taskhost.exe

  • File Path: C:\windows\system32\taskhost.exe
  • Description: Host Process for Windows Tasks

Hashes

Type Hash
MD5 7016ACD1D0C1CC6ACF45CBC6C90D0575
SHA1 5647C86F30318B232B3819DED08FC5A9A171E0D9
SHA256 B79E0890E5ACFFE7966BB32A6AAA415D6E334D0DF5452DEBE6A867BB03451EA6
SHA384 C2576D3C55335ECD8D31B5A4B80CAB9A33789420308EE82077BD173190A0CBBB9BD2558EC822E41959B880CAA5460960
SHA512 A6024C58FB6ED460B5C27B0AA2245425135C5F5C45A98F0F32AB651D2B1FC0DA3BA07EE38D333E0E619609C2E0C54C8550874B8967283F70B16B39CE873DEB9F
SSDEEP 1536:G94iupJRlYWC8f+G/UH+wp0FDYvftV6CTONh6qN/mAP2S/:GBQJRlYW/hszYYvfeCTOP6qF9j/

Signature

  • Status: Signature verified.
  • Serial: 330000004EA1D80770A9BBE94400000000004E
  • Thumbprint: DF3B9B7E5AEA1AA0B82EA25F542A6A00963AB890
  • Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
  • Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

File Metadata

  • Original Filename: taskhost.exe.mui
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 6.3.9600.16384 (winblue_rtm.130821-1623)
  • Product Version: 6.3.9600.16384
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.

Possible Misuse

The following table contains possible examples of taskhost.exe being misused. While taskhost.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
sigma sysmon_suspicious_remote_thread.yml # - '\taskhost.exe' # disabled due to false positives DRL 1.0
sigma file_event_win_creation_system_file.yml - '\taskhost.exe' DRL 1.0
sigma proc_creation_win_proc_wrong_parent.yml - '\taskhost.exe' DRL 1.0
sigma proc_creation_win_system_exe_anomaly.yml - '\taskhost.exe' DRL 1.0
malware-ioc nukesped_lazarus .taskhost.exe``{:.highlight .language-cmhg} © ESET 2014-2018
signature-base apt_blackenergy.yar $s8 = “taskhost.exe” fullword wide /* Goodware String - occured 1 times */ CC BY-NC 4.0
signature-base apt_moonlightmaze.yar $a4=”/var/tmp/taskhost” fullword CC BY-NC 4.0
signature-base crime_eternalrocks.yar description = “Detects EternalRocks Malware - file taskhost.exe” CC BY-NC 4.0
signature-base crime_eternalrocks.yar $s2 = “svchost.taskhost.exe” fullword ascii CC BY-NC 4.0
signature-base generic_anomalies.yar description = “Detects uncommon file size of taskhost.exe” CC BY-NC 4.0
signature-base generic_anomalies.yar and filename == “taskhost.exe” CC BY-NC 4.0

MIT License. Copyright (c) 2020-2021 Strontic.