Analysis
-
max time kernel
146s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 23:01
Static task
static1
Behavioral task
behavioral1
Sample
51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe
Resource
win7-20241010-en
General
-
Target
51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe
-
Size
121KB
-
MD5
001a39ec1f3a1b62304d3c015d8c90c7
-
SHA1
226ff896916f352b108c2120dd94728ef42ef8df
-
SHA256
51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7
-
SHA512
2a0fe4ef1ac4049835aa2e22b0be68ae87ff5803867f7ecbf16433a1a55b6b26afe2dc8c397441fa80c9e44445da4793236e9bb82afaa4e8d1c57ee505ecccc9
-
SSDEEP
3072:h9QLdsON8xxwaTq29LzLAGtrLfWvX8oyhuWVFrag1shbortvx:3QLvN8VTjAGtoWVFmZhUrt
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4228-1-0x0000000000540000-0x000000000054A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" AppLaunch.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" AppLaunch.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4192 set thread context of 4228 4192 51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe 85 -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 628 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4604 4192 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4228 AppLaunch.exe 4228 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4228 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4192 wrote to memory of 4228 4192 51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe 85 PID 4192 wrote to memory of 4228 4192 51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe 85 PID 4192 wrote to memory of 4228 4192 51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe 85 PID 4192 wrote to memory of 4228 4192 51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe 85 PID 4192 wrote to memory of 4228 4192 51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe"C:\Users\Admin\AppData\Local\Temp\51a526999eec9ac9fc1a55f48e2eb6936c80bf130dfd8423b4d05b87fccb60b7.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 1562⤵
- Program crash
PID:4604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4192 -ip 41921⤵PID:2444
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:628