Analysis
-
max time kernel
300s -
max time network
252s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
03/01/2023, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3.exe
Resource
win10-20220901-en
General
-
Target
a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3.exe
-
Size
56KB
-
MD5
2e16b9fc1ce92309c4658bc5e78a5c63
-
SHA1
ffee7171cefd8bcf8e27671078bf40ad41e41cbc
-
SHA256
a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3
-
SHA512
015a900c7f47d5c0e92bd3bc15b2aa5dcf7a8ec12900881582319c497a45d3ad1b3d33be2f221da2d501a86661f45e659c1ec5870db489e4e1d031ce5759c6de
-
SSDEEP
768:9zOfVpyN0RyJ/Agv5W9HsHHkcigcNsxp2bgwiUaRs36fTT+UtY:8yNWUv5WBsHEc9VGbg3Dy3qThG
Malware Config
Signatures
-
XMRig Miner payload 1 IoCs
resource yara_rule behavioral2/files/0x000600000001afff-1178.dat xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 4432 dllhost.exe 4384 winlogson.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe / file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4036 schtasks.exe 4056 schtasks.exe 3424 schtasks.exe 4264 schtasks.exe 4236 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1312 a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3.exe 4912 powershell.exe 4912 powershell.exe 4912 powershell.exe 4176 powershell.exe 4176 powershell.exe 4176 powershell.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe 4432 dllhost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 644 Process not Found -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1312 a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3.exe Token: SeDebugPrivilege 4912 powershell.exe Token: SeDebugPrivilege 4176 powershell.exe Token: SeDebugPrivilege 4432 dllhost.exe Token: SeLockMemoryPrivilege 4384 winlogson.exe Token: SeLockMemoryPrivilege 4384 winlogson.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4384 winlogson.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1312 wrote to memory of 3328 1312 a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3.exe 68 PID 1312 wrote to memory of 3328 1312 a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3.exe 68 PID 1312 wrote to memory of 3328 1312 a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3.exe 68 PID 3328 wrote to memory of 4312 3328 cmd.exe 70 PID 3328 wrote to memory of 4312 3328 cmd.exe 70 PID 3328 wrote to memory of 4312 3328 cmd.exe 70 PID 3328 wrote to memory of 4912 3328 cmd.exe 71 PID 3328 wrote to memory of 4912 3328 cmd.exe 71 PID 3328 wrote to memory of 4912 3328 cmd.exe 71 PID 3328 wrote to memory of 4176 3328 cmd.exe 72 PID 3328 wrote to memory of 4176 3328 cmd.exe 72 PID 3328 wrote to memory of 4176 3328 cmd.exe 72 PID 1312 wrote to memory of 4432 1312 a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3.exe 73 PID 1312 wrote to memory of 4432 1312 a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3.exe 73 PID 1312 wrote to memory of 4432 1312 a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3.exe 73 PID 4432 wrote to memory of 4424 4432 dllhost.exe 74 PID 4432 wrote to memory of 4424 4432 dllhost.exe 74 PID 4432 wrote to memory of 4424 4432 dllhost.exe 74 PID 4432 wrote to memory of 2736 4432 dllhost.exe 75 PID 4432 wrote to memory of 2736 4432 dllhost.exe 75 PID 4432 wrote to memory of 2736 4432 dllhost.exe 75 PID 4432 wrote to memory of 444 4432 dllhost.exe 76 PID 4432 wrote to memory of 444 4432 dllhost.exe 76 PID 4432 wrote to memory of 444 4432 dllhost.exe 76 PID 4432 wrote to memory of 160 4432 dllhost.exe 77 PID 4432 wrote to memory of 160 4432 dllhost.exe 77 PID 4432 wrote to memory of 160 4432 dllhost.exe 77 PID 4432 wrote to memory of 188 4432 dllhost.exe 80 PID 4432 wrote to memory of 188 4432 dllhost.exe 80 PID 4432 wrote to memory of 188 4432 dllhost.exe 80 PID 4432 wrote to memory of 2236 4432 dllhost.exe 79 PID 4432 wrote to memory of 2236 4432 dllhost.exe 79 PID 4432 wrote to memory of 2236 4432 dllhost.exe 79 PID 4432 wrote to memory of 4364 4432 dllhost.exe 81 PID 4432 wrote to memory of 4364 4432 dllhost.exe 81 PID 4432 wrote to memory of 4364 4432 dllhost.exe 81 PID 4432 wrote to memory of 612 4432 dllhost.exe 83 PID 4432 wrote to memory of 612 4432 dllhost.exe 83 PID 4432 wrote to memory of 612 4432 dllhost.exe 83 PID 4432 wrote to memory of 932 4432 dllhost.exe 94 PID 4432 wrote to memory of 932 4432 dllhost.exe 94 PID 4432 wrote to memory of 932 4432 dllhost.exe 94 PID 4432 wrote to memory of 1160 4432 dllhost.exe 92 PID 4432 wrote to memory of 1160 4432 dllhost.exe 92 PID 4432 wrote to memory