Analysis

  • max time kernel
    117s
  • max time network
    127s
  • platform
    windows10-1703_x64
  • resource
    win10-20230831-en
  • resource tags

    arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/09/2023, 01:33

General

  • Target

    4270a3459505c9160acb66a6e8b4dc16454f29eead58d18262be263907f60ad6.exe

  • Size

    1.3MB

  • MD5

    bf2c81231c283e0320777303c6194c4c

  • SHA1

    1c8d2bf7569db96b5cca5dfb26543a3a9619b5b4

  • SHA256

    4270a3459505c9160acb66a6e8b4dc16454f29eead58d18262be263907f60ad6

  • SHA512

    13b1a6941b1b5f240cffd5033f1046070948b77efa6ac5e0f89f28437e103e2cb9fa97759c1b6b7448f65ff55f911aaf06d9b4e87bca53f60aea891da7fe4779

  • SSDEEP

    24576:4yQtuIxxMSMkayWY8fllnwPacTpdgKsYF9AzOIvH/y/UV39k:/ar6Zyki1dgSF2/yU

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4270a3459505c9160acb66a6e8b4dc16454f29eead58d18262be263907f60ad6.exe
    "C:\Users\Admin\AppData\Local\Temp\4270a3459505c9160acb66a6e8b4dc16454f29eead58d18262be263907f60ad6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3708
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6225293.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6225293.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6718746.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6718746.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3672
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0217463.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0217463.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:432
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7895525.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7895525.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:372
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0778415.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0778415.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2320
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:4280
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 568
                  7⤵
                  • Program crash
                  PID:1744
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 576
                6⤵
                • Program crash
                PID:4084

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6225293.exe

            Filesize

            1.2MB

            MD5

            d5ac42a3b47339decf2b69ba2fc067c6

            SHA1

            456e53858e24791e83d6a5e9f550b66346aa1ea2

            SHA256

            7d869a1b722c3ae814f857370cac4047d2f20a8290e324485777799c6a610fc5

            SHA512

            2cc050abea6cd6c08a4ad489ebd084b86842aa4d18c2bf5a40a2372036c1b5f3227108c52880903eba3e1aed837094c75710abe702aef0f65bc7ad3bd800a9f6

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6225293.exe

            Filesize

            1.2MB

            MD5

            d5ac42a3b47339decf2b69ba2fc067c6

            SHA1

            456e53858e24791e83d6a5e9f550b66346aa1ea2

            SHA256

            7d869a1b722c3ae814f857370cac4047d2f20a8290e324485777799c6a610fc5

            SHA512

            2cc050abea6cd6c08a4ad489ebd084b86842aa4d18c2bf5a40a2372036c1b5f3227108c52880903eba3e1aed837094c75710abe702aef0f65bc7ad3bd800a9f6

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6718746.exe

            Filesize

            836KB

            MD5

            b126b7dc19491fe4e4749b1cf5ae87c8

            SHA1

            53919205e0d7ed29c84dc95e3e048eaea132447f

            SHA256

            20ef7d4b3f0940dae99be06e8371635670e6de1fb764e03af0e2100cdfc1cf7b

            SHA512

            ae70845e4d941be03712beb390cf9467f40508eedbd9d88865f7c361696564d8602b0e2e1dc6679c88d0f97bd7aa34ed36701fd85bdaef4bdac0664c01f1c6df

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6718746.exe

            Filesize

            836KB

            MD5

            b126b7dc19491fe4e4749b1cf5ae87c8

            SHA1

            53919205e0d7ed29c84dc95e3e048eaea132447f

            SHA256

            20ef7d4b3f0940dae99be06e8371635670e6de1fb764e03af0e2100cdfc1cf7b

            SHA512

            ae70845e4d941be03712beb390cf9467f40508eedbd9d88865f7c361696564d8602b0e2e1dc6679c88d0f97bd7aa34ed36701fd85bdaef4bdac0664c01f1c6df

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0217463.exe

            Filesize

            475KB

            MD5

            3fb5ef7421dda27b814e538729d6dc1b

            SHA1

            b225e58d426251ef7b0dd421a1735de7ab2eaad5

            SHA256

            af29490959a8a856b501216a8621f5d0231d08697b246ba339c108ab55fefae5

            SHA512

            cb3a6e6b288908cdd644f9eb472240af0d1ae575f457c85df5885490211673a23e501f14c76d875b06099677bd5ea3eae86e5b19f03acde163c282a8e6a3b25b

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0217463.exe

            Filesize

            475KB

            MD5

            3fb5ef7421dda27b814e538729d6dc1b

            SHA1

            b225e58d426251ef7b0dd421a1735de7ab2eaad5

            SHA256

            af29490959a8a856b501216a8621f5d0231d08697b246ba339c108ab55fefae5

            SHA512

            cb3a6e6b288908cdd644f9eb472240af0d1ae575f457c85df5885490211673a23e501f14c76d875b06099677bd5ea3eae86e5b19f03acde163c282a8e6a3b25b

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7895525.exe

            Filesize

            11KB

            MD5

            0965d53b8bba0d2e35e751fb24194369

            SHA1

            7ed84fe0934fcff573047620e6a455728f8192fe

            SHA256

            c69356cc8f56505631537ed4c342fe4652c56cd9e0f85717501167b66e24c8d9

            SHA512

            6d8f5c6ab27d14c57af3db37e40023f1fd8ee436bb5b41cad5f2764d3baa014bf156e64206cd94675239678a4b7e2af433feea997bef49bbd4f70caf6053af62

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7895525.exe

            Filesize

            11KB

            MD5

            0965d53b8bba0d2e35e751fb24194369

            SHA1

            7ed84fe0934fcff573047620e6a455728f8192fe

            SHA256

            c69356cc8f56505631537ed4c342fe4652c56cd9e0f85717501167b66e24c8d9

            SHA512

            6d8f5c6ab27d14c57af3db37e40023f1fd8ee436bb5b41cad5f2764d3baa014bf156e64206cd94675239678a4b7e2af433feea997bef49bbd4f70caf6053af62

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0778415.exe

            Filesize

            1.0MB

            MD5

            055103fa9162ab11eab401f3c0ac7015

            SHA1

            a718462f2bd63577a3ff744ae5771036bf80fdf4

            SHA256

            bc7ddaa36476da68cec413fb728ef64981940fe3327782916c27be814a33e491

            SHA512

            17b8ceb908f23f6b6903a7a1c892f0641a8a70490164baf9a83933238aafd624acaefb9555a548bf03e9a8c684c6abe3fff4937a876b895f66f79cc5f7098d2f

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0778415.exe

            Filesize

            1.0MB

            MD5

            055103fa9162ab11eab401f3c0ac7015

            SHA1

            a718462f2bd63577a3ff744ae5771036bf80fdf4

            SHA256

            bc7ddaa36476da68cec413fb728ef64981940fe3327782916c27be814a33e491

            SHA512

            17b8ceb908f23f6b6903a7a1c892f0641a8a70490164baf9a83933238aafd624acaefb9555a548bf03e9a8c684c6abe3fff4937a876b895f66f79cc5f7098d2f

          • memory/372-31-0x00007FF9DB3D0000-0x00007FF9DBDBC000-memory.dmp

            Filesize

            9.9MB

          • memory/372-29-0x00007FF9DB3D0000-0x00007FF9DBDBC000-memory.dmp

            Filesize

            9.9MB

          • memory/372-28-0x0000000000E90000-0x0000000000E9A000-memory.dmp

            Filesize

            40KB

          • memory/4280-35-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/4280-38-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/4280-39-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/4280-41-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB