Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
13/07/2023, 07:52
Static task
static1
Behavioral task
behavioral1
Sample
f5d998e2615d3b4e0823b1a95095f6a1.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f5d998e2615d3b4e0823b1a95095f6a1.exe
Resource
win10v2004-20230703-en
General
-
Target
f5d998e2615d3b4e0823b1a95095f6a1.exe
-
Size
1.1MB
-
MD5
f5d998e2615d3b4e0823b1a95095f6a1
-
SHA1
e17d5b22b217f5915252b603ad470dbb0ac940c9
-
SHA256
ae8197b1fc9e24e9e69f286c0b2dbc556a93a4ef150295c06b9ca4abb80f668d
-
SHA512
8f5429184ca6a61560edda4ae2770f1cbb10a27a4538a25f74d8957ee6ab2bfc9c5c65a4a4fb8b55f5621612e6e23741d46addd56ad35c5fd65217e1d993e550
-
SSDEEP
24576:kyMH4+2J6PhGB5ZPHtg6L0sdJSJMoVLKG3Lr0zoFRlL:zwIJzk6L9D2ZszoFR
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/2276-87-0x0000000000020000-0x000000000002A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2006222.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2006222.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k2006222.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2006222.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2006222.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2006222.exe -
Executes dropped EXE 4 IoCs
pid Process 2432 y6815521.exe 1560 y9605803.exe 2276 k2006222.exe 2456 l1975614.exe -
Loads dropped DLL 14 IoCs
pid Process 952 f5d998e2615d3b4e0823b1a95095f6a1.exe 2432 y6815521.exe 2432 y6815521.exe 1560 y9605803.exe 1560 y9605803.exe 1560 y9605803.exe 2276 k2006222.exe 1560 y9605803.exe 1560 y9605803.exe 2456 l1975614.exe 2916 WerFault.exe 2916 WerFault.exe 2916 WerFault.exe 2916 WerFault.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k2006222.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k2006222.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce f5d998e2615d3b4e0823b1a95095f6a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f5d998e2615d3b4e0823b1a95095f6a1.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6815521.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y6815521.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9605803.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y9605803.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2916 2456 WerFault.exe 34 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2276 k2006222.exe 2276 k2006222.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2276 k2006222.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 952 wrote to memory of 2432 952 f5d998e2615d3b4e0823b1a95095f6a1.exe 28 PID 952 wrote to memory of 2432 952 f5d998e2615d3b4e0823b1a95095f6a1.exe 28 PID 952 wrote to memory of 2432 952 f5d998e2615d3b4e0823b1a95095f6a1.exe 28 PID 952 wrote to memory of 2432 952 f5d998e2615d3b4e0823b1a95095f6a1.exe 28 PID 952 wrote to memory of 2432 952 f5d998e2615d3b4e0823b1a95095f6a1.exe 28 PID 952 wrote to memory of 2432 952 f5d998e2615d3b4e0823b1a95095f6a1.exe 28 PID 952 wrote to memory of 2432 952 f5d998e2615d3b4e0823b1a95095f6a1.exe 28 PID 2432 wrote to memory of 1560 2432 y6815521.exe 29 PID 2432 wrote to memory of 1560 2432 y6815521.exe 29 PID 2432 wrote to memory of 1560 2432 y6815521.exe 29 PID 