winrshost.exe

  • File Path: C:\Windows\system32\winrshost.exe
  • Description: Host Process for WinRM’s Remote Shell plugin

Hashes

Type Hash
MD5 F40EC96CA18D88CB1F26FA2070010714
SHA1 50D3607204F89876C1C32BD0B3D591CC083DC43A
SHA256 607C014A3CA531FFAD50BCD90095C01E4E6B691D9E18473C70E4699CF1E31453
SHA384 B69628364D2B6AE4A0D99379DF87E8B8B6B5C8EA79B084B7B5E45651C46F9A69E3725E2266D4B14EBC5084F305207217
SHA512 BCDC1D10962ECF9069A540B98F53CE7E42521D0E33CB8EC5FF8C2E29A006596258D4D5484D0EC58F86694798C1E52BD951D7F327780BDC17A59AF4BA31114A62
SSDEEP 384:/wEsIQt5IFeEkFSnqoMtqhwDACwC19XZRs6EK57nEb8FAHc6XceFaWsjEWC:YIqw7kusDAC719XZa6EKGKAHhXcmKI

Runtime Data

Child Processes:

conhost.exe

Signature

  • Status: Signature verified.
  • Serial: 33000000BCE120FDD27CC8EE930000000000BC
  • Thumbprint: E85459B23C232DB3CB94C7A56D47678F58E8E51E
  • Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
  • Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

File Metadata

  • Original Filename: winrshost.exe
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 10.0.14393.0 (rs1_release.160715-1616)
  • Product Version: 10.0.14393.0
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.

Possible Misuse

The following table contains possible examples of winrshost.exe being misused. While winrshost.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
sigma image_load_in_memory_powershell.yml - '\winrshost.exe' DRL 1.0

MIT License. Copyright (c) 2020-2021 Strontic.