Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 01:45
Static task
static1
Behavioral task
behavioral1
Sample
718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe
Resource
win10v2004-20230915-en
General
-
Target
718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe
-
Size
446KB
-
MD5
9607ed5c7e1b88f1d1035a34d258ea9c
-
SHA1
aed23957bf68a9b43aa7eedcf5cf2cbc12cbe5f0
-
SHA256
718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0
-
SHA512
5c3e56b36ba171964fe9d98eaa778aa352e9fe9d43c35b62376991b203ea9b41950b8b6049442e14a896a71d240309c1e87dc1b99bea9b1155c56caa54110aad
-
SSDEEP
12288:KMrMy90vr6TORA+xHWOmUh9LaeKJvhSODV:yyQWSR5WOmUhwVJvhSOR
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 5 IoCs
resource yara_rule behavioral1/memory/2756-25-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2756-26-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2756-28-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2756-32-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2756-30-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Executes dropped EXE 2 IoCs
pid Process 3064 v8150321.exe 2628 a2136167.exe -
Loads dropped DLL 9 IoCs
pid Process 3040 718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe 3064 v8150321.exe 3064 v8150321.exe 3064 v8150321.exe 2628 a2136167.exe 2596 WerFault.exe 2596 WerFault.exe 2596 WerFault.exe 2596 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8150321.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2628 set thread context of 2756 2628 a2136167.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2596 2628 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2756 AppLaunch.exe 2756 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2756 AppLaunch.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3040 wrote to memory of 3064 3040 718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe 28 PID 3040 wrote to memory of 3064 3040 718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe 28 PID 3040 wrote to memory of 3064 3040 718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe 28 PID 3040 wrote to memory of 3064 3040 718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe 28 PID 3040 wrote to memory of 3064 3040 718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe 28 PID 3040 wrote to memory of 3064 3040 718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe 28 PID 3040 wrote to memory of 3064 3040 718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe 28 PID 3064 wrote to memory of 2628 3064 v8150321.exe 29 PID 3064 wrote to memory of 2628 3064 v8150321.exe 29 PID 3064 wrote to memory of 2628 3064 v8150321.exe 29 PID 3064 wrote to memory of 2628 3064 v8150321.exe 29 PID 3064 wrote to memory of 2628 3064 v8150321.exe 29 PID 3064 wrote to memory of 2628 3064 v8150321.exe 29 PID 3064 wrote to memory of 2628 3064 v8150321.exe 29 PID 2628 wrote to memory of 2756 2628 a2136167.exe 30 PID 2628 wrote to memory of 2756 2628 a2136167.exe 30 PID 2628 wrote to memory of 2756 2628 a2136167.exe 30 PID 2628 wrote to memory of 2756 2628 a2136167.exe 30 PID 2628 wrote to memory of 2756 2628 a2136167.exe 30 PID 2628 wrote to memory of 2756 2628 a2136167.exe 30 PID 2628 wrote to memory of 2756 2628 a2136167.exe 30 PID 2628 wrote to memory of 2756 2628 a2136167.exe 30 PID 2628 wrote to memory of 2756 2628 a2136167.exe 30 PID 2628 wrote to memory of 2756 2628 a2136167.exe 30 PID 2628 wrote to memory of 2756 2628 a2136167.exe 30 PID 2628 wrote to memory of 2756 2628 a2136167.exe 30 PID 2628 wrote to memory of 2596 2628 a2136167.exe 31 PID 2628 wrote to memory of 2596 2628 a2136167.exe 31 PID 2628 wrote to memory of 2596 2628 a2136167.exe 31 PID 2628 wrote to memory of 2596 2628 a2136167.exe 31 PID 2628 wrote to memory of 2596 2628 a2136167.exe 31 PID 2628 wrote to memory of 2596 2628 a2136167.exe 31 PID 2628 wrote to memory of 2596 2628 a2136167.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe"C:\Users\Admin\AppData\Local\Temp\718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8150321.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8150321.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2136167.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2136167.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 2724⤵
- Loads dropped DLL
- Program crash
