Analysis
-
max time kernel
242s -
max time network
251s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23/08/2023, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
x0422095.exe
Resource
win7-20230712-en
General
-
Target
x0422095.exe
-
Size
277KB
-
MD5
df17a4184453fa574f5da5df31d42aad
-
SHA1
2d0ae6991e2cd8c7e04ab9b05a7a8e59199b5b96
-
SHA256
97a6b40c1df77ea4fa8e12db7564cdbfd7452c19dda3a43154c8d0bc58313bdd
-
SHA512
a37763eb7e963281d4d05f6f6b19ebc7999aa3534678a921a25f02b8cdaa0051e75a0cbca31ff710debb402f5c1d9ba510c80419d8fa2cf7d18db246c619cff3
-
SSDEEP
6144:Kdy+bnr+ip0yN90QE2MXr8cWR3bXTX5l1S1xGnfF0Y4dVl:LMrmy90lX1WJrc4fF29
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Signatures
-
Detects Healer an antivirus disabler dropper 4 IoCs
resource yara_rule behavioral1/files/0x00090000000120f2-57.dat healer behavioral1/files/0x00090000000120f2-59.dat healer behavioral1/files/0x00090000000120f2-60.dat healer behavioral1/memory/2076-61-0x00000000001F0000-0x00000000001FA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g7501174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g7501174.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g7501174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g7501174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g7501174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g7501174.exe -
Executes dropped EXE 7 IoCs
pid Process 2076 g7501174.exe 2864 h3635835.exe 2304 saves.exe 2820 saves.exe 1704 saves.exe 2688 saves.exe 712 saves.exe -
Loads dropped DLL 9 IoCs
pid Process 1292 x0422095.exe 1292 x0422095.exe 2864 h3635835.exe 2864 h3635835.exe 2304 saves.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features g7501174.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g7501174.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x0422095.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 996 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2076 g7501174.exe 2076 g7501174.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2076 g7501174.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2076 1292 x0422095.exe 28 PID 1292 wrote to memory of 2076 1292 x0422095.exe 28 PID 1292 wrote to memory of 2076 1292 x0422095.exe 28 PID 1292 wrote to memory of 2076 1292 x0422095.exe 28 PID 1292 wrote to memory of 2076 1292 x0422095.exe 28 PID 1292 wrote to memory of 2076 1292 x0422095.exe 28 PID 1292 wrote to memory of 2076 1292 x0422095.exe 28 PID 1292 wrote to memory of 2864 1292 x0422095.exe 29 PID 1292 wrote to memory of 2864 1292 x0422095.exe 29 PID 1292 wrote to memory of 2864 1292 x0422095.exe 29 PID 1292 wrote to memory of 2864 1292 x0422095.exe 29 PID 1292 wrote to memory of 2864 1292 x0422095.exe 29 PID 1292 wrote to memory of 2864 1292 x0422095.exe 29 PID 1292 wrote to memory of 2864 1292 x0422095.exe 29 PID 2864 wrote to memory of 2304 2864 h3635835.exe 30 PID 2864 wrote to memory of 2304 2864 h3635835.exe 30 PID 2864 wrote to memory of 2304 2864 h3635835.exe 30 PID 2864 wrote to memory of 2304 2864 h3635835.exe 30 PID 2864 wrote to memory of 2304 2864 h3635835.exe 30 PID 2864 wrote to memory of 2304 2864 h3635835.exe 30 PID 2864 wrote to memory of 2304 2864 h3635835.exe 30 PID 2304 wrote to memory of 996 2304 saves.exe 31 PID 2304 wrote to memory of 996 2304 saves.exe 31 PID 2304 wrote to memory of 996 2304 saves.exe 31 PID 2304 wrote to memory of 996 2304 saves.exe 31 PID 2304 wrote to memory of 996 2304 saves.exe 31 PID 2304 wrote to memory of 996 2304 saves.exe 31 PID 2304 wrote to memory of 996 2304 saves.exe 31 PID 2304 wrote to memory of 2880 2304 saves.exe 33 PID 2304 wrote to memory of 2880 2304 saves.exe 33 PID 2304 wrote to memory of 2880 2304 saves.exe 33 PID 2304 wrote to memory of 2880 2304 saves.exe 33 PID 2304 wrote to memory of 2880 2304 saves.exe 33 PID 2304 wrote to memory of 2880 2304 saves.exe 33 PID 2304 wrote to memory of 2880 2304 