dllhost.exe
- File Path:
C:\windows\SysWOW64\dllhost.exe
- Description: COM Surrogate
Hashes
Type | Hash |
---|---|
MD5 | CC05C14EEFF5E7813A49718BA88E59B0 |
SHA1 | 2BB3A1C63CC3B09AE7C8AD45FF2F437CAD4B7A97 |
SHA256 | 771151FDEB8E30545F4BBFE1B73EEE0E1187DB905A535E9CC12D2C57AA0ACC8D |
SHA384 | 8CBE36A582CA1C2E6E04F924EF7906A6A46B6A8C9971AC66991CA019FDD8C1DA43B44600015DB6FE8E8DF671566B3146 |
SHA512 | E48DF4286A9114A47FEBC96480AD748FEE97C0FF50F87B525AA17CFE7DC043BE5F8FE406E6001D5049DA68F742EB06A620D66C7A5F5DD1E89A480B3FF29DFCF4 |
SSDEEP | 384:4O1slXwD+Og1GFWe5WoDBRJBLlxXWindGC:4IZg1Gbt1PB7Gin4C |
Signature
- Status: Signature verified.
- Serial:
330000004EA1D80770A9BBE94400000000004E
- Thumbprint:
DF3B9B7E5AEA1AA0B82EA25F542A6A00963AB890
- Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
- Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
File Metadata
- Original Filename: dllhost.exe
- Product Name: Microsoft Windows Operating System
- Company Name: Microsoft Corporation
- File Version: 6.3.9600.17415 (winblue_r4.141028-1500)
- Product Version: 6.3.9600.17415
- Language: English (United States)
- Legal Copyright: Microsoft Corporation. All rights reserved.
Possible Misuse
The following table contains possible examples of dllhost.exe
being misused. While dllhost.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | file_event_win_creation_system_file.yml | - '\dllhost.exe' |
DRL 1.0 |
sigma | file_event_win_susp_adsi_cache_usage.yml | - 'C:\windows\system32\dllhost.exe' |
DRL 1.0 |
sigma | file_event_win_uac_bypass_wmp.yml | Image: 'C:\Windows\system32\DllHost.exe' |
DRL 1.0 |
sigma | image_load_suspicious_vss_ps_load.yml | - '\dllhost.exe' |
DRL 1.0 |
sigma | net_connection_win_dllhost_net_connections.yml | title: Dllhost Internet Connection |
DRL 1.0 |
sigma | net_connection_win_dllhost_net_connections.yml | description: Detects Dllhost that communicates with public IP addresses |
DRL 1.0 |
sigma | net_connection_win_dllhost_net_connections.yml | Image\|endswith: '\dllhost.exe' |
DRL 1.0 |
sigma | proc_creation_win_apt_unc2452_cmds.yml | Image\|endswith: '\dllhost.exe' |
DRL 1.0 |
sigma | proc_creation_win_cmstp_com_object_access.yml | ParentImage\|endswith: '\DllHost.exe' |
DRL 1.0 |
sigma | proc_creation_win_cobaltstrike_process_patterns.yml | ParentImage\|endswith: '\dllhost.exe' |
DRL 1.0 |
sigma | proc_creation_win_mal_darkside_ransomware.yml | ParentCommandLine\|contains: 'DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}' |
DRL 1.0 |
sigma | proc_creation_win_script_event_consumer_spawn.yml | - '\dllhost.exe' |
DRL 1.0 |
sigma | proc_creation_win_system_exe_anomaly.yml | - '\dllhost.exe' |
DRL 1.0 |
LOLBAS | Dllhost.yml | Name: Dllhost.exe |
|
LOLBAS | Dllhost.yml | - Command: dllhost.exe /Processid:{CLSID} |
|
LOLBAS | Dllhost.yml | Description: Use dllhost.exe to load a registered or hijacked COM Server payload. |
|
LOLBAS | Dllhost.yml | - Path: C:\Windows\System32\dllhost.exe |
|
LOLBAS | Dllhost.yml | - Path: C:\Windows\SysWOW64\dllhost.exe |
|
LOLBAS | Dllhost.yml | - IOC: DotNet CLR libraries loaded into dllhost.exe |
|
LOLBAS | Dllhost.yml | - IOC: DotNet CLR Usage Log - dllhost.exe.log |
|
LOLBAS | Dllhost.yml | - IOC: Suspicious network connectings originating from dllhost.exe |
|
LOLBAS | Dllhost.yml | - Link: https://nasbench.medium.com/what-is-the-dllhost-exe-process-actually-running-ef9fe4c19c08 |
|
signature-base | crime_nopetya_jun17.yar | $s7 = “dllhost.dat” fullword wide | CC BY-NC 4.0 |
MIT License. Copyright (c) 2020-2021 Strontic.