2432 wrote to memory of 1560 2432 y6815521.exe 29 PID 2432 wrote to memory of 1560 2432 y6815521.exe 29 PID 2432 wrote to memory of 1560 2432 y6815521.exe 29 PID 2432 wrote to memory of 1560 2432 y6815521.exe 29 PID 1560 wrote to memory of 2276 1560 y9605803.exe 30 PID 1560 wrote to memory of 2276 1560 y9605803.exe 30 PID 1560 wrote to memory of 2276 1560 y9605803.exe 30 PID 1560 wrote to memory of 2276 1560 y9605803.exe 30 PID 1560 wrote to memory of 2276 1560 y9605803.exe 30 PID 1560 wrote to memory of 2276 1560 y9605803.exe 30 PID 1560 wrote to memory of 2276 1560 y9605803.exe 30 PID 1560 wrote to memory of 2456 1560 y9605803.exe 34 PID 1560 wrote to memory of 2456 1560 y9605803.exe 34 PID 1560 wrote to memory of 2456 1560 y9605803.exe 34 PID 1560 wrote to memory of 2456 1560 y9605803.exe 34 PID 1560 wrote to memory of 2456 1560 y9605803.exe 34 PID 1560 wrote to memory of 2456 1560 y9605803.exe 34 PID 1560 wrote to memory of 2456 1560 y9605803.exe 34 PID 2456 wrote to memory of 2916 2456 l1975614.exe 36 PID 2456 wrote to memory of 2916 2456 l1975614.exe 36 PID 2456 wrote to memory of 2916 2456 l1975614.exe 36 PID 2456 wrote to memory of 2916 2456 l1975614.exe 36 PID 2456 wrote to memory of 2916 2456 l1975614.exe 36 PID 2456 wrote to memory of 2916 2456 l1975614.exe 36 PID 2456 wrote to memory of 2916 2456 l1975614.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5d998e2615d3b4e0823b1a95095f6a1.exe"C:\Users\Admin\AppData\Local\Temp\f5d998e2615d3b4e0823b1a95095f6a1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6815521.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6815521.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9605803.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9605803.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2006222.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k2006222.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1975614.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1975614.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 2765⤵
- Loads dropped DLL
- Program crash
PID:2916
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
994KB
MD54038e91a8578924cfabbbc4caadeedab
SHA11cd19cd1a660b17d80a12c24adf5df42210b57ec
SHA25667780af53129b066e74f449b39905b5e03bf4d4112f4db3664241ca4e0c22a38
SHA5129c409fc2711baef2a06ae7aef8063c643bf5642360861fdf285d4d5c0a5b4d7130171db53160d50357038b909cdb4ba8d4929588f2e71e42004d154bf6e3909e
-
Filesize
994KB
MD54038e91a8578924cfabbbc4caadeedab
SHA11cd19cd1a660b17d80a12c24adf5df42210b57ec
SHA25667780af53129b066e74f449b39905b5e03bf4d4112f4db3664241ca4e0c22a38
SHA5129c409fc2711baef2a06ae7aef8063c643bf5642360861fdf285d4d5c0a5b4d7130171db53160d50357038b909cdb4ba8d4929588f2e71e42004d154bf6e3909e
-
Filesize
838KB
MD520a39f10edf968c563f4a311fa6f550d
SHA1205f12f79e4f319f4ba7fcbe34acada58cc4e201
SHA2566e26ea2537215af7032edb3b32b3cf7e35e236710bba4b80fed39c88f320f85b
SHA512d34ac50cffbdff6c37fb8b691d9a778b000e47486aaf36442a05dfdf0a674158baa1a73eaf3b31e706a2d48b6738303aa379070cb5c88ac55526dbb86f67bc22
-
Filesize
838KB
MD520a39f10edf968c563f4a311fa6f550d
SHA1205f12f79e4f319f4ba7fcbe34acada58cc4e201
