Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2023 06:53
Static task
static1
Behavioral task
behavioral1
Sample
392febb1bcb51ffd4a9019f2aa7fba82.exe
Resource
win7-20230703-en
windows7-x64
6 signatures
150 seconds
General
-
Target
392febb1bcb51ffd4a9019f2aa7fba82.exe
-
Size
530KB
-
MD5
392febb1bcb51ffd4a9019f2aa7fba82
-
SHA1
e9ad51d6043f0ccc93829e084f3e9440d6317a38
-
SHA256
b1f4801cf9033987a2e212ce20fa18963f4778e116d7f3ca0612991aa7f7e3b1
-
SHA512
604f67d12926fd55413908b4c0524321001c29ee7bd700bef49e2dbb78ffcc072621fb57310b256a9cd83df9d4133c2313c35fd8fa6344b71bc781b51e9b454d
-
SSDEEP
12288:FiICSVtg0wBW3iFt4ONq30/4St2NBd0JoLdaoi9Bbk:FBbVTb34k30/8dRi9
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4980-133-0x0000000000030000-0x000000000003A000-memory.dmp healer -
Processes:
392febb1bcb51ffd4a9019f2aa7fba82.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 392febb1bcb51ffd4a9019f2aa7fba82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 392febb1bcb51ffd4a9019f2aa7fba82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 392febb1bcb51ffd4a9019f2aa7fba82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 392febb1bcb51ffd4a9019f2aa7fba82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 392febb1bcb51ffd4a9019f2aa7fba82.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 392febb1bcb51ffd4a9019f2aa7fba82.exe -
Processes:
392febb1bcb51ffd4a9019f2aa7fba82.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 392febb1bcb51ffd4a9019f2aa7fba82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 392febb1bcb51ffd4a9019f2aa7fba82.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
392febb1bcb51ffd4a9019f2aa7fba82.exepid process 4980 392febb1bcb51ffd4a9019f2aa7fba82.exe 4980 392febb1bcb51ffd4a9019f2aa7fba82.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
392febb1bcb51ffd4a9019f2aa7fba82.exedescription pid process Token: SeDebugPrivilege 4980 392febb1bcb51ffd4a9019f2aa7fba82.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\392febb1bcb51ffd4a9019f2aa7fba82.exe"C:\Users\Admin\AppData\Local\Temp\392febb1bcb51ffd4a9019f2aa7fba82.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980