Analysis
-
max time kernel
92s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 00:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b1fa9ca13ac7308f7110dba6ad991a769ab99d32d3c12dac47f2f8d9f82911bdN.exe
Resource
win7-20240708-en
8 signatures
120 seconds
General
-
Target
b1fa9ca13ac7308f7110dba6ad991a769ab99d32d3c12dac47f2f8d9f82911bdN.exe
-
Size
360KB
-
MD5
6d9a9f94a521944dbaadd86f8986bf60
-
SHA1
476e2c5e3b5a5c41ca2f1f07b025813e9ec3e817
-
SHA256
b1fa9ca13ac7308f7110dba6ad991a769ab99d32d3c12dac47f2f8d9f82911bd
-
SHA512
12c51ca869017db68588a0b473b434b08fe9145379782edeecdd51c93fca283cae8bc6e9b3cb75f9b27a52ca644c1aaf89925c3b8353a8f58d4ec0f554fc9f3d
-
SSDEEP
6144:sTE19tF67l53WAB8I/o14y+PRgyRNy4p/8Emt:QE3tS9Bob+tI3N
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral2/memory/3672-5-0x0000000002490000-0x00000000024AA000-memory.dmp healer behavioral2/memory/3672-7-0x0000000002740000-0x0000000002758000-memory.dmp healer behavioral2/memory/3672-21-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral2/memory/3672-31-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral2/memory/3672-35-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral2/memory/3672-33-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral2/memory/3672-29-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral2/memory/3672-27-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral2/memory/3672-25-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral2/memory/3672-23-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral2/memory/3672-19-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral2/memory/3672-18-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral2/memory/3672-15-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral2/memory/3672-13-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral2/memory/3672-11-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral2/memory/3672-9-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral2/memory/3672-8-0x0000000002740000-0x0000000002752000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b1fa9ca13ac7308f7110dba6ad991a769ab99d32d3c12dac47f2f8d9f82911bdN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b1fa9ca13ac7308f7110dba6ad991a769ab99d32d3c12dac47f2f8d9f82911bdN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection b1fa9ca13ac7308f7110dba6ad991a769ab99d32d3c12dac47f2f8d9f82911bdN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b1fa9ca13ac7308f7110dba6ad991a769ab99d32d3c12dac47f2f8d9f82911bdN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b1fa9ca13ac7308f7110dba6ad991a769ab99d32d3c12dac47f2f8d9f82911bdN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b1fa9ca13ac7308f7110dba6ad991a769ab99d32d3c12dac47f2f8d9f82911bdN.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features b1fa9ca13ac7308f7110dba6ad991a769ab99d32d3c12dac47f2f8d9f82911bdN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b1fa9ca13ac7308f7110dba6ad991a769ab99d32d3c12dac47f2f8d9f82911bdN.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3660 3672 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1fa9ca13ac7308f7110dba6ad991a769ab99d32d3c12dac47f2f8d9f82911bdN.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3672 b1fa9ca13ac7308f7110dba6ad991a769ab99d32d3c12dac47f2f8d9f82911bdN.exe 3672 b1fa9ca13ac7308f7110dba6ad991a769ab99d32d3c12dac47f2f8d9f82911bdN.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3672 b1fa9ca13ac7308f7110dba6ad991a769ab99d32d3c12dac47f2f8d9f82911bdN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1fa9ca13ac7308f7110dba6ad991a769ab99d32d3c12dac47f2f8d9f82911bdN.exe"C:\Users\Admin\AppData\Local\Temp\b1fa9ca13ac7308f7110dba6ad991a769ab99d32d3c12dac47f2f8d9f82911bdN.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 9482⤵
- Program crash
PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3672 -ip 36721⤵PID:3568