Analysis
-
max time kernel
300s -
max time network
182s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
31-03-2023 04:47
Static task
static1
Behavioral task
behavioral1
Sample
28320cd26471f2e1d02e580bcd300ccd27617240c4560477979efc3eceae834e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
28320cd26471f2e1d02e580bcd300ccd27617240c4560477979efc3eceae834e.exe
Resource
win10-20230220-en
General
-
Target
28320cd26471f2e1d02e580bcd300ccd27617240c4560477979efc3eceae834e.exe
-
Size
63KB
-
MD5
7989e6d4f4db31b2c3b73fac729489cd
-
SHA1
46ab5789ff40e63d6b4fc9ec7df114841c97e7b8
-
SHA256
28320cd26471f2e1d02e580bcd300ccd27617240c4560477979efc3eceae834e
-
SHA512
345e6145cd51b7d2f64562515c5015b05fac69211c38141b7f3f6bc7a443c817f9a0a62a22b7b5c7be2184de6d03fd148c2d266ff3cf491e8d5f0077e12d3be0
-
SSDEEP
768:ra0hDktrxSo6eQTIuLBVIYyVLdg76hMbEJNU4EWNpgMO2WB9JJn155tkvRmR:xDaSoJSqhgeMbEzQqO2WB9J51nmvM
Malware Config
Signatures
-
XMRig Miner payload 14 IoCs
Processes:
resource yara_rule C:\ProgramData\Dllhost\winlogson.exe family_xmrig C:\ProgramData\Dllhost\winlogson.exe xmrig C:\ProgramData\Dllhost\winlogson.exe family_xmrig C:\ProgramData\Dllhost\winlogson.exe xmrig C:\ProgramData\Dllhost\winlogson.exe family_xmrig C:\ProgramData\Dllhost\winlogson.exe xmrig C:\ProgramData\Dllhost\winlogson.exe family_xmrig C:\ProgramData\Dllhost\winlogson.exe xmrig C:\ProgramData\Dllhost\winlogson.exe family_xmrig C:\ProgramData\Dllhost\winlogson.exe xmrig C:\ProgramData\Dllhost\winlogson.exe family_xmrig C:\ProgramData\Dllhost\winlogson.exe xmrig C:\ProgramData\Dllhost\winlogson.exe family_xmrig C:\ProgramData\Dllhost\winlogson.exe xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
Processes:
dllhost.exewinlogson.exewinlogson.exewinlogson.exewinlogson.exewinlogson.exewinlogson.exepid process 3988 dllhost.exe 2172 winlogson.exe 2136 winlogson.exe 2700 winlogson.exe 4112 winlogson.exe 4516 winlogson.exe 3488 winlogson.exe -
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
dllhost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe / file.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3932 schtasks.exe 4488 schtasks.exe 1500 schtasks.exe 4392 schtasks.exe 4468 schtasks.exe 5040 schtasks.exe 2680 schtasks.exe 3408 schtasks.exe 3500 schtasks.exe 4076 schtasks.exe 3544 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
28320cd26471f2e1d02e580bcd300ccd27617240c4560477979efc3eceae834e.exepowershell.exepowershell.exedllhost.exepid process 4188 28320cd26471f2e1d02e580bcd300ccd27617240c4560477979efc3eceae834e.exe 4948 powershell.exe 4948 powershell.exe 4948 powershell.exe 2516 powershell.exe 2516 powershell.exe 2516 powershell.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe 3988 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
28320cd26471f2e1d02e580bcd300ccd27617240c4560477979efc3eceae834e.exepowershell.exepowershell.exedllhost.exedescription pid process Token: SeDebugPrivilege 4188 28320cd26471f2e1d02e580bcd300ccd27617240c4560477979efc3eceae834e.exe Token: SeDebugPrivilege 4948 powershell.exe Token: SeDebugPrivilege 2516 powershell.exe Token: SeDebugPrivilege 3988 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
28320cd26471f2e1d02e580bcd300ccd27617240c4560477979efc3eceae834e.execmd.exedllhost.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 4188 wrote to memory of 4908 4188 28320cd26471f2e1d02e580bcd300ccd27617240c4560477979efc3eceae834e.exe cmd.exe PID 4188 wrote to memory of 4908 4188 28320cd26471f2e1d02e580bcd300ccd27617240c4560477979efc3eceae834e.exe cmd.exe PID 4188 wrote to memory of 4908 4188 28320cd26471f2e1d02e580bcd300ccd27617240c4560477979efc3eceae834e.exe cmd.exe PID 4908 wrote to memory of 2688 4908 cmd.exe chcp.com PID 4908 wrote to memory of 2688 4908 cmd.exe chcp.com PID 4908 wrote to memory of 2688 4908 cmd.exe chcp.com PID 4908 wrote to memory of 4948 4908 cmd.exe powershell.exe PID 4908 wrote to memory of 4948 4908 cmd.exe