Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
08/10/2022, 18:06
Static task
static1
Behavioral task
behavioral1
Sample
f1cb0ef8b0a48ed611317dff8d5e405fe46fa24942c18bc22f080c056df3f533.exe
Resource
win10-20220901-en
General
-
Target
f1cb0ef8b0a48ed611317dff8d5e405fe46fa24942c18bc22f080c056df3f533.exe
-
Size
733KB
-
MD5
7403b4d50e78ddc4202e04214f6635c2
-
SHA1
f43dc63c996d07f5fa2fef3783cc6d1251f3d7a0
-
SHA256
f1cb0ef8b0a48ed611317dff8d5e405fe46fa24942c18bc22f080c056df3f533
-
SHA512
5f63117bedf0e01c47316b6e77100cc92f69d21d681216af8b2e35eeec90a005207f207762c06d2364f9b8b9fcaec2140f704bbfa8de38939c04f9b3c001cd52
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 5116 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2308 schtasks.exe 2316 schtasks.exe 3884 schtasks.exe 3360 schtasks.exe 1588 schtasks.exe 4836 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2684 powershell.exe 2684 powershell.exe 2684 powershell.exe 2388 powershell.exe 2388 powershell.exe 2388 powershell.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe 5116 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2684 powershell.exe Token: SeDebugPrivilege 2492 f1cb0ef8b0a48ed611317dff8d5e405fe46fa24942c18bc22f080c056df3f533.exe Token: SeDebugPrivilege 2388 powershell.exe Token: SeDebugPrivilege 5116 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2492 wrote to memory of 4016 2492 f1cb0ef8b0a48ed611317dff8d5e405fe46fa24942c18bc22f080c056df3f533.exe 66 PID 2492 wrote to memory of 4016 2492 f1cb0ef8b0a48ed611317dff8d5e405fe46fa24942c18bc22f080c056df3f533.exe 66 PID 2492 wrote to memory of 4016 2492 f1cb0ef8b0a48ed611317dff8d5e405fe46fa24942c18bc22f080c056df3f533.exe 66 PID 4016 wrote to memory of 4868 4016 cmd.exe 68 PID 4016 wrote to memory of 4868 4016 cmd.exe 68 PID 4016 wrote to memory of 4868 4016 cmd.exe 68 PID 4016 wrote to memory of 2684 4016 cmd.exe 69 PID 4016 wrote to memory of 2684 4016 cmd.exe 69 PID 4016 wrote to memory of 2684 4016 cmd.exe 69 PID 4016 wrote to memory of 2388 4016 cmd.exe 70 PID 4016 wrote to memory of 2388 4016 cmd.exe 70 PID 4016 wrote to memory of 2388 4016 cmd.exe 70 PID 2492 wrote to memory of 5116 2492 f1cb0ef8b0a48ed611317dff8d5e405fe46fa24942c18bc22f080c056df3f533.exe 71 PID 2492 wrote to memory of 5116 2492 f1cb0ef8b0a48ed611317dff8d5e405fe46fa24942c18bc22f080c056df3f533.exe 71 PID 2492 wrote to memory of 5116 2492 f1cb0ef8b0a48ed611317dff8d5e405fe46fa24942c18bc22f080c056df3f533.exe 71 PID 5116 wrote to memory of 4692 5116 dllhost.exe 72 PID 5116 wrote to memory of 4692 5116 dllhost.exe 72 PID 5116 wrote to memory of 4692 5116 dllhost.exe 72 PID 5116 wrote to memory of 4728 5116 dllhost.exe 73 PID 5116 wrote to memory of 4728 5116 dllhost.exe 73 PID 5116 wrote to memory of 4728 5116 dllhost.exe 73 PID 5116 wrote to memory of 4720 5116 dllhost.exe 74 PID 5116 wrote to memory of 4720 5116 dllhost.exe 74 PID 5116 wrote to memory of 4720 5116 dllhost.exe 74 PID 5116 wrote to memory of 4744 5116 dllhost.exe 75 PID 5116 wrote to memory of 4744 5116 dllhost.exe 75 PID 5116 wrote to memory of 4744 5116 dllhost.exe 75 PID 5116 wrote to memory of 4404 5116 dllhost.exe 76 PID 5116 wrote to memory of 4404 5116 dllhost.exe 76 PID 5116 wrote to memory of 4404 5116 dllhost.exe 76 PID 5116 wrote to memory of 4704 5116 dllhost.exe 94 PID 5116 wrote to memory of 4704 5116 dllhost.exe 94 PID 5116 wrote to memory of 4704 5116 dllhost.exe 94 PID 5116 wrote to memory of 3148 5116 dllhost.exe 93 PID 5116 wrote to memory of 3148 5116 dllhost.exe 93 PID 5116 wrote to memory of 3148 5116 dllhost.exe 93 PID 5116 wrote to memory of 640 5116 dllhost.exe 79 PID 5116 wrote to memory of 640 5116 dllhost.exe 79 PID 5116 wrote to memory of 640 5116 dllhost.exe 79 PID 5116 wrote to memory of 3332 5116 dllhost.exe 91 PID 5116 wrote to memory of 3332 5116 dllhost.exe 