taskhostw.exe
- File Path:
C:\Windows\system32\taskhostw.exe
- Description: Host Process for Windows Tasks
Hashes
Type | Hash |
---|---|
MD5 | B5D41CD8E27C26DA82B11B277D233B04 |
SHA1 | 6D9D0BE989C8383C06B279A71F770EDAD617AF27 |
SHA256 | 1876990EEBC99F0B0F66BEC435FE2810E450532E23E22427DA31A09802394461 |
SHA384 | 203D9E28EEDD4004848ACB75988DC29F559E67D8A06B671D0CBF76D4E8463BD7B6288D241EDD813B7324F865D7862A3A |
SHA512 | 079013DE8347C49979FD816FE258D7A3EABABC5F11AF9F7BA0EED74BE90B41DDE7261EFF065A370B0065F7AB1D8BCF9847AD7167833CF0F441BDF494EF6BA50B |
SSDEEP | 1536:ZdbYZGzola91KOG6d7/T8S333FGfi1WU7/L4GB+KSqXaENd/xPH:XbMXg/3HFGfi1P9SqXaEnx/ |
Signature
- Status: Signature verified.
- Serial:
3300000266BD1580EFA75CD6D3000000000266
- Thumbprint:
A4341B9FD50FB9964283220A36A1EF6F6FAA7840
- Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
- Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
File Metadata
- Original Filename: taskhostw.exe.mui
- Product Name: Microsoft Windows Operating System
- Company Name: Microsoft Corporation
- File Version: 10.0.14393.0 (rs1_release.160715-1616)
- Product Version: 10.0.14393.0
- Language: English (United States)
- Legal Copyright: Microsoft Corporation. All rights reserved.
Possible Misuse
The following table contains possible examples of taskhostw.exe
being misused. While taskhostw.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | image_load_suspicious_vss_ps_load.yml | - 'taskhostw.exe' |
DRL 1.0 |
sigma | image_load_wmi_module_load.yml | - '\windows\system32\taskhostw.exe' # c:\windows\system32\taskhostw.exe |
DRL 1.0 |
sigma | proc_access_win_cred_dump_lsass_access.yml | - 'C:\WINDOWS\system32\taskhostw.exe' |
DRL 1.0 |
sigma | proc_access_win_in_memory_assembly_execution.yml | - 'C:\WINDOWS\system32\taskhostw.exe' |
DRL 1.0 |
sigma | proc_access_win_susp_proc_access_lsass.yml | - 'C:\WINDOWS\system32\taskhostw.exe' |
DRL 1.0 |
atomic-red-team | index.md | - Atomic Test #5: Masquerading - powershell.exe running as taskhostw.exe [windows] | MIT License. © 2018 Red Canary |
atomic-red-team | windows-index.md | - Atomic Test #5: Masquerading - powershell.exe running as taskhostw.exe [windows] | MIT License. © 2018 Red Canary |
atomic-red-team | T1036.003.md | - Atomic Test #5 - Masquerading - powershell.exe running as taskhostw.exe | MIT License. © 2018 Red Canary |
atomic-red-team | T1036.003.md | ## Atomic Test #5 - Masquerading - powershell.exe running as taskhostw.exe | MIT License. © 2018 Red Canary |
atomic-red-team | T1036.003.md | Copies powershell.exe, renames it, and launches it to masquerade as an instance of taskhostw.exe. | MIT License. © 2018 Red Canary |
atomic-red-team | T1036.003.md | Upon successful execution, powershell.exe is renamed as taskhostw.exe and executed from non-standard path. | MIT License. © 2018 Red Canary |
atomic-red-team | T1036.003.md | copy %windir%\System32\windowspowershell\v1.0\powershell.exe %APPDATA%\taskhostw.exe /Y | MIT License. © 2018 Red Canary |
atomic-red-team | T1036.003.md | cmd.exe /K %APPDATA%\taskhostw.exe | MIT License. © 2018 Red Canary |
atomic-red-team | T1036.003.md | del /Q /F %APPDATA%\taskhostw.exe >nul 2>&1 | MIT License. © 2018 Red Canary |
MIT License. Copyright (c) 2020-2021 Strontic.