Overview
overview
10Static
static
10d6086904aa...c6.dll
windows7-x64
1d6086904aa...c6.dll
windows10-2004-x64
1e4d31acd4f...96.exe
windows7-x64
10e4d31acd4f...96.exe
windows10-2004-x64
10eb1a060a2f...2d.exe
windows7-x64
eb1a060a2f...2d.exe
windows10-2004-x64
10f6147edac0...28.exe
windows7-x64
10f6147edac0...28.exe
windows10-2004-x64
10Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06/10/2023, 02:12
Behavioral task
behavioral1
Sample
d6086904aa3c47a04f9651cad2d2d4be3d50ae93b4bbc5b5b7bd63dc86eb2ec6.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d6086904aa3c47a04f9651cad2d2d4be3d50ae93b4bbc5b5b7bd63dc86eb2ec6.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
e4d31acd4f6f9a8c85c0c7d946d55e4efd5a2571f54a3b6682e04495f951bd96.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
e4d31acd4f6f9a8c85c0c7d946d55e4efd5a2571f54a3b6682e04495f951bd96.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
eb1a060a2f31ff324b171aa329f0302493bf6d8a573c1142f03b7267fb2a362d.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
eb1a060a2f31ff324b171aa329f0302493bf6d8a573c1142f03b7267fb2a362d.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
f6147edac0f3bf98bf8360176358fe4b4eeeca097325a501dcd32916b60fbe28.exe
Resource
win7-20230831-en
General
-
Target
e4d31acd4f6f9a8c85c0c7d946d55e4efd5a2571f54a3b6682e04495f951bd96.exe
-
Size
12KB
-
MD5
35a0e47267276a8e8882396e4f192a37
-
SHA1
a6353f0584ca37d0f783e1a077b524ec54da2a2c
-
SHA256
e4d31acd4f6f9a8c85c0c7d946d55e4efd5a2571f54a3b6682e04495f951bd96
-
SHA512
e322cf2c200076ced13d097f6cb3a92164a6fc7cfcc7c855161d7bf76397c8eb96be20d347cb609bba1361ac803ba5b23668b02f6c7f62db25b2a025d5e6fc03
-
SSDEEP
96:yA/vMth9sDLibql3A44P9QL4fwmPImg+A03PvXLOzk+gqWYV4J6oP/zNt:yw+wGWt94+iANiCkc4Jhp
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral3/memory/2404-0-0x0000000000FE0000-0x0000000000FEA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e4d31acd4f6f9a8c85c0c7d946d55e4efd5a2571f54a3b6682e04495f951bd96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e4d31acd4f6f9a8c85c0c7d946d55e4efd5a2571f54a3b6682e04495f951bd96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e4d31acd4f6f9a8c85c0c7d946d55e4efd5a2571f54a3b6682e04495f951bd96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e4d31acd4f6f9a8c85c0c7d946d55e4efd5a2571f54a3b6682e04495f951bd96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e4d31acd4f6f9a8c85c0c7d946d55e4efd5a2571f54a3b6682e04495f951bd96.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection e4d31acd4f6f9a8c85c0c7d946d55e4efd5a2571f54a3b6682e04495f951bd96.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" e4d31acd4f6f9a8c85c0c7d946d55e4efd5a2571f54a3b6682e04495f951bd96.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features e4d31acd4f6f9a8c85c0c7d946d55e4efd5a2571f54a3b6682e04495f951bd96.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2404 e4d31acd4f6f9a8c85c0c7d946d55e4efd5a2571f54a3b6682e04495f951bd96.exe 2404 e4d31acd4f6f9a8c85c0c7d946d55e4efd5a2571f54a3b6682e04495f951bd96.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2404 e4d31acd4f6f9a8c85c0c7d946d55e4efd5a2571f54a3b6682e04495f951bd96.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4d31acd4f6f9a8c85c0c7d946d55e4efd5a2571f54a3b6682e04495f951bd96.exe"C:\Users\Admin\AppData\Local\Temp\e4d31acd4f6f9a8c85c0c7d946d55e4efd5a2571f54a3b6682e04495f951bd96.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2404