DismHost.exe

  • File Path: C:\Windows\SysWOW64\Dism\DismHost.exe
  • Description: Dism Host Servicing Process

Hashes

Type Hash
MD5 37EA3E07F35A490F68C38D2F08344E12
SHA1 B072D5E40A79204D2EF585CF748897F72A5BF370
SHA256 EA7E7D5045D32C114C030E85FB03925690F2FFFE93C5EB56209292C3C1154A8C
SHA384 2AB770158B63105CF7897BA9C3A2320AD002C2162B007047084CCEF857BFDA2E5F101DF325B8178F4976C49BF9189832
SHA512 F239A7A5EE155526ADFD7E5616DFC4C06EF705C5EA7AE548D637238B1E58495B830496D3900FF6F33890C6371E5BA3284FB97F27B0514878D4FC18F34B52DF28
SSDEEP 3072:A2PBxNV0a6pEIChuGkkZbD1Vh6LVYofclw:A2NdAChulWbD1Vh6LC4ca
IMP D73721430C20D31544AEA558B6ECAA47
PESHA1 260215D0899792E3AF2D45A4AB76D7B8CBFA2F82
PE256 E8F64708C38E9487B69E275C71254726873D9F52D2CFEF6488C6C4EBD0A95A69

Signature

  • Status: Signature verified.
  • Serial: 3300000266BD1580EFA75CD6D3000000000266
  • Thumbprint: A4341B9FD50FB9964283220A36A1EF6F6FAA7840
  • Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
  • Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

File Metadata

  • Original Filename: DismHost.exe
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 10.0.17763.1518 (WinBuild.160101.0800)
  • Product Version: 10.0.17763.1518
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.
  • Machine Type: 32-bit

File Scan

  • VirusTotal Detections: Unknown

Possible Misuse

The following table contains possible examples of DismHost.exe being misused. While DismHost.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
sigma image_load_suspicious_vss_ps_load.yml - 'dismhost.exe' DRL 1.0
sigma proc_creation_win_dsim_remove.yml Image\|endswith: '\DismHost.exe' DRL 1.0
sigma proc_creation_win_uac_bypass_dismhost.yml title: UAC Bypass Using DismHost DRL 1.0
sigma proc_creation_win_uac_bypass_dismhost.yml description: Detects the pattern of UAC Bypass using DismHost DLL hijacking (UACMe 63) DRL 1.0
sigma proc_creation_win_uac_bypass_dismhost.yml - '\DismHost.exe' DRL 1.0
sigma proc_creation_win_uac_bypass_ntfs_reparse_point.yml - '\dismhost.exe {' DRL 1.0
sigma proc_creation_win_uac_bypass_ntfs_reparse_point.yml Image\|endswith: '\DismHost.exe' DRL 1.0

MIT License. Copyright (c) 2020-2021 Strontic.