Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 11:28
Static task
static1
Behavioral task
behavioral1
Sample
706b12243f83171ca0fd0cf2eb89f5f6d5af79a06b95e729a3af3f82d22c9510.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
706b12243f83171ca0fd0cf2eb89f5f6d5af79a06b95e729a3af3f82d22c9510.exe
Resource
win10v2004-20230915-en
General
-
Target
706b12243f83171ca0fd0cf2eb89f5f6d5af79a06b95e729a3af3f82d22c9510.exe
-
Size
936KB
-
MD5
040ea35d0a643b5114fc636266c077b7
-
SHA1
05ac1b71f789f2902f27830d343f9dfe5d914e73
-
SHA256
706b12243f83171ca0fd0cf2eb89f5f6d5af79a06b95e729a3af3f82d22c9510
-
SHA512
12f9c6c59d3574705ac63fafed5924946e6833bab37bad8c008a82957d99f0826843d930863ab7a0fc847066b32b78fcae782a8754d3f3f51b6c8a30ea74d6e2
-
SSDEEP
24576:1y1IY8nAoCLK5ucUaJyC5dxstFprmcpptEgb:QF8nAoCZcxJyCxstFprmcxP
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 5 IoCs
resource yara_rule behavioral1/memory/2896-45-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2896-46-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2896-48-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2896-52-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2896-50-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 3008 v1152853.exe 2164 v1482304.exe 1984 v8391247.exe 2716 a1482949.exe -
Loads dropped DLL 13 IoCs
pid Process 3004 706b12243f83171ca0fd0cf2eb89f5f6d5af79a06b95e729a3af3f82d22c9510.exe 3008 v1152853.exe 3008 v1152853.exe 2164 v1482304.exe 2164 v1482304.exe 1984 v8391247.exe 1984 v8391247.exe 1984 v8391247.exe 2716 a1482949.exe 2788 WerFault.exe 2788 WerFault.exe 2788 WerFault.exe 2788 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 706b12243f83171ca0fd0cf2eb89f5f6d5af79a06b95e729a3af3f82d22c9510.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1152853.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1482304.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8391247.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2716 set thread context of 2896 2716 a1482949.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2788 2716 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2896 AppLaunch.exe 2896 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2896 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3008 3004 706b12243f83171ca0fd0cf2eb89f5f6d5af79a06b95e729a3af3f82d22c9510.exe 28 PID 3004 wrote to memory of 3008 3004 706b12243f83171ca0fd0cf2eb89f5f6d5af79a06b95e729a3af3f82d22c9510.exe 28 PID 3004 wrote to memory of 3008 3004 706b12243f83171ca0fd0cf2eb89f5f6d5af79a06b95e729a3af3f82d22c9510.exe 28 PID 3004 wrote to memory of 3008 3004 706b12243f83171ca0fd0cf2eb89f5f6d5af79a06b95e729a3af3f82d22c9510.exe 28 PID 3004 wrote to memory of 3008 3004 706b12243f83171ca0fd0cf2eb89f5f6d5af79a06b95e729a3af3f82d22c9510.exe 28 PID 3004 wrote to memory of 3008 3004 706b12243f83171ca0fd0cf2eb89f5f6d5af79a06b95e729a3af3f82d22c9510.exe 28 PID 3004 wrote to memory of 3008 3004 706b12243f83171ca0fd0cf2eb89f5f6d5af79a06b95e729a3af3f82d22c9510.exe 28 PID 3008 wrote to memory of 2164 3008 v1152853.exe 29 PID 3008 wrote to memory of 2164 3008 v1152853.exe 29 PID 3008 wrote to memory of 2164 3008 v1152853.exe 29 PID 