Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05-02-2025 23:01
Static task
static1
Behavioral task
behavioral1
Sample
51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe
Resource
win7-20241010-en
12 signatures
150 seconds
General
-
Target
51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe
-
Size
121KB
-
MD5
001a39ec1f3a1b62304d3c015d8c90c7
-
SHA1
226ff896916f352b108c2120dd94728ef42ef8df
-
SHA256
51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7
-
SHA512
2a0fe4ef1ac4049835aa2e22b0be68ae87ff5803867f7ecbf16433a1a55b6b26afe2dc8c397441fa80c9e44445da4793236e9bb82afaa4e8d1c57ee505ecccc9
-
SSDEEP
3072:h9QLdsON8xxwaTq29LzLAGtrLfWvX8oyhuWVFrag1shbortvx:3QLvN8VTjAGtoWVFmZhUrt
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/792-3-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/792-9-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/792-10-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" AppLaunch.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" AppLaunch.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2328 set thread context of 792 2328 51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 792 AppLaunch.exe 792 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 792 AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2328 wrote to memory of 792 2328 51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe 32 PID 2328 wrote to memory of 792 2328 51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe 32 PID 2328 wrote to memory of 792 2328 51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe 32 PID 2328 wrote to memory of 792 2328 51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe 32 PID 2328 wrote to memory of 792 2328 51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe 32 PID 2328 wrote to memory of 792 2328 51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe 32 PID 2328 wrote to memory of 792 2328 51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe 32 PID 2328 wrote to memory of 792 2328 51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe 32 PID 2328 wrote to memory of 792 2328 51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe"C:\Users\Admin\AppData\Local\Temp\51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:792
-