91 PID 5116 wrote to memory of 3332 5116 dllhost.exe 91 PID 5116 wrote to memory of 1596 5116 dllhost.exe 81 PID 5116 wrote to memory of 1596 5116 dllhost.exe 81 PID 5116 wrote to memory of 1596 5116 dllhost.exe 81 PID 5116 wrote to memory of 900 5116 dllhost.exe 89 PID 5116 wrote to memory of 900 5116 dllhost.exe 89 PID 5116 wrote to memory of 900 5116 dllhost.exe 89 PID 5116 wrote to memory of 292 5116 dllhost.exe 87 PID 5116 wrote to memory of 292 5116 dllhost.exe 87 PID 5116 wrote to memory of 292 5116 dllhost.exe 87 PID 4692 wrote to memory of 2308 4692 cmd.exe 96 PID 4692 wrote to memory of 2308 4692 cmd.exe 96 PID 4692 wrote to memory of 2308 4692 cmd.exe 96 PID 4404 wrote to memory of 2316 4404 cmd.exe 97 PID 4404 wrote to memory of 2316 4404 cmd.exe 97 PID 4404 wrote to memory of 2316 4404 cmd.exe 97 PID 4728 wrote to memory of 3884 4728 cmd.exe 98 PID 4728 wrote to memory of 3884 4728 cmd.exe 98 PID 4728 wrote to memory of 3884 4728 cmd.exe 98 PID 4744 wrote to memory of 3360 4744 cmd.exe 99 PID 4744 wrote to memory of 3360 4744 cmd.exe 99 PID 4744 wrote to memory of 3360 4744 cmd.exe 99 PID 640 wrote to memory of 1588 640 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1cb0ef8b0a48ed611317dff8d5e405fe46fa24942c18bc22f080c056df3f533.exe"C:\Users\Admin\AppData\Local\Temp\f1cb0ef8b0a48ed611317dff8d5e405fe46fa24942c18bc22f080c056df3f533.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:4868
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2308
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3884
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4720
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3360
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2316
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1588
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk1569" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1596
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk1569" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4836
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7028" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:292
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk292" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:900
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk3754" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3332
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3148
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4704
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:1832
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:3672
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:2708
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:2200
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:1036
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4104
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960KB
MD5a1186cfb59791e1ad806be13f30035a8
SHA103618ac95a296f1103b61f94903eab6166f5571e
SHA25648832f37ca92015f374d20db42dc4bdf2ceb620ae314142942b1d1fdb45fed06
SHA512c30c966af5de0c0fa2ac46ebc0003bc7896c54fb750408229d2f85c83dd714ef4aa13d3e6f276ffc151f9d6447eea755a2d36ca24442cb2071058abaa8831b4a
-
Filesize
960KB
MD5a1186cfb59791e1ad806be13f30035a8
SHA103618ac95a296f1103b61f94903eab6166f5571e
SHA25648832f37ca92015f374d20db42dc4bdf2ceb620ae314142942b1d1fdb45fed06
SHA512c30c966af5de0c0fa2ac46ebc0003bc7896c54fb750408229d2f85c83dd714ef4aa13d3e6f276ffc151f9d6447eea755a2d36ca24442cb2071058abaa8831b4a
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD5b7914bb0094047e991fddbc0c5d71765
SHA192d98bf4837e76e41d22f4b212cab34a572a017e
SHA256444f657931862ba5619a4bb9affe44dcbee408c2df4948d578b7d01c8b42be53
SHA512044e13a88fbe275a512ff0aab86b20d7439297cf14499d4a48ca83c57fc704ac7ff3c57c63002c6df1e15e6476283eda646d9c0b3aea69b0a7b7f9b2722303d9