Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230824-en -
resource tags
arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system -
submitted
25/08/2023, 04:37
Static task
static1
Behavioral task
behavioral1
Sample
z3081707.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
z3081707.exe
Resource
win10-20230703-en
General
-
Target
z3081707.exe
-
Size
217KB
-
MD5
b428d9e050841623c55a4b5522578a9f
-
SHA1
7edd24eb1811a6998bc7adec9f1ab99f343ba3c9
-
SHA256
b2c7059861e84bbbd4aa1d06b7da8c804928aa6e0f5421afc6fa434a0e3e9cad
-
SHA512
d0c01a428bfc9fcbea6a4c50d412d0e4d73b885c6808e136f2e0c5fe47f5321d0b565cfa68d1f27731543e40e9996389ba54b38614be802c876eb3c08fb4453d
-
SSDEEP
3072:K3y+bnr+O1f5GWp1icKAArDZz4N9GhbkrNEk1XaLgZhjOOdjiJ5rIFktI4TxKFXL:K3y+bnr+8p0yN90QEib6dIFktImBIAK
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 4 IoCs
resource yara_rule behavioral1/files/0x000b000000012270-4.dat healer behavioral1/files/0x000b000000012270-6.dat healer behavioral1/files/0x000b000000012270-7.dat healer behavioral1/memory/1364-9-0x0000000000280000-0x000000000028A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q9406253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q9406253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q9406253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q9406253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q9406253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q9406253.exe -
Executes dropped EXE 2 IoCs
pid Process 1364 q9406253.exe 1012 r8133859.exe -
Loads dropped DLL 3 IoCs
pid Process 2892 z3081707.exe 2892 z3081707.exe 1012 r8133859.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features q9406253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q9406253.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" z3081707.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1364 q9406253.exe 1364 q9406253.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1364 q9406253.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2892 wrote to memory of 1364 2892 z3081707.exe 30 PID 2892 wrote to memory of 1364 2892 z3081707.exe 30 PID 2892 wrote to memory of 1364 2892 z3081707.exe 30 PID 2892 wrote to memory of 1364 2892 z3081707.exe 30 PID 2892 wrote to memory of 1364 2892 z3081707.exe 30 PID 2892 wrote to memory of 1364 2892 z3081707.exe 30 PID 2892 wrote to memory of 1364 2892 z3081707.exe 30 PID 2892 wrote to memory of 1012 2892 z3081707.exe 31 PID 2892 wrote to memory of 1012 2892 z3081707.exe 31 PID 2892 wrote to memory of 1012 2892 z3081707.exe 31 PID 2892 wrote to memory of 1012 2892 z3081707.exe 31 PID 2892 wrote to memory of 1012 2892 z3081707.exe 31 PID 2892 wrote to memory of 1012 2892 z3081707.exe 31 PID 2892 wrote to memory of 1012 2892 z3081707.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\z3081707.exe"C:\Users\Admin\AppData\Local\Temp\z3081707.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\q9406253.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\q9406253.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r8133859.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r8133859.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1012
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5d920ccff55709346e718df460557ce7d
SHA1cb28db460556747e480f6ef8ea01d6ef6b27f55b
SHA256322e1bb05e211a3c0278bbc4adc4d3bc604265c53a65d52edf22b578fa4dd1ef
SHA51298be952217d1038bc718bead06b373bebd911abd73aa215c5838e56bdbf7ce374c6e325bdfc6ea29ab6811e097e925da93b8fc9ae1979049c6123f26ab7710ba
-
Filesize
13KB
MD5d920ccff55709346e718df460557ce7d
SHA1cb28db460556747e480f6ef8ea01d6ef6b27f55b
SHA256322e1bb05e211a3c0278bbc4adc4d3bc604265c53a65d52edf22b578fa4dd1ef
SHA51298be952217d1038bc718bead06b373bebd911abd73aa215c5838e56bdbf7ce374c6e325bdfc6ea29ab6811e097e925da93b8fc9ae1979049c6123f26ab7710ba
-
Filesize
140KB
MD533c30cdfd58a0f8fb2a69817114801c6
SHA1fc42aba6725fef4a19c2e51b06fefb3583e1fca9
SHA2569affd2f3cb4ce48e9c45fd2181633313d799ee2cb9df7170e0d5c49b31e256e5
SHA5121cf95e29ae2640972636404e91097a0646185908f7a7c08b962cddb030575a4be87a86e005b5e078ddc1aca1ef8402a966178dfbc6b0fe5a495c730e2fb433da
-
Filesize
140KB
MD533c30cdfd58a0f8fb2a69817114801c6
SHA1fc42aba6725fef4a19c2e51b06fefb3583e1fca9
SHA2569affd2f3cb4ce48e9c45fd2181633313d799ee2cb9df7170e0d5c49b31e256e5
SHA5121cf95e29ae2640972636404e91097a0646185908f7a7c08b962cddb030575a4be87a86e005b5e078ddc1aca1ef8402a966178dfbc6b0fe5a495c730e2fb433da
-
Filesize
13KB
MD5d920ccff55709346e718df460557ce7d
SHA1cb28db460556747e480f6ef8ea01d6ef6b27f55b
SHA256322e1bb05e211a3c0278bbc4adc4d3bc604265c53a65d52edf22b578fa4dd1ef
SHA51298be952217d1038bc718bead06b373bebd911abd73aa215c5838e56bdbf7ce374c6e325bdfc6ea29ab6811e097e925da93b8fc9ae1979049c6123f26ab7710ba
-
Filesize
140KB
MD533c30cdfd58a0f8fb2a69817114801c6
SHA1fc42aba6725fef4a19c2e51b06fefb3583e1fca9
SHA2569affd2f3cb4ce48e9c45fd2181633313d799ee2cb9df7170e0d5c49b31e256e5
SHA5121cf95e29ae2640972636404e91097a0646185908f7a7c08b962cddb030575a4be87a86e005b5e078ddc1aca1ef8402a966178dfbc6b0fe5a495c730e2fb433da
-
Filesize
140KB
MD533c30cdfd58a0f8fb2a69817114801c6
SHA1fc42aba6725fef4a19c2e51b06fefb3583e1fca9
SHA2569affd2f3cb4ce48e9c45fd2181633313d799ee2cb9df7170e0d5c49b31e256e5
SHA5121cf95e29ae2640972636404e91097a0646185908f7a7c08b962cddb030575a4be87a86e005b5e078ddc1aca1ef8402a966178dfbc6b0fe5a495c730e2fb433da