Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
169s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
cccf27993459362488c165354e0eb9324c77407fd436564e73beb629e6db67dd.exe
Resource
win10v2004-20220812-en
General
-
Target
cccf27993459362488c165354e0eb9324c77407fd436564e73beb629e6db67dd.exe
-
Size
730KB
-
MD5
2f5fc3bfc5041a0d51ef82bfa0ac4553
-
SHA1
eacf00ed835054a76181d823260203c7dc6fd9ec
-
SHA256
cccf27993459362488c165354e0eb9324c77407fd436564e73beb629e6db67dd
-
SHA512
86b27ec7473e788ebe2cd1b111fe7ee98c4184ce79a19aff3205bb34595bb8721f7bcedfe501cdeda5dd4ceee26e0c09356f724ebd0bd43ef58827de109a281c
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4680 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1668 schtasks.exe 740 schtasks.exe 3652 schtasks.exe 2428 schtasks.exe 328 schtasks.exe 3356 schtasks.exe 3624 schtasks.exe 2276 schtasks.exe 2740 schtasks.exe 5096 schtasks.exe 4800 schtasks.exe 4076 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2644 powershell.exe 2644 powershell.exe 3896 powershell.exe 4680 dllhost.exe 4680 dllhost.exe 3896 powershell.exe 3896 powershell.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe 4680 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 4920 cccf27993459362488c165354e0eb9324c77407fd436564e73beb629e6db67dd.exe Token: SeDebugPrivilege 3896 powershell.exe Token: SeDebugPrivilege 4680 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4920 wrote to memory of 2256 4920 cccf27993459362488c165354e0eb9324c77407fd436564e73beb629e6db67dd.exe 81 PID 4920 wrote to memory of 2256 4920 cccf27993459362488c165354e0eb9324c77407fd436564e73beb629e6db67dd.exe 81 PID 4920 wrote to memory of 2256 4920 cccf27993459362488c165354e0eb9324c77407fd436564e73beb629e6db67dd.exe 81 PID 2256 wrote to memory of 3208 2256 cmd.exe 83 PID 2256 wrote to memory of 3208 2256 cmd.exe 83 PID 2256 wrote to memory of 3208 2256 cmd.exe 83 PID 2256 wrote to memory of 2644 2256 cmd.exe 84 PID 2256 wrote to memory of 2644 2256 cmd.exe 84 PID 2256 wrote to memory of 2644 2256 cmd.exe 84 PID 4920 wrote to memory of 4680 4920 cccf27993459362488c165354e0eb9324c77407fd436564e73beb629e6db67dd.exe 93 PID 4920 wrote to memory of 4680 4920 cccf27993459362488c165354e0eb9324c77407fd436564e73beb629e6db67dd.exe 93 PID 4920 wrote to memory of 4680 4920 cccf27993459362488c165354e0eb9324c77407fd436564e73beb629e6db67dd.exe 93 PID 2256 wrote to memory of 3896 2256 cmd.exe 94 PID 2256 wrote to memory of 3896 2256 cmd.exe 94 PID 2256 wrote to memory of 3896 2256 cmd.exe 94 PID 4680 wrote to memory of 3176 4680 dllhost.exe 95 PID 4680 wrote to memory of 3176 4680 dllhost.exe 95 PID 4680 wrote to memory of 3176 4680 dllhost.exe 95 PID 4680 wrote to memory of 1424 4680 dllhost.exe 96 PID 4680 wrote to memory of 1424 4680 dllhost.exe 96 PID 4680 wrote to memory of 1424 4680 dllhost.exe 96 PID 4680 wrote to memory of 2124 4680 dllhost.exe 98 PID 4680 wrote to memory of 2124 4680 dllhost.exe 98 PID 4680 wrote to memory of 2124 4680 dllhost.exe 98 PID 4680 wrote to memory of 2264 4680 dllhost.exe 99 PID 4680 wrote to memory of 2264 4680 dllhost.exe 99 PID 4680 wrote to memory of 2264 4680 dllhost.exe 99 PID 4680 wrote to memory of 4880 4680 dllhost.exe 102 PID 4680 wrote to memory of 4880 4680 dllhost.exe 102 PID 4680 wrote to memory of 4880 4680 dllhost.exe 102 PID 4680 wrote to memory of 3240 4680 dllhost.exe 104 PID 4680 wrote to memory of 3240 4680 dllhost.exe 104 PID 4680 wrote to memory of 3240 4680 dllhost.exe 104 PID 4680 wrote to memory of 4232 4680 dllhost.exe 106 PID 4680 wrote to memory of 4232 4680 dllhost.exe 106 PID 4680 wrote to memory of 4232 4680 dllhost.exe 106 PID 4680 wrote to memory of 1836 4680 dllhost.exe 107 PID 4680 wrote to memory of 1836 4680 dllhost.exe 107 PID 4680 wrote to memory of 1836 4680 dllhost.exe 107 PID 4680 wrote to memory of 4136 4680 dllhost.exe 110 PID 4680 wrote to memory of 4136 4680 dllhost.exe 110 PID 4680 wrote to memory of 4136 4680 dllhost.exe 110 PID 4680 wrote to memory of 4480 4680 dllhost.exe 114 PID 