Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 00:28
Static task
static1
Behavioral task
behavioral1
Sample
f7fc6f165bfbe28b9961e8afe3c250dfd80399753342eb6f411ac83a300ac7d4.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f7fc6f165bfbe28b9961e8afe3c250dfd80399753342eb6f411ac83a300ac7d4.exe
Resource
win10v2004-20230915-en
General
-
Target
f7fc6f165bfbe28b9961e8afe3c250dfd80399753342eb6f411ac83a300ac7d4.exe
-
Size
933KB
-
MD5
36238c0cd743c3e59c2850918485ff06
-
SHA1
c1f3a83c59ae9f209bb56bde695590f5dbeb10ea
-
SHA256
f7fc6f165bfbe28b9961e8afe3c250dfd80399753342eb6f411ac83a300ac7d4
-
SHA512
822b78b01ee7c1241fcbc9e5b29c75eaf80835bd2210215cbf06c3c7ade9c14379f75317e54a3c37f96d3c958574ba12241f02a6a3515adfa2531c14bf6293ad
-
SSDEEP
12288:KMrxy90GxG17OeI/FlC+TaJjWduJ5fmmTcXAq1zMVB9vrdLRLYX70Xd+4upiVUeH:LyL4OR/FlMlWsXfjof4NzqIUecpnmUm
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 5 IoCs
resource yara_rule behavioral1/memory/2672-47-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2672-48-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2672-50-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2672-54-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2672-52-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 1328 v8875543.exe 2960 v0737248.exe 2564 v3543856.exe 2620 a1979241.exe -
Loads dropped DLL 13 IoCs
pid Process 1456 f7fc6f165bfbe28b9961e8afe3c250dfd80399753342eb6f411ac83a300ac7d4.exe 1328 v8875543.exe 1328 v8875543.exe 2960 v0737248.exe 2960 v0737248.exe 2564 v3543856.exe 2564 v3543856.exe 2564 v3543856.exe 2620 a1979241.exe 3012 WerFault.exe 3012 WerFault.exe 3012 WerFault.exe 3012 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0737248.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v3543856.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f7fc6f165bfbe28b9961e8afe3c250dfd80399753342eb6f411ac83a300ac7d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8875543.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2620 set thread context of 2672 2620 a1979241.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 3012 2620 WerFault.exe 30 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2672 AppLaunch.exe 2672 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2672 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1328 1456 f7fc6f165bfbe28b9961e8afe3c250dfd80399753342eb6f411ac83a300ac7d4.exe 27 PID 1456 wrote to memory of 1328 1456 f7fc6f165bfbe28b9961e8afe3c250dfd80399753342eb6f411ac83a300ac7d4.exe 27 PID 1456 wrote to memory of 1328 1456 f7fc6f165bfbe28b9961e8afe3c250dfd80399753342eb6f411ac83a300ac7d4.exe 27 PID 1456 wrote to memory of 1328 1456 f7fc6f165bfbe28b9961e8afe3c250dfd80399753342eb6f411ac83a300ac7d4.exe 27 PID 1456 wrote to memory of 1328 1456 f7fc6f165bfbe28b9961e8afe3c250dfd80399753342eb6f411ac83a300ac7d4.exe 27 PID 1456 wrote to memory of 1328 1456 f7fc6f165bfbe28b9961e8afe3c250dfd80399753342eb6f411ac83a300ac7d4.exe 27 PID 1456 wrote to memory of 1328 1456 f7fc6f165bfbe28b9961e8afe3c250dfd80399753342eb6f411ac83a300ac7d4.exe 27 PID 1328 wrote to memory of 2960 1328 v8875543.exe 28 PID 1328 wrote to memory of 2960 1328 v8875543.exe 28 PID 1328 wrote to