Analysis
-
max time kernel
128s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 01:45
Static task
static1
Behavioral task
behavioral1
Sample
718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe
Resource
win10v2004-20230915-en
General
-
Target
718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe
-
Size
446KB
-
MD5
9607ed5c7e1b88f1d1035a34d258ea9c
-
SHA1
aed23957bf68a9b43aa7eedcf5cf2cbc12cbe5f0
-
SHA256
718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0
-
SHA512
5c3e56b36ba171964fe9d98eaa778aa352e9fe9d43c35b62376991b203ea9b41950b8b6049442e14a896a71d240309c1e87dc1b99bea9b1155c56caa54110aad
-
SSDEEP
12288:KMrMy90vr6TORA+xHWOmUh9LaeKJvhSODV:yyQWSR5WOmUhwVJvhSOR
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4448-14-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 1344 v8150321.exe 2184 a2136167.exe 2936 b0169593.exe 2372 d5241735.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8150321.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2184 set thread context of 4448 2184 a2136167.exe 87 PID 2936 set thread context of 3952 2936 b0169593.exe 96 -
Program crash 3 IoCs
pid pid_target Process procid_target 4264 2184 WerFault.exe 86 2712 2936 WerFault.exe 95 1896 3952 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4448 AppLaunch.exe 4448 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4448 AppLaunch.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3528 wrote to memory of 1344 3528 718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe 85 PID 3528 wrote to memory of 1344 3528 718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe 85 PID 3528 wrote to memory of 1344 3528 718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe 85 PID 1344 wrote to memory of 2184 1344 v8150321.exe 86 PID 1344 wrote to memory of 2184 1344 v8150321.exe 86 PID 1344 wrote to memory of 2184 1344 v8150321.exe 86 PID 2184 wrote to memory of 4448 2184 a2136167.exe 87 PID 2184 wrote to memory of 4448 2184 a2136167.exe 87 PID 2184 wrote to memory of 4448 2184 a2136167.exe 87 PID 2184 wrote to memory of 4448 2184 a2136167.exe 87 PID 2184 wrote to memory of 4448 2184 a2136167.exe 87 PID 2184 wrote to memory of 4448 2184 a2136167.exe 87 PID 2184 wrote to memory of 4448 2184 a2136167.exe 87 PID 2184 wrote to memory of 4448 2184 a2136167.exe 87 PID 1344 wrote to memory of 2936 1344 v8150321.exe 95 PID 1344 wrote to memory of 2936 1344 v8150321.exe 95 PID 1344 wrote to memory of 2936 1344 v8150321.exe 95 PID 2936 wrote to memory of 3952 2936 b0169593.exe 96 PID 2936 wrote to memory of 3952 2936 b0169593.exe 96 PID 2936 wrote to memory of 3952 2936 b0169593.exe 96 PID 2936 wrote to memory of 3952 2936 b0169593.exe 96 PID 2936 wrote to memory of 3952 2936 b0169593.exe 96 PID 2936 wrote to memory of 3952 2936 b0169593.exe 96 PID 2936 wrote to memory of 3952 2936 b0169593.exe 96 PID 2936 wrote to memory of 3952 2936 b0169593.exe 96 PID 2936 wrote to memory of 3952 2936 b0169593.exe 96 PID 2936 wrote to memory of 3952 2936 b0169593.exe 96 PID 3528 wrote to memory of 2372 3528 718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe 101 PID 3528 wrote to memory of 2372 3528 718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe 101 PID 3528 wrote to memory of 2372 3528 718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe"C:\Users\Admin\AppData\Local\Temp\718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8150321.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8150321.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2136167.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2136167.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 5804⤵
