Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2022, 11:26
Static task
static1
Behavioral task
behavioral1
Sample
58d8eb6aa9ccd7d9e86c87f46d0f255eadd2007ff354e50b1a022a4416f69db8.exe
Resource
win10v2004-20220812-en
General
-
Target
58d8eb6aa9ccd7d9e86c87f46d0f255eadd2007ff354e50b1a022a4416f69db8.exe
-
Size
732KB
-
MD5
22c2eeeab2cd9f6e7dcf3da7ecb8dcdc
-
SHA1
a8ee14df995afb320a0f04cc14cd930d28acc6c4
-
SHA256
58d8eb6aa9ccd7d9e86c87f46d0f255eadd2007ff354e50b1a022a4416f69db8
-
SHA512
699d2cf0d92ec193212021da2ec51fff8001005ab9cc17d491624e2b4e73cf7941a79df3d034c8374a7f66b2f89cd82119b621f34d4c9ff9f3eec81045a64adf
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2716 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4356 schtasks.exe 4528 schtasks.exe 2852 schtasks.exe 4312 schtasks.exe 3192 schtasks.exe 2180 schtasks.exe 4704 schtasks.exe 4884 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5008 powershell.exe 5008 powershell.exe 2056 powershell.exe 2056 powershell.exe 968 powershell.exe 968 powershell.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe 2716 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 5008 powershell.exe Token: SeDebugPrivilege 4332 58d8eb6aa9ccd7d9e86c87f46d0f255eadd2007ff354e50b1a022a4416f69db8.exe Token: SeDebugPrivilege 2056 powershell.exe Token: SeDebugPrivilege 968 powershell.exe Token: SeDebugPrivilege 2716 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4332 wrote to memory of 4912 4332 58d8eb6aa9ccd7d9e86c87f46d0f255eadd2007ff354e50b1a022a4416f69db8.exe 80 PID 4332 wrote to memory of 4912 4332 58d8eb6aa9ccd7d9e86c87f46d0f255eadd2007ff354e50b1a022a4416f69db8.exe 80 PID 4332 wrote to memory of 4912 4332 58d8eb6aa9ccd7d9e86c87f46d0f255eadd2007ff354e50b1a022a4416f69db8.exe 80 PID 4912 wrote to memory of 4968 4912 cmd.exe 82 PID 4912 wrote to memory of 4968 4912 cmd.exe 82 PID 4912 wrote to memory of 4968 4912 cmd.exe 82 PID 4912 wrote to memory of 5008 4912 cmd.exe 83 PID 4912 wrote to memory of 5008 4912 cmd.exe 83 PID 4912 wrote to memory of 5008 4912 cmd.exe 83 PID 4912 wrote to memory of 2056 4912 cmd.exe 89 PID 4912 wrote to memory of 2056 4912 cmd.exe 89 PID 4912 wrote to memory of 2056 4912 cmd.exe 89 PID 4912 wrote to memory of 968 4912 cmd.exe 92 PID 4912 wrote to memory of 968 4912 cmd.exe 92 PID 4912 wrote to memory of 968 4912 cmd.exe 92 PID 4332 wrote to memory of 2716 4332 58d8eb6aa9ccd7d9e86c87f46d0f255eadd2007ff354e50b1a022a4416f69db8.exe 93 PID 4332 wrote to memory of 2716 4332 58d8eb6aa9ccd7d9e86c87f46d0f255eadd2007ff354e50b1a022a4416f69db8.exe 93 PID 4332 wrote to memory of 2716 4332 58d8eb6aa9ccd7d9e86c87f46d0f255eadd2007ff354e50b1a022a4416f69db8.exe 93 PID 2716 wrote to memory of 2660 2716 dllhost.exe 94 PID 2716 wrote to memory of 2660 2716 dllhost.exe 94 PID 2716 wrote to memory of 2660 2716 dllhost.exe 94 PID 2716 wrote to memory of 3740 2716 dllhost.exe 95 PID 2716 wrote to memory of 3740 2716 dllhost.exe 95 PID 2716 wrote to memory of 3740 2716 dllhost.exe 95 PID 2716 wrote to memory of 4736 2716 dllhost.exe 97 PID 2716 wrote to memory of 4736 2716 dllhost.exe 97 PID 2716 wrote to memory of 4736 2716 dllhost.exe 97 PID 2716 wrote to memory of 4580 2716 dllhost.exe 102 PID 2716 wrote to memory of 4580 2716 dllhost.exe 102 PID 2716 wrote to memory of 4580 2716 dllhost.exe 102 PID 2716 wrote to memory of 1252 2716 dllhost.exe 100 PID 2716 wrote to memory of 1252 2716 dllhost.exe 100 PID 2716 wrote to memory of 1252 2716 dllhost.exe 100 PID 2716 wrote to memory of 2580 2716 dllhost.exe 103 PID 2716 wrote to memory of 2580 2716 dllhost.exe 103 PID 2716 wrote to memory of 2580 2716 dllhost.exe 103 PID 2716 wrote to memory of 740 2716 dllhost.exe 105 PID 2716 wrote to memory of 740 2716 dllhost.exe 105 PID 2716 wrote to memory of 740 2716 dllhost.exe 105 PID 2716 wrote to memory of 2668 2716 dllhost.exe 107 PID 2716 wrote to memory of 2668 2716 dllhost.exe 107 PID 2716 wrote to memory of 2668 2716 dllhost.exe 107 PID 2716 wrote to memory of 1736 2716 dllhost.exe 109 PID 2716 wrote to memory of 1736 2716 dllhost.exe 109 PID 2716 wrote to memory of 1736 2716 dllhost.exe 109 PID 2716 wrote to memory of 2312 2716 dllhost.exe 111 PID 2716 