Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
20/09/2023, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
x2028485.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x2028485.exe
Resource
win10-20230915-en
General
-
Target
x2028485.exe
-
Size
465KB
-
MD5
81d2d11c5d134859f6112c984f14c25c
-
SHA1
399c1cb6eef99777d9a7a5edf33d759cd05144e7
-
SHA256
f4282ae1b5c5224f999f4e5e1d5bf25bae5b95999f289ff76014ccc69c5004f9
-
SHA512
92ff065195ffb2ad0e94aeb2dd5ab2cbe04a32672545a48d8e584a5f9b38f7406f0822fc93b4240d10c0c68413cbb5edc036d085cd66c72a233d2dc8b875ade3
-
SSDEEP
12288:yMr1y90I3lTCRMABtXLIr5eFqZ+7EncSQAUgq:nyHuBtLIdeFvdSUgq
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 5 IoCs
resource yara_rule behavioral1/memory/2748-16-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2748-15-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2748-18-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2748-20-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2748-22-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
Executes dropped EXE 1 IoCs
pid Process 2212 g9158772.exe -
Loads dropped DLL 7 IoCs
pid Process 2232 x2028485.exe 2232 x2028485.exe 2212 g9158772.exe 3008 WerFault.exe 3008 WerFault.exe 3008 WerFault.exe 3008 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x2028485.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2212 set thread context of 2748 2212 g9158772.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 3008 2212 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2748 AppLaunch.exe 2748 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2748 AppLaunch.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2212 2232 x2028485.exe 28 PID 2232 wrote to memory of 2212 2232 x2028485.exe 28 PID 2232 wrote to memory of 2212 2232 x2028485.exe 28 PID 2232 wrote to memory of 2212 2232 x2028485.exe 28 PID 2232 wrote to memory of 2212 2232 x2028485.exe 28 PID 2232 wrote to memory of 2212 2232 x2028485.exe 28 PID 2232 wrote to memory of 2212 2232 x2028485.exe 28 PID 2212 wrote to memory of 2748 2212 g9158772.exe 30 PID 2212 wrote to memory of 2748 2212 g9158772.exe 30 PID 2212 wrote to memory of 2748 2212 g9158772.exe 30 PID 2212 wrote to memory of 2748 2212 g9158772.exe 30 PID 2212 wrote to memory of 2748 2212 g9158772.exe 30 PID 2212 wrote to memory of 2748 2212 g9158772.exe 30 PID 2212 wrote to memory of 2748 2212 g9158772.exe 30 PID 2212 wrote to memory of 2748 2212 g9158772.exe 30 PID 2212 wrote to memory of 2748 2212 g9158772.exe 30 PID 2212 wrote to memory of 2748 2212 g9158772.exe 30 PID 2212 wrote to memory of 2748 2212 g9158772.exe 30 PID 2212 wrote to memory of 2748 2212 g9158772.exe 30 PID 2212 wrote to memory of 3008 2212 g9158772.exe 31 PID 2212 wrote to memory of 3008 2212 g9158772.exe 31 PID 2212 wrote to memory of 3008 2212 g9158772.exe 31 PID 2212 wrote to memory of 3008 2212 g9158772.exe 31 PID 2212 wrote to memory of 3008 2212 g9158772.exe 31 PID 2212 wrote to memory of 3008 2212 g9158772.exe 31 PID 2212 wrote to memory of 3008 2212 g9158772.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\x2028485.exe"C:\Users\Admin\AppData\Local\Temp\x2028485.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g9158772.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g9158772.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 2683⤵
