Analysis
-
max time kernel
85s -
max time network
195s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
18/09/2023, 01:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
g9630027.exe
Resource
win7-20230831-en
7 signatures
300 seconds
General
-
Target
g9630027.exe
-
Size
229KB
-
MD5
3548e7f1ffb850f4cfe23a2cbff5ad67
-
SHA1
0f87248238e0064b11083c3d9853338eeff5ec16
-
SHA256
8253e2647f727f41ccf91f52fd1f59bb70d0f2eb25d5034f8489184d59fe4f67
-
SHA512
757b125969abe468d9aa2dd63f3b38d1fb06e8ee4a759da2a6e2f36062d9d5197354c47db02285cc61a6c007842401f1260a2e43f2f684f2692d488f1d8a26c4
-
SSDEEP
6144:/lAhp/hOqxxwOxAIUeCKz7z4AOQACM8fi:tAhNwqxyI74SAr8fi
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/712-0-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4428 set thread context of 712 4428 g9630027.exe 72 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 712 AppLaunch.exe 712 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 712 AppLaunch.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4428 wrote to memory of 796 4428 g9630027.exe 71 PID 4428 wrote to memory of 796 4428 g9630027.exe 71 PID 4428 wrote to memory of 796 4428 g9630027.exe 71 PID 4428 wrote to memory of 712 4428 g9630027.exe 72 PID 4428 wrote to memory of 712 4428 g9630027.exe 72 PID 4428 wrote to memory of 712 4428 g9630027.exe 72 PID 4428 wrote to memory of 712 4428 g9630027.exe 72 PID 4428 wrote to memory of 712 4428 g9630027.exe 72 PID 4428 wrote to memory of 712 4428 g9630027.exe 72 PID 4428 wrote to memory of 712 4428 g9630027.exe 72 PID 4428 wrote to memory of 712 4428 g9630027.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\g9630027.exe"C:\Users\Admin\AppData\Local\Temp\g9630027.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:796
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:712
-