Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
09/10/2022, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
62ed66200303f23780dd1112edad83b2f65c82fe93b18d35e34d3a44df5d7798.exe
Resource
win10-20220812-en
General
-
Target
62ed66200303f23780dd1112edad83b2f65c82fe93b18d35e34d3a44df5d7798.exe
-
Size
733KB
-
MD5
8742d58a001ff9dc6453ef39b0756f8d
-
SHA1
d3cdac00c36ec6b0edc1d74111b31ace99b216e5
-
SHA256
62ed66200303f23780dd1112edad83b2f65c82fe93b18d35e34d3a44df5d7798
-
SHA512
38fefc162eff1abaf1386fac1978e79f5873e9c8e7ce6070b0ca3a9b8dec2c8f1c7d0029db236612e0887dbd6b2a069e71333b5a4df770a639681de7ce102f7d
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4076 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 288 schtasks.exe 4780 schtasks.exe 1456 schtasks.exe 1400 schtasks.exe 2404 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5096 powershell.exe 5096 powershell.exe 5096 powershell.exe 4620 powershell.exe 4620 powershell.exe 4620 powershell.exe 2400 powershell.exe 2400 powershell.exe 2400 powershell.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe 4076 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 5096 powershell.exe Token: SeDebugPrivilege 4824 62ed66200303f23780dd1112edad83b2f65c82fe93b18d35e34d3a44df5d7798.exe Token: SeDebugPrivilege 4620 powershell.exe Token: SeDebugPrivilege 2400 powershell.exe Token: SeDebugPrivilege 4076 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4824 wrote to memory of 3444 4824 62ed66200303f23780dd1112edad83b2f65c82fe93b18d35e34d3a44df5d7798.exe 67 PID 4824 wrote to memory of 3444 4824 62ed66200303f23780dd1112edad83b2f65c82fe93b18d35e34d3a44df5d7798.exe 67 PID 4824 wrote to memory of 3444 4824 62ed66200303f23780dd1112edad83b2f65c82fe93b18d35e34d3a44df5d7798.exe 67 PID 3444 wrote to memory of 3352 3444 cmd.exe 69 PID 3444 wrote to memory of 3352 3444 cmd.exe 69 PID 3444 wrote to memory of 3352 3444 cmd.exe 69 PID 3444 wrote to memory of 5096 3444 cmd.exe 70 PID 3444 wrote to memory of 5096 3444 cmd.exe 70 PID 3444 wrote to memory of 5096 3444 cmd.exe 70 PID 3444 wrote to memory of 4620 3444 cmd.exe 71 PID 3444 wrote to memory of 4620 3444 cmd.exe 71 PID 3444 wrote to memory of 4620 3444 cmd.exe 71 PID 3444 wrote to memory of 2400 3444 cmd.exe 72 PID 3444 wrote to memory of 2400 3444 cmd.exe 72 PID 3444 wrote to memory of 2400 3444 cmd.exe 72 PID 4824 wrote to memory of 4076 4824 62ed66200303f23780dd1112edad83b2f65c82fe93b18d35e34d3a44df5d7798.exe 73 PID 4824 wrote to memory of 4076 4824 62ed66200303f23780dd1112edad83b2f65c82fe93b18d35e34d3a44df5d7798.exe 73 PID 4824 wrote to memory of 4076 4824 62ed66200303f23780dd1112edad83b2f65c82fe93b18d35e34d3a44df5d7798.exe 73 PID 4076 wrote to memory of 4412 4076 dllhost.exe 74 PID 4076 wrote to memory of 4412 4076 dllhost.exe 74 PID 4076 wrote to memory of 4412 4076 dllhost.exe 74 PID 4076 wrote to memory of 3804 4076 dllhost.exe 75 PID 4076 wrote to memory of 3804 4076 dllhost.exe 75 PID 4076 wrote to memory of 3804 4076 dllhost.exe 75 PID 4076 wrote to memory of 4988 4076 dllhost.exe 76 PID 4076 wrote to memory of 4988 4076 dllhost.exe 76 PID 4076 wrote to memory of 4988 4076 dllhost.exe 76 PID 4076 wrote to memory of 4304 4076 dllhost.exe 83 PID 4076 wrote to memory of 4304 4076 dllhost.exe 83 PID 4076 wrote to memory of 4304 4076 dllhost.exe 83 PID 4076 wrote to memory of 3964 4076 dllhost.exe 77 PID 4076 wrote to memory of 3964 4076 dllhost.exe 77 PID 4076 wrote to memory of 3964 4076 dllhost.exe 77 PID 4076 wrote to memory of 3944 4076 dllhost.exe 79 PID 4076 wrote to memory of 3944 4076 dllhost.exe 79 PID 4076 wrote to memory of 3944 4076 dllhost.exe 79 PID 4076 wrote to memory of 4004 4076 dllhost.exe 80 PID 4076 wrote to memory of 4004 4076 dllhost.exe 80 PID 4076 wrote to memory of 4004 4076 dllhost.exe 80 PID 4076 wrote to memory of 1800 4076 dllhost.exe 81 PID 4076 wrote to memory of 1800 4076 dllhost.exe 81 PID 4076 wrote to memory of 1800 4076 dllhost.exe 81 PID 4076 wrote to memory of 4260 4076 dllhost.exe 96 PID 4076 wrote