saves.exe 33 PID 2880 wrote to memory of 364 2880 cmd.exe 35 PID 2880 wrote to memory of 364 2880 cmd.exe 35 PID 2880 wrote to memory of 364 2880 cmd.exe 35 PID 2880 wrote to memory of 364 2880 cmd.exe 35 PID 2880 wrote to memory of 364 2880 cmd.exe 35 PID 2880 wrote to memory of 364 2880 cmd.exe 35 PID 2880 wrote to memory of 364 2880 cmd.exe 35 PID 2880 wrote to memory of 240 2880 cmd.exe 36 PID 2880 wrote to memory of 240 2880 cmd.exe 36 PID 2880 wrote to memory of 240 2880 cmd.exe 36 PID 2880 wrote to memory of 240 2880 cmd.exe 36 PID 2880 wrote to memory of 240 2880 cmd.exe 36 PID 2880 wrote to memory of 240 2880 cmd.exe 36 PID 2880 wrote to memory of 240 2880 cmd.exe 36 PID 2880 wrote to memory of 2980 2880 cmd.exe 37 PID 2880 wrote to memory of 2980 2880 cmd.exe 37 PID 2880 wrote to memory of 2980 2880 cmd.exe 37 PID 2880 wrote to memory of 2980 2880 cmd.exe 37 PID 2880 wrote to memory of 2980 2880 cmd.exe 37 PID 2880 wrote to memory of 2980 2880 cmd.exe 37 PID 2880 wrote to memory of 2980 2880 cmd.exe 37 PID 2880 wrote to memory of 2716 2880 cmd.exe 38 PID 2880 wrote to memory of 2716 2880 cmd.exe 38 PID 2880 wrote to memory of 2716 2880 cmd.exe 38 PID 2880 wrote to memory of 2716 2880 cmd.exe 38 PID 2880 wrote to memory of 2716 2880 cmd.exe 38 PID 2880 wrote to memory of 2716 2880 cmd.exe 38 PID 2880 wrote to memory of 2716 2880 cmd.exe 38 PID 2880 wrote to memory of 2736 2880 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\x0422095.exe"C:\Users\Admin\AppData\Local\Temp\x0422095.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g7501174.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g7501174.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h3635835.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h3635835.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F4⤵
- Creates scheduled task(s)
PID:996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:364
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"5⤵PID:240
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E5⤵PID:2980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2716
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"5⤵PID:2736
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E5⤵PID:2764
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1240
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E0CE6B84-77D7-4095-BDA2-E40442C47092} S-1-5-21-3408354897-1169622894-3874090110-1000:WGWIREOE\Admin:Interactive:[1]1⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe2⤵
- Executes dropped EXE
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe2⤵
- Executes dropped EXE
PID:1704
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe2⤵
- Executes dropped EXE
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe2⤵
- Executes dropped EXE
PID:712
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD568545ae9913b3fe8366b8d4347a281b6
SHA19482d0ba1c0de54e2d03644f15e2bfb442dc032d
SHA2560c6eafdb0bb0f0fa8b44cb0644d2e8df9213c507f8819489dc361bc279fe25e8
SHA5123072f6ac8dc4c8f3bea673f0347030cca95359633f678de526263568bd542139c7e4d77ce4b9eec217b7f8923eca8d205befca97c581cf1427ced115c7264280
-
Filesize
12KB
MD568545ae9913b3fe8366b8d4347a281b6
SHA19482d0ba1c0de54e2d03644f15e2bfb442dc032d
SHA2560c6eafdb0bb0f0fa8b44cb0644d2e8df9213c507f8819489dc361bc279fe25e8
SHA5123072f6ac8dc4c8f3bea673f0347030cca95359633f678de526263568bd542139c7e4d77ce4b9eec217b7f8923eca8d205befca97c581cf1427ced115c7264280
-
Filesize
315KB
MD5001fdd934e6c15eae9168fa532159ac2
SHA16799b380531e287b3dc5caab98d9741267544280
SHA2564daf03c04ee409d743c843ff1e0dfd933a690f69d69a279ed914ddff895c7fe9
SHA5120943e2c66794d61d45c0bc406530a1f40478adf6b1d1e5f9514a503c885c963516d08748d0fffe34c25ab1951cbe79ac341153274058013617af28bd73cf7972
-
Filesize
315KB
MD5001fdd934e6c15eae9168fa532159ac2
SHA16799b380531e287b3dc5caab98d9741267544280
SHA2564daf03c04ee409d743c843ff1e0dfd933a690f69d69a279ed914ddff895c7fe9