of 1160 4432 dllhost.exe 92 PID 4432 wrote to memory of 916 4432 dllhost.exe 86 PID 4432 wrote to memory of 916 4432 dllhost.exe 86 PID 4432 wrote to memory of 916 4432 dllhost.exe 86 PID 4432 wrote to memory of 1500 4432 dllhost.exe 90 PID 4432 wrote to memory of 1500 4432 dllhost.exe 90 PID 4432 wrote to memory of 1500 4432 dllhost.exe 90 PID 4424 wrote to memory of 4036 4424 cmd.exe 98 PID 4424 wrote to memory of 4036 4424 cmd.exe 98 PID 4424 wrote to memory of 4036 4424 cmd.exe 98 PID 2236 wrote to memory of 4056 2236 cmd.exe 99 PID 2236 wrote to memory of 4056 2236 cmd.exe 99 PID 2236 wrote to memory of 4056 2236 cmd.exe 99 PID 444 wrote to memory of 3424 444 cmd.exe 100 PID 444 wrote to memory of 3424 444 cmd.exe 100 PID 444 wrote to memory of 3424 444 cmd.exe 100 PID 4364 wrote to memory of 4264 4364 cmd.exe 101 PID 4364 wrote to memory of 4264 4364 cmd.exe 101 PID 4364 wrote to memory of 4264 4364 cmd.exe 101 PID 612 wrote to memory of 4236 612 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3.exe"C:\Users\Admin\AppData\Local\Temp\a2d08339c34dd2a487a9b13e12027f5df57d8080df13e6cf5f0328b6639095e3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData"2⤵
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:4312
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4176
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4036
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2736
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3424
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:160
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4056
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:188
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4264
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4236
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk1615" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:916
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk5253" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1500
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk291" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1160
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk6709" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:932
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json3⤵PID:364
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:228
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json3⤵PID:5100
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:764
-
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe -c config.json4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4384
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD58eac424b39ecd7724237708242536dce
SHA1dbd058d840422fcaaf1d6897564e73be3641f7d3
SHA256a43dad593d702d374a6f7d8f0a7de4a1e98a8a7edbf25cc01c45b7f26e60a229
SHA5121ed33db65161a5ee089f4f030c42ac5168be0d5fd041422575d23e2f414a477b18397f583d7d53a744df716798f79de407bcb33ab8602644371c44291fa0c7fa
-
Filesize
60KB
MD58eac424b39ecd7724237708242536dce
SHA1dbd058d840422fcaaf1d6897564e73be3641f7d3
SHA256a43dad593d702d374a6f7d8f0a7de4a1e98a8a7edbf25cc01c45b7f26e60a229
SHA5121ed33db65161a5ee089f4f030c42ac5168be0d5fd041422575d23e2f414a477b18397f583d7d53a744df716798f79de407bcb33ab8602644371c44291fa0c7fa
-
Filesize
7.8MB
MD56f4532e49d65c2be0355b222f96e06e8
SHA1268e90ce25e01bbb205f6ae3f493f8da36a61480
SHA256acaf8e844ef7f4f65033ebe9546c394cc21bce175dac8b59199106309f04e5ab
SHA51285f495b0bbd0673df376f44e912f9a0a8d201c2843f1a9efa64d93703a2d8ba2b6fa2638a747e79604715d26ddfc07de26ba43d03adf86290d928b442bf09207
-
Filesize
311B
MD5a86dab3a83115be5f4ab7305f98d20d1
SHA1205065359958ec8bf0bf9aef699d680fa477aac0
SHA2569c05df57e16b54dda6dbd2bbc5362905d7d24bade2f447f23ec244adacfc8cfc
SHA51278eb7f1db743472532b726e3bef831dd532c9f347ebb2b1f3a8333cd17972e75547e98b149ecee760c0bf384b941276a2151c0551a4351bebe26fcfa87dadb7d
-
Filesize
1KB
MD513096d8d61cc161abad17c0d01e85ba3
SHA1f68befac7ee6d02916676726d6d9f63299fc29fa
SHA2562cfafde33d1bc95655a9ab469f9313f437f6dc9a168a095cfe125770df79be49
SHA5129649543ac40020a66f7a252fd66ae054a6c4e845c802c583ab0ff6dc2eb15280d719f5bda38442e6943f800365aab2fdb7d544113346346b9e3a6998e3ff5ab8
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD5499d6832576014b7822bec1c882f2901
SHA17a0bba128ee72838f5ae1c8158bdaec3740683e7
SHA25622fcc5e5864613176c8f340e8aa63acf73e80fbef7b11976afabcfc26f7260d6
SHA512b6087dc0d804d7bb90cf4ce4cb182d7c8bacacc37143751693a1e88002558bb230cc2256904f7b2a75d168cddf9e6acb60d8431bf788e02e54fb009ca3661362