3008 wrote to memory of 2164 3008 v1152853.exe 29 PID 3008 wrote to memory of 2164 3008 v1152853.exe 29 PID 3008 wrote to memory of 2164 3008 v1152853.exe 29 PID 3008 wrote to memory of 2164 3008 v1152853.exe 29 PID 2164 wrote to memory of 1984 2164 v1482304.exe 30 PID 2164 wrote to memory of 1984 2164 v1482304.exe 30 PID 2164 wrote to memory of 1984 2164 v1482304.exe 30 PID 2164 wrote to memory of 1984 2164 v1482304.exe 30 PID 2164 wrote to memory of 1984 2164 v1482304.exe 30 PID 2164 wrote to memory of 1984 2164 v1482304.exe 30 PID 2164 wrote to memory of 1984 2164 v1482304.exe 30 PID 1984 wrote to memory of 2716 1984 v8391247.exe 31 PID 1984 wrote to memory of 2716 1984 v8391247.exe 31 PID 1984 wrote to memory of 2716 1984 v8391247.exe 31 PID 1984 wrote to memory of 2716 1984 v8391247.exe 31 PID 1984 wrote to memory of 2716 1984 v8391247.exe 31 PID 1984 wrote to memory of 2716 1984 v8391247.exe 31 PID 1984 wrote to memory of 2716 1984 v8391247.exe 31 PID 2716 wrote to memory of 2896 2716 a1482949.exe 32 PID 2716 wrote to memory of 2896 2716 a1482949.exe 32 PID 2716 wrote to memory of 2896 2716 a1482949.exe 32 PID 2716 wrote to memory of 2896 2716 a1482949.exe 32 PID 2716 wrote to memory of 2896 2716 a1482949.exe 32 PID 2716 wrote to memory of 2896 2716 a1482949.exe 32 PID 2716 wrote to memory of 2896 2716 a1482949.exe 32 PID 2716 wrote to memory of 2896 2716 a1482949.exe 32 PID 2716 wrote to memory of 2896 2716 a1482949.exe 32 PID 2716 wrote to memory of 2896 2716 a1482949.exe 32 PID 2716 wrote to memory of 2896 2716 a1482949.exe 32 PID 2716 wrote to memory of 2896 2716 a1482949.exe 32 PID 2716 wrote to memory of 2788 2716 a1482949.exe 33 PID 2716 wrote to memory of 2788 2716 a1482949.exe 33 PID 2716 wrote to memory of 2788 2716 a1482949.exe 33 PID 2716 wrote to memory of 2788 2716 a1482949.exe 33 PID 2716 wrote to memory of 2788 2716 a1482949.exe 33 PID 2716 wrote to memory of 2788 2716 a1482949.exe 33 PID 2716 wrote to memory of 2788 2716 a1482949.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\706b12243f83171ca0fd0cf2eb89f5f6d5af79a06b95e729a3af3f82d22c9510.exe"C:\Users\Admin\AppData\Local\Temp\706b12243f83171ca0fd0cf2eb89f5f6d5af79a06b95e729a3af3f82d22c9510.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1152853.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1152853.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1482304.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1482304.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8391247.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8391247.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1482949.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1482949.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2788
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
834KB
MD5b16611d102b055aac2918fa97f66eb8a
SHA1db4e9ece054d0e4b715a59e865918c65dfba06fe
SHA256e242253620816ad8b8c811fa53849f5c104f9045d0932e03493a186acc89cb69
SHA5127767f0c3ff26d91047d6b317d21393561d52b59b584c340aeefb595393d770c7142503880ec4a616bd67eca5d1dd420f1a385601d62da0451c11925daeb433e2
-
Filesize
834KB
MD5b16611d102b055aac2918fa97f66eb8a