memory of 2960 1328 v8875543.exe 28 PID 1328 wrote to memory of 2960 1328 v8875543.exe 28 PID 1328 wrote to memory of 2960 1328 v8875543.exe 28 PID 1328 wrote to memory of 2960 1328 v8875543.exe 28 PID 1328 wrote to memory of 2960 1328 v8875543.exe 28 PID 2960 wrote to memory of 2564 2960 v0737248.exe 29 PID 2960 wrote to memory of 2564 2960 v0737248.exe 29 PID 2960 wrote to memory of 2564 2960 v0737248.exe 29 PID 2960 wrote to memory of 2564 2960 v0737248.exe 29 PID 2960 wrote to memory of 2564 2960 v0737248.exe 29 PID 2960 wrote to memory of 2564 2960 v0737248.exe 29 PID 2960 wrote to memory of 2564 2960 v0737248.exe 29 PID 2564 wrote to memory of 2620 2564 v3543856.exe 30 PID 2564 wrote to memory of 2620 2564 v3543856.exe 30 PID 2564 wrote to memory of 2620 2564 v3543856.exe 30 PID 2564 wrote to memory of 2620 2564 v3543856.exe 30 PID 2564 wrote to memory of 2620 2564 v3543856.exe 30 PID 2564 wrote to memory of 2620 2564 v3543856.exe 30 PID 2564 wrote to memory of 2620 2564 v3543856.exe 30 PID 2620 wrote to memory of 2672 2620 a1979241.exe 31 PID 2620 wrote to memory of 2672 2620 a1979241.exe 31 PID 2620 wrote to memory of 2672 2620 a1979241.exe 31 PID 2620 wrote to memory of 2672 2620 a1979241.exe 31 PID 2620 wrote to memory of 2672 2620 a1979241.exe 31 PID 2620 wrote to memory of 2672 2620 a1979241.exe 31 PID 2620 wrote to memory of 2672 2620 a1979241.exe 31 PID 2620 wrote to memory of 2672 2620 a1979241.exe 31 PID 2620 wrote to memory of 2672 2620 a1979241.exe 31 PID 2620 wrote to memory of 2672 2620 a1979241.exe 31 PID 2620 wrote to memory of 2672 2620 a1979241.exe 31 PID 2620 wrote to memory of 2672 2620 a1979241.exe 31 PID 2620 wrote to memory of 3012 2620 a1979241.exe 32 PID 2620 wrote to memory of 3012 2620 a1979241.exe 32 PID 2620 wrote to memory of 3012 2620 a1979241.exe 32 PID 2620 wrote to memory of 3012 2620 a1979241.exe 32 PID 2620 wrote to memory of 3012 2620 a1979241.exe 32 PID 2620 wrote to memory of 3012 2620 a1979241.exe 32 PID 2620 wrote to memory of 3012 2620 a1979241.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7fc6f165bfbe28b9961e8afe3c250dfd80399753342eb6f411ac83a300ac7d4.exe"C:\Users\Admin\AppData\Local\Temp\f7fc6f165bfbe28b9961e8afe3c250dfd80399753342eb6f411ac83a300ac7d4.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8875543.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8875543.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0737248.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0737248.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3543856.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3543856.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1979241.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1979241.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:3012
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
830KB
MD5a8b7ea6ffff2ce1a5de7d2fa6b70d90f
SHA1df0763b883e1bba6a1ca2865ec1ace392c317fe8
SHA2561201b91e4b2489153460e30ecd56cac1ef0f6b2b39cdde7be3176121da2c555f
SHA512a73eac0cf133fd7f0f14cee33b75845f9469490217c5103819e4f21621de4650d26ad8edb87e26fc503bcf2d6b3ea09ebda58d5648d9192737b793203e816381
-
Filesize
830KB
