Analysis
-
max time kernel
91s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 04:11
Static task
static1
Behavioral task
behavioral1
Sample
c80a7c9f711f25d6618ba385dde2515313acfe1b573bec067b0cc8a5f0453f0dN.exe
Resource
win7-20241010-en
General
-
Target
c80a7c9f711f25d6618ba385dde2515313acfe1b573bec067b0cc8a5f0453f0dN.exe
-
Size
295KB
-
MD5
02a8d30e926df56a9cb8a5858dc3dd30
-
SHA1
cd379b7a853f2c538a62b3af6ec27b11fb9f952e
-
SHA256
c80a7c9f711f25d6618ba385dde2515313acfe1b573bec067b0cc8a5f0453f0d
-
SHA512
9450782815243b353dd4989064f86b2ea07c8f42df8f28917a020605ce8d1bb64113daf6b8897436d8f1393ae1b74f48f4b525476a30760c509f407104bac0e6
-
SSDEEP
3072:SZ7HjoCTZXT3uq7AmjWCXeZeHhVURa7sMc+Z+pBAkKtrrmJ4DQENIv8kc8+c0bJf:iFdruq7om2a7sHlWtrHDQGIv8kc8ex
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral2/memory/4084-4-0x0000000004A10000-0x0000000004A2A000-memory.dmp healer behavioral2/memory/4084-7-0x0000000004D90000-0x0000000004DA8000-memory.dmp healer behavioral2/memory/4084-27-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral2/memory/4084-31-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral2/memory/4084-35-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral2/memory/4084-33-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral2/memory/4084-30-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral2/memory/4084-23-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral2/memory/4084-21-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral2/memory/4084-19-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral2/memory/4084-17-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral2/memory/4084-15-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral2/memory/4084-13-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral2/memory/4084-11-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral2/memory/4084-9-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral2/memory/4084-8-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral2/memory/4084-25-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c80a7c9f711f25d6618ba385dde2515313acfe1b573bec067b0cc8a5f0453f0dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c80a7c9f711f25d6618ba385dde2515313acfe1b573bec067b0cc8a5f0453f0dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c80a7c9f711f25d6618ba385dde2515313acfe1b573bec067b0cc8a5f0453f0dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c80a7c9f711f25d6618ba385dde2515313acfe1b573bec067b0cc8a5f0453f0dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c80a7c9f711f25d6618ba385dde2515313acfe1b573bec067b0cc8a5f0453f0dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c80a7c9f711f25d6618ba385dde2515313acfe1b573bec067b0cc8a5f0453f0dN.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c80a7c9f711f25d6618ba385dde2515313acfe1b573bec067b0cc8a5f0453f0dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c80a7c9f711f25d6618ba385dde2515313acfe1b573bec067b0cc8a5f0453f0dN.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4368 4084 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c80a7c9f711f25d6618ba385dde2515313acfe1b573bec067b0cc8a5f0453f0dN.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4084 c80a7c9f711f25d6618ba385dde2515313acfe1b573bec067b0cc8a5f0453f0dN.exe 4084 c80a7c9f711f25d6618ba385dde2515313acfe1b573bec067b0cc8a5f0453f0dN.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4084 c80a7c9f711f25d6618ba385dde2515313acfe1b573bec067b0cc8a5f0453f0dN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c80a7c9f711f25d6618ba385dde2515313acfe1b573bec067b0cc8a5f0453f0dN.exe"C:\Users\Admin\AppData\Local\Temp\c80a7c9f711f25d6618ba385dde2515313acfe1b573bec067b0cc8a5f0453f0dN.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 9522⤵
- Program crash
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4084 -ip 40841⤵PID:2852