4964 cmd.exe 99 PID 4964 wrote to memory of 4260 4964 cmd.exe 99 PID 4948 wrote to memory of 1196 4948 dllhost.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\64b7c530f7fb7a8a6665e464720865b330d4a71bc118a70dd7545fc6e082b2ff.exe"C:\Users\Admin\AppData\Local\Temp\64b7c530f7fb7a8a6665e464720865b330d4a71bc118a70dd7545fc6e082b2ff.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:2888
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4624
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4652
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3828
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4200
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2136
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4616
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2156
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1339" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2840
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3349" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1488
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6627" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4012
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk1541" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk1541" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4260
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2308
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:1196
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:2304
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:4048
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4960
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
945KB
MD5128017930444dbce551306a2b6bb4026
SHA13a3369793715139df4e360aa8a45e0d4c6458e07
SHA25655ec31e1da266fbc9ca020c0a206a9d32c5b2b4b6611a8023015249ce06d2aa7
SHA5127f100438986f1fd1f750e5295a9bc3aaba1c3cc440cbe7903e327b68a440936c7a28aa3d498e1b9a8430a52c118dcd3c4ab8571d582d58c992011530244f696e
-
Filesize
945KB
MD5128017930444dbce551306a2b6bb4026
SHA13a3369793715139df4e360aa8a45e0d4c6458e07
SHA25655ec31e1da266fbc9ca020c0a206a9d32c5b2b4b6611a8023015249ce06d2aa7
SHA5127f100438986f1fd1f750e5295a9bc3aaba1c3cc440cbe7903e327b68a440936c7a28aa3d498e1b9a8430a52c118dcd3c4ab8571d582d58c992011530244f696e
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc