Analysis
-
max time kernel
122s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 11:05
Static task
static1
Behavioral task
behavioral1
Sample
0d38abfe984169678896e8bb7d6acb76520f9a192c13c35d628aed308e80edaa.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0d38abfe984169678896e8bb7d6acb76520f9a192c13c35d628aed308e80edaa.exe
Resource
win10v2004-20230915-en
General
-
Target
0d38abfe984169678896e8bb7d6acb76520f9a192c13c35d628aed308e80edaa.exe
-
Size
1.1MB
-
MD5
5c116774214fee0cbeb74166443f6aa0
-
SHA1
1c45fd2c507f3a8b529ecdc16179265512a053b7
-
SHA256
0d38abfe984169678896e8bb7d6acb76520f9a192c13c35d628aed308e80edaa
-
SHA512
707c38965b7f15cf795d2fa9ba22934a9e5ae73ca536d0a1c0ef491915efb60f89a86c4f29a015d393714165994ff935b674eac77541594128bf18c8e8aa1176
-
SSDEEP
24576:cyFw0eHM4WfRa5xtOpGlFND2XryzQSgugHyy3WT99:LFw3HjIa5eolXD2WsSRgH
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 5 IoCs
resource yara_rule behavioral1/memory/2208-49-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2208-47-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2208-52-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2208-54-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2208-56-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
Executes dropped EXE 4 IoCs
pid Process 1444 x0921769.exe 2260 x1372855.exe 2644 x2389860.exe 2092 g2357082.exe -
Loads dropped DLL 13 IoCs
pid Process 2700 0d38abfe984169678896e8bb7d6acb76520f9a192c13c35d628aed308e80edaa.exe 1444 x0921769.exe 1444 x0921769.exe 2260 x1372855.exe 2260 x1372855.exe 2644 x2389860.exe 2644 x2389860.exe 2644 x2389860.exe 2092 g2357082.exe 2620 WerFault.exe 2620 WerFault.exe 2620 WerFault.exe 2620 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0d38abfe984169678896e8bb7d6acb76520f9a192c13c35d628aed308e80edaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0921769.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1372855.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x2389860.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2092 set thread context of 2208 2092 g2357082.exe 35 -
Program crash 1 IoCs
pid pid_target Process procid_target 2620 2092 WerFault.exe 33 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2208 AppLaunch.exe 2208 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2208 AppLaunch.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2700 wrote to memory of 1444 2700 0d38abfe984169678896e8bb7d6acb76520f9a192c13c35d628aed308e80edaa.exe 30 PID 2700 wrote to memory of 1444 2700 0d38abfe984169678896e8bb7d6acb76520f9a192c13c35d628aed308e80edaa.exe 30 PID 2700 wrote to memory of 1444 2700 0d38abfe984169678896e8bb7d6acb76520f9a192c13c35d628aed308e80edaa.exe 30 PID 2700 wrote to memory of 1444 2700 0d38abfe984169678896e8bb7d6acb76520f9a192c13c35d628aed308e80edaa.exe 30 PID 2700 wrote to memory of 1444 2700 0d38abfe984169678896e8bb7d6acb76520f9a192c13c35d628aed308e80edaa.exe 30 PID 2700 wrote to memory of 1444 2700 0d38abfe984169678896e8bb7d6acb76520f9a192c13c35d628aed308e80edaa.exe 30 PID 2700 wrote to memory of 1444 2700 0d38abfe984169678896e8bb7d6acb76520f9a192c13c35d628aed308e80edaa.exe 30 PID 1444 wrote to memory of 2260 1444 x0921769.exe 31 PID 1444 