PID:2596
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD5325f3e44d888ac484242d7ffcb8de718
SHA17077444752fb0c9864cf8d7c1be5c3f1c21e13d4
SHA2568222cc4c79f4ab381c5ca1aedfebf14c7f2cbe3b74e3650de8f44222c2097b2b
SHA512f0119ac3cdf8081d659d24bdef942929e0080f38f51f5a025b5636eea301ac35d53b48bbe1d9759b66e45919a0325487dbc6a4b2e35819a5ac9b2fc49cc7231f
-
Filesize
344KB
MD5325f3e44d888ac484242d7ffcb8de718
SHA17077444752fb0c9864cf8d7c1be5c3f1c21e13d4
SHA2568222cc4c79f4ab381c5ca1aedfebf14c7f2cbe3b74e3650de8f44222c2097b2b
SHA512f0119ac3cdf8081d659d24bdef942929e0080f38f51f5a025b5636eea301ac35d53b48bbe1d9759b66e45919a0325487dbc6a4b2e35819a5ac9b2fc49cc7231f
-
Filesize
220KB
MD5581a608a9bfcf0cc4e06528947efe778
SHA140d77d9bb82795ebdb78774a6a5524a2d5ad30c2
SHA256d8c220d8d660b3ea7a07f50cbf56c78afbe7af0ec99c7e6fc20ed22b6cdfbcd9
SHA51266d92c89f167d7d9a3ca8fe2104add448d08f8604331641e233a1b71535c5f2b9431fbe8fd5843550fe5242e161edb019c84e9ff062983be0257bae19b7be320
-
Filesize
220KB
MD5581a608a9bfcf0cc4e06528947efe778
SHA140d77d9bb82795ebdb78774a6a5524a2d5ad30c2
SHA256d8c220d8d660b3ea7a07f50cbf56c78afbe7af0ec99c7e6fc20ed22b6cdfbcd9
SHA51266d92c89f167d7d9a3ca8fe2104add448d08f8604331641e233a1b71535c5f2b9431fbe8fd5843550fe5242e161edb019c84e9ff062983be0257bae19b7be320
-
Filesize
220KB
MD5581a608a9bfcf0cc4e06528947efe778
SHA140d77d9bb82795ebdb78774a6a5524a2d5ad30c2
SHA256d8c220d8d660b3ea7a07f50cbf56c78afbe7af0ec99c7e6fc20ed22b6cdfbcd9
SHA51266d92c89f167d7d9a3ca8fe2104add448d08f8604331641e233a1b71535c5f2b9431fbe8fd5843550fe5242e161edb019c84e9ff062983be0257bae19b7be320
-
Filesize
344KB
MD5325f3e44d888ac484242d7ffcb8de718
SHA17077444752fb0c9864cf8d7c1be5c3f1c21e13d4
SHA2568222cc4c79f4ab381c5ca1aedfebf14c7f2cbe3b74e3650de8f44222c2097b2b
SHA512f0119ac3cdf8081d659d24bdef942929e0080f38f51f5a025b5636eea301ac35d53b48bbe1d9759b66e45919a0325487dbc6a4b2e35819a5ac9b2fc49cc7231f
-
Filesize
344KB
MD5325f3e44d888ac484242d7ffcb8de718
SHA17077444752fb0c9864cf8d7c1be5c3f1c21e13d4
SHA2568222cc4c79f4ab381c5ca1aedfebf14c7f2cbe3b74e3650de8f44222c2097b2b
SHA512f0119ac3cdf8081d659d24bdef942929e0080f38f51f5a025b5636eea301ac35d53b48bbe1d9759b66e45919a0325487dbc6a4b2e35819a5ac9b2fc49cc7231f
-
Filesize
220KB
MD5581a608a9bfcf0cc4e06528947efe778
SHA140d77d9bb82795ebdb78774a6a5524a2d5ad30c2
SHA256d8c220d8d660b3ea7a07f50cbf56c78afbe7af0ec99c7e6fc20ed22b6cdfbcd9
SHA51266d92c89f167d7d9a3ca8fe2104add448d08f8604331641e233a1b71535c5f2b9431fbe8fd5843550fe5242e161edb019c84e9ff062983be0257bae19b7be320
-
Filesize
220KB
MD5581a608a9bfcf0cc4e06528947efe778
SHA140d77d9bb82795ebdb78774a6a5524a2d5ad30c2
SHA256d8c220d8d660b3ea7a07f50cbf56c78afbe7af0ec99c7e6fc20ed22b6cdfbcd9
SHA51266d92c89f167d7d9a3ca8fe2104add448d08f8604331641e233a1b71535c5f2b9431fbe8fd5843550fe5242e161edb019c84e9ff062983be0257bae19b7be320
-
Filesize
220KB
MD5581a608a9bfcf0cc4e06528947efe778
SHA140d77d9bb82795ebdb78774a6a5524a2d5ad30c2
SHA256d8c220d8d660b3ea7a07f50cbf56c78afbe7af0ec99c7e6fc20ed22b6cdfbcd9
SHA51266d92c89f167d7d9a3ca8fe2104add448d08f8604331641e233a1b71535c5f2b9431fbe8fd5843550fe5242e161edb019c84e9ff062983be0257bae19b7be320
-
Filesize
220KB
MD5581a608a9bfcf0cc4e06528947efe778
SHA140d77d9bb82795ebdb78774a6a5524a2d5ad30c2
SHA256d8c220d8d660b3ea7a07f50cbf56c78afbe7af0ec99c7e6fc20ed22b6cdfbcd9
SHA51266d92c89f167d7d9a3ca8fe2104add448d08f8604331641e233a1b71535c5f2b9431fbe8fd5843550fe5242e161edb019c84e9ff062983be0257bae19b7be320
-
Filesize
220KB
MD5581a608a9bfcf0cc4e06528947efe778
SHA140d77d9bb82795ebdb78774a6a5524a2d5ad30c2
SHA256d8c220d8d660b3ea7a07f50cbf56c78afbe7af0ec99c7e6fc20ed22b6cdfbcd9
SHA51266d92c89f167d7d9a3ca8fe2104add448d08f8604331641e233a1b71535c5f2b9431fbe8fd5843550fe5242e161edb019c84e9ff062983be0257bae19b7be320
-
Filesize
220KB
MD5581a608a9bfcf0cc4e06528947efe778
SHA140d77d9bb82795ebdb78774a6a5524a2d5ad30c2
SHA256d8c220d8d660b3ea7a07f50cbf56c78afbe7af0ec99c7e6fc20ed22b6cdfbcd9
SHA51266d92c89f167d7d9a3ca8fe2104add448d08f8604331641e233a1b71535c5f2b9431fbe8fd5843550fe5242e161edb019c84e9ff062983be0257bae19b7be320
-
Filesize
220KB
MD5581a608a9bfcf0cc4e06528947efe778
SHA140d77d9bb82795ebdb78774a6a5524a2d5ad30c2
SHA256d8c220d8d660b3ea7a07f50cbf56c78afbe7af0ec99c7e6fc20ed22b6cdfbcd9
SHA51266d92c89f167d7d9a3ca8fe2104add448d08f8604331641e233a1b71535c5f2b9431fbe8fd5843550fe5242e161edb019c84e9ff062983be0257bae19b7be320