Heavily Detected .NET Backdoor Showing Strong Anti-Analysis Techniques


Zero‑Dwell Threat Intelligence Report

A narrative, executive‑ready view into the malware’s behavior, exposure, and reliable defenses.
Generated: 2025-12-16 07:06:49 UTC

Executive Overview — What We’re Dealing With

This specimen has persisted long enough to matter. Human experts classified it as Malware, and the telemetry confirms a capable, evasive Trojan with real impact potential.

File
HealingSystemChecker.exe
Type
Generic CIL Executable (.NET, Mono, etc.)
SHA‑1
449b27b49fb2718ba17fd84bf5ee67052b47c541
MD5
6b21dd90492bf6452f9b2d14a41d06d6
First Seen
2025-12-10 17:56:16.606661
Last Analysis
2025-12-10 20:05:08.474068
Dwell Time
0 days, 7 hours, 33 minutes

Extended Dwell Time Impact

For 2+ hours, this malware remained undetected — a limited but sufficient window for the adversary to complete initial execution and establish basic system access.

Comparative Context

Industry studies report a median dwell time closer to 21–24 days. This case represents rapid detection and containment within hours rather than days.

Timeline

Time (UTC) Event Elapsed
2025-10-07 17:35:08 UTC First VirusTotal submission
2025-12-14 19:48:11 UTC Latest analysis snapshot 68 days, 2 hours, 13 minutes
2025-12-16 07:06:49 UTC Report generation time 69 days, 13 hours, 31 minutes

Why It Matters

Every additional day of dwell time is not just an abstract number — it is attacker opportunity. Each day equates to more time for lateral movement, stealth persistence, and intelligence gathering.

Global Detection Posture — Who Caught It, Who Missed It

VirusTotal engines: 69. Detected as malicious: 55. Missed: 14. Coverage: 79.7%.

Detected Vendors

  • Xcitium
  • +54 additional vendors (names not provided)

List includes Xcitium plus an additional 54 vendors per the provided summary.

Missed Vendors

  • Acronis
  • Antiy-AVL
  • Baidu
  • CMC
  • Cynet
  • google_safebrowsing
  • Gridinsoft
  • SUPERAntiSpyware
  • TACHYON
  • tehtris
  • TrendMicro
  • Webroot
  • Yandex
  • Zoner

Why it matters: if any endpoint relies solely on a missed engine, this malware can operate with zero alerts. Prevention‑first controls close that gap regardless of signature lag.

Behavioral Storyline — How the Malware Operates

Intensive file system activity (49.33% of behavior) indicates data harvesting, file encryption, or dropper behavior. The threat is actively searching for and manipulating files across the system.

Behavior Categories (weighted)

Weight values represent the frequency and intensity of malware interactions with specific system components. Higher weights indicate more aggressive targeting of that category. Each operation (registry access, file modification, network connection, etc.) contributes to the category’s total weight, providing a quantitative measure of the malware’s behavioral focus.

Category Weight Percentage
File System 128713 49.33%
Synchronization 128173 49.12%
System 1851 0.71%
Registry 1616 0.62%
Com 238 0.09%
Process 213 0.08%
Misc 62 0.02%
Threading 54 0.02%
Device 16 0.01%
Services 4 0.00%
Hooking 3 0.00%
Crypto 2 0.00%
Windows 1 0.00%

MITRE ATT&CK Mapping

  • T1620 – load .NET assembly
  • T1082 – get hostname
  • T1083 – check if directory exists
  • T1140 – decode data using Base64 in .NET
  • T1012 – query or enumerate registry value
  • T1027 – encode data using Base64
  • T1620 – invoke .NET assembly method
  • T1112 – delete registry value
  • T1012 – query or enumerate registry key
  • T1222 – set file attributes
  • T1113 – capture screenshot
  • T1033 – get session user name
  • T1087 – get session user name
  • T1033 – get session integrity level
  • T1083 – get common file path
  • T1082 – get number of processors
  • T1047 – access WMI data in .NET
  • T1083 – check if file exists

Following the Trail — Network & DNS Activity

Outbound activity leans on reputable infrastructure (e.g., CDNs, cloud endpoints) to blend in. TLS sessions and
HTTP calls show routine beaconing and IP‑lookup behavior that can masquerade as normal browsing.

Contacted Domains

Domain IP Country ASN/Org
www.aieov.com 76.223.54.146 United States Amazon.com, Inc.
www.msftncsi.com 23.200.3.82 United States Akamai Technologies, Inc.