wrote to memory of 2260 1444 x0921769.exe 31 PID 1444 wrote to memory of 2260 1444 x0921769.exe 31 PID 1444 wrote to memory of 2260 1444 x0921769.exe 31 PID 1444 wrote to memory of 2260 1444 x0921769.exe 31 PID 1444 wrote to memory of 2260 1444 x0921769.exe 31 PID 1444 wrote to memory of 2260 1444 x0921769.exe 31 PID 2260 wrote to memory of 2644 2260 x1372855.exe 32 PID 2260 wrote to memory of 2644 2260 x1372855.exe 32 PID 2260 wrote to memory of 2644 2260 x1372855.exe 32 PID 2260 wrote to memory of 2644 2260 x1372855.exe 32 PID 2260 wrote to memory of 2644 2260 x1372855.exe 32 PID 2260 wrote to memory of 2644 2260 x1372855.exe 32 PID 2260 wrote to memory of 2644 2260 x1372855.exe 32 PID 2644 wrote to memory of 2092 2644 x2389860.exe 33 PID 2644 wrote to memory of 2092 2644 x2389860.exe 33 PID 2644 wrote to memory of 2092 2644 x2389860.exe 33 PID 2644 wrote to memory of 2092 2644 x2389860.exe 33 PID 2644 wrote to memory of 2092 2644 x2389860.exe 33 PID 2644 wrote to memory of 2092 2644 x2389860.exe 33 PID 2644 wrote to memory of 2092 2644 x2389860.exe 33 PID 2092 wrote to memory of 2208 2092 g2357082.exe 35 PID 2092 wrote to memory of 2208 2092 g2357082.exe 35 PID 2092 wrote to memory of 2208 2092 g2357082.exe 35 PID 2092 wrote to memory of 2208 2092 g2357082.exe 35 PID 2092 wrote to memory of 2208 2092 g2357082.exe 35 PID 2092 wrote to memory of 2208 2092 g2357082.exe 35 PID 2092 wrote to memory of 2208 2092 g2357082.exe 35 PID 2092 wrote to memory of 2208 2092 g2357082.exe 35 PID 2092 wrote to memory of 2208 2092 g2357082.exe 35 PID 2092 wrote to memory of 2208 2092 g2357082.exe 35 PID 2092 wrote to memory of 2208 2092 g2357082.exe 35 PID 2092 wrote to memory of 2208 2092 g2357082.exe 35 PID 2092 wrote to memory of 2620 2092 g2357082.exe 36 PID 2092 wrote to memory of 2620 2092 g2357082.exe 36 PID 2092 wrote to memory of 2620 2092 g2357082.exe 36 PID 2092 wrote to memory of 2620 2092 g2357082.exe 36 PID 2092 wrote to memory of 2620 2092 g2357082.exe 36 PID 2092 wrote to memory of 2620 2092 g2357082.exe 36 PID 2092 wrote to memory of 2620 2092 g2357082.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d38abfe984169678896e8bb7d6acb76520f9a192c13c35d628aed308e80edaa.exe"C:\Users\Admin\AppData\Local\Temp\0d38abfe984169678896e8bb7d6acb76520f9a192c13c35d628aed308e80edaa.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0921769.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0921769.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1372855.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1372855.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2389860.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2389860.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2357082.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2357082.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2620
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD57f7496c1d9f20ea5e178435793d36f45
SHA1c9aa33954e55f7d1cb127cc0934550b4664a4c35
SHA25616b1322ea6156c88649fa1965515e2247829085323d59e1e993d95507c3455ef
SHA512bb3091de22244bbcd437bb4d05a1089cbb46d6b84c5abbbb9947cb31f9944438ea92aea5cbf9838c311d24e6ab3b1c477fd783dddcff35230bc2eee6d40e473f
