DismHost.exe

  • File Path: C:\Windows\system32\Dism\DismHost.exe
  • Description: Dism Host Servicing Process

Hashes

Type Hash
MD5 1AE12EB030839C374CF89CA82B7F45C0
SHA1 E3040F7D963A366AD6FCF0DE3D64A0277CD9A140
SHA256 F81B2F9FBBFA6E16D59D8AB703B3EF5A4A63BF4B23E002BD7B5BFA01CE62B937
SHA384 E6A728567D14A45598152E1CF04309B68CECFDFCF7F2FFFC9B65F548DB81743CE23EF65776A7BF6050005936459C1ED4
SHA512 854B67DE4E03124D8B94EF71EDAD92876225F6CA4EF82D8319287C001D4B0F3335C50C95424E4A5DA14F49F7CEECEF5C303B862B03D0C1F5E0367BC3A265995A
SSDEEP 1536:gcyoV9r967An2g8+V3NkqmKs0dwymJaw9oyDTSEjf9/DSzLO5LxMQSGP8:gcyk9rU7G22V/7w56fy5LxDBU
IMP C601FA732FF0599995A293BA7882B84D
PESHA1 DF41B1F3C84CEF9439CF49B592B9B80A43160D3C
PE256 7945F4870C90EA05B65A0A5A4A237C442294FDDC550988CE5DC5E99BF2866303

Runtime Data

Child Processes:

csrss.exe wininit.exe

Signature

  • Status: Signature verified.
  • Serial: 3300000266BD1580EFA75CD6D3000000000266
  • Thumbprint: A4341B9FD50FB9964283220A36A1EF6F6FAA7840
  • Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
  • Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

File Metadata

  • Original Filename: DismHost.exe
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 10.0.17763.1518 (WinBuild.160101.0800)
  • Product Version: 10.0.17763.1518
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.
  • Machine Type: 64-bit

File Scan

  • VirusTotal Detections: 0/69
  • VirusTotal Link: https://www.virustotal.com/gui/file/f81b2f9fbbfa6e16d59d8ab703b3ef5a4a63bf4b23e002bd7b5bfa01ce62b937/detection/

Possible Misuse

The following table contains possible examples of DismHost.exe being misused. While DismHost.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
sigma image_load_suspicious_vss_ps_load.yml - 'dismhost.exe' DRL 1.0
sigma proc_creation_win_dsim_remove.yml Image\|endswith: '\DismHost.exe' DRL 1.0
sigma proc_creation_win_uac_bypass_dismhost.yml title: UAC Bypass Using DismHost DRL 1.0
sigma proc_creation_win_uac_bypass_dismhost.yml description: Detects the pattern of UAC Bypass using DismHost DLL hijacking (UACMe 63) DRL 1.0
sigma proc_creation_win_uac_bypass_dismhost.yml - '\DismHost.exe' DRL 1.0
sigma proc_creation_win_uac_bypass_ntfs_reparse_point.yml - '\dismhost.exe {' DRL 1.0
sigma proc_creation_win_uac_bypass_ntfs_reparse_point.yml Image\|endswith: '\DismHost.exe' DRL 1.0

MIT License. Copyright (c) 2020-2021 Strontic.