powershell.exe PID 4908 wrote to memory of 4948 4908 cmd.exe powershell.exe PID 4908 wrote to memory of 2516 4908 cmd.exe powershell.exe PID 4908 wrote to memory of 2516 4908 cmd.exe powershell.exe PID 4908 wrote to memory of 2516 4908 cmd.exe powershell.exe PID 4188 wrote to memory of 3988 4188 28320cd26471f2e1d02e580bcd300ccd27617240c4560477979efc3eceae834e.exe dllhost.exe PID 4188 wrote to memory of 3988 4188 28320cd26471f2e1d02e580bcd300ccd27617240c4560477979efc3eceae834e.exe dllhost.exe PID 4188 wrote to memory of 3988 4188 28320cd26471f2e1d02e580bcd300ccd27617240c4560477979efc3eceae834e.exe dllhost.exe PID 3988 wrote to memory of 4920 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 4920 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 4920 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 968 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 968 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 968 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 1516 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 1516 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 1516 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 2868 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 2868 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 2868 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 2800 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 2800 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 2800 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 1388 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 1388 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 1388 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 1096 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 1096 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 1096 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 1092 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 1092 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 1092 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 2684 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 2684 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 2684 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 4432 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 4432 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 4432 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 4480 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 4480 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 4480 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 5048 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 5048 3988 dllhost.exe cmd.exe PID 3988 wrote to memory of 5048 3988 dllhost.exe cmd.exe PID 2868 wrote to memory of 3408 2868 cmd.exe schtasks.exe PID 2868 wrote to memory of 3408 2868 cmd.exe schtasks.exe PID 2868 wrote to memory of 3408 2868 cmd.exe schtasks.exe PID 968 wrote to memory of 4488 968 cmd.exe schtasks.exe PID 968 wrote to memory of 4488 968 cmd.exe schtasks.exe PID 968 wrote to memory of 4488 968 cmd.exe schtasks.exe PID 1092 wrote to memory of 3500 1092 cmd.exe schtasks.exe PID 1092 wrote to memory of 3500 1092 cmd.exe schtasks.exe PID 1092 wrote to memory of 3500 1092 cmd.exe schtasks.exe PID 1388 wrote to memory of 1500 1388 cmd.exe schtasks.exe PID 1388 wrote to memory of 1500 1388 cmd.exe schtasks.exe PID 1388 wrote to memory of 1500 1388 cmd.exe schtasks.exe PID 2684 wrote to memory of 4076 2684 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28320cd26471f2e1d02e580bcd300ccd27617240c4560477979efc3eceae834e.exe"C:\Users\Admin\AppData\Local\Temp\28320cd26471f2e1d02e580bcd300ccd27617240c4560477979efc3eceae834e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 