-
Filesize
1.0MB
MD57f7496c1d9f20ea5e178435793d36f45
SHA1c9aa33954e55f7d1cb127cc0934550b4664a4c35
SHA25616b1322ea6156c88649fa1965515e2247829085323d59e1e993d95507c3455ef
SHA512bb3091de22244bbcd437bb4d05a1089cbb46d6b84c5abbbb9947cb31f9944438ea92aea5cbf9838c311d24e6ab3b1c477fd783dddcff35230bc2eee6d40e473f
-
Filesize
652KB
MD564aa1c5b71352841a02edd6cc8c2b7f2
SHA117566315bd53880de53fc6fc3cfd753dbcd8a139
SHA256f752fbf36143fe48a1069f9feaa7cbf58539e4a8d66d436677b6f87c8afd5b2b
SHA5125967ec488ac34c0aeef26c13f6ebd5104b76ef3500a55814d6ccf9dadc749ad32d62bccc3860c50f2b4b9af9753e3f26fd7488068d68c3e3c4dc9bffa8f00e25
-
Filesize
652KB
MD564aa1c5b71352841a02edd6cc8c2b7f2
SHA117566315bd53880de53fc6fc3cfd753dbcd8a139
SHA256f752fbf36143fe48a1069f9feaa7cbf58539e4a8d66d436677b6f87c8afd5b2b
SHA5125967ec488ac34c0aeef26c13f6ebd5104b76ef3500a55814d6ccf9dadc749ad32d62bccc3860c50f2b4b9af9753e3f26fd7488068d68c3e3c4dc9bffa8f00e25
-
Filesize
466KB
MD5ed52a4d38d95ca34e85c6d613cb0bc48
SHA1294c142198802b728f283d4c9159ae5d75e56bfc
SHA256ab7e79251d896ade55793c9fbf3f45673bd94a7d798e092a709208f4657db282
SHA512966f09f64ab48b60021dc62159883f7acc10872276743a875ed151f2c9ff3a5f518ec56d78be889a9d3b16cfea1c82394d7f29d9460154120f665ee448a49171
-
Filesize
466KB
MD5ed52a4d38d95ca34e85c6d613cb0bc48
SHA1294c142198802b728f283d4c9159ae5d75e56bfc
SHA256ab7e79251d896ade55793c9fbf3f45673bd94a7d798e092a709208f4657db282
SHA512966f09f64ab48b60021dc62159883f7acc10872276743a875ed151f2c9ff3a5f518ec56d78be889a9d3b16cfea1c82394d7f29d9460154120f665ee448a49171
-
Filesize
899KB
MD50cf2c4d40e24e40ea1191e2e9e8175d6
SHA1d45e9bd05b245c9f8152f92adaed593247dac6d3
SHA256ffb5994ddbabbae91efca92051fed4296921df5fa75b90c1acf175e8c04926bb
SHA512d45826fe1ea25bcd791621117b1314452ef1f67760f0e444a5c4c2fe5aba5160632794713d08797ed27e682134b7eb85af4298189e87b3a4ff8484c66363633e
-
Filesize
899KB
MD50cf2c4d40e24e40ea1191e2e9e8175d6
SHA1d45e9bd05b245c9f8152f92adaed593247dac6d3
SHA256ffb5994ddbabbae91efca92051fed4296921df5fa75b90c1acf175e8c04926bb
SHA512d45826fe1ea25bcd791621117b1314452ef1f67760f0e444a5c4c2fe5aba5160632794713d08797ed27e682134b7eb85af4298189e87b3a4ff8484c66363633e
-
Filesize
899KB
MD50cf2c4d40e24e40ea1191e2e9e8175d6
SHA1d45e9bd05b245c9f8152f92adaed593247dac6d3
SHA256ffb5994ddbabbae91efca92051fed4296921df5fa75b90c1acf175e8c04926bb
SHA512d45826fe1ea25bcd791621117b1314452ef1f67760f0e444a5c4c2fe5aba5160632794713d08797ed27e682134b7eb85af4298189e87b3a4ff8484c66363633e
-
Filesize
1.0MB
MD57f7496c1d9f20ea5e178435793d36f45
SHA1c9aa33954e55f7d1cb127cc0934550b4664a4c35
SHA25616b1322ea6156c88649fa1965515e2247829085323d59e1e993d95507c3455ef
SHA512bb3091de22244bbcd437bb4d05a1089cbb46d6b84c5abbbb9947cb31f9944438ea92aea5cbf9838c311d24e6ab3b1c477fd783dddcff35230bc2eee6d40e473f
-
Filesize
1.0MB
MD57f7496c1d9f20ea5e178435793d36f45
SHA1c9aa33954e55f7d1cb127cc0934550b4664a4c35
SHA25616b1322ea6156c88649fa1965515e2247829085323d59e1e993d95507c3455ef
SHA512bb3091de22244bbcd437bb4d05a1089cbb46d6b84c5abbbb9947cb31f9944438ea92aea5cbf9838c311d24e6ab3b1c477fd783dddcff35230bc2eee6d40e473f
-
Filesize
652KB
MD564aa1c5b71352841a02edd6cc8c2b7f2
SHA117566315bd53880de53fc6fc3cfd753dbcd8a139
SHA256f752fbf36143fe48a1069f9feaa7cbf58539e4a8d66d436677b6f87c8afd5b2b