SHA1db4e9ece054d0e4b715a59e865918c65dfba06fe
SHA256e242253620816ad8b8c811fa53849f5c104f9045d0932e03493a186acc89cb69
SHA5127767f0c3ff26d91047d6b317d21393561d52b59b584c340aeefb595393d770c7142503880ec4a616bd67eca5d1dd420f1a385601d62da0451c11925daeb433e2
-
Filesize
605KB
MD59d62375543300db25c3cb6dc9ae97847
SHA1c850875c432621685d6d8777cb8406496dd0f345
SHA2568f4a59729236911bcc98447ac4c9bc50ff4a508f2d9cbdd21bae539f0b278ffe
SHA512e9f52436191ef57445e7dbcf851a701d8697e25aafcd445be1b9783221d2a438ded0271de656f80c706c70a161b54ae8e044bc318e098274d602c84395cb45d9
-
Filesize
605KB
MD59d62375543300db25c3cb6dc9ae97847
SHA1c850875c432621685d6d8777cb8406496dd0f345
SHA2568f4a59729236911bcc98447ac4c9bc50ff4a508f2d9cbdd21bae539f0b278ffe
SHA512e9f52436191ef57445e7dbcf851a701d8697e25aafcd445be1b9783221d2a438ded0271de656f80c706c70a161b54ae8e044bc318e098274d602c84395cb45d9
-
Filesize
346KB
MD5a0c79c5dccd62ba45d63615ac24c4141
SHA166e30cdc5f55ca16d65faf732cf4488a1e127770
SHA25669043081df072080ede01e76121fcaf10cb3ffcbc763d3b8f0064bb7069ae36b
SHA512e9d04fb87413ac502163b2212dfc1c9cb831d672b636b04ae8ec35bba398f307110fa8c47e0bc591a916e0c7eb2c8571df3ea71cd559fb0452546397acc5db73
-
Filesize
346KB
MD5a0c79c5dccd62ba45d63615ac24c4141
SHA166e30cdc5f55ca16d65faf732cf4488a1e127770
SHA25669043081df072080ede01e76121fcaf10cb3ffcbc763d3b8f0064bb7069ae36b
SHA512e9d04fb87413ac502163b2212dfc1c9cb831d672b636b04ae8ec35bba398f307110fa8c47e0bc591a916e0c7eb2c8571df3ea71cd559fb0452546397acc5db73
-
Filesize
220KB
MD51f82bcbeb42ed5c1fd6ad7457525e1f9
SHA1f84d0fdfe044b01aefb374f1088c226ec8368a38
SHA256b5e484b644f9126f810c3f46ebdb690875cd950f672d6610c656c87a2bc6ea9c
SHA5122f94b04d0e9a7a794c2528aae3a507f9697f8de910eaed109dbdea4eb9f189126b22d54f959f78b7614e69851bc9dceb930d47ea68d8faa01c1b611f9fadcd4b
-
Filesize
220KB
MD51f82bcbeb42ed5c1fd6ad7457525e1f9
SHA1f84d0fdfe044b01aefb374f1088c226ec8368a38
SHA256b5e484b644f9126f810c3f46ebdb690875cd950f672d6610c656c87a2bc6ea9c
SHA5122f94b04d0e9a7a794c2528aae3a507f9697f8de910eaed109dbdea4eb9f189126b22d54f959f78b7614e69851bc9dceb930d47ea68d8faa01c1b611f9fadcd4b
-
Filesize
220KB
MD51f82bcbeb42ed5c1fd6ad7457525e1f9
SHA1f84d0fdfe044b01aefb374f1088c226ec8368a38
SHA256b5e484b644f9126f810c3f46ebdb690875cd950f672d6610c656c87a2bc6ea9c
SHA5122f94b04d0e9a7a794c2528aae3a507f9697f8de910eaed109dbdea4eb9f189126b22d54f959f78b7614e69851bc9dceb930d47ea68d8faa01c1b611f9fadcd4b
-
Filesize
834KB
MD5b16611d102b055aac2918fa97f66eb8a
SHA1db4e9ece054d0e4b715a59e865918c65dfba06fe
SHA256e242253620816ad8b8c811fa53849f5c104f9045d0932e03493a186acc89cb69
SHA5127767f0c3ff26d91047d6b317d21393561d52b59b584c340aeefb595393d770c7142503880ec4a616bd67eca5d1dd420f1a385601d62da0451c11925daeb433e2
-
Filesize
834KB
MD5b16611d102b055aac2918fa97f66eb8a
SHA1db4e9ece054d0e4b715a59e865918c65dfba06fe
SHA256e242253620816ad8b8c811fa53849f5c104f9045d0932e03493a186acc89cb69
SHA5127767f0c3ff26d91047d6b317d21393561d52b59b584c340aeefb595393d770c7142503880ec4a616bd67eca5d1dd420f1a385601d62da0451c11925daeb433e2
-
Filesize
605KB
MD59d62375543300db25c3cb6dc9ae97847
SHA1c850875c432621685d6d8777cb8406496dd0f345
SHA2568f4a59729236911bcc98447ac4c9bc50ff4a508f2d9cbdd21bae539f0b278ffe
