Analysis

  • max time kernel
    267s
  • max time network
    298s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20/09/2023, 04:22

General

  • Target

    x2028485.exe

  • Size

    465KB

  • MD5

    81d2d11c5d134859f6112c984f14c25c

  • SHA1

    399c1cb6eef99777d9a7a5edf33d759cd05144e7

  • SHA256

    f4282ae1b5c5224f999f4e5e1d5bf25bae5b95999f289ff76014ccc69c5004f9

  • SHA512

    92ff065195ffb2ad0e94aeb2dd5ab2cbe04a32672545a48d8e584a5f9b38f7406f0822fc93b4240d10c0c68413cbb5edc036d085cd66c72a233d2dc8b875ade3

  • SSDEEP

    12288:yMr1y90I3lTCRMABtXLIr5eFqZ+7EncSQAUgq:nyHuBtLIdeFvdSUgq

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\x2028485.exe
    "C:\Users\Admin\AppData\Local\Temp\x2028485.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:208
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g9158772.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g9158772.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3916
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 580
        3⤵
        • Program crash
        PID:1044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g9158772.exe

    Filesize

    899KB

    MD5

    297df662d819bd3a7cafc846c2d57e93

    SHA1

    2554f1194ec93678fe0c1216ce376deacd4f0cf3

    SHA256

    fa7db054bba0b8f955be25c8f2735e3b443e02243ddb933492a95aa2e6befdda

    SHA512

    a44ee58d3a959170bdcef512e366f73af0c2a7b3a09226811acda16e441a8d465e5db9b27f609b00d97937e96debe610e49b2fdd517efe80bd9d8a3e3e6e2838

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g9158772.exe

    Filesize

    899KB

    MD5

    297df662d819bd3a7cafc846c2d57e93

    SHA1

    2554f1194ec93678fe0c1216ce376deacd4f0cf3

    SHA256

    fa7db054bba0b8f955be25c8f2735e3b443e02243ddb933492a95aa2e6befdda

    SHA512

    a44ee58d3a959170bdcef512e366f73af0c2a7b3a09226811acda16e441a8d465e5db9b27f609b00d97937e96debe610e49b2fdd517efe80bd9d8a3e3e6e2838

  • memory/3916-7-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3916-11-0x00000000732F0000-0x00000000739DE000-memory.dmp

    Filesize

    6.9MB

  • memory/3916-20-0x00000000732F0000-0x00000000739DE000-memory.dmp

    Filesize

    6.9MB

  • memory/3916-35-0x00000000732F0000-0x00000000739DE000-memory.dmp

    Filesize

    6.9MB