Analysis
-
max time kernel
267s -
max time network
298s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
20/09/2023, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
x2028485.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x2028485.exe
Resource
win10-20230915-en
General
-
Target
x2028485.exe
-
Size
465KB
-
MD5
81d2d11c5d134859f6112c984f14c25c
-
SHA1
399c1cb6eef99777d9a7a5edf33d759cd05144e7
-
SHA256
f4282ae1b5c5224f999f4e5e1d5bf25bae5b95999f289ff76014ccc69c5004f9
-
SHA512
92ff065195ffb2ad0e94aeb2dd5ab2cbe04a32672545a48d8e584a5f9b38f7406f0822fc93b4240d10c0c68413cbb5edc036d085cd66c72a233d2dc8b875ade3
-
SSDEEP
12288:yMr1y90I3lTCRMABtXLIr5eFqZ+7EncSQAUgq:nyHuBtLIdeFvdSUgq
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/3916-7-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
Executes dropped EXE 1 IoCs
pid Process 2592 g9158772.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x2028485.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2592 set thread context of 3916 2592 g9158772.exe 71 -
Program crash 1 IoCs
pid pid_target Process procid_target 1044 2592 WerFault.exe 69 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3916 AppLaunch.exe 3916 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3916 AppLaunch.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 208 wrote to memory of 2592 208 x2028485.exe 69 PID 208 wrote to memory of 2592 208 x2028485.exe 69 PID 208 wrote to memory of 2592 208 x2028485.exe 69 PID 2592 wrote to memory of 3916 2592 g9158772.exe 71 PID 2592 wrote to memory of 3916 2592 g9158772.exe 71 PID 2592 wrote to memory of 3916 2592 g9158772.exe 71 PID 2592 wrote to memory of 3916 2592 g9158772.exe 71 PID 2592 wrote to memory of 3916 2592 g9158772.exe 71 PID 2592 wrote to memory of 3916 2592 g9158772.exe 71 PID 2592 wrote to memory of 3916 2592 g9158772.exe 71 PID 2592 wrote to memory of 3916 2592 g9158772.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\x2028485.exe"C:\Users\Admin\AppData\Local\Temp\x2028485.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g9158772.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g9158772.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 5803⤵
- Program crash
PID:1044
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
899KB
MD5297df662d819bd3a7cafc846c2d57e93
SHA12554f1194ec93678fe0c1216ce376deacd4f0cf3
SHA256fa7db054bba0b8f955be25c8f2735e3b443e02243ddb933492a95aa2e6befdda
SHA512a44ee58d3a959170bdcef512e366f73af0c2a7b3a09226811acda16e441a8d465e5db9b27f609b00d97937e96debe610e49b2fdd517efe80bd9d8a3e3e6e2838
-
Filesize
899KB
MD5297df662d819bd3a7cafc846c2d57e93
SHA12554f1194ec93678fe0c1216ce376deacd4f0cf3
SHA256fa7db054bba0b8f955be25c8f2735e3b443e02243ddb933492a95aa2e6befdda
SHA512a44ee58d3a959170bdcef512e366f73af0c2a7b3a09226811acda16e441a8d465e5db9b27f609b00d97937e96debe610e49b2fdd517efe80bd9d8a3e3e6e2838