Analysis
-
max time kernel
188s -
max time network
258s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
19-09-2023 06:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
g2204807.exe
Resource
win7-20230831-en
7 signatures
300 seconds
General
-
Target
g2204807.exe
-
Size
236KB
-
MD5
bd7db8b543d1b8d37a380bace855e6f1
-
SHA1
6bb4a5230f3038cfc4414e36175e399df0123568
-
SHA256
85c512fbf6bdc46b301a7fca81c9d0b9c420ba21078befeec31d6061b7c1590b
-
SHA512
bd3d7ddfdefbb677e43fcc87b00f265c9a0cade8aa2f39d40eedb272586e2291c28d085035a3053a214ffb0102c1d6cbd1aa7606fb5c744c6aff3a54f3c6d63f
-
SSDEEP
6144:d/KXjE22jicP5iOo2T8VrSd/sUAOx2l2TYb1Sa:diXHqiG59ouH2kYb1Sa
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4660-0-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
g2204807.exedescription pid process target process PID 664 set thread context of 4660 664 g2204807.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 4660 AppLaunch.exe 4660 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 4660 AppLaunch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
g2204807.exedescription pid process target process PID 664 wrote to memory of 4660 664 g2204807.exe AppLaunch.exe PID 664 wrote to memory of 4660 664 g2204807.exe AppLaunch.exe PID 664 wrote to memory of 4660 664 g2204807.exe AppLaunch.exe PID 664 wrote to memory of 4660 664 g2204807.exe AppLaunch.exe PID 664 wrote to memory of 4660 664 g2204807.exe AppLaunch.exe PID 664 wrote to memory of 4660 664 g2204807.exe AppLaunch.exe PID 664 wrote to memory of 4660 664 g2204807.exe AppLaunch.exe PID 664 wrote to memory of 4660 664 g2204807.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\g2204807.exe"C:\Users\Admin\AppData\Local\Temp\g2204807.exe"
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4660-0-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/4660-4-0x0000000073F40000-0x000000007462E000-memory.dmpFilesize
6MB
-
memory/4660-13-0x0000000073F40000-0x000000007462E000-memory.dmpFilesize
6MB
-
memory/4660-28-0x0000000073F40000-0x000000007462E000-memory.dmpFilesize
6MB