Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
08/10/2022, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
52ce2e30a78d8b3707fd749d5aece05af23def2a63301199e03f52fb36bbda18.exe
Resource
win10-20220901-en
General
-
Target
52ce2e30a78d8b3707fd749d5aece05af23def2a63301199e03f52fb36bbda18.exe
-
Size
733KB
-
MD5
e2f9123fcba3790c11bc44487b443611
-
SHA1
b326d6b4ac22d869b1dcc92d22ecc54ea243ba3d
-
SHA256
52ce2e30a78d8b3707fd749d5aece05af23def2a63301199e03f52fb36bbda18
-
SHA512
a2b516e64b455b35cee58a710a38b3cfcaa2f9b1d6829377dcbc43289ca64e739db62fb3e23ef9e301a968e28b4a48242afcbacbd0ec3e0be19575ebb3b787d9
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 5088 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3604 schtasks.exe 3600 schtasks.exe 3404 schtasks.exe 4168 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4940 powershell.exe 4940 powershell.exe 4940 powershell.exe 1896 powershell.exe 1896 powershell.exe 1896 powershell.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe 5088 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4940 powershell.exe Token: SeDebugPrivilege 4800 52ce2e30a78d8b3707fd749d5aece05af23def2a63301199e03f52fb36bbda18.exe Token: SeDebugPrivilege 1896 powershell.exe Token: SeDebugPrivilege 5088 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4800 wrote to memory of 2008 4800 52ce2e30a78d8b3707fd749d5aece05af23def2a63301199e03f52fb36bbda18.exe 66 PID 4800 wrote to memory of 2008 4800 52ce2e30a78d8b3707fd749d5aece05af23def2a63301199e03f52fb36bbda18.exe 66 PID 4800 wrote to memory of 2008 4800 52ce2e30a78d8b3707fd749d5aece05af23def2a63301199e03f52fb36bbda18.exe 66 PID 2008 wrote to memory of 3424 2008 cmd.exe 68 PID 2008 wrote to memory of 3424 2008 cmd.exe 68 PID 2008 wrote to memory of 3424 2008 cmd.exe 68 PID 2008 wrote to memory of 4940 2008 cmd.exe 69 PID 2008 wrote to memory of 4940 2008 cmd.exe 69 PID 2008 wrote to memory of 4940 2008 cmd.exe 69 PID 2008 wrote to memory of 1896 2008 cmd.exe 70 PID 2008 wrote to memory of 1896 2008 cmd.exe 70 PID 2008 wrote to memory of 1896 2008 cmd.exe 70 PID 4800 wrote to memory of 5088 4800 52ce2e30a78d8b3707fd749d5aece05af23def2a63301199e03f52fb36bbda18.exe 71 PID 4800 wrote to memory of 5088 4800 52ce2e30a78d8b3707fd749d5aece05af23def2a63301199e03f52fb36bbda18.exe 71 PID 4800 wrote to memory of 5088 4800 52ce2e30a78d8b3707fd749d5aece05af23def2a63301199e03f52fb36bbda18.exe 71 PID 5088 wrote to memory of 632 5088 dllhost.exe 72 PID 5088 wrote to memory of 632 5088 dllhost.exe 72 PID 5088 wrote to memory of 632 5088 dllhost.exe 72 PID 5088 wrote to memory of 4788 5088 dllhost.exe 73 PID 5088 wrote to memory of 4788 5088 dllhost.exe 73 PID 5088 wrote to memory of 4788 5088 dllhost.exe 73 PID 5088 wrote to memory of 372 5088 dllhost.exe 74 PID 5088 wrote to memory of 372 5088 dllhost.exe 74 PID 5088 wrote to memory of 372 5088 dllhost.exe 74 PID 5088 wrote to memory of 1484 5088 dllhost.exe 75 PID 5088 wrote to memory of 1484 5088 dllhost.exe 75 PID 5088 wrote to memory of 1484 5088 dllhost.exe 75 PID 5088 wrote to memory of 1776 5088 dllhost.exe 76 PID 5088 wrote to memory of 1776 5088 dllhost.exe 76 PID 5088 wrote to memory of 1776 5088 dllhost.exe 76 PID 5088 wrote to memory of 2144 5088 dllhost.exe 77 PID 5088 wrote to memory of 2144 5088 dllhost.exe 77 PID 5088 wrote to memory of 2144 5088 dllhost.exe 77 PID 5088 wrote to memory of 1468 5088 dllhost.exe 95 PID 5088 wrote to memory of 1468 5088 dllhost.exe 95 PID 5088 wrote to memory of 1468 5088 dllhost.exe 95 PID 5088 wrote to memory of 4304 5088 dllhost.exe 93 PID 5088 wrote to memory of 4304 5088 dllhost.exe 93 PID 5088 wrote to memory of 4304 5088 dllhost.exe 93 PID 5088 wrote to memory of 312 5088 dllhost.exe 80 PID 5088 wrote to memory of 312 5088 dllhost.exe 