Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
18/09/2023, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
g8003181.exe
Resource
win7-20230831-en
7 signatures
300 seconds
General
-
Target
g8003181.exe
-
Size
242KB
-
MD5
4db2aca858ec494990998fe2c03c1c07
-
SHA1
2022128ff3da5a76d6b4c5aaea5d1cbae5b25660
-
SHA256
5d7aca046c52ba7c34c49e526918b2e0e16153165a1f645713fe60480128fa17
-
SHA512
4e819cae3fc87403f5ccd0c324e86e0c4c594591064097181eda0d158f7313803bba2acfacd9038014bb4c870b9ce53bc5fe604be11aa864b70e789982a4089b
-
SSDEEP
3072:c2cG6IBtVVzkEmJth+9p1ORs+NJ2uvHJ5TMi473cceipyEAeAg0FujDU6fQJupkE:cwvJm09zORs+z/TMify9DAOM+Qga8/
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 5 IoCs
resource yara_rule behavioral1/memory/2528-2-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2528-3-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2528-5-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2528-7-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2528-9-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1920 set thread context of 2528 1920 g8003181.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2528 AppLaunch.exe 2528 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2528 AppLaunch.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2528 1920 g8003181.exe 28 PID 1920 wrote to memory of 2528 1920 g8003181.exe 28 PID 1920 wrote to memory of 2528 1920 g8003181.exe 28 PID 1920 wrote to memory of 2528 1920 g8003181.exe 28 PID 1920 wrote to memory of 2528 1920 g8003181.exe 28 PID 1920 wrote to memory of 2528 1920 g8003181.exe 28 PID 1920 wrote to memory of 2528 1920 g8003181.exe 28 PID 1920 wrote to memory of 2528 1920 g8003181.exe 28 PID 1920 wrote to memory of 2528 1920 g8003181.exe 28 PID 1920 wrote to memory of 2528 1920 g8003181.exe 28 PID 1920 wrote to memory of 2528 1920 g8003181.exe 28 PID 1920 wrote to memory of 2528 1920 g8003181.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\g8003181.exe"C:\Users\Admin\AppData\Local\Temp\g8003181.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-