MD5a8b7ea6ffff2ce1a5de7d2fa6b70d90f
SHA1df0763b883e1bba6a1ca2865ec1ace392c317fe8
SHA2561201b91e4b2489153460e30ecd56cac1ef0f6b2b39cdde7be3176121da2c555f
SHA512a73eac0cf133fd7f0f14cee33b75845f9469490217c5103819e4f21621de4650d26ad8edb87e26fc503bcf2d6b3ea09ebda58d5648d9192737b793203e816381
-
Filesize
602KB
MD541a16c369f41ed2622768b73207bb6c8
SHA132eb7a4fbe0245b95f0e4743db9a2ea91ae61a47
SHA256060fa8046a65fc1f62564ec21f96308c22ab1553e1c9e3b51393852868cf4220
SHA512aa23e2829905f05abc9a896e8aca21bb1482cbf9174b5c28debaed157da6c292e33d81d34f8efc716bebef265eec7dc8c4de642f877e9e6e149e9695f7360bba
-
Filesize
602KB
MD541a16c369f41ed2622768b73207bb6c8
SHA132eb7a4fbe0245b95f0e4743db9a2ea91ae61a47
SHA256060fa8046a65fc1f62564ec21f96308c22ab1553e1c9e3b51393852868cf4220
SHA512aa23e2829905f05abc9a896e8aca21bb1482cbf9174b5c28debaed157da6c292e33d81d34f8efc716bebef265eec7dc8c4de642f877e9e6e149e9695f7360bba
-
Filesize
343KB
MD5f91042548d8cf1704a001445280b3e5e
SHA1adcf1a486530cce9ca07154174bc432ca3e2bfbc
SHA25643053eb7a47d895b5fb3b0045f3568b27f29e9389cef75a1b920e67f2f253c33
SHA512d1b116d5601d3569e730d7367fd665395ffc0cc9e14e54ce5229799de4a6360933e1dd54d3004482e37e02350d9115947bce542c2c9ff1ec1add4fc4902335ad
-
Filesize
343KB
MD5f91042548d8cf1704a001445280b3e5e
SHA1adcf1a486530cce9ca07154174bc432ca3e2bfbc
SHA25643053eb7a47d895b5fb3b0045f3568b27f29e9389cef75a1b920e67f2f253c33
SHA512d1b116d5601d3569e730d7367fd665395ffc0cc9e14e54ce5229799de4a6360933e1dd54d3004482e37e02350d9115947bce542c2c9ff1ec1add4fc4902335ad
-
Filesize
220KB
MD5d78f2528741ead70aec0c2d65c9490dc
SHA148b9e8150882e9b555441b55e818530cdbc16b19
SHA256620a3e14d29f3caeac72a728bd6ac045f80ec6f7c6197161953ed1be503b682c
SHA512ea7835314678461f15e284f6787172751aa8a514888f2b58b27ce701665db4a741111ea5064b3daadfc474efce9d1df3ceef2d4d54bccaa9a6828970914690d6
-
Filesize
220KB
MD5d78f2528741ead70aec0c2d65c9490dc
SHA148b9e8150882e9b555441b55e818530cdbc16b19
SHA256620a3e14d29f3caeac72a728bd6ac045f80ec6f7c6197161953ed1be503b682c
SHA512ea7835314678461f15e284f6787172751aa8a514888f2b58b27ce701665db4a741111ea5064b3daadfc474efce9d1df3ceef2d4d54bccaa9a6828970914690d6
-
Filesize
220KB
MD5d78f2528741ead70aec0c2d65c9490dc
SHA148b9e8150882e9b555441b55e818530cdbc16b19
SHA256620a3e14d29f3caeac72a728bd6ac045f80ec6f7c6197161953ed1be503b682c
SHA512ea7835314678461f15e284f6787172751aa8a514888f2b58b27ce701665db4a741111ea5064b3daadfc474efce9d1df3ceef2d4d54bccaa9a6828970914690d6
-
Filesize
830KB
MD5a8b7ea6ffff2ce1a5de7d2fa6b70d90f
SHA1df0763b883e1bba6a1ca2865ec1ace392c317fe8
SHA2561201b91e4b2489153460e30ecd56cac1ef0f6b2b39cdde7be3176121da2c555f
SHA512a73eac0cf133fd7f0f14cee33b75845f9469490217c5103819e4f21621de4650d26ad8edb87e26fc503bcf2d6b3ea09ebda58d5648d9192737b793203e816381
-
Filesize
830KB
MD5a8b7ea6ffff2ce1a5de7d2fa6b70d90f
SHA1df0763b883e1bba6a1ca2865ec1ace392c317fe8
SHA2561201b91e4b2489153460e30ecd56cac1ef0f6b2b39cdde7be3176121da2c555f
SHA512a73eac0cf133fd7f0f14cee33b75845f9469490217c5103819e4f21621de4650d26ad8edb87e26fc503bcf2d6b3ea09ebda58d5648d9192737b793203e816381
-
Filesize
602KB
MD541a16c369f41ed2622768b73207bb6c8
SHA132eb7a4fbe0245b95f0e4743db9a2ea91ae61a47
SHA256060fa8046a65fc1f62564ec21f96308c22ab1553e1c9e3b51393852868cf4220