80 PID 5088 wrote to memory of 312 5088 dllhost.exe 80 PID 5088 wrote to memory of 3112 5088 dllhost.exe 81 PID 5088 wrote to memory of 3112 5088 dllhost.exe 81 PID 5088 wrote to memory of 3112 5088 dllhost.exe 81 PID 5088 wrote to memory of 1204 5088 dllhost.exe 90 PID 5088 wrote to memory of 1204 5088 dllhost.exe 90 PID 5088 wrote to memory of 1204 5088 dllhost.exe 90 PID 5088 wrote to memory of 2736 5088 dllhost.exe 83 PID 5088 wrote to memory of 2736 5088 dllhost.exe 83 PID 5088 wrote to memory of 2736 5088 dllhost.exe 83 PID 632 wrote to memory of 3604 632 cmd.exe 96 PID 632 wrote to memory of 3604 632 cmd.exe 96 PID 632 wrote to memory of 3604 632 cmd.exe 96 PID 4788 wrote to memory of 3600 4788 cmd.exe 97 PID 4788 wrote to memory of 3600 4788 cmd.exe 97 PID 4788 wrote to memory of 3600 4788 cmd.exe 97 PID 1776 wrote to memory of 3404 1776 cmd.exe 98 PID 1776 wrote to memory of 3404 1776 cmd.exe 98 PID 1776 wrote to memory of 3404 1776 cmd.exe 98 PID 1204 wrote to memory of 4168 1204 cmd.exe 99 PID 1204 wrote to memory of 4168 1204 cmd.exe 99 PID 1204 wrote to memory of 4168 1204 cmd.exe 99 PID 5088 wrote to memory of 3180 5088 dllhost.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\52ce2e30a78d8b3707fd749d5aece05af23def2a63301199e03f52fb36bbda18.exe"C:\Users\Admin\AppData\Local\Temp\52ce2e30a78d8b3707fd749d5aece05af23def2a63301199e03f52fb36bbda18.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:3424
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3604
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3600
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:372
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1484
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3404
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2144
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk6689" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:312
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk261" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3112
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk1363" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2736
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk8185" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk8185" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4168
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4304
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1468
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:3180
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:436
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:1888
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:2112
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:2264
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4796
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960KB
MD5394e934ad3ebe9a963a0cb2c41c36c83
SHA115b9b179fd53b83f7a82b043332fe4d260877a8f
SHA256bbded5eae07e716eacad788fe48c944913fd730b09ec8aa15495ffb283206c69
SHA51260d5d4e5d16b0f9f07fae2a96443be5a2b9dd9b1e64b8f762e66905850be069483770c436b294b5ff7c8f5a0a9409af004e8e2e0c3d6d9736de18df7d9c43ad2
-
Filesize
960KB
MD5394e934ad3ebe9a963a0cb2c41c36c83
SHA115b9b179fd53b83f7a82b043332fe4d260877a8f
SHA256bbded5eae07e716eacad788fe48c944913fd730b09ec8aa15495ffb283206c69
SHA51260d5d4e5d16b0f9f07fae2a96443be5a2b9dd9b1e64b8f762e66905850be069483770c436b294b5ff7c8f5a0a9409af004e8e2e0c3d6d9736de18df7d9c43ad2
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD51321d89b03a8a1649c369c5ef0a849c2
SHA1e2b0f841f5ce1a9494a276d2f44519788f67db19
SHA256cee188ece1d039f18bc6eb240ab40f78a5b7d39ea5c8d21701d8a469669faa0b
SHA512ff1f3722942f69ed147a4f27382e6e915e61a60b3ac33c69cf5d34b74530f5bdfad5c0d2c69d6dddeb34179cd27ea3f11c2be680bb7ab4f52ea0049a6c03f5bc