- Program crash
PID:4264
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0169593.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0169593.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 5405⤵
- Program crash
PID:1896
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 5524⤵
- Program crash
PID:2712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5241735.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5241735.exe2⤵
- Executes dropped EXE
PID:2372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2184 -ip 21841⤵PID:1424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2936 -ip 29361⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3952 -ip 39521⤵PID:1872
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD53182699a931a4bd0949984e270feb6e2
SHA1800134414d8759e2572b5c5e4af5d4eb719769fa
SHA2564402d15a8edd830bf8e98ee0cc60581968cd679994d36533ee9db966b8abab7d
SHA512f4010cae8023b48c412eb7c4f65262789bcffb9886fd8934903ddb7b717eeb91bf91c321f5d611730cc68f9fee9f2d13f95efdc0628dff4d66de1f03570cb6a5
-
Filesize
19KB
MD53182699a931a4bd0949984e270feb6e2
SHA1800134414d8759e2572b5c5e4af5d4eb719769fa
SHA2564402d15a8edd830bf8e98ee0cc60581968cd679994d36533ee9db966b8abab7d
SHA512f4010cae8023b48c412eb7c4f65262789bcffb9886fd8934903ddb7b717eeb91bf91c321f5d611730cc68f9fee9f2d13f95efdc0628dff4d66de1f03570cb6a5
-
Filesize
344KB
MD5325f3e44d888ac484242d7ffcb8de718
SHA17077444752fb0c9864cf8d7c1be5c3f1c21e13d4
SHA2568222cc4c79f4ab381c5ca1aedfebf14c7f2cbe3b74e3650de8f44222c2097b2b
SHA512f0119ac3cdf8081d659d24bdef942929e0080f38f51f5a025b5636eea301ac35d53b48bbe1d9759b66e45919a0325487dbc6a4b2e35819a5ac9b2fc49cc7231f
-
Filesize
344KB
MD5325f3e44d888ac484242d7ffcb8de718
SHA17077444752fb0c9864cf8d7c1be5c3f1c21e13d4
SHA2568222cc4c79f4ab381c5ca1aedfebf14c7f2cbe3b74e3650de8f44222c2097b2b
SHA512f0119ac3cdf8081d659d24bdef942929e0080f38f51f5a025b5636eea301ac35d53b48bbe1d9759b66e45919a0325487dbc6a4b2e35819a5ac9b2fc49cc7231f
-
Filesize
220KB
MD5581a608a9bfcf0cc4e06528947efe778
SHA140d77d9bb82795ebdb78774a6a5524a2d5ad30c2
SHA256d8c220d8d660b3ea7a07f50cbf56c78afbe7af0ec99c7e6fc20ed22b6cdfbcd9
SHA51266d92c89f167d7d9a3ca8fe2104add448d08f8604331641e233a1b71535c5f2b9431fbe8fd5843550fe5242e161edb019c84e9ff062983be0257bae19b7be320
-
Filesize
220KB
MD5581a608a9bfcf0cc4e06528947efe778
SHA140d77d9bb82795ebdb78774a6a5524a2d5ad30c2
SHA256d8c220d8d660b3ea7a07f50cbf56c78afbe7af0ec99c7e6fc20ed22b6cdfbcd9
SHA51266d92c89f167d7d9a3ca8fe2104add448d08f8604331641e233a1b71535c5f2b9431fbe8fd5843550fe5242e161edb019c84e9ff062983be0257bae19b7be320
-
Filesize
364KB
MD5afa67287f08a490da4f8af7d75ceae16
SHA1accfbe43947040c6d02739283a1441e9157e8f8d
SHA256f8936912798e55028b40a3001ab0daf715063c893edfe681bd7d10ae7c9185f8
SHA512be10b4998566576de59628be822e4267da61a0a55753b4db17886b443cde8f5fbedb58ebccf117c0b78bf28a30dcb6f7e2f207ef34b2bdfeec9d78a47ccc2cd8
-
Filesize
364KB
MD5afa67287f08a490da4f8af7d75ceae16
SHA1accfbe43947040c6d02739283a1441e9157e8f8d
SHA256f8936912798e55028b40a3001ab0daf715063c893edfe681bd7d10ae7c9185f8
SHA512be10b4998566576de59628be822e4267da61a0a55753b4db17886b443cde8f5fbedb58ebccf117c0b78bf28a30dcb6f7e2f207ef34b2bdfeec9d78a47ccc2cd8