Observed IPs

IP Country ASN/Org
224.0.0.252
239.255.255.250
8.8.4.4 United States Google LLC
8.8.8.8 United States Google LLC

DNS Queries

Request Type
5isohu.com A
www.msftncsi.com A
www.aieov.com A

Contacted IPs

IP Country ASN/Org
224.0.0.252
239.255.255.250
8.8.4.4 United States Google LLC
8.8.8.8 United States Google LLC

Port Distribution

Port Count Protocols
137 1 udp
138 1 udp
5355 6 udp
53 50 udp
3702 1 udp

UDP Packets

Source IP Dest IP Sport Dport Time Proto
192.168.56.13 192.168.56.255 137 137 3.238157033920288 udp
192.168.56.13 192.168.56.255 138 138 9.238096952438354 udp
192.168.56.13 224.0.0.252 49311 5355 5.723545074462891 udp
192.168.56.13 224.0.0.252 55150 5355 3.1671600341796875 udp
192.168.56.13 224.0.0.252 58920 5355 97.31625509262085 udp
192.168.56.13 224.0.0.252 60010 5355 5.177833080291748 udp
192.168.56.13 224.0.0.252 62406 5355 3.1722140312194824 udp
192.168.56.13 224.0.0.252 63527 5355 3.8109629154205322 udp
192.168.56.13 239.255.255.250 52252 3702 3.1757540702819824 udp
192.168.56.13 8.8.4.4 50554 53 127.28548192977905 udp
192.168.56.13 8.8.4.4 53518 53 221.89487195014954 udp
192.168.56.13 8.8.4.4 53985 53 345.3163950443268 udp
192.168.56.13 8.8.4.4 54879 53 7.738600969314575 udp
192.168.56.13 8.8.4.4 54881 53 6.380040884017944 udp
192.168.56.13 8.8.4.4 55551 53 160.08205795288086 udp
192.168.56.13 8.8.4.4 55743 53 330.8482620716095 udp
192.168.56.13 8.8.4.4 56086 53 302.03517603874207 udp
192.168.56.13 8.8.4.4 56197 53 145.67524099349976 udp
192.168.56.13 8.8.4.4 56908 53 359.722177028656 udp
192.168.56.13 8.8.4.4 57065 53 240.28772592544556 udp
192.168.56.13 8.8.4.4 57310 53 65.51938104629517 udp
192.168.56.13 8.8.4.4 57415 53 80.03503894805908 udp
192.168.56.13 8.8.4.4 58697 53 21.925452947616577 udp
192.168.56.13 8.8.4.4 59610 53 269.2222189903259 udp
192.168.56.13 8.8.4.4 60543 53 207.3948049545288 udp
192.168.56.13 8.8.4.4 60780 53 287.6130290031433 udp
192.168.56.13 8.8.4.4 60910 53 98.4252610206604 udp
192.168.56.13 8.8.4.4 61004 53 174.58224606513977 udp
192.168.56.13 8.8.4.4 61800 53 316.53509306907654 udp
192.168.56.13 8.8.4.4 62493 53 51.082133054733276 udp
192.168.56.13 8.8.4.4 62849 53 36.33191704750061 udp
192.168.56.13 8.8.4.4 64533 53 192.97205305099487 udp
192.168.56.13 8.8.4.4 64801 53 112.84772801399231 udp
192.168.56.13 8.8.4.4 64886 53 254.72329592704773 udp
192.168.56.13 8.8.8.8 50554 53 126.28605604171753 udp
192.168.56.13 8.8.8.8 53518 53 220.8943738937378 udp
192.168.56.13 8.8.8.8 53985 53 344.31667399406433 udp
192.168.56.13 8.8.8.8 54879 53 8.737788915634155 udp
192.168.56.13 8.8.8.8 54881 53 7.378889083862305 udp
192.168.56.13 8.8.8.8 55551 53 159.08341598510742 udp
192.168.56.13 8.8.8.8 55743 53 329.84827494621277 udp
192.168.56.13 8.8.8.8 56086 53 301.0353810787201 udp
192.168.56.13 8.8.8.8 56197 53 144.67604303359985 udp
192.168.56.13 8.8.8.8 56908 53 358.72253489494324 udp
192.168.56.13 8.8.8.8 57065 53 239.28624200820923 udp
192.168.56.13 8.8.8.8 57310 53 64.51915287971497 udp
192.168.56.13 8.8.8.8 57415 53 79.03582286834717 udp
192.168.56.13 8.8.8.8 58697 53 20.939023971557617 udp
192.168.56.13 8.8.8.8 59610 53 268.22265005111694 udp
192.168.56.13 8.8.8.8 60543 53 206.39433789253235 udp
192.168.56.13 8.8.8.8 60780 53 286.61363697052 udp
192.168.56.13 8.8.8.8 60910 53 97.42582607269287 udp
192.168.56.13 8.8.8.8 61004 53 173.5822970867157 udp
192.168.56.13 8.8.8.8 61800 53 315.5350320339203 udp
192.168.56.13 8.8.8.8 62493 53 50.08207392692566 udp
192.168.56.13 8.8.8.8 62849 53 35.33341908454895 udp
192.168.56.13 8.8.8.8 64533 53 191.97279500961304 udp
192.168.56.13 8.8.8.8 64801 53 111.84848809242249 udp
192.168.56.13 8.8.8.8 64886 53 253.72309494018555 udp

