Analysis
-
max time kernel
181s -
max time network
263s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
19-09-2023 06:52
Static task
static1
Behavioral task
behavioral1
Sample
g6429604.exe
Resource
win7-20230831-en
windows7-x64
7 signatures
300 seconds
General
-
Target
g6429604.exe
-
Size
242KB
-
MD5
8989f700c821326027fe2fe0f49e5377
-
SHA1
42caa5229b3098681604d0ef16959b4bf0bbb4c2
-
SHA256
f083e0adfc6196b5a9eff007132b1bbce34ff64ea672a9aebe64ed0bcf745421
-
SHA512
2405054d42419eacc4e4ee9630e80a146e3a359a22152ad7d49098aac72691b218db1c3085a3d4b5ac604ddc874bc8369719f8e0ad126f6b1c4abdcfcfb2e368
-
SSDEEP
3072:e2dG6IBtVVzkEmJth+9p1ORs+NJ2uvHJ5TMi473cceipyEAeAg0FujDm6fQhQTt6:eTvJm09zORs+z/TMify9DAOu+QaTT8/
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/912-0-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2436 set thread context of 912 2436 g6429604.exe 69 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 912 AppLaunch.exe 912 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 912 AppLaunch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2436 wrote to memory of 912 2436 g6429604.exe 69 PID 2436 wrote to memory of 912 2436 g6429604.exe 69 PID 2436 wrote to memory of 912 2436 g6429604.exe 69 PID 2436 wrote to memory of 912 2436 g6429604.exe 69 PID 2436 wrote to memory of 912 2436 g6429604.exe 69 PID 2436 wrote to memory of 912 2436 g6429604.exe 69 PID 2436 wrote to memory of 912 2436 g6429604.exe 69 PID 2436 wrote to memory of 912 2436 g6429604.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\g6429604.exe"C:\Users\Admin\AppData\Local\Temp\g6429604.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:912
-