Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
133s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
22/09/2023, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
ccdf1960aaf20254d282799a321d6d2b64a0e497c8a166d10751b1b7b65f8071.exe
Resource
win10-20230915-en
General
-
Target
ccdf1960aaf20254d282799a321d6d2b64a0e497c8a166d10751b1b7b65f8071.exe
-
Size
1.1MB
-
MD5
ce179af2d7b69dd8b917cbcc939ba471
-
SHA1
1460f6a9cd13642832ea40d21c80ab9566cd9bd9
-
SHA256
ccdf1960aaf20254d282799a321d6d2b64a0e497c8a166d10751b1b7b65f8071
-
SHA512
324bbae6c8d5a67a411df165f56740f2857b7954ebbb017168c433604395022dd9a09af2fceb465e037357c5eec382865c818470b327f65a14493e75b40716f6
-
SSDEEP
24576:ByffEcfpAkQOm7STRz5XCqAbzKoWLmlZnVRLWN:0ffEQqTSh55YkqlLRL
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001b005-33.dat healer behavioral1/files/0x000700000001b005-34.dat healer behavioral1/memory/2704-35-0x00000000007F0000-0x00000000007FA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q6797162.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q6797162.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q6797162.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q6797162.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q6797162.exe -
Executes dropped EXE 6 IoCs
pid Process 1164 z5487474.exe 2532 z0520494.exe 1168 z3604877.exe 4244 z0840782.exe 2704 q6797162.exe 5028 r5568890.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q6797162.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z0840782.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ccdf1960aaf20254d282799a321d6d2b64a0e497c8a166d10751b1b7b65f8071.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5487474.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z0520494.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z3604877.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5028 set thread context of 2720 5028 r5568890.exe 76 -
Program crash 2 IoCs
pid pid_target Process procid_target 1172 5028 WerFault.exe 75 232 2720 WerFault.exe 76 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2704 q6797162.exe 2704 q6797162.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2704 q6797162.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4768 wrote to memory of 1164 4768 ccdf1960aaf20254d282799a321d6d2b64a0e497c8a166d10751b1b7b65f8071.exe 70 PID 4768 wrote to memory of 1164 4768 ccdf1960aaf20254d282799a321d6d2b64a0e497c8a166d10751b1b7b65f8071.exe 70 PID 4768 wrote to memory of 1164 4768 ccdf1960aaf20254d282799a321d6d2b64a0e497c8a166d10751b1b7b65f8071.exe 70 PID 1164 wrote to memory of 2532 1164 z5487474.exe 71 PID 1164 wrote to memory of 2532 1164 z5487474.exe 71 PID 1164 wrote to memory of 2532 1164 z5487474.exe 71 PID 2532 wrote to memory of 1168 2532 z0520494.exe 72 PID 2532 wrote to memory of 1168 2532 z0520494.exe 72 PID 2532 wrote to memory of 1168 2532 z0520494.exe 72 PID 1168 wrote to memory of 4244 1168 z3604877.exe 73 PID 1168 wrote to memory of 4244 1168 z3604877.exe 73 PID 1168 wrote to memory of 4244 1168 z3604877.exe 73 PID 4244 wrote to memory of 2704 4244 z0840782.exe 74 PID 4244 wrote to memory of 2704 4244 z0840782.exe 74 PID 4244 wrote to memory of 5028 4244 z0840782.exe 75 PID 4244 wrote to memory of 5028 4244 z0840782.exe 75 PID 4244 wrote to memory of 5028 4244 z0840782.exe 75 PID 5028 wrote to memory of 2720 5028 r5568890.exe 76 PID 5028 wrote to memory of 2720 5028 r5568890.exe 76 PID 5028 wrote to memory of 2720 5028 r5568890.exe 76 PID 5028 wrote to memory of 2720 5028 r5568890.exe 76 PID 5028 wrote to memory of 2720 5028 r5568890.exe 76 PID 5028 wrote to memory of 2720 5028 r5568890.exe 76 PID 5028 wrote to memory of 2720 5028 r5568890.exe 76 PID 5028 wrote to memory of 2720 5028 r5568890.exe 76 PID 5028 wrote to memory of 2720 5028 r5568890.exe 76 PID 5028 wrote to memory of 2720 5028 r5568890.