SHA512e9f52436191ef57445e7dbcf851a701d8697e25aafcd445be1b9783221d2a438ded0271de656f80c706c70a161b54ae8e044bc318e098274d602c84395cb45d9
-
Filesize
605KB
MD59d62375543300db25c3cb6dc9ae97847
SHA1c850875c432621685d6d8777cb8406496dd0f345
SHA2568f4a59729236911bcc98447ac4c9bc50ff4a508f2d9cbdd21bae539f0b278ffe
SHA512e9f52436191ef57445e7dbcf851a701d8697e25aafcd445be1b9783221d2a438ded0271de656f80c706c70a161b54ae8e044bc318e098274d602c84395cb45d9
-
Filesize
346KB
MD5a0c79c5dccd62ba45d63615ac24c4141
SHA166e30cdc5f55ca16d65faf732cf4488a1e127770
SHA25669043081df072080ede01e76121fcaf10cb3ffcbc763d3b8f0064bb7069ae36b
SHA512e9d04fb87413ac502163b2212dfc1c9cb831d672b636b04ae8ec35bba398f307110fa8c47e0bc591a916e0c7eb2c8571df3ea71cd559fb0452546397acc5db73
-
Filesize
346KB
MD5a0c79c5dccd62ba45d63615ac24c4141
SHA166e30cdc5f55ca16d65faf732cf4488a1e127770
SHA25669043081df072080ede01e76121fcaf10cb3ffcbc763d3b8f0064bb7069ae36b
SHA512e9d04fb87413ac502163b2212dfc1c9cb831d672b636b04ae8ec35bba398f307110fa8c47e0bc591a916e0c7eb2c8571df3ea71cd559fb0452546397acc5db73
-
Filesize
220KB
MD51f82bcbeb42ed5c1fd6ad7457525e1f9
SHA1f84d0fdfe044b01aefb374f1088c226ec8368a38
SHA256b5e484b644f9126f810c3f46ebdb690875cd950f672d6610c656c87a2bc6ea9c
SHA5122f94b04d0e9a7a794c2528aae3a507f9697f8de910eaed109dbdea4eb9f189126b22d54f959f78b7614e69851bc9dceb930d47ea68d8faa01c1b611f9fadcd4b
-
Filesize
220KB
MD51f82bcbeb42ed5c1fd6ad7457525e1f9
SHA1f84d0fdfe044b01aefb374f1088c226ec8368a38
SHA256b5e484b644f9126f810c3f46ebdb690875cd950f672d6610c656c87a2bc6ea9c
SHA5122f94b04d0e9a7a794c2528aae3a507f9697f8de910eaed109dbdea4eb9f189126b22d54f959f78b7614e69851bc9dceb930d47ea68d8faa01c1b611f9fadcd4b
-
Filesize
220KB
MD51f82bcbeb42ed5c1fd6ad7457525e1f9
SHA1f84d0fdfe044b01aefb374f1088c226ec8368a38
SHA256b5e484b644f9126f810c3f46ebdb690875cd950f672d6610c656c87a2bc6ea9c
SHA5122f94b04d0e9a7a794c2528aae3a507f9697f8de910eaed109dbdea4eb9f189126b22d54f959f78b7614e69851bc9dceb930d47ea68d8faa01c1b611f9fadcd4b
-
Filesize
220KB
MD51f82bcbeb42ed5c1fd6ad7457525e1f9
SHA1f84d0fdfe044b01aefb374f1088c226ec8368a38
SHA256b5e484b644f9126f810c3f46ebdb690875cd950f672d6610c656c87a2bc6ea9c
SHA5122f94b04d0e9a7a794c2528aae3a507f9697f8de910eaed109dbdea4eb9f189126b22d54f959f78b7614e69851bc9dceb930d47ea68d8faa01c1b611f9fadcd4b
-
Filesize
220KB
MD51f82bcbeb42ed5c1fd6ad7457525e1f9
SHA1f84d0fdfe044b01aefb374f1088c226ec8368a38
SHA256b5e484b644f9126f810c3f46ebdb690875cd950f672d6610c656c87a2bc6ea9c
SHA5122f94b04d0e9a7a794c2528aae3a507f9697f8de910eaed109dbdea4eb9f189126b22d54f959f78b7614e69851bc9dceb930d47ea68d8faa01c1b611f9fadcd4b
-
Filesize
220KB
MD51f82bcbeb42ed5c1fd6ad7457525e1f9
SHA1f84d0fdfe044b01aefb374f1088c226ec8368a38
SHA256b5e484b644f9126f810c3f46ebdb690875cd950f672d6610c656c87a2bc6ea9c
SHA5122f94b04d0e9a7a794c2528aae3a507f9697f8de910eaed109dbdea4eb9f189126b22d54f959f78b7614e69851bc9dceb930d47ea68d8faa01c1b611f9fadcd4b
-
Filesize
220KB
MD51f82bcbeb42ed5c1fd6ad7457525e1f9
SHA1f84d0fdfe044b01aefb374f1088c226ec8368a38
SHA256b5e484b644f9126f810c3f46ebdb690875cd950f672d6610c656c87a2bc6ea9c
SHA5122f94b04d0e9a7a794c2528aae3a507f9697f8de910eaed109dbdea4eb9f189126b22d54f959f78b7614e69851bc9dceb930d47ea68d8faa01c1b611f9fadcd4b