Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230824-en
  • resource tags

    arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2023, 04:37

General

  • Target

    z3081707.exe

  • Size

    217KB

  • MD5

    b428d9e050841623c55a4b5522578a9f

  • SHA1

    7edd24eb1811a6998bc7adec9f1ab99f343ba3c9

  • SHA256

    b2c7059861e84bbbd4aa1d06b7da8c804928aa6e0f5421afc6fa434a0e3e9cad

  • SHA512

    d0c01a428bfc9fcbea6a4c50d412d0e4d73b885c6808e136f2e0c5fe47f5321d0b565cfa68d1f27731543e40e9996389ba54b38614be802c876eb3c08fb4453d

  • SSDEEP

    3072:K3y+bnr+O1f5GWp1icKAArDZz4N9GhbkrNEk1XaLgZhjOOdjiJ5rIFktI4TxKFXL:K3y+bnr+8p0yN90QEib6dIFktImBIAK

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\z3081707.exe
    "C:\Users\Admin\AppData\Local\Temp\z3081707.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2892
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\q9406253.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\q9406253.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1364
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r8133859.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r8133859.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\q9406253.exe

    Filesize

    13KB

    MD5

    d920ccff55709346e718df460557ce7d

    SHA1

    cb28db460556747e480f6ef8ea01d6ef6b27f55b

    SHA256

    322e1bb05e211a3c0278bbc4adc4d3bc604265c53a65d52edf22b578fa4dd1ef

    SHA512

    98be952217d1038bc718bead06b373bebd911abd73aa215c5838e56bdbf7ce374c6e325bdfc6ea29ab6811e097e925da93b8fc9ae1979049c6123f26ab7710ba

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\q9406253.exe

    Filesize

    13KB

    MD5

    d920ccff55709346e718df460557ce7d

    SHA1

    cb28db460556747e480f6ef8ea01d6ef6b27f55b

    SHA256

    322e1bb05e211a3c0278bbc4adc4d3bc604265c53a65d52edf22b578fa4dd1ef

    SHA512

    98be952217d1038bc718bead06b373bebd911abd73aa215c5838e56bdbf7ce374c6e325bdfc6ea29ab6811e097e925da93b8fc9ae1979049c6123f26ab7710ba

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r8133859.exe

    Filesize

    140KB

    MD5

    33c30cdfd58a0f8fb2a69817114801c6

    SHA1

    fc42aba6725fef4a19c2e51b06fefb3583e1fca9

    SHA256

    9affd2f3cb4ce48e9c45fd2181633313d799ee2cb9df7170e0d5c49b31e256e5

    SHA512

    1cf95e29ae2640972636404e91097a0646185908f7a7c08b962cddb030575a4be87a86e005b5e078ddc1aca1ef8402a966178dfbc6b0fe5a495c730e2fb433da

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r8133859.exe

    Filesize

    140KB

    MD5

    33c30cdfd58a0f8fb2a69817114801c6

    SHA1

    fc42aba6725fef4a19c2e51b06fefb3583e1fca9

    SHA256

    9affd2f3cb4ce48e9c45fd2181633313d799ee2cb9df7170e0d5c49b31e256e5

    SHA512

    1cf95e29ae2640972636404e91097a0646185908f7a7c08b962cddb030575a4be87a86e005b5e078ddc1aca1ef8402a966178dfbc6b0fe5a495c730e2fb433da

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\q9406253.exe

    Filesize

    13KB

    MD5

    d920ccff55709346e718df460557ce7d

    SHA1

    cb28db460556747e480f6ef8ea01d6ef6b27f55b

    SHA256

    322e1bb05e211a3c0278bbc4adc4d3bc604265c53a65d52edf22b578fa4dd1ef

    SHA512

    98be952217d1038bc718bead06b373bebd911abd73aa215c5838e56bdbf7ce374c6e325bdfc6ea29ab6811e097e925da93b8fc9ae1979049c6123f26ab7710ba

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\r8133859.exe

    Filesize

    140KB

    MD5

    33c30cdfd58a0f8fb2a69817114801c6

    SHA1

    fc42aba6725fef4a19c2e51b06fefb3583e1fca9

    SHA256

    9affd2f3cb4ce48e9c45fd2181633313d799ee2cb9df7170e0d5c49b31e256e5

    SHA512

    1cf95e29ae2640972636404e91097a0646185908f7a7c08b962cddb030575a4be87a86e005b5e078ddc1aca1ef8402a966178dfbc6b0fe5a495c730e2fb433da

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\r8133859.exe

    Filesize

    140KB

    MD5

    33c30cdfd58a0f8fb2a69817114801c6

    SHA1

    fc42aba6725fef4a19c2e51b06fefb3583e1fca9

    SHA256

    9affd2f3cb4ce48e9c45fd2181633313d799ee2cb9df7170e0d5c49b31e256e5

    SHA512

    1cf95e29ae2640972636404e91097a0646185908f7a7c08b962cddb030575a4be87a86e005b5e078ddc1aca1ef8402a966178dfbc6b0fe5a495c730e2fb433da

  • memory/1364-8-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

    Filesize

    9.9MB

  • memory/1364-9-0x0000000000280000-0x000000000028A000-memory.dmp

    Filesize

    40KB

  • memory/1364-10-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

    Filesize

    9.9MB

  • memory/1364-11-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

    Filesize

    9.9MB