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccdf1960aaf20254d282799a321d6d2b64a0e497c8a166d10751b1b7b65f8071.exe"C:\Users\Admin\AppData\Local\Temp\ccdf1960aaf20254d282799a321d6d2b64a0e497c8a166d10751b1b7b65f8071.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5487474.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5487474.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0520494.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0520494.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3604877.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3604877.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0840782.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0840782.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6797162.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6797162.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5568890.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5568890.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 1928⤵
- Program crash
PID:232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 5807⤵
- Program crash
PID:1172
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
979KB
MD57e2c9528780bec0faa450830cbb24e8f
SHA1013b55f6ad2d2330e4ddb778b87aa4cd8628dd20
SHA256850e47a477220f739afe02d40bfc5a629b498122594afb383233e5c01fc01cbe
SHA512a2c208133a7799c8264ac874dff264789be3a8ee4dbcb50f98a66914d60ec79e5e1beb380037d1e72e79cadc53014d9f25186e288f5296a18320f412767e09c5
-
Filesize
979KB
MD57e2c9528780bec0faa450830cbb24e8f
SHA1013b55f6ad2d2330e4ddb778b87aa4cd8628dd20
SHA256850e47a477220f739afe02d40bfc5a629b498122594afb383233e5c01fc01cbe
SHA512a2c208133a7799c8264ac874dff264789be3a8ee4dbcb50f98a66914d60ec79e5e1beb380037d1e72e79cadc53014d9f25186e288f5296a18320f412767e09c5
-
Filesize
796KB
MD5dfc11af5638a758aeecbd4e449ddbad2
SHA12bc5c14462f2e4fc04c0f5aa70a95f3d141d4709
SHA2566b0bacb60aefc1d14c8ca619568e4b911c3fd6c04a7959781bfe6941a25e77ba
SHA5128b3394e17738463ba7fed8fbcf8fa1b8fcb8aa10896c59d8b997d4d5a566da4a3d043292503ef9b51f9c7d35463b8cf43b94707b6e054f5ca45a11797855d9db
-
Filesize
796KB
MD5dfc11af5638a758aeecbd4e449ddbad2
SHA12bc5c14462f2e4fc04c0f5aa70a95f3d141d4709
SHA2566b0bacb60aefc1d14c8ca619568e4b911c3fd6c04a7959781bfe6941a25e77ba
SHA5128b3394e17738463ba7fed8fbcf8fa1b8fcb8aa10896c59d8b997d4d5a566da4a3d043292503ef9b51f9c7d35463b8cf43b94707b6e054f5ca45a11797855d9db
-
Filesize
612KB
MD5563d5c76daee350e61e9035bad9c238d
SHA164bb4a8dcb4899560263f00a7886d85dff3322f4
SHA2563e307e0289b1c7494e92452760e8eecd4550eb35ea645b947c5a9a6f942104ff
SHA512643c31c828e8230fef64c1ecb151e6fae48daa611074f488a0163979705b98231be00d421ea39388f7da535b856b1c803a489ac587e412d5d55e56ee01269df2
-
Filesize
612KB
MD5563d5c76daee350e61e9035bad9c238d
SHA164bb4a8dcb4899560263f00a7886d85dff3322f4
SHA2563e307e0289b1c7494e92452760e8eecd4550eb35ea645b947c5a9a6f942104ff
SHA512643c31c828e8230fef64c1ecb151e6fae48daa611074f488a0163979705b98231be00d421ea39388f7da535b856b1c803a489ac587e412d5d55e56ee01269df2
-
Filesize
348KB
MD5bd4fad02d389953f3355ddaad920fd70
SHA12bd5dd06f986d132702559ac2d0c290d3fc1af78
SHA256f5514db35210aa0784ffb5d0b9c27b3b35c46f87c20ff759870e3e2b13eb3333
SHA5126090544b66daa1e34b57a97cbd5dfaa93350bbea519c6eb115d46bf1bd1aedd1582d329