Analysis
-
max time kernel
161s -
max time network
230s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
18/09/2023, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
g8003181.exe
Resource
win7-20230831-en
7 signatures
300 seconds
General
-
Target
g8003181.exe
-
Size
242KB
-
MD5
4db2aca858ec494990998fe2c03c1c07
-
SHA1
2022128ff3da5a76d6b4c5aaea5d1cbae5b25660
-
SHA256
5d7aca046c52ba7c34c49e526918b2e0e16153165a1f645713fe60480128fa17
-
SHA512
4e819cae3fc87403f5ccd0c324e86e0c4c594591064097181eda0d158f7313803bba2acfacd9038014bb4c870b9ce53bc5fe604be11aa864b70e789982a4089b
-
SSDEEP
3072:c2cG6IBtVVzkEmJth+9p1ORs+NJ2uvHJ5TMi473cceipyEAeAg0FujDU6fQJupkE:cwvJm09zORs+z/TMify9DAOM+Qga8/
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/664-0-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3504 set thread context of 664 3504 g8003181.exe 70 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 664 AppLaunch.exe 664 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 664 AppLaunch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3504 wrote to memory of 664 3504 g8003181.exe 70 PID 3504 wrote to memory of 664 3504 g8003181.exe 70 PID 3504 wrote to memory of 664 3504 g8003181.exe 70 PID 3504 wrote to memory of 664 3504 g8003181.exe 70 PID 3504 wrote to memory of 664 3504 g8003181.exe 70 PID 3504 wrote to memory of 664 3504 g8003181.exe 70 PID 3504 wrote to memory of 664 3504 g8003181.exe 70 PID 3504 wrote to memory of 664 3504 g8003181.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\g8003181.exe"C:\Users\Admin\AppData\Local\Temp\g8003181.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:664
-