Analysis
-
max time kernel
129s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
16/07/2023, 12:26
Static task
static1
1 signatures
General
-
Target
74300b6d43400e327dadddaeb0dcdcf8ef6ac9a34d01bafa43730d0b49404194.exe
-
Size
295KB
-
MD5
d061d4fe53154eda26a80aa94b64fa47
-
SHA1
f64b33cced915d151d39939d37573abec9206b12
-
SHA256
74300b6d43400e327dadddaeb0dcdcf8ef6ac9a34d01bafa43730d0b49404194
-
SHA512
0e0ef22144e6c07fff6c297facc94a35ed041cffbb3f84d594e8791a51efc01431b23d8d5e46af91258d8ad5fc40d7f88f62eedfd12aa40ae859c43ce1c8d59a
-
SSDEEP
6144:O+oZI0FvxYHw8nJrTc853tpK4ucvgHBfLuGZdmLK77iuQmOc:O+oZv/8/53tpK4uok5Vdme77pQS
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/656-128-0x0000000002060000-0x000000000209E000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 74300b6d43400e327dadddaeb0dcdcf8ef6ac9a34d01bafa43730d0b49404194.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 74300b6d43400e327dadddaeb0dcdcf8ef6ac9a34d01bafa43730d0b49404194.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 74300b6d43400e327dadddaeb0dcdcf8ef6ac9a34d01bafa43730d0b49404194.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 74300b6d43400e327dadddaeb0dcdcf8ef6ac9a34d01bafa43730d0b49404194.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 74300b6d43400e327dadddaeb0dcdcf8ef6ac9a34d01bafa43730d0b49404194.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 74300b6d43400e327dadddaeb0dcdcf8ef6ac9a34d01bafa43730d0b49404194.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 74300b6d43400e327dadddaeb0dcdcf8ef6ac9a34d01bafa43730d0b49404194.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 656 74300b6d43400e327dadddaeb0dcdcf8ef6ac9a34d01bafa43730d0b49404194.exe 656 74300b6d43400e327dadddaeb0dcdcf8ef6ac9a34d01bafa43730d0b49404194.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 656 74300b6d43400e327dadddaeb0dcdcf8ef6ac9a34d01bafa43730d0b49404194.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74300b6d43400e327dadddaeb0dcdcf8ef6ac9a34d01bafa43730d0b49404194.exe"C:\Users\Admin\AppData\Local\Temp\74300b6d43400e327dadddaeb0dcdcf8ef6ac9a34d01bafa43730d0b49404194.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:656