Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17-07-2023 04:47
Static task
static1
1 signatures
General
-
Target
8fe5d0d2cd15fb11a75e742258e77e56a7ff5ee7108571a7ab200bd5e789f13a.exe
-
Size
146KB
-
MD5
d86ecd057cbd9c16498267a01eb4235e
-
SHA1
c96ffc63540ade4405fa94e9656eb5a76a6b850a
-
SHA256
8fe5d0d2cd15fb11a75e742258e77e56a7ff5ee7108571a7ab200bd5e789f13a
-
SHA512
c7dfd693705e0f25e06e1fbe72c10b8e98a638dfb2c73d499f6178161e878c001135dd1dd1617ffa3c524a71f7c88039f7a45a2db5ba4ab316eba5555d22552a
-
SSDEEP
3072:BO2on4uzz7wjiR6ZwelYpK2+rlENZjLXfHXW:ZpjiRCwz86rPXW
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/5016-133-0x00000000001C0000-0x00000000001CA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 8fe5d0d2cd15fb11a75e742258e77e56a7ff5ee7108571a7ab200bd5e789f13a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 8fe5d0d2cd15fb11a75e742258e77e56a7ff5ee7108571a7ab200bd5e789f13a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 8fe5d0d2cd15fb11a75e742258e77e56a7ff5ee7108571a7ab200bd5e789f13a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 8fe5d0d2cd15fb11a75e742258e77e56a7ff5ee7108571a7ab200bd5e789f13a.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 8fe5d0d2cd15fb11a75e742258e77e56a7ff5ee7108571a7ab200bd5e789f13a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 8fe5d0d2cd15fb11a75e742258e77e56a7ff5ee7108571a7ab200bd5e789f13a.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 8fe5d0d2cd15fb11a75e742258e77e56a7ff5ee7108571a7ab200bd5e789f13a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8fe5d0d2cd15fb11a75e742258e77e56a7ff5ee7108571a7ab200bd5e789f13a.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3824 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5016 8fe5d0d2cd15fb11a75e742258e77e56a7ff5ee7108571a7ab200bd5e789f13a.exe 5016 8fe5d0d2cd15fb11a75e742258e77e56a7ff5ee7108571a7ab200bd5e789f13a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5016 8fe5d0d2cd15fb11a75e742258e77e56a7ff5ee7108571a7ab200bd5e789f13a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fe5d0d2cd15fb11a75e742258e77e56a7ff5ee7108571a7ab200bd5e789f13a.exe"C:\Users\Admin\AppData\Local\Temp\8fe5d0d2cd15fb11a75e742258e77e56a7ff5ee7108571a7ab200bd5e789f13a.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3824