to memory of 4260 4076 dllhost.exe 96 PID 4076 wrote to memory of 4260 4076 dllhost.exe 96 PID 4076 wrote to memory of 3184 4076 dllhost.exe 94 PID 4076 wrote to memory of 3184 4076 dllhost.exe 94 PID 4076 wrote to memory of 3184 4076 dllhost.exe 94 PID 4076 wrote to memory of 2804 4076 dllhost.exe 86 PID 4076 wrote to memory of 2804 4076 dllhost.exe 86 PID 4076 wrote to memory of 2804 4076 dllhost.exe 86 PID 4076 wrote to memory of 4724 4076 dllhost.exe 87 PID 4076 wrote to memory of 4724 4076 dllhost.exe 87 PID 4076 wrote to memory of 4724 4076 dllhost.exe 87 PID 3964 wrote to memory of 1456 3964 cmd.exe 97 PID 3964 wrote to memory of 1456 3964 cmd.exe 97 PID 3964 wrote to memory of 1456 3964 cmd.exe 97 PID 3804 wrote to memory of 1400 3804 cmd.exe 98 PID 3804 wrote to memory of 1400 3804 cmd.exe 98 PID 3804 wrote to memory of 1400 3804 cmd.exe 98 PID 3944 wrote to memory of 2404 3944 cmd.exe 99 PID 3944 wrote to memory of 2404 3944 cmd.exe 99 PID 3944 wrote to memory of 2404 3944 cmd.exe 99 PID 1800 wrote to memory of 4780 1800 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\62ed66200303f23780dd1112edad83b2f65c82fe93b18d35e34d3a44df5d7798.exe"C:\Users\Admin\AppData\Local\Temp\62ed66200303f23780dd1112edad83b2f65c82fe93b18d35e34d3a44df5d7798.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:3352
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4412
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1400
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4988
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1456
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2404
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4004
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4780
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4304
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk8326" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2804
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7898" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4724
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk4445" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3184
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk4445" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:288
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1167" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4260
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:4244
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4640
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:2540
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4404
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:1764
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:5012
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
963KB
MD50bd1ecb826c7f179b3997c4c1b81b899
SHA16e124aee430fb6aae34d2992018c4c5049b3c20e
SHA25621a1402a8ffa91470e4f27e507b3247e79e50f9fd2b932402531b443ec43c13b
SHA512cff22af1a71d6d12d08163b89976a8da164b13267322a02a01cf1a310b5e65c7f47f3c138827d9667a6890002ba8ef517098abbed9b88cbb0e1d2b3bc0688bc0
-
Filesize
963KB
MD50bd1ecb826c7f179b3997c4c1b81b899
SHA16e124aee430fb6aae34d2992018c4c5049b3c20e
SHA25621a1402a8ffa91470e4f27e507b3247e79e50f9fd2b932402531b443ec43c13b
SHA512cff22af1a71d6d12d08163b89976a8da164b13267322a02a01cf1a310b5e65c7f47f3c138827d9667a6890002ba8ef517098abbed9b88cbb0e1d2b3bc0688bc0
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD516a762a70933f2e7842148b89e6e3d56
SHA1f5a8ab468045fbeb9f4f02c279d8c6ff38964f89
SHA2565fb6c2a90cc9a2117cfe30a0e12aa376f059189cbfbec53cba2d7782e94ce83d
SHA512d8efd0f36c4872866f9e518ea23d7155ab2ddcc1c15c7d315c73ed4d77aa8f76846bbcb66ec6f9d9ef70c59b11b22588caee127a2c4a367338711c1e11a11e2a
-
Filesize
18KB
MD5c900a914b940cddf64e50cfc87d424eb
SHA1703d4bc7e6efd3bb80cf844e0b961bf5fdf13aa2
SHA256a38cc9e58770b40a3490a40ba68602dec4781d6f87dd01f4c433ae6486cece76
SHA5120c39ae5b715c4e1eacf78e9e11decab6bf7b35ea47c8cbf3996f2ac82cf94fa93a3023895ad20a8ae62dd556dda3210920200ff4e597b42447e3026c880c55d7