SHA5120943e2c66794d61d45c0bc406530a1f40478adf6b1d1e5f9514a503c885c963516d08748d0fffe34c25ab1951cbe79ac341153274058013617af28bd73cf7972
-
Filesize
315KB
MD5001fdd934e6c15eae9168fa532159ac2
SHA16799b380531e287b3dc5caab98d9741267544280
SHA2564daf03c04ee409d743c843ff1e0dfd933a690f69d69a279ed914ddff895c7fe9
SHA5120943e2c66794d61d45c0bc406530a1f40478adf6b1d1e5f9514a503c885c963516d08748d0fffe34c25ab1951cbe79ac341153274058013617af28bd73cf7972
-
Filesize
315KB
MD5001fdd934e6c15eae9168fa532159ac2
SHA16799b380531e287b3dc5caab98d9741267544280
SHA2564daf03c04ee409d743c843ff1e0dfd933a690f69d69a279ed914ddff895c7fe9
SHA5120943e2c66794d61d45c0bc406530a1f40478adf6b1d1e5f9514a503c885c963516d08748d0fffe34c25ab1951cbe79ac341153274058013617af28bd73cf7972
-
Filesize
315KB
MD5001fdd934e6c15eae9168fa532159ac2
SHA16799b380531e287b3dc5caab98d9741267544280
SHA2564daf03c04ee409d743c843ff1e0dfd933a690f69d69a279ed914ddff895c7fe9
SHA5120943e2c66794d61d45c0bc406530a1f40478adf6b1d1e5f9514a503c885c963516d08748d0fffe34c25ab1951cbe79ac341153274058013617af28bd73cf7972
-
Filesize
315KB
MD5001fdd934e6c15eae9168fa532159ac2
SHA16799b380531e287b3dc5caab98d9741267544280
SHA2564daf03c04ee409d743c843ff1e0dfd933a690f69d69a279ed914ddff895c7fe9
SHA5120943e2c66794d61d45c0bc406530a1f40478adf6b1d1e5f9514a503c885c963516d08748d0fffe34c25ab1951cbe79ac341153274058013617af28bd73cf7972
-
Filesize
315KB
MD5001fdd934e6c15eae9168fa532159ac2
SHA16799b380531e287b3dc5caab98d9741267544280
SHA2564daf03c04ee409d743c843ff1e0dfd933a690f69d69a279ed914ddff895c7fe9
SHA5120943e2c66794d61d45c0bc406530a1f40478adf6b1d1e5f9514a503c885c963516d08748d0fffe34c25ab1951cbe79ac341153274058013617af28bd73cf7972
-
Filesize
315KB
MD5001fdd934e6c15eae9168fa532159ac2
SHA16799b380531e287b3dc5caab98d9741267544280
SHA2564daf03c04ee409d743c843ff1e0dfd933a690f69d69a279ed914ddff895c7fe9
SHA5120943e2c66794d61d45c0bc406530a1f40478adf6b1d1e5f9514a503c885c963516d08748d0fffe34c25ab1951cbe79ac341153274058013617af28bd73cf7972
-
Filesize
315KB
MD5001fdd934e6c15eae9168fa532159ac2
SHA16799b380531e287b3dc5caab98d9741267544280
SHA2564daf03c04ee409d743c843ff1e0dfd933a690f69d69a279ed914ddff895c7fe9
SHA5120943e2c66794d61d45c0bc406530a1f40478adf6b1d1e5f9514a503c885c963516d08748d0fffe34c25ab1951cbe79ac341153274058013617af28bd73cf7972
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
12KB
MD568545ae9913b3fe8366b8d4347a281b6
SHA19482d0ba1c0de54e2d03644f15e2bfb442dc032d
SHA2560c6eafdb0bb0f0fa8b44cb0644d2e8df9213c507f8819489dc361bc279fe25e8
SHA5123072f6ac8dc4c8f3bea673f0347030cca95359633f678de526263568bd542139c7e4d77ce4b9eec217b7f8923eca8d205befca97c581cf1427ced115c7264280
-
Filesize
315KB
MD5001fdd934e6c15eae9168fa532159ac2
SHA16799b380531e287b3dc5caab98d9741267544280
SHA2564daf03c04ee409d743c843ff1e0dfd933a690f69d69a279ed914ddff895c7fe9
SHA5120943e2c66794d61d45c0bc406530a1f40478adf6b1d1e5f9514a503c885c963516d08748d0fffe34c25ab1951cbe79ac341153274058013617af28bd73cf7972
-
Filesize
315KB
MD5001fdd934e6c15eae9168fa532159ac2
SHA16799b380531e287b3dc5caab98d9741267544280
SHA2564daf03c04ee409d743c843ff1e0dfd933a690f69d69a279ed914ddff895c7fe9
SHA5120943e2c66794d61d45c0bc406530a1f40478adf6b1d1e5f9514a503c885c963516d08748d0fffe34c25ab1951cbe79ac341153274058013617af28bd73cf7972
-
Filesize
315KB
MD5001fdd934e6c15eae9168fa532159ac2
SHA16799b380531e287b3dc5caab98d9741267544280
SHA2564daf03c04ee409d743c843ff1e0dfd933a690f69d69a279ed914ddff895c7fe9
SHA5120943e2c66794d61d45c0bc406530a1f40478adf6b1d1e5f9514a503c885c963516d08748d0fffe34c25ab1951cbe79ac341153274058013617af28bd73cf7972
-
Filesize
315KB
MD5001fdd934e6c15eae9168fa532159ac2
SHA16799b380531e287b3dc5caab98d9741267544280
SHA2564daf03c04ee409d743c843ff1e0dfd933a690f69d69a279ed914ddff895c7fe9
SHA5120943e2c66794d61d45c0bc406530a1f40478adf6b1d1e5f9514a503c885c963516d08748d0fffe34c25ab1951cbe79ac341153274058013617af28bd73cf7972
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b