wrote to memory of 2312 2716 dllhost.exe 111 PID 2716 wrote to memory of 2312 2716 dllhost.exe 111 PID 2716 wrote to memory of 3012 2716 dllhost.exe 113 PID 2716 wrote to memory of 3012 2716 dllhost.exe 113 PID 2716 wrote to memory of 3012 2716 dllhost.exe 113 PID 2716 wrote to memory of 1988 2716 dllhost.exe 115 PID 2716 wrote to memory of 1988 2716 dllhost.exe 115 PID 2716 wrote to memory of 1988 2716 dllhost.exe 115 PID 2580 wrote to memory of 2852 2580 cmd.exe 120 PID 2580 wrote to memory of 2852 2580 cmd.exe 120 PID 2580 wrote to memory of 2852 2580 cmd.exe 120 PID 1252 wrote to memory of 4356 1252 cmd.exe 118 PID 1252 wrote to memory of 4356 1252 cmd.exe 118 PID 1252 wrote to memory of 4356 1252 cmd.exe 118 PID 4736 wrote to memory of 4528 4736 cmd.exe 119 PID 4736 wrote to memory of 4528 4736 cmd.exe 119 PID 4736 wrote to memory of 4528 4736 cmd.exe 119 PID 4580 wrote to memory of 4312 4580 cmd.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\58d8eb6aa9ccd7d9e86c87f46d0f255eadd2007ff354e50b1a022a4416f69db8.exe"C:\Users\Admin\AppData\Local\Temp\58d8eb6aa9ccd7d9e86c87f46d0f255eadd2007ff354e50b1a022a4416f69db8.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:4968
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:968
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2660
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3192
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3740
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4528
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4356
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4312
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2852
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:740
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2668
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4884
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk124" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1736
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk9043" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2312
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk9043" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4704
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9964" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3012
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9964" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2180
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk5392" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1988
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:3868
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:2328
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:2284
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:1916
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:524
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4000
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
953KB
MD5ca6f129e89e80841204fe9973f274b02
SHA1831cfe737a2025d195003ad4d4703b4ee5864f16
SHA2569d97799d6f1e9f279529eae1e376d1a62d46073e7b5d42fac5f4cb47de6774e2
SHA5126e49e405c2487bb797067f9f568884ba7cdccdfcfe4daa510d5fdf9ad596fc0a4951958a17f6da5b393d24bf8ab87c52583a573781590f3e4924a44d22ba2549
-
Filesize
953KB
MD5ca6f129e89e80841204fe9973f274b02
SHA1831cfe737a2025d195003ad4d4703b4ee5864f16
SHA2569d97799d6f1e9f279529eae1e376d1a62d46073e7b5d42fac5f4cb47de6774e2
SHA5126e49e405c2487bb797067f9f568884ba7cdccdfcfe4daa510d5fdf9ad596fc0a4951958a17f6da5b393d24bf8ab87c52583a573781590f3e4924a44d22ba2549
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD54461bb43113e2b12d066b9a2f625ed22
SHA1033acddda341ac3cb5db8b67280622b1c70ee91f
SHA2560fbdc55cf5de70b54495b02a9aa562388fc6bf329132b2365d3093a848cc42c0
SHA512f889d02c485846d2bdd57ac5485818dd3f8177c8f3122879847d29496786f5dae082e69f79537707e13ebb36da1b94eda21da331e0388572449575c129d95e6b
-
Filesize
18KB
MD5c7345848649cf84c947f9828784b4d51
SHA157ce9468eaf21b3e1457758353d73888c8fc7f8f
SHA2567ab85f34bc46d94c3db4a909c2b754664d732375d153c1cbfe482ffa0de9bddb
SHA51281fc1e1bea983f7cf01e6563a85bb9690c4eb57d71e7fdb0af3338fff201e41fb5e02d6b6d41eb8cd8b2083aec1e2fabea48a1fbcc6cee740bfb4a71a4c2daa0