Hunting tip: alert on unknown binaries initiating TLS to IP‑lookup services or unusual CDN endpoints — especially early in execution.

Persistence & Policy — Registry and Services

Registry and service telemetry points to policy awareness and environment reconnaissance rather than noisy persistence. Below is a compact view of the most relevant keys and handles; expand to see the full lists where available.

Registry Opened

71

Registry Set

0

Services Started

0

Services Opened

0

Registry Opened (Top 25)

Key
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DevOverrideEnable
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Xml__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\v4.0.30319\SKUs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\DisableConfigCache
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.10.0.Microsoft.JScript__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32\0x0
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\FeatureSIMD
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\LoggingLevel
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Management__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\EnablePrivateObjectHeap
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\Policy\Servicing
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\Policy\v4.0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319\WMIDisableCOMSecurity
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\ObjectLimit
HKEY_CLASSES_ROOT\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\LogFailures
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\DisableMSIPeek
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\NGen\Policy\v4.0
HKEY_CURRENT_USER\Software\Microsoft\.NETFramework\Policy\Standards
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\UseLegacyV2RuntimeActivationPolicyDefaultValue
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\Release
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\LegacyPolicyTimeStamp
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Configuration__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\IdentifierLimit
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Management__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\Latest
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\OnlyUseLatestCLR
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\AppContext
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\UseLegacyIdentityFormat
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\5e51cb019bd67162fa9bf7ec460b91f47873aeae016f5d2355e3c64000a7ff54-dropped.bin.exe
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Xml__b77a5c561934e089
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\DownloadCacheQuotaInKB
HKEY_CLASSES_ROOT\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\CLRLoadLogDir
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\ProcessID
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default
HKEY_CLASSES_ROOT\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32\0x0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\ContextLimit
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\FileInUseRetryAttempts
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\UseRyuJIT
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\InstallRoot
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System__b77a5c561934e089
Show all (71 total)
Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319
HKEY_CLASSES_ROOT\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32\0x0
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\Policy\Standards\v4.0.30319
HKEY_LOCAL_MACHINE\Software\Microsoft\StrongName
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\Policy
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\CacheLocation
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.10.0.Microsoft.JScript__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Configuration__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\index9
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\FileInUseMillisecondsBetweenRetries
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\Policy\APTCA
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\ForceLog
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fusion\NoClientChecks
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\EnableLog
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\NGen\Policy\v4.0\OptimizeUsedBinaries
HKEY_LOCAL_MACHINE\Software\Microsoft\.NETFramework\v4.0.30319\SKUs\default
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32\0x0
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\v4.0_policy.4.0.System.Configuration.Install__b03f5f7f11d50a3a
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\LogResourceBinds
HKEY_LOCAL_MACHINE\Software\Microsoft\Fusion\PublisherPolicy\Default\policy.4.0.System.Configuration.Install__b03f5f7f11d50a3a

Registry Set (Top 25)

Services Started (Top 15)

Services Opened (Top 15)

What To Do Now — Practical Defense Playbook

  • Contain unknowns: block first‑run binaries by default — signatures catch up, containment works now.
  • EDR controls: alert on keyboard hooks, screen capture APIs, VM/sandbox checks, and command‑shell launches.
  • Registry watch: flag queries/sets under policy paths (e.g., …\FipsAlgorithmPolicy\*).
  • Network rules: inspect outbound TLS to IP‑lookup services and unexpected CDN endpoints.
  • Hunt broadly: sweep endpoints for the indicators above and quarantine positives immediately.

Dwell time equals attacker opportunity. Reducing execution privileges and egress shrinks that window even when vendors disagree.

Scroll to Top