Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 00:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe
Resource
win7-20240611-en
windows7-x64
8 signatures
150 seconds
General
-
Target
9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe
-
Size
213KB
-
MD5
65137ec382edef42ab1b9d2af33e2c0f
-
SHA1
1dfbd39b301620f9e774e8d0487aaf8e025222bb
-
SHA256
9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4
-
SHA512
cbbbc94dddb8cfe64108a84b6f4e887130a245161a3eb884c4995d810a01b88e3f68184d05807536f6501ce437942f500b168753e87abfb37a83e94a93f8a662
-
SSDEEP
6144:oPtiKL/yfYb5B+BO99c0s0ZVtAOOgufEE9:At//yfYb5BIQZVtUpx9
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 5 IoCs
resource yara_rule behavioral1/memory/2152-5-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2152-3-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2152-2-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2152-7-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/2152-9-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 5 IoCs
resource yara_rule behavioral1/memory/2152-5-0x0000000000400000-0x000000000040A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2152-3-0x0000000000400000-0x000000000040A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2152-2-0x0000000000400000-0x000000000040A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2152-7-0x0000000000400000-0x000000000040A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2152-9-0x0000000000400000-0x000000000040A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2764 set thread context of 2152 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 30 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2152 AppLaunch.exe 2152 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2152 AppLaunch.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2004 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 29 PID 2764 wrote to memory of 2004 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 29 PID 2764 wrote to memory of 2004 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 29 PID 2764 wrote to memory of 2004 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 29 PID 2764 wrote to memory of 2004 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 29 PID 2764 wrote to memory of 2004 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 29 PID 2764 wrote to memory of 2004 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 29 PID 2764 wrote to memory of 2152 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 30 PID 2764 wrote to memory of 2152 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 30 PID 2764 wrote to memory of 2152 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 30 PID 2764 wrote to memory of 2152 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 30 PID 2764 wrote to memory of 2152 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 30 PID 2764 wrote to memory of 2152 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 30 PID 2764 wrote to memory of 2152 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 30 PID 2764 wrote to memory of 2152 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 30 PID 2764 wrote to memory of 2152 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 30 PID 2764 wrote to memory of 2152 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 30 PID 2764 wrote to memory of 2152 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 30 PID 2764 wrote to memory of 2152 2764 9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe"C:\Users\Admin\AppData\Local\Temp\9ad49977ef65476a7c03f8f44cefc8a80da08425d1ee51b87aca9c0004eb1fa4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152
-