12513⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk633" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk633" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9799" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9799" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk1769" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk1769" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5888" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5888" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json3⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json3⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe -c config.json4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json3⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe -c config.json4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json3⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe -c config.json4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json3⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe -c config.json4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json3⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe -c config.json4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json3⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe -c config.json4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Dllhost\dllhost.exeFilesize
24KB
MD5acf4152befc5768daaf11c92fd3899b0
SHA1f8a210a2a00876f15008f275063988e5cf534722
SHA25664c80419e5ca81a5bfee32e223b5676aac6d47c4aa8168ceae6247f766c291d6
SHA51215bdde54be38e7ed0828f238bd2f0bcdc1a73671118225b731760fe4beb568a72570bad9b1a97a237291b394f1d3155aa6fcac209f6ae0a3db6608e0036c56d1
-
C:\ProgramData\Dllhost\dllhost.exeFilesize
24KB
MD5acf4152befc5768daaf11c92fd3899b0
SHA1f8a210a2a00876f15008f275063988e5cf534722
SHA25664c80419e5ca81a5bfee32e223b5676aac6d47c4aa8168ceae6247f766c291d6
SHA51215bdde54be38e7ed0828f238bd2f0bcdc1a73671118225b731760fe4beb568a72570bad9b1a97a237291b394f1d3155aa6fcac209f6ae0a3db6608e0036c56d1
-
C:\ProgramData\Dllhost\winlogson.exeFilesize
5.2MB
MD56c454e10bbea489cfc96253fe55ec282
SHA122fd5c79495ad06036635eff26a31c76d859e3b7
SHA256a12c34fef1d6475d99aa9af2e8bf1fd55bca83982a0ee2a9131ffd9fd15cb2a7
SHA51281f45ebeffc0205e4132db3f29584e267f986dc8b5e02f3d444a8470e24e073259cb2075af8a832aa09da1dc20b0609e2e4b3ec68284232ce86547e6bf794562
-
C:\ProgramData\Dllhost\winlogson.exeFilesize
5.2MB
MD56c454e10bbea489cfc96253fe55ec282
SHA122fd5c79495ad06036635eff26a31c76d859e3b7
SHA256a12c34fef1d6475d99aa9af2e8bf1fd55bca83982a0ee2a9131ffd9fd15cb2a7
SHA51281f45ebeffc0205e4132db3f29584e267f986dc8b5e02f3d444a8470e24e073259cb2075af8a832aa09da1dc20b0609e2e4b3ec68284232ce86547e6bf794562
-
C:\ProgramData\Dllhost\winlogson.exeFilesize
5.2MB
MD56c454e10bbea489cfc96253fe55ec282
SHA122fd5c79495ad06036635eff26a31c76d859e3b7
SHA256a12c34fef1d6475d99aa9af2e8bf1fd55bca83982a0ee2a9131ffd9fd15cb2a7
SHA51281f45ebeffc0205e4132db3f29584e267f986dc8b5e02f3d444a8470e24e073259cb2075af8a832aa09da1dc20b0609e2e4b3ec68284232ce86547e6bf794562
-
C:\ProgramData\Dllhost\winlogson.exeFilesize
5.2MB
MD56c454e10bbea489cfc96253fe55ec282
SHA122fd5c79495ad06036635eff26a31c76d859e3b7
SHA256a12c34fef1d6475d99aa9af2e8bf1fd55bca83982a0ee2a9131ffd9fd15cb2a7
SHA51281f45ebeffc0205e4132db3f29584e267f986dc8b5e02f3d444a8470e24e073259cb2075af8a832aa09da1dc20b0609e2e4b3ec68284232ce86547e6bf794562
-
C:\ProgramData\Dllhost\winlogson.exeFilesize
5.2MB
MD56c454e10bbea489cfc96253fe55ec282
SHA122fd5c79495ad06036635eff26a31c76d859e3b7
SHA256a12c34fef1d6475d99aa9af2e8bf1fd55bca83982a0ee2a9131ffd9fd15cb2a7
SHA51281f45ebeffc0205e4132db3f29584e267f986dc8b5e02f3d444a8470e24e073259cb2075af8a832aa09da1dc20b0609e2e4b3ec68284232ce86547e6bf794562
-
C:\ProgramData\Dllhost\winlogson.exeFilesize
5.2MB
MD56c454e10bbea489cfc96253fe55ec282
SHA122fd5c79495ad06036635eff26a31c76d859e3b7
SHA256a12c34fef1d6475d99aa9af2e8bf1fd55bca83982a0ee2a9131ffd9fd15cb2a7
SHA51281f45ebeffc0205e4132db3f29584e267f986dc8b5e02f3d444a8470e24e073259cb2075af8a832aa09da1dc20b0609e2e4b3ec68284232ce86547e6bf794562
-
C:\ProgramData\Dllhost\winlogson.exeFilesize
