General
-
Target
taskhost.exe
-
Size
35.3MB
-
Sample
221031-yt46rsceh9
-
MD5
911a11639a40d412466ac9bfca7c1ea1
-
SHA1
bd79203199a3aa9b4222a80bfe070902c50089b9
-
SHA256
91303120d9f0da0918f412b1a50134fe780835457b18624013e7502b6171e6dd
-
SHA512
20a0f6faab8619456dfb8cf5397951a56ea1bff4a3388029a7d19e88b4883cdf2635dcc9c2b71018c1edf1755546924761fd9eb11405fdcb54379c96ec380bdf
-
SSDEEP
786432:E20/7XQ6bxJzUArhCh5ZKHvqmgcshUtrYVOWkkNRS0IVKi1Nn/vARdbulE:f0zXQ6bnnhC+9oKYcWkylIVDN/vaCE
Behavioral task
behavioral1
Sample
taskhost.exe
Resource
win7-20220901-en
Malware Config
Targets
-
-
Target
taskhost.exe
-
Size
35.3MB
-
MD5
911a11639a40d412466ac9bfca7c1ea1
-
SHA1
bd79203199a3aa9b4222a80bfe070902c50089b9
-
SHA256
91303120d9f0da0918f412b1a50134fe780835457b18624013e7502b6171e6dd
-
SHA512
20a0f6faab8619456dfb8cf5397951a56ea1bff4a3388029a7d19e88b4883cdf2635dcc9c2b71018c1edf1755546924761fd9eb11405fdcb54379c96ec380bdf
-
SSDEEP
786432:E20/7XQ6bxJzUArhCh5ZKHvqmgcshUtrYVOWkkNRS0IVKi1Nn/vARdbulE:f0zXQ6bnnhC+9oKYcWkylIVDN/vaCE
-
Modifies visiblity of hidden/system files in Explorer
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
XMRig Miner payload
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-