Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28/08/2023, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
z5056178.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
z5056178.exe
Resource
win10-20230703-en
General
-
Target
z5056178.exe
-
Size
217KB
-
MD5
82cb46a47f9a2e58d40f1b0edf47fb34
-
SHA1
62eb05bbd24a580640350fd4fc5dc516ae1a882c
-
SHA256
a879a9170e7cb065ffe6d99a6f79a39d21fa91937284100e453af790356789ad
-
SHA512
0ced7a8d35635eb5d5e5ceb20306a96a5a00696078e1a6c44642dbe1d2a5859e02104d01323cf6dd4ef08bcff8cd9b79e5b9335a67a8f68949dce4ccc4501c08
-
SSDEEP
3072:Kay+bnr+O1t5GWp1icKAArDZz4N9GhbkrNEk1TcfLO3KWvGHJo4/wKo1:Kay+bnr+ip0yN90QE+ULO3POHJdw9
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 4 IoCs
resource yara_rule behavioral1/files/0x000a00000001224e-4.dat healer behavioral1/files/0x000a00000001224e-6.dat healer behavioral1/files/0x000a00000001224e-7.dat healer behavioral1/memory/3044-8-0x0000000000870000-0x000000000087A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q3049712.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q3049712.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q3049712.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q3049712.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q3049712.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q3049712.exe -
Executes dropped EXE 2 IoCs
pid Process 3044 q3049712.exe 2844 r7768028.exe -
Loads dropped DLL 3 IoCs
pid Process 1936 z5056178.exe 1936 z5056178.exe 2844 r7768028.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features q3049712.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q3049712.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" z5056178.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3044 q3049712.exe 3044 q3049712.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3044 q3049712.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1936 wrote to memory of 3044 1936 z5056178.exe 28 PID 1936 wrote to memory of 3044 1936 z5056178.exe 28 PID 1936 wrote to memory of 3044 1936 z5056178.exe 28 PID 1936 wrote to memory of 3044 1936 z5056178.exe 28 PID 1936 wrote to memory of 3044 1936 z5056178.exe 28 PID 1936 wrote to memory of 3044 1936 z5056178.exe 28 PID 1936 wrote to memory of 3044 1936 z5056178.exe 28 PID 1936 wrote to memory of 2844 1936 z5056178.exe 29 PID 1936 wrote to memory of 2844 1936 z5056178.exe 29 PID 1936 wrote to memory of 2844 1936 z5056178.exe 29 PID 1936 wrote to memory of 2844 1936 z5056178.exe 29 PID 1936 wrote to memory of 2844 1936 z5056178.exe 29 PID 1936 wrote to memory of 2844 1936 z5056178.exe 29 PID 1936 wrote to memory of 2844 1936 z5056178.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\z5056178.exe"C:\Users\Admin\AppData\Local\Temp\z5056178.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\q3049712.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\q3049712.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r7768028.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r7768028.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD56e729cd67e73459385419449be70358e
SHA139e83cf6ff2a60deb8713df7f1e4705931bed89d
SHA2565632bd1a4d9754ba2ff125424bfbc9f2924d5136d08d031e0718c186d9ab19ab
SHA512e805ddb2740ae72e70a0e7cd2a41ac4b7135b6244e316f764520d411a55b14413fa170d9c15c2d78a5e3eabc5bba4188c553734965aa0759e5bad74301094757
-
Filesize
14KB
MD56e729cd67e73459385419449be70358e
SHA139e83cf6ff2a60deb8713df7f1e4705931bed89d
SHA2565632bd1a4d9754ba2ff125424bfbc9f2924d5136d08d031e0718c186d9ab19ab
SHA512e805ddb2740ae72e70a0e7cd2a41ac4b7135b6244e316f764520d411a55b14413fa170d9c15c2d78a5e3eabc5bba4188c553734965aa0759e5bad74301094757
-
Filesize
140KB
MD5c1595ef884b29bfbe48639bcd81f472c
SHA13f800e547f18c808be73001c509a43ea3581cbae
SHA256918559754fc14ef764fc4e72aaa1283169913154f302514758f31507c12d5d45
SHA512e22d46a8546ceaf85d62dc66ef3e136f09e48f189ded966ef2b5b74c59e15cc62bf2c46c6464c4661aab714f553f26bfae179e31fec997020076aa86777113dc
-
Filesize
140KB
MD5c1595ef884b29bfbe48639bcd81f472c
SHA13f800e547f18c808be73001c509a43ea3581cbae
SHA256918559754fc14ef764fc4e72aaa1283169913154f302514758f31507c12d5d45
SHA512e22d46a8546ceaf85d62dc66ef3e136f09e48f189ded966ef2b5b74c59e15cc62bf2c46c6464c4661aab714f553f26bfae179e31fec997020076aa86777113dc
-
Filesize
14KB
MD56e729cd67e73459385419449be70358e
SHA139e83cf6ff2a60deb8713df7f1e4705931bed89d
SHA2565632bd1a4d9754ba2ff125424bfbc9f2924d5136d08d031e0718c186d9ab19ab
SHA512e805ddb2740ae72e70a0e7cd2a41ac4b7135b6244e316f764520d411a55b14413fa170d9c15c2d78a5e3eabc5bba4188c553734965aa0759e5bad74301094757
-
Filesize
140KB
MD5c1595ef884b29bfbe48639bcd81f472c
SHA13f800e547f18c808be73001c509a43ea3581cbae
SHA256918559754fc14ef764fc4e72aaa1283169913154f302514758f31507c12d5d45
SHA512e22d46a8546ceaf85d62dc66ef3e136f09e48f189ded966ef2b5b74c59e15cc62bf2c46c6464c4661aab714f553f26bfae179e31fec997020076aa86777113dc
-
Filesize
140KB
MD5c1595ef884b29bfbe48639bcd81f472c
SHA13f800e547f18c808be73001c509a43ea3581cbae
SHA256918559754fc14ef764fc4e72aaa1283169913154f302514758f31507c12d5d45
SHA512e22d46a8546ceaf85d62dc66ef3e136f09e48f189ded966ef2b5b74c59e15cc62bf2c46c6464c4661aab714f553f26bfae179e31fec997020076aa86777113dc