SHA512aa23e2829905f05abc9a896e8aca21bb1482cbf9174b5c28debaed157da6c292e33d81d34f8efc716bebef265eec7dc8c4de642f877e9e6e149e9695f7360bba
-
Filesize
602KB
MD541a16c369f41ed2622768b73207bb6c8
SHA132eb7a4fbe0245b95f0e4743db9a2ea91ae61a47
SHA256060fa8046a65fc1f62564ec21f96308c22ab1553e1c9e3b51393852868cf4220
SHA512aa23e2829905f05abc9a896e8aca21bb1482cbf9174b5c28debaed157da6c292e33d81d34f8efc716bebef265eec7dc8c4de642f877e9e6e149e9695f7360bba
-
Filesize
343KB
MD5f91042548d8cf1704a001445280b3e5e
SHA1adcf1a486530cce9ca07154174bc432ca3e2bfbc
SHA25643053eb7a47d895b5fb3b0045f3568b27f29e9389cef75a1b920e67f2f253c33
SHA512d1b116d5601d3569e730d7367fd665395ffc0cc9e14e54ce5229799de4a6360933e1dd54d3004482e37e02350d9115947bce542c2c9ff1ec1add4fc4902335ad
-
Filesize
343KB
MD5f91042548d8cf1704a001445280b3e5e
SHA1adcf1a486530cce9ca07154174bc432ca3e2bfbc
SHA25643053eb7a47d895b5fb3b0045f3568b27f29e9389cef75a1b920e67f2f253c33
SHA512d1b116d5601d3569e730d7367fd665395ffc0cc9e14e54ce5229799de4a6360933e1dd54d3004482e37e02350d9115947bce542c2c9ff1ec1add4fc4902335ad
-
Filesize
220KB
MD5d78f2528741ead70aec0c2d65c9490dc
SHA148b9e8150882e9b555441b55e818530cdbc16b19
SHA256620a3e14d29f3caeac72a728bd6ac045f80ec6f7c6197161953ed1be503b682c
SHA512ea7835314678461f15e284f6787172751aa8a514888f2b58b27ce701665db4a741111ea5064b3daadfc474efce9d1df3ceef2d4d54bccaa9a6828970914690d6
-
Filesize
220KB
MD5d78f2528741ead70aec0c2d65c9490dc
SHA148b9e8150882e9b555441b55e818530cdbc16b19
SHA256620a3e14d29f3caeac72a728bd6ac045f80ec6f7c6197161953ed1be503b682c
SHA512ea7835314678461f15e284f6787172751aa8a514888f2b58b27ce701665db4a741111ea5064b3daadfc474efce9d1df3ceef2d4d54bccaa9a6828970914690d6
-
Filesize
220KB
MD5d78f2528741ead70aec0c2d65c9490dc
SHA148b9e8150882e9b555441b55e818530cdbc16b19
SHA256620a3e14d29f3caeac72a728bd6ac045f80ec6f7c6197161953ed1be503b682c
SHA512ea7835314678461f15e284f6787172751aa8a514888f2b58b27ce701665db4a741111ea5064b3daadfc474efce9d1df3ceef2d4d54bccaa9a6828970914690d6
-
Filesize
220KB
MD5d78f2528741ead70aec0c2d65c9490dc
SHA148b9e8150882e9b555441b55e818530cdbc16b19
SHA256620a3e14d29f3caeac72a728bd6ac045f80ec6f7c6197161953ed1be503b682c
SHA512ea7835314678461f15e284f6787172751aa8a514888f2b58b27ce701665db4a741111ea5064b3daadfc474efce9d1df3ceef2d4d54bccaa9a6828970914690d6
-
Filesize
220KB
MD5d78f2528741ead70aec0c2d65c9490dc
SHA148b9e8150882e9b555441b55e818530cdbc16b19
SHA256620a3e14d29f3caeac72a728bd6ac045f80ec6f7c6197161953ed1be503b682c
SHA512ea7835314678461f15e284f6787172751aa8a514888f2b58b27ce701665db4a741111ea5064b3daadfc474efce9d1df3ceef2d4d54bccaa9a6828970914690d6
-
Filesize
220KB
MD5d78f2528741ead70aec0c2d65c9490dc
SHA148b9e8150882e9b555441b55e818530cdbc16b19
SHA256620a3e14d29f3caeac72a728bd6ac045f80ec6f7c6197161953ed1be503b682c
SHA512ea7835314678461f15e284f6787172751aa8a514888f2b58b27ce701665db4a741111ea5064b3daadfc474efce9d1df3ceef2d4d54bccaa9a6828970914690d6
-
Filesize
220KB
MD5d78f2528741ead70aec0c2d65c9490dc
SHA148b9e8150882e9b555441b55e818530cdbc16b19
SHA256620a3e14d29f3caeac72a728bd6ac045f80ec6f7c6197161953ed1be503b682c
SHA512ea7835314678461f15e284f6787172751aa8a514888f2b58b27ce701665db4a741111ea5064b3daadfc474efce9d1df3ceef2d4d54bccaa9a6828970914690d6