4680 wrote to memory of 4480 4680 dllhost.exe 114 PID 4680 wrote to memory of 4480 4680 dllhost.exe 114 PID 4680 wrote to memory of 2476 4680 dllhost.exe 112 PID 4680 wrote to memory of 2476 4680 dllhost.exe 112 PID 4680 wrote to memory of 2476 4680 dllhost.exe 112 PID 4680 wrote to memory of 4272 4680 dllhost.exe 116 PID 4680 wrote to memory of 4272 4680 dllhost.exe 116 PID 4680 wrote to memory of 4272 4680 dllhost.exe 116 PID 2124 wrote to memory of 4076 2124 cmd.exe 130 PID 2124 wrote to memory of 4076 2124 cmd.exe 130 PID 2124 wrote to memory of 4076 2124 cmd.exe 130 PID 1836 wrote to memory of 5096 1836 cmd.exe 128 PID 1836 wrote to memory of 5096 1836 cmd.exe 128 PID 1836 wrote to memory of 5096 1836 cmd.exe 128 PID 2264 wrote to memory of 328 2264 cmd.exe 127 PID 2264 wrote to memory of 328 2264 cmd.exe 127 PID 2264 wrote to memory of 328 2264 cmd.exe 127 PID 3176 wrote to memory of 4800 3176 cmd.exe 129 PID 3176 wrote to memory of 4800 3176 cmd.exe 129 PID 3176 wrote to memory of 4800 3176 cmd.exe 129 PID 1424 wrote to memory of 2428 1424 cmd.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\cccf27993459362488c165354e0eb9324c77407fd436564e73beb629e6db67dd.exe"C:\Users\Admin\AppData\Local\Temp\cccf27993459362488c165354e0eb9324c77407fd436564e73beb629e6db67dd.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:3208
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4800
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2428
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4076
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:328
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4880
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1668
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3240
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:740
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4232
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3624
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:5096
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5176" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4136
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5176" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3465" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2476
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3465" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3782" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4480
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3782" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3356
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3516" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4272
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3516" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3652
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:2832
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:2316
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:4948
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:1756
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
947KB
MD51f19232a08c204aab12065a95f544922
SHA1f17ffd19592a56790d0efdc2eada1ec90fad45eb
SHA2569b2ccd1adba5cc4bba485f10f2ba30011bb06d832d294689224c3b1f71c60ba7
SHA5121281fbfa4c5bd2687616d50d4249310af4a280ce2e85509b5834806912e029c2d0e6f3875c85ab503beaa79ba2f708eb849ec8b02538ee1393f87401c4d70033
-
Filesize
947KB
MD51f19232a08c204aab12065a95f544922
SHA1f17ffd19592a56790d0efdc2eada1ec90fad45eb
SHA2569b2ccd1adba5cc4bba485f10f2ba30011bb06d832d294689224c3b1f71c60ba7
SHA5121281fbfa4c5bd2687616d50d4249310af4a280ce2e85509b5834806912e029c2d0e6f3875c85ab503beaa79ba2f708eb849ec8b02538ee1393f87401c4d70033
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD541eaa0b062d892c6e350a2d0030fbd67
SHA1ef7f7cf5e11a39eaac452dc515bed36138664c2b
SHA2562b352d70281cd72b6594b3db4d1110e4bc10e6c40651edd40ba65c249a027ba0
SHA51273716908394efb3a080c3355c2567c2b6cf852e6ed7053d97acf7b180cfa9c5b9085acd158085a9b67d05da57181ab5bc9bfdc6676dc45f1ea56baaffb827ae7