SHA2566e26ea2537215af7032edb3b32b3cf7e35e236710bba4b80fed39c88f320f85b
SHA512d34ac50cffbdff6c37fb8b691d9a778b000e47486aaf36442a05dfdf0a674158baa1a73eaf3b31e706a2d48b6738303aa379070cb5c88ac55526dbb86f67bc22
-
Filesize
640KB
MD58c0070111324b4f6315905e63e3f6108
SHA1e319a0a3d54d24075755bdc2d15bce8e17939fec
SHA256752e861f21a6be46940d2d9a158f2825cad9ee4acb3d4644edf3675f33769ab0
SHA512dae096c8c8f1e1ecaa5cd6bc3aebb3c6635a2534735ac9fa41613955c80c3780a7d62a02142096fff325d33e05901ee6c543dedc9e3460355341d3b76e6eeaa2
-
Filesize
640KB
MD58c0070111324b4f6315905e63e3f6108
SHA1e319a0a3d54d24075755bdc2d15bce8e17939fec
SHA256752e861f21a6be46940d2d9a158f2825cad9ee4acb3d4644edf3675f33769ab0
SHA512dae096c8c8f1e1ecaa5cd6bc3aebb3c6635a2534735ac9fa41613955c80c3780a7d62a02142096fff325d33e05901ee6c543dedc9e3460355341d3b76e6eeaa2
-
Filesize
640KB
MD58c0070111324b4f6315905e63e3f6108
SHA1e319a0a3d54d24075755bdc2d15bce8e17939fec
SHA256752e861f21a6be46940d2d9a158f2825cad9ee4acb3d4644edf3675f33769ab0
SHA512dae096c8c8f1e1ecaa5cd6bc3aebb3c6635a2534735ac9fa41613955c80c3780a7d62a02142096fff325d33e05901ee6c543dedc9e3460355341d3b76e6eeaa2
-
Filesize
1.7MB
MD54be25a17dcda5b72adbffb12bc36ff25
SHA17434bab75eeddc53501f4b6749a1af49d958ef01
SHA256edbce910e5aae3e9ba91bc0b928ca22cdac4521d47acbef419eacabe257a2351
SHA512d41a02fbd559ee3da550acb2067c36321109b02567d80cf39f28139fc8d18d23493571a1eb465081b061ea277d955d12d17a3ecb59118946cb33d07cb6d824cd
-
Filesize
1.7MB
MD54be25a17dcda5b72adbffb12bc36ff25
SHA17434bab75eeddc53501f4b6749a1af49d958ef01
SHA256edbce910e5aae3e9ba91bc0b928ca22cdac4521d47acbef419eacabe257a2351
SHA512d41a02fbd559ee3da550acb2067c36321109b02567d80cf39f28139fc8d18d23493571a1eb465081b061ea277d955d12d17a3ecb59118946cb33d07cb6d824cd
-
Filesize
1.7MB
MD54be25a17dcda5b72adbffb12bc36ff25
SHA17434bab75eeddc53501f4b6749a1af49d958ef01
SHA256edbce910e5aae3e9ba91bc0b928ca22cdac4521d47acbef419eacabe257a2351
SHA512d41a02fbd559ee3da550acb2067c36321109b02567d80cf39f28139fc8d18d23493571a1eb465081b061ea277d955d12d17a3ecb59118946cb33d07cb6d824cd
-
Filesize
994KB
MD54038e91a8578924cfabbbc4caadeedab
SHA11cd19cd1a660b17d80a12c24adf5df42210b57ec
SHA25667780af53129b066e74f449b39905b5e03bf4d4112f4db3664241ca4e0c22a38
SHA5129c409fc2711baef2a06ae7aef8063c643bf5642360861fdf285d4d5c0a5b4d7130171db53160d50357038b909cdb4ba8d4929588f2e71e42004d154bf6e3909e
-
Filesize
994KB
MD54038e91a8578924cfabbbc4caadeedab
SHA11cd19cd1a660b17d80a12c24adf5df42210b57ec
SHA25667780af53129b066e74f449b39905b5e03bf4d4112f4db3664241ca4e0c22a38
SHA5129c409fc2711baef2a06ae7aef8063c643bf5642360861fdf285d4d5c0a5b4d7130171db53160d50357038b909cdb4ba8d4929588f2e71e42004d154bf6e3909e
-
Filesize
838KB
MD520a39f10edf968c563f4a311fa6f550d
SHA1205f12f79e4f319f4ba7fcbe34acada58cc4e201
SHA2566e26ea2537215af7032edb3b32b3cf7e35e236710bba4b80fed39c88f320f85b
SHA512d34ac50cffbdff6c37fb8b691d9a778b000e47486aaf36442a05dfdf0a674158baa1a73eaf3b31e706a2d48b6738303aa379070cb5c88ac55526dbb86f67bc22
-
Filesize
838KB
MD520a39f10edf968c563f4a311fa6f550d
SHA1205f12f79e4f319f4ba7fcbe34acada58cc4e201
SHA2566e26ea2537215af7032edb3b32b3cf7e35e236710bba4b80fed39c88f320f85b
