Analysis
-
max time kernel
125s -
max time network
132s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
20/07/2023, 20:55
Static task
static1
1 signatures
General
-
Target
936b912d6856692f740cd656923c361085790bdbc3c374e17a537053a552752c.exe
-
Size
147KB
-
MD5
cf7ed205454f480553d2c42353f3df09
-
SHA1
b11e4c19fc97b4ba67c65709aefda2290229aff6
-
SHA256
936b912d6856692f740cd656923c361085790bdbc3c374e17a537053a552752c
-
SHA512
44c32e0e489499ac53a31ef080bd13eefb128f682265e33ace94443c79fe5c4eb4dfd8e25a19bf9e55a64a1c0716f82e15b88d43c60ea9ca827eff6cd52ea6a1
-
SSDEEP
3072:KlZ3TFfpCRzzwQjiRb5welYpK23rlx4cLXfHXW:er8LjiRVwz86rPXW
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/2192-122-0x00000000001C0000-0x00000000001CA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 936b912d6856692f740cd656923c361085790bdbc3c374e17a537053a552752c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 936b912d6856692f740cd656923c361085790bdbc3c374e17a537053a552752c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 936b912d6856692f740cd656923c361085790bdbc3c374e17a537053a552752c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 936b912d6856692f740cd656923c361085790bdbc3c374e17a537053a552752c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 936b912d6856692f740cd656923c361085790bdbc3c374e17a537053a552752c.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 936b912d6856692f740cd656923c361085790bdbc3c374e17a537053a552752c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 936b912d6856692f740cd656923c361085790bdbc3c374e17a537053a552752c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2192 936b912d6856692f740cd656923c361085790bdbc3c374e17a537053a552752c.exe 2192 936b912d6856692f740cd656923c361085790bdbc3c374e17a537053a552752c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2192 936b912d6856692f740cd656923c361085790bdbc3c374e17a537053a552752c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\936b912d6856692f740cd656923c361085790bdbc3c374e17a537053a552752c.exe"C:\Users\Admin\AppData\Local\Temp\936b912d6856692f740cd656923c361085790bdbc3c374e17a537053a552752c.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2192