SecurityHealthHost.exe
This report is generated from a file or URL submitted to this webservice on March 19th 2019 14:45:29 (UTC) and action script Heavy Anti-Evasion
Guest System: Windows 7 64 bit, Professional, 6.1 (build 7601), Service Pack 1
Report generated by Falcon Sandbox © Hybrid Analysis
Incident Response
MITRE ATT&CK™ Techniques Detection
Indicators
Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.
-
Malicious Indicators 1
-
Environment Awareness
-
The input sample contains a known anti-VM trick
- details
- Found VM detection artifact "CPUID trick" in "27fe99211e89c7ec5fddee43accb5278684d7ac5fab3a2557069a55af1153b5e.bin" (Offset: 27408)
- source
- Binary File
- relevance
- 5/10
-
The input sample contains a known anti-VM trick
-
Suspicious Indicators 2
-
Unusual Characteristics
-
Imports suspicious APIs
- details
-
IsDebuggerPresent
GetFileAttributesW
LockResource
UnhandledExceptionFilter
LoadLibraryExW
GetProcAddress
GetModuleHandleW
TerminateProcess
FindResourceW
CreateFileW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW - source
- Static Parser
- relevance
- 1/10
-
Timestamp in PE header is very old or in the future
- details
- "27fe99211e89c7ec5fddee43accb5278684d7ac5fab3a2557069a55af1153b5e.bin" claims program is from Fri Jun 25 11:09:50 2038
- source
- Static Parser
- relevance
- 10/10
-
Imports suspicious APIs
-
Informative 4
-
External Systems
-
Sample was identified as clean by Antivirus engines
- details
- 0/64 Antivirus vendors marked sample as malicious (0% detection rate)
- source
- External System
- relevance
- 10/10
-
Sample was identified as clean by Antivirus engines
-
General
-
Contains PDB pathways
- details
- "SecurityHealthHost.pdb"
- source
- File/Memory
- relevance
- 1/10
-
The input sample is signed with a certificate
- details
-
The input sample is signed with a certificate issued by "CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US" (SHA1: AE:9C:1A:E5:47:63:82:2E:EC:42:47:49:83:D8:B6:35:11:6C:84:52; see report for more information)
The input sample is signed with a certificate issued by "CN=Microsoft Root Certificate Authority 2010, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US" (SHA1: 58:0A:6F:4C:C4:E4:B6:69:B9:EB:DC:1B:2B:3E:08:7B:80:D0:67:8D; see report for more information) - source
- Certificate Data
- relevance
- 10/10
- ATT&CK ID
- T1116 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains PDB pathways
-
Network Related
-
Found potential URL in binary/memory
- details
-
Pattern match: "www.microsoft.com/pkiops/crl/MicWinProPCA2011_2011-10-19.crl0a"
Pattern match: "www.microsoft.com/pkiops/certs/MicWinProPCA2011_2011-10-19.crt0"
Pattern match: "crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z"
Pattern match: "http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0"
Pattern match: "http://www.microsoft.com/windows0"
Pattern match: "www.microsoft.com/PKI/docs/CPS/default.htm0@"
Pattern match: "crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl0Z"
Pattern match: "http://www.microsoft.com/pki/certs/MicTimStaPCA_2010-07-01.crt0" - source
- File/Memory
- relevance
- 10/10
-
Found potential URL in binary/memory
File Details
SecurityHealthHost.exe
- Filename
- SecurityHealthHost.exe
- Size
- 62KiB (63504 bytes)
- Type
- peexe 64bits executable
- Description
- PE32+ executable (GUI) x86-64, for MS Windows
- Architecture
- WINDOWS
- SHA256
- 27fe99211e89c7ec5fddee43accb5278684d7ac5fab3a2557069a55af1153b5e
- MD5
- 94d49162a08b536a2a4d7f5c4377c745
- SHA1
- 205290cb8eeee41b7a5eb2792df81508a26f31ec
- ssdeep
-
1536:Y30wgYqF9lKOc6Xi073JYP9TZTG3QrgBiTQGmCvtTJn+wRZmMveGxUwp6npP:tw3OrX73JYP99S3Qrg4sGmCvtNn+wRZW
- imphash
-
588f984996756bee8ebfe48a7299428f
- authentihash
-
1196c9d4060b39c8f55932ff445d72d8cbfdb0b5ee81e9bf7f8b9fe26ab31adb
- PDB Timestamp
- 06/25/2038 11:09:50 (UTC)
- PDB Pathway
- SecurityHealthHost.pdb
- PDB GUID
- 9DE6C6F26DBAA555BEBFE6B578F3E734
Version Info
- LegalCopyright
- Microsoft Corporation. All rights reserved.
- InternalName
- SecurityHealthHost
- FileVersion
- 4.18.1901.16384 (WinBuild.160101.0800)
- CompanyName
- Microsoft Corporation
- ProductName
- Microsoft Windows Operating System
- ProductVersion
- 4.18.1901.16384
- FileDescription
- Windows Security Health Host
- OriginalFilename
- SecurityHealthHost.exe
- Translation
- 0x0409 0x04b0
Classification (TrID)
- 82.0% (.EXE) Win64 Executable (generic)
- 6.0% (.EXE) OS/2 Executable (generic)
- 5.9% (.EXE) Generic Win/DOS Executable
- 5.9% (.EXE) DOS Executable Generic
File Metadata
- 1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 26715)
- 57 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 26715)
- 35 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26715)
- 2 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 26715)
- 11 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 26715)
- 40 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)
- File contains Visual Basic code
- File appears to contain raw COFF/OMF content
- File is the product of a medium codebase (57 files)
File Sections
| Details | ||||||
|---|---|---|---|---|---|---|
File Resources
| Details | ||||
|---|---|---|---|---|
File Imports
File Certificates
Download Certificate File (8.5KiB)| Owner | Issuer | Validity | Hashes (MD5, SHA1) |
|---|---|---|---|
| CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US | CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US Serial: 33000001c422b2f79b793dacb20000000001c4 |
07/03/2018 20:45:50 07/26/2019 20:45:50 |
79:08:00:D8:69:8C:34:EF:92:D8:25:6C:23:E3:99:8B AE:9C:1A:E5:47:63:82:2E:EC:42:47:49:83:D8:B6:35:11:6C:84:52 |
| CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US | CN=Microsoft Root Certificate Authority 2010, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US Serial: 61077656000000000008 |
10/19/2011 18:41:42 10/19/2026 18:51:42 |
AF:74:9A:21:6C:00:C7:D2:5C:24:9F:CA:0D:7F:D4:71 58:0A:6F:4C:C4:E4:B6:69:B9:EB:DC:1B:2B:3E:08:7B:80:D0:67:8D |
Screenshots
Loading content, please wait...
Hybrid Analysis
No runtime process information available, as the input sample failed to launch (more).
Network Analysis
DNS Requests
No relevant DNS requests were made.
Contacted Hosts
No relevant hosts were contacted.
HTTP Traffic
No relevant HTTP requests were made.
Extracted Strings
Extracted Files
No significant files were extracted.