5.2MB
MD56c454e10bbea489cfc96253fe55ec282
SHA122fd5c79495ad06036635eff26a31c76d859e3b7
SHA256a12c34fef1d6475d99aa9af2e8bf1fd55bca83982a0ee2a9131ffd9fd15cb2a7
SHA51281f45ebeffc0205e4132db3f29584e267f986dc8b5e02f3d444a8470e24e073259cb2075af8a832aa09da1dc20b0609e2e4b3ec68284232ce86547e6bf794562
-
C:\ProgramData\SystemFiles\sys_rh.binFilesize
1KB
MD58dc77ffab9dacb95d54917e4a5ab9d0e
SHA16c2e2e81da7d126b24c09de9496274f50579a988
SHA2566f6fbeacac025ed3122e58087103f337fa4d67417de8b73844464e00b2d5a12c
SHA5124aee4e67d7ed96342bfcdd3e0fb6cc67e8d0ff356b3018ee3dcd50db17f2055ef2b4773823eb5961ec3ca5734ea6640f29cf60e17e7d76697d65cba6c3ac8f49
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD51d055009cb7a93c5b6cd67bbf097eccd
SHA1dca2b6ccd0c2a8f6cd880fbf14956f219db62dd0
SHA25697bd26295a3504e1331e53e77df6c4d2bb20291a2f02404714a76d39415619c7
SHA5128630763120811c44c827e42efe10b048fd4a72df627db56a59842d8159aca6d77b8e87b097fd7242504ce55aa97d21340e39c74a89b149079512466cee89b153
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ommgzdar.1jz.ps1Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
memory/2172-637-0x0000022AB51C0000-0x0000022AB51E0000-memory.dmpFilesize
128KB
-
memory/2516-480-0x00000000048E0000-0x00000000048F0000-memory.dmpFilesize
64KB
-
memory/2516-387-0x0000000007AE0000-0x0000000007E30000-memory.dmpFilesize
3.3MB
-
memory/2516-397-0x00000000048E0000-0x00000000048F0000-memory.dmpFilesize
64KB
-
memory/2516-398-0x00000000048E0000-0x00000000048F0000-memory.dmpFilesize
64KB
-
memory/2516-411-0x000000007EB30000-0x000000007EB40000-memory.dmpFilesize
64KB
-
memory/3988-630-0x0000000005310000-0x0000000005320000-memory.dmpFilesize
64KB
-
memory/3988-486-0x0000000000A80000-0x0000000000A8C000-memory.dmpFilesize
48KB
-
memory/3988-504-0x0000000005310000-0x0000000005320000-memory.dmpFilesize
64KB
-
memory/4188-122-0x0000000009B10000-0x000000000A00E000-memory.dmpFilesize
5.0MB
-
memory/4188-121-0x0000000004F60000-0x0000000004F66000-memory.dmpFilesize
24KB
-
memory/4188-124-0x0000000005000000-0x0000000005010000-memory.dmpFilesize
64KB
-
memory/4188-123-0x0000000005230000-0x00000000052C2000-memory.dmpFilesize
584KB
-
memory/4188-376-0x0000000005000000-0x0000000005010000-memory.dmpFilesize
64KB
-
memory/4188-120-0x00000000007D0000-0x00000000007E6000-memory.dmpFilesize
88KB
-
memory/4188-126-0x0000000005E40000-0x0000000005EA6000-memory.dmpFilesize
408KB
-
memory/4188-125-0x0000000005060000-0x000000000506A000-memory.dmpFilesize
40KB
-
memory/4948-134-0x0000000007390000-0x00000000073F6000-memory.dmpFilesize
408KB
-
memory/4948-367-0x00000000067C0000-0x00000000067C8000-memory.dmpFilesize
32KB
-
memory/4948-362-0x00000000067D0000-0x00000000067EA000-memory.dmpFilesize
104KB
-
memory/4948-224-0x00000000044E0000-0x00000000044F0000-memory.dmpFilesize
64KB
-
memory/4948-163-0x0000000009050000-0x00000000090E4000-memory.dmpFilesize
592KB
-
memory/4948-162-0x0000000008B80000-0x0000000008C25000-memory.dmpFilesize
660KB
-
memory/4948-157-0x000000007F6F0000-0x000000007F700000-memory.dmpFilesize
64KB
-
memory/4948-156-0x0000000008B10000-0x0000000008B2E000-memory.dmpFilesize
120KB
-
memory/4948-155-0x0000000008B30000-0x0000000008B63000-memory.dmpFilesize
204KB
-
memory/4948-138-0x0000000007CD0000-0x0000000007D46000-memory.dmpFilesize
472KB
-
memory/4948-137-0x00000000079E0000-0x0000000007A2B000-memory.dmpFilesize
300KB
-
memory/4948-136-0x0000000007850000-0x000000000786C000-memory.dmpFilesize
112KB
-
memory/4948-135-0x0000000007500000-0x0000000007850000-memory.dmpFilesize
3.3MB
-
memory/4948-133-0x0000000006BB0000-0x0000000006BD2000-memory.dmpFilesize
136KB
-
memory/4948-132-0x0000000006C80000-0x00000000072A8000-memory.dmpFilesize
6.2MB
-
memory/4948-131-0x00000000044E0000-0x00000000044F0000-memory.dmpFilesize
64KB
-
memory/4948-130-0x00000000044E0000-0x00000000044F0000-memory.dmpFilesize
64KB
-
memory/4948-129-0x00000000044F0000-0x0000000004526000-memory.dmpFilesize
216KB