- Loads dropped DLL
- Program crash
PID:3008
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
899KB
MD5297df662d819bd3a7cafc846c2d57e93
SHA12554f1194ec93678fe0c1216ce376deacd4f0cf3
SHA256fa7db054bba0b8f955be25c8f2735e3b443e02243ddb933492a95aa2e6befdda
SHA512a44ee58d3a959170bdcef512e366f73af0c2a7b3a09226811acda16e441a8d465e5db9b27f609b00d97937e96debe610e49b2fdd517efe80bd9d8a3e3e6e2838
-
Filesize
899KB
MD5297df662d819bd3a7cafc846c2d57e93
SHA12554f1194ec93678fe0c1216ce376deacd4f0cf3
SHA256fa7db054bba0b8f955be25c8f2735e3b443e02243ddb933492a95aa2e6befdda
SHA512a44ee58d3a959170bdcef512e366f73af0c2a7b3a09226811acda16e441a8d465e5db9b27f609b00d97937e96debe610e49b2fdd517efe80bd9d8a3e3e6e2838
-
Filesize
899KB
MD5297df662d819bd3a7cafc846c2d57e93
SHA12554f1194ec93678fe0c1216ce376deacd4f0cf3
SHA256fa7db054bba0b8f955be25c8f2735e3b443e02243ddb933492a95aa2e6befdda
SHA512a44ee58d3a959170bdcef512e366f73af0c2a7b3a09226811acda16e441a8d465e5db9b27f609b00d97937e96debe610e49b2fdd517efe80bd9d8a3e3e6e2838
-
Filesize
899KB
MD5297df662d819bd3a7cafc846c2d57e93
SHA12554f1194ec93678fe0c1216ce376deacd4f0cf3
SHA256fa7db054bba0b8f955be25c8f2735e3b443e02243ddb933492a95aa2e6befdda
SHA512a44ee58d3a959170bdcef512e366f73af0c2a7b3a09226811acda16e441a8d465e5db9b27f609b00d97937e96debe610e49b2fdd517efe80bd9d8a3e3e6e2838
-
Filesize
899KB
MD5297df662d819bd3a7cafc846c2d57e93
SHA12554f1194ec93678fe0c1216ce376deacd4f0cf3
SHA256fa7db054bba0b8f955be25c8f2735e3b443e02243ddb933492a95aa2e6befdda
SHA512a44ee58d3a959170bdcef512e366f73af0c2a7b3a09226811acda16e441a8d465e5db9b27f609b00d97937e96debe610e49b2fdd517efe80bd9d8a3e3e6e2838
-
Filesize
899KB
MD5297df662d819bd3a7cafc846c2d57e93
SHA12554f1194ec93678fe0c1216ce376deacd4f0cf3
SHA256fa7db054bba0b8f955be25c8f2735e3b443e02243ddb933492a95aa2e6befdda
SHA512a44ee58d3a959170bdcef512e366f73af0c2a7b3a09226811acda16e441a8d465e5db9b27f609b00d97937e96debe610e49b2fdd517efe80bd9d8a3e3e6e2838
-
Filesize
899KB
MD5297df662d819bd3a7cafc846c2d57e93
SHA12554f1194ec93678fe0c1216ce376deacd4f0cf3
SHA256fa7db054bba0b8f955be25c8f2735e3b443e02243ddb933492a95aa2e6befdda
SHA512a44ee58d3a959170bdcef512e366f73af0c2a7b3a09226811acda16e441a8d465e5db9b27f609b00d97937e96debe610e49b2fdd517efe80bd9d8a3e3e6e2838
-
Filesize
899KB
MD5297df662d819bd3a7cafc846c2d57e93
SHA12554f1194ec93678fe0c1216ce376deacd4f0cf3
SHA256fa7db054bba0b8f955be25c8f2735e3b443e02243ddb933492a95aa2e6befdda
SHA512a44ee58d3a959170bdcef512e366f73af0c2a7b3a09226811acda16e441a8d465e5db9b27f609b00d97937e96debe610e49b2fdd517efe80bd9d8a3e3e6e2838
-
Filesize
899KB
MD5297df662d819bd3a7cafc846c2d57e93
SHA12554f1194ec93678fe0c1216ce376deacd4f0cf3
SHA256fa7db054bba0b8f955be25c8f2735e3b443e02243ddb933492a95aa2e6befdda
SHA512a44ee58d3a959170bdcef512e366f73af0c2a7b3a09226811acda16e441a8d465e5db9b27f609b00d97937e96debe610e49b2fdd517efe80bd9d8a3e3e6e2838
-
Filesize
899KB
MD5297df662d819bd3a7cafc846c2d57e93
SHA12554f1194ec93678fe0c1216ce376deacd4f0cf3
SHA256fa7db054bba0b8f955be25c8f2735e3b443e02243ddb933492a95aa2e6befdda
SHA512a44ee58d3a959170bdcef512e366f73af0c2a7b3a09226811acda16e441a8d465e5db9b27f609b00d97937e96debe610e49b2fdd517efe80bd9d8a3e3e6e2838