Analysis
-
max time kernel
157s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 19:22
Static task
static1
Behavioral task
behavioral1
Sample
682283ef8fde1772be8f6da7a5ea6cb75c92f468900f4ad9a980d540e9ee71e4.exe
Resource
win10v2004-20220812-en
General
-
Target
682283ef8fde1772be8f6da7a5ea6cb75c92f468900f4ad9a980d540e9ee71e4.exe
-
Size
731KB
-
MD5
f3654deae66c38b6de2d38d361e8ca3a
-
SHA1
d43dbc24eeb90e8561bd16285c72e0b012b3cde8
-
SHA256
682283ef8fde1772be8f6da7a5ea6cb75c92f468900f4ad9a980d540e9ee71e4
-
SHA512
bb8c61531d91e497bbb458f11e27d581aaf42721dadb2bf06e2be7b5daa06e57fa7dab263b7254f4b3062c8963004f2c39a02208b3461453f72904e79a861d06
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 228 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4048 schtasks.exe 3700 schtasks.exe 2936 schtasks.exe 3376 schtasks.exe 3108 schtasks.exe 4352 schtasks.exe 2160 schtasks.exe 4164 schtasks.exe 3076 schtasks.exe 4476 schtasks.exe 4888 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1456 powershell.exe 1456 powershell.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe 228 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4332 682283ef8fde1772be8f6da7a5ea6cb75c92f468900f4ad9a980d540e9ee71e4.exe Token: SeDebugPrivilege 1456 powershell.exe Token: SeDebugPrivilege 228 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4332 wrote to memory of 4344 4332 682283ef8fde1772be8f6da7a5ea6cb75c92f468900f4ad9a980d540e9ee71e4.exe 80 PID 4332 wrote to memory of 4344 4332 682283ef8fde1772be8f6da7a5ea6cb75c92f468900f4ad9a980d540e9ee71e4.exe 80 PID 4332 wrote to memory of 4344 4332 682283ef8fde1772be8f6da7a5ea6cb75c92f468900f4ad9a980d540e9ee71e4.exe 80 PID 4344 wrote to memory of 4720 4344 cmd.exe 83 PID 4344 wrote to memory of 4720 4344 cmd.exe 83 PID 4344 wrote to memory of 4720 4344 cmd.exe 83 PID 4344 wrote to memory of 1456 4344 cmd.exe 85 PID 4344 wrote to memory of 1456 4344 cmd.exe 85 PID 4344 wrote to memory of 1456 4344 cmd.exe 85 PID 4332 wrote to memory of 228 4332 682283ef8fde1772be8f6da7a5ea6cb75c92f468900f4ad9a980d540e9ee71e4.exe 86 PID 4332 wrote to memory of 228 4332 682283ef8fde1772be8f6da7a5ea6cb75c92f468900f4ad9a980d540e9ee71e4.exe 86 PID 4332 wrote to memory of 228 4332 682283ef8fde1772be8f6da7a5ea6cb75c92f468900f4ad9a980d540e9ee71e4.exe 86 PID 228 wrote to memory of 3784 228 dllhost.exe 87 PID 228 wrote to memory of 3784 228 dllhost.exe 87 PID 228 wrote to memory of 3784 228 dllhost.exe 87 PID 228 wrote to memory of 2072 228 dllhost.exe 88 PID 228 wrote to memory of 2072 228 dllhost.exe 88 PID 228 wrote to memory of 2072 228 dllhost.exe 88 PID 228 wrote to memory of 2196 228 dllhost.exe 93 PID 228 wrote to memory of 2196 228 dllhost.exe 93 PID 228 wrote to memory of 2196 228 dllhost.exe 93 PID 228 wrote to memory of 3256 228 dllhost.exe 91 PID 228 wrote to memory of 3256 228 dllhost.exe 91 PID 228 wrote to memory of 3256 228 dllhost.exe 91 PID 228 wrote to memory of 5044 228 dllhost.exe 90 PID 228 wrote to memory of 5044 228 dllhost.exe 90 PID 228 wrote to memory of 5044 228 dllhost.exe 90 PID 228 wrote to memory of 4876 228 dllhost.exe 95 PID 228 wrote to memory of 4876 228 dllhost.exe 95 PID 228 wrote to memory of 4876 228 dllhost.exe 95 PID 228 wrote to memory of 3280 228 dllhost.exe 98 PID 228 wrote to memory of 3280 228 dllhost.exe 98 PID 228 wrote to memory of 3280 228 dllhost.exe 98 PID 228 wrote to memory of 4524 228 dllhost.exe 99 PID 228 wrote to memory of 4524 228 dllhost.exe 99 PID 228 wrote to memory of 4524 228 dllhost.exe 99 PID 228 wrote to memory of 4240 228 dllhost.exe 101 PID 228 wrote to memory of 4240 228 dllhost.exe 101 PID 228 wrote to memory of 4240 228 dllhost.exe 101 PID 228 wrote to memory of 3724 228 dllhost.exe 102 PID 228 wrote to memory of 3724 228 dllhost.exe 102 