Analysis

  • max time kernel
    131s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-06-2024 22:00

General

  • Target

    5b59b48f0a2ced9ede68f7a63000d78b0504da16801d0498728e033d3cd3c6d7.exe

  • Size

    282KB

  • MD5

    1874f89dbe2a3164c41df05b2a5e692e

  • SHA1

    fa350e3d9c5f20f2397bd773109f2c9c13d0c1b9

  • SHA256

    5b59b48f0a2ced9ede68f7a63000d78b0504da16801d0498728e033d3cd3c6d7

  • SHA512

    2a9297bb25855073d7d7c1d0198adce40169f8203989a7e2e5a48573b35bb9354c59e6ba2cf64c44fd42790b30cab99f576c8894072de76fee7dcfd10a508a3a

  • SSDEEP

    3072:1wgBVdMoVJuQDO11uUEPdNKT+s25XEdygR8LojR+2dzvPgOp95C6beNvxb:egdMCLSEPdN51EdytqzdzJS6beNv

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 17 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b59b48f0a2ced9ede68f7a63000d78b0504da16801d0498728e033d3cd3c6d7.exe
    "C:\Users\Admin\AppData\Local\Temp\5b59b48f0a2ced9ede68f7a63000d78b0504da16801d0498728e033d3cd3c6d7.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Windows security modification
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2712
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 952
      2⤵
      • Program crash
      PID:1892
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2712 -ip 2712
    1⤵
      PID:4872
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:4176

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2712-2-0x00000000005B0000-0x00000000005DD000-memory.dmp

      Filesize

      180KB

    • memory/2712-1-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2712-3-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2712-4-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/2712-5-0x0000000002390000-0x00000000023AA000-memory.dmp

      Filesize

      104KB

    • memory/2712-6-0x0000000004BB0000-0x0000000005154000-memory.dmp

      Filesize

      5.6MB

    • memory/2712-7-0x00000000025D0000-0x00000000025E8000-memory.dmp

      Filesize

      96KB

    • memory/2712-35-0x00000000025D0000-0x00000000025E3000-memory.dmp

      Filesize

      76KB

    • memory/2712-33-0x00000000025D0000-0x00000000025E3000-memory.dmp

      Filesize

      76KB

    • memory/2712-31-0x00000000025D0000-0x00000000025E3000-memory.dmp

      Filesize

      76KB

    • memory/2712-29-0x00000000025D0000-0x00000000025E3000-memory.dmp

      Filesize

      76KB

    • memory/2712-27-0x00000000025D0000-0x00000000025E3000-memory.dmp

      Filesize

      76KB

    • memory/2712-25-0x00000000025D0000-0x00000000025E3000-memory.dmp

      Filesize

      76KB

    • memory/2712-23-0x00000000025D0000-0x00000000025E3000-memory.dmp

      Filesize

      76KB

    • memory/2712-21-0x00000000025D0000-0x00000000025E3000-memory.dmp

      Filesize

      76KB

    • memory/2712-19-0x00000000025D0000-0x00000000025E3000-memory.dmp

      Filesize

      76KB

    • memory/2712-17-0x00000000025D0000-0x00000000025E3000-memory.dmp

      Filesize

      76KB

    • memory/2712-15-0x00000000025D0000-0x00000000025E3000-memory.dmp

      Filesize

      76KB

    • memory/2712-13-0x00000000025D0000-0x00000000025E3000-memory.dmp

      Filesize

      76KB

    • memory/2712-11-0x00000000025D0000-0x00000000025E3000-memory.dmp

      Filesize

      76KB

    • memory/2712-9-0x00000000025D0000-0x00000000025E3000-memory.dmp

      Filesize

      76KB

    • memory/2712-8-0x00000000025D0000-0x00000000025E3000-memory.dmp

      Filesize

      76KB

    • memory/2712-40-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2712-39-0x00000000005B0000-0x00000000005DD000-memory.dmp

      Filesize

      180KB

    • memory/2712-38-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB