dllhost.exe
- File Path:
C:\WINDOWS\SysWOW64\dllhost.exe
- Description: COM Surrogate
Hashes
Type | Hash |
---|---|
MD5 | AE1936CE9A4B92E69493470B1009AD5A |
SHA1 | 95C4325460718F5E762347372DF4004EFFFD57FD |
SHA256 | 39A4819265D67C89919672D415E22EDB5F74A47BCF28CEEF49F1ACE80A721874 |
SHA384 | 4DA4B4636BA5FD4A0BEA3F29B2262531C86370A7B300178F264F4859491CC124AEE366298A6CE662384DC6703FD39BB9 |
SHA512 | BFAD7DCC1199682CD8857EC43FD72E15CFDD2D91F534314EAB73045E184597BE649E9A67396E3F3E9A02D1EC1ACF65CED69EDEFEACE175B8EBE052741AADF8B0 |
SSDEEP | 384:n3Y36g+KrQH8xjIcSWv5WwvDBRJs1xUsl3TvT:n3KMHRcLF1Pst |
IMP | B7F063F6E914DB6ACB4DCC8D69219A5F |
PESHA1 | CF97E8EC36CA4C62E38832771F6BA196B6AC4D45 |
PE256 | 8770EFE783C85F7040279DFACDCDB7EEFB2C38E0D5588CD052D035399B5F8F7D |
Runtime Data
Loaded Modules:
Path |
---|
C:\WINDOWS\SYSTEM32\ntdll.dll |
C:\WINDOWS\System32\wow64.dll |
C:\WINDOWS\System32\wow64base.dll |
C:\WINDOWS\System32\wow64con.dll |
C:\WINDOWS\System32\wow64cpu.dll |
C:\WINDOWS\System32\wow64win.dll |
C:\WINDOWS\SysWOW64\dllhost.exe |
Signature
- Status: Signature verified.
- Serial:
33000002ED2C45E4C145CF48440000000002ED
- Thumbprint:
312860D2047EB81F8F58C29FF19ECDB4C634CF6A
- Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
- Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
File Metadata
- Original Filename: dllhost.exe
- Product Name: Microsoft Windows Operating System
- Company Name: Microsoft Corporation
- File Version: 10.0.22000.1 (WinBuild.160101.0800)
- Product Version: 10.0.22000.1
- Language: English (United States)
- Legal Copyright: Microsoft Corporation. All rights reserved.
- Machine Type: 32-bit
File Scan
- VirusTotal Detections: 0/72
- VirusTotal Link: https://www.virustotal.com/gui/file/39a4819265d67c89919672d415e22edb5f74a47bcf28ceef49f1ace80a721874/detection
Possible Misuse
The following table contains possible examples of dllhost.exe
being misused. While dllhost.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | file_event_win_creation_system_file.yml | - '\dllhost.exe' |
DRL 1.0 |
sigma | file_event_win_susp_adsi_cache_usage.yml | - 'C:\windows\system32\dllhost.exe' |
DRL 1.0 |
sigma | file_event_win_uac_bypass_wmp.yml | Image: 'C:\Windows\system32\DllHost.exe' |
DRL 1.0 |
sigma | image_load_suspicious_vss_ps_load.yml | - '\dllhost.exe' |
DRL 1.0 |
sigma | net_connection_win_dllhost_net_connections.yml | title: Dllhost Internet Connection |
DRL 1.0 |
sigma | net_connection_win_dllhost_net_connections.yml | description: Detects Dllhost that communicates with public IP addresses |
DRL 1.0 |
sigma | net_connection_win_dllhost_net_connections.yml | Image\|endswith: '\dllhost.exe' |
DRL 1.0 |
sigma | proc_creation_win_apt_unc2452_cmds.yml | Image\|endswith: '\dllhost.exe' |
DRL 1.0 |
sigma | proc_creation_win_cmstp_com_object_access.yml | ParentImage\|endswith: '\DllHost.exe' |
DRL 1.0 |
sigma | proc_creation_win_cobaltstrike_process_patterns.yml | ParentImage\|endswith: '\dllhost.exe' |
DRL 1.0 |
sigma | proc_creation_win_mal_darkside_ransomware.yml | ParentCommandLine\|contains: 'DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}' |
DRL 1.0 |
sigma | proc_creation_win_script_event_consumer_spawn.yml | - '\dllhost.exe' |
DRL 1.0 |
sigma | proc_creation_win_system_exe_anomaly.yml | - '\dllhost.exe' |
DRL 1.0 |
LOLBAS | Dllhost.yml | Name: Dllhost.exe |
|
LOLBAS | Dllhost.yml | - Command: dllhost.exe /Processid:{CLSID} |
|
LOLBAS | Dllhost.yml | Description: Use dllhost.exe to load a registered or hijacked COM Server payload. |
|
LOLBAS | Dllhost.yml | - Path: C:\Windows\System32\dllhost.exe |
|
LOLBAS | Dllhost.yml | - Path: C:\Windows\SysWOW64\dllhost.exe |
|
LOLBAS | Dllhost.yml | - IOC: DotNet CLR libraries loaded into dllhost.exe |
|
LOLBAS | Dllhost.yml | - IOC: DotNet CLR Usage Log - dllhost.exe.log |
|
LOLBAS | Dllhost.yml | - IOC: Suspicious network connectings originating from dllhost.exe |
|
LOLBAS | Dllhost.yml | - Link: https://nasbench.medium.com/what-is-the-dllhost-exe-process-actually-running-ef9fe4c19c08 |
|
signature-base | crime_nopetya_jun17.yar | $s7 = “dllhost.dat” fullword wide | CC BY-NC 4.0 |
MIT License. Copyright (c) 2020-2021 Strontic.