Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
19-09-2023 06:52
Static task
static1
Behavioral task
behavioral1
Sample
g6429604.exe
Resource
win7-20230831-en
7 signatures
300 seconds
General
-
Target
g6429604.exe
-
Size
242KB
-
MD5
8989f700c821326027fe2fe0f49e5377
-
SHA1
42caa5229b3098681604d0ef16959b4bf0bbb4c2
-
SHA256
f083e0adfc6196b5a9eff007132b1bbce34ff64ea672a9aebe64ed0bcf745421
-
SHA512
2405054d42419eacc4e4ee9630e80a146e3a359a22152ad7d49098aac72691b218db1c3085a3d4b5ac604ddc874bc8369719f8e0ad126f6b1c4abdcfcfb2e368
-
SSDEEP
3072:e2dG6IBtVVzkEmJth+9p1ORs+NJ2uvHJ5TMi473cceipyEAeAg0FujDm6fQhQTt6:eTvJm09zORs+z/TMify9DAOu+QaTT8/
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2192-5-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2192-3-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2192-2-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2192-7-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2192-9-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
g6429604.exedescription pid process target process PID 2952 set thread context of 2192 2952 g6429604.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 2192 AppLaunch.exe 2192 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 2192 AppLaunch.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
g6429604.exedescription pid process target process PID 2952 wrote to memory of 2456 2952 g6429604.exe AppLaunch.exe PID 2952 wrote to memory of 2456 2952 g6429604.exe AppLaunch.exe PID 2952 wrote to memory of 2456 2952 g6429604.exe AppLaunch.exe PID 2952 wrote to memory of 2456 2952 g6429604.exe AppLaunch.exe PID 2952 wrote to memory of 2456 2952 g6429604.exe AppLaunch.exe PID 2952 wrote to memory of 2456 2952 g6429604.exe AppLaunch.exe PID 2952 wrote to memory of 2456 2952 g6429604.exe AppLaunch.exe PID 2952 wrote to memory of 2192 2952 g6429604.exe AppLaunch.exe PID 2952 wrote to memory of 2192 2952 g6429604.exe AppLaunch.exe PID 2952 wrote to memory of 2192 2952 g6429604.exe AppLaunch.exe PID 2952 wrote to memory of 2192 2952 g6429604.exe AppLaunch.exe PID 2952 wrote to memory of 2192 2952 g6429604.exe AppLaunch.exe PID 2952 wrote to memory of 2192 2952 g6429604.exe AppLaunch.exe PID 2952 wrote to memory of 2192 2952 g6429604.exe AppLaunch.exe PID 2952 wrote to memory of 2192 2952 g6429604.exe AppLaunch.exe PID 2952 wrote to memory of 2192 2952 g6429604.exe AppLaunch.exe PID 2952 wrote to memory of 2192 2952 g6429604.exe AppLaunch.exe PID 2952 wrote to memory of 2192 2952 g6429604.exe AppLaunch.exe PID 2952 wrote to memory of 2192 2952 g6429604.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\g6429604.exe"C:\Users\Admin\AppData\Local\Temp\g6429604.exe"
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2192-4-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/2192-5-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2192-3-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2192-2-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2192-1-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2192-0-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2192-7-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2192-9-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2192-10-0x0000000074600000-0x0000000074CEE000-memory.dmpFilesize
6MB
-
memory/2192-11-0x0000000074600000-0x0000000074CEE000-memory.dmpFilesize
6MB
-
memory/2192-12-0x0000000074600000-0x0000000074CEE000-memory.dmpFilesize
6MB