SHA512d34ac50cffbdff6c37fb8b691d9a778b000e47486aaf36442a05dfdf0a674158baa1a73eaf3b31e706a2d48b6738303aa379070cb5c88ac55526dbb86f67bc22
-
Filesize
640KB
MD58c0070111324b4f6315905e63e3f6108
SHA1e319a0a3d54d24075755bdc2d15bce8e17939fec
SHA256752e861f21a6be46940d2d9a158f2825cad9ee4acb3d4644edf3675f33769ab0
SHA512dae096c8c8f1e1ecaa5cd6bc3aebb3c6635a2534735ac9fa41613955c80c3780a7d62a02142096fff325d33e05901ee6c543dedc9e3460355341d3b76e6eeaa2
-
Filesize
640KB
MD58c0070111324b4f6315905e63e3f6108
SHA1e319a0a3d54d24075755bdc2d15bce8e17939fec
SHA256752e861f21a6be46940d2d9a158f2825cad9ee4acb3d4644edf3675f33769ab0
SHA512dae096c8c8f1e1ecaa5cd6bc3aebb3c6635a2534735ac9fa41613955c80c3780a7d62a02142096fff325d33e05901ee6c543dedc9e3460355341d3b76e6eeaa2
-
Filesize
640KB
MD58c0070111324b4f6315905e63e3f6108
SHA1e319a0a3d54d24075755bdc2d15bce8e17939fec
SHA256752e861f21a6be46940d2d9a158f2825cad9ee4acb3d4644edf3675f33769ab0
SHA512dae096c8c8f1e1ecaa5cd6bc3aebb3c6635a2534735ac9fa41613955c80c3780a7d62a02142096fff325d33e05901ee6c543dedc9e3460355341d3b76e6eeaa2
-
Filesize
1.7MB
MD54be25a17dcda5b72adbffb12bc36ff25
SHA17434bab75eeddc53501f4b6749a1af49d958ef01
SHA256edbce910e5aae3e9ba91bc0b928ca22cdac4521d47acbef419eacabe257a2351
SHA512d41a02fbd559ee3da550acb2067c36321109b02567d80cf39f28139fc8d18d23493571a1eb465081b061ea277d955d12d17a3ecb59118946cb33d07cb6d824cd
-
Filesize
1.7MB
MD54be25a17dcda5b72adbffb12bc36ff25
SHA17434bab75eeddc53501f4b6749a1af49d958ef01
SHA256edbce910e5aae3e9ba91bc0b928ca22cdac4521d47acbef419eacabe257a2351
SHA512d41a02fbd559ee3da550acb2067c36321109b02567d80cf39f28139fc8d18d23493571a1eb465081b061ea277d955d12d17a3ecb59118946cb33d07cb6d824cd
-
Filesize
1.7MB
MD54be25a17dcda5b72adbffb12bc36ff25
SHA17434bab75eeddc53501f4b6749a1af49d958ef01
SHA256edbce910e5aae3e9ba91bc0b928ca22cdac4521d47acbef419eacabe257a2351
SHA512d41a02fbd559ee3da550acb2067c36321109b02567d80cf39f28139fc8d18d23493571a1eb465081b061ea277d955d12d17a3ecb59118946cb33d07cb6d824cd
-
Filesize
1.7MB
MD54be25a17dcda5b72adbffb12bc36ff25
SHA17434bab75eeddc53501f4b6749a1af49d958ef01
SHA256edbce910e5aae3e9ba91bc0b928ca22cdac4521d47acbef419eacabe257a2351
SHA512d41a02fbd559ee3da550acb2067c36321109b02567d80cf39f28139fc8d18d23493571a1eb465081b061ea277d955d12d17a3ecb59118946cb33d07cb6d824cd
-
Filesize
1.7MB
MD54be25a17dcda5b72adbffb12bc36ff25
SHA17434bab75eeddc53501f4b6749a1af49d958ef01
SHA256edbce910e5aae3e9ba91bc0b928ca22cdac4521d47acbef419eacabe257a2351
SHA512d41a02fbd559ee3da550acb2067c36321109b02567d80cf39f28139fc8d18d23493571a1eb465081b061ea277d955d12d17a3ecb59118946cb33d07cb6d824cd
-
Filesize
1.7MB
MD54be25a17dcda5b72adbffb12bc36ff25
SHA17434bab75eeddc53501f4b6749a1af49d958ef01
SHA256edbce910e5aae3e9ba91bc0b928ca22cdac4521d47acbef419eacabe257a2351
SHA512d41a02fbd559ee3da550acb2067c36321109b02567d80cf39f28139fc8d18d23493571a1eb465081b061ea277d955d12d17a3ecb59118946cb33d07cb6d824cd
-
Filesize
1.7MB
MD54be25a17dcda5b72adbffb12bc36ff25
SHA17434bab75eeddc53501f4b6749a1af49d958ef01
SHA256edbce910e5aae3e9ba91bc0b928ca22cdac4521d47acbef419eacabe257a2351
SHA512d41a02fbd559ee3da550acb2067c36321109b02567d80cf39f28139fc8d18d23493571a1eb465081b061ea277d955d12d17a3ecb59118946cb33d07cb6d824cd