SHA5125967ec488ac34c0aeef26c13f6ebd5104b76ef3500a55814d6ccf9dadc749ad32d62bccc3860c50f2b4b9af9753e3f26fd7488068d68c3e3c4dc9bffa8f00e25
-
Filesize
652KB
MD564aa1c5b71352841a02edd6cc8c2b7f2
SHA117566315bd53880de53fc6fc3cfd753dbcd8a139
SHA256f752fbf36143fe48a1069f9feaa7cbf58539e4a8d66d436677b6f87c8afd5b2b
SHA5125967ec488ac34c0aeef26c13f6ebd5104b76ef3500a55814d6ccf9dadc749ad32d62bccc3860c50f2b4b9af9753e3f26fd7488068d68c3e3c4dc9bffa8f00e25
-
Filesize
466KB
MD5ed52a4d38d95ca34e85c6d613cb0bc48
SHA1294c142198802b728f283d4c9159ae5d75e56bfc
SHA256ab7e79251d896ade55793c9fbf3f45673bd94a7d798e092a709208f4657db282
SHA512966f09f64ab48b60021dc62159883f7acc10872276743a875ed151f2c9ff3a5f518ec56d78be889a9d3b16cfea1c82394d7f29d9460154120f665ee448a49171
-
Filesize
466KB
MD5ed52a4d38d95ca34e85c6d613cb0bc48
SHA1294c142198802b728f283d4c9159ae5d75e56bfc
SHA256ab7e79251d896ade55793c9fbf3f45673bd94a7d798e092a709208f4657db282
SHA512966f09f64ab48b60021dc62159883f7acc10872276743a875ed151f2c9ff3a5f518ec56d78be889a9d3b16cfea1c82394d7f29d9460154120f665ee448a49171
-
Filesize
899KB
MD50cf2c4d40e24e40ea1191e2e9e8175d6
SHA1d45e9bd05b245c9f8152f92adaed593247dac6d3
SHA256ffb5994ddbabbae91efca92051fed4296921df5fa75b90c1acf175e8c04926bb
SHA512d45826fe1ea25bcd791621117b1314452ef1f67760f0e444a5c4c2fe5aba5160632794713d08797ed27e682134b7eb85af4298189e87b3a4ff8484c66363633e
-
Filesize
899KB
MD50cf2c4d40e24e40ea1191e2e9e8175d6
SHA1d45e9bd05b245c9f8152f92adaed593247dac6d3
SHA256ffb5994ddbabbae91efca92051fed4296921df5fa75b90c1acf175e8c04926bb
SHA512d45826fe1ea25bcd791621117b1314452ef1f67760f0e444a5c4c2fe5aba5160632794713d08797ed27e682134b7eb85af4298189e87b3a4ff8484c66363633e
-
Filesize
899KB
MD50cf2c4d40e24e40ea1191e2e9e8175d6
SHA1d45e9bd05b245c9f8152f92adaed593247dac6d3
SHA256ffb5994ddbabbae91efca92051fed4296921df5fa75b90c1acf175e8c04926bb
SHA512d45826fe1ea25bcd791621117b1314452ef1f67760f0e444a5c4c2fe5aba5160632794713d08797ed27e682134b7eb85af4298189e87b3a4ff8484c66363633e
-
Filesize
899KB
MD50cf2c4d40e24e40ea1191e2e9e8175d6
SHA1d45e9bd05b245c9f8152f92adaed593247dac6d3
SHA256ffb5994ddbabbae91efca92051fed4296921df5fa75b90c1acf175e8c04926bb
SHA512d45826fe1ea25bcd791621117b1314452ef1f67760f0e444a5c4c2fe5aba5160632794713d08797ed27e682134b7eb85af4298189e87b3a4ff8484c66363633e
-
Filesize
899KB
MD50cf2c4d40e24e40ea1191e2e9e8175d6
SHA1d45e9bd05b245c9f8152f92adaed593247dac6d3
SHA256ffb5994ddbabbae91efca92051fed4296921df5fa75b90c1acf175e8c04926bb
SHA512d45826fe1ea25bcd791621117b1314452ef1f67760f0e444a5c4c2fe5aba5160632794713d08797ed27e682134b7eb85af4298189e87b3a4ff8484c66363633e
-
Filesize
899KB
MD50cf2c4d40e24e40ea1191e2e9e8175d6
SHA1d45e9bd05b245c9f8152f92adaed593247dac6d3
SHA256ffb5994ddbabbae91efca92051fed4296921df5fa75b90c1acf175e8c04926bb
SHA512d45826fe1ea25bcd791621117b1314452ef1f67760f0e444a5c4c2fe5aba5160632794713d08797ed27e682134b7eb85af4298189e87b3a4ff8484c66363633e
-
Filesize
899KB
MD50cf2c4d40e24e40ea1191e2e9e8175d6
SHA1d45e9bd05b245c9f8152f92adaed593247dac6d3
SHA256ffb5994ddbabbae91efca92051fed4296921df5fa75b90c1acf175e8c04926bb
SHA512d45826fe1ea25bcd791621117b1314452ef1f67760f0e444a5c4c2fe5aba5160632794713d08797ed27e682134b7eb85af4298189e87b3a4ff8484c66363633e