PID 228 wrote to memory of 3724 228 dllhost.exe 102 PID 228 wrote to memory of 3508 228 dllhost.exe 106 PID 228 wrote to memory of 3508 228 dllhost.exe 106 PID 228 wrote to memory of 3508 228 dllhost.exe 106 PID 228 wrote to memory of 4288 228 dllhost.exe 104 PID 228 wrote to memory of 4288 228 dllhost.exe 104 PID 228 wrote to memory of 4288 228 dllhost.exe 104 PID 4524 wrote to memory of 3376 4524 cmd.exe 121 PID 4524 wrote to memory of 3376 4524 cmd.exe 121 PID 4524 wrote to memory of 3376 4524 cmd.exe 121 PID 3280 wrote to memory of 3700 3280 cmd.exe 116 PID 3256 wrote to memory of 3076 3256 cmd.exe 119 PID 3280 wrote to memory of 3700 3280 cmd.exe 116 PID 3280 wrote to memory of 3700 3280 cmd.exe 116 PID 3256 wrote to memory of 3076 3256 cmd.exe 119 PID 3256 wrote to memory of 3076 3256 cmd.exe 119 PID 2196 wrote to memory of 2936 2196 cmd.exe 120 PID 2196 wrote to memory of 2936 2196 cmd.exe 120 PID 2196 wrote to memory of 2936 2196 cmd.exe 120 PID 3508 wrote to memory of 3108 3508 cmd.exe 113 PID 3508 wrote to memory of 3108 3508 cmd.exe 113 PID 3508 wrote to memory of 3108 3508 cmd.exe 113 PID 4288 wrote to memory of 4888 4288 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\682283ef8fde1772be8f6da7a5ea6cb75c92f468900f4ad9a980d540e9ee71e4.exe"C:\Users\Admin\AppData\Local\Temp\682283ef8fde1772be8f6da7a5ea6cb75c92f468900f4ad9a980d540e9ee71e4.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:4720
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3784
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4476
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2072
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4352
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:5044
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4164
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3076
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2936
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4876
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2160
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3700
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3376
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2903" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4240
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2903" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4048
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk9922" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3724
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk9957" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk9957" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4888
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9626" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9626" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3108
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:3960
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:3480
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:1672
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:3908
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
949KB
MD5f0ee55e5d9aaabd946222739fdd60256
SHA186fcb9772d0f3b8c459cb9ee9bd157ca1c5ed278
SHA256a07b944286cbb1128462f9364e24729211f2b7aa8cea049645b2bf2ba7703650
SHA51238b319c13e33489943efabaa026beb8ba0480802f7733c42545eb8c4de608a3fe979087cac717bd18aff4b0a777900af4431fdd56a1a1bdcb39850a79f476aac
-
Filesize
949KB
MD5f0ee55e5d9aaabd946222739fdd60256
SHA186fcb9772d0f3b8c459cb9ee9bd157ca1c5ed278
SHA256a07b944286cbb1128462f9364e24729211f2b7aa8cea049645b2bf2ba7703650
SHA51238b319c13e33489943efabaa026beb8ba0480802f7733c42545eb8c4de608a3fe979087cac717bd18aff4b0a777900af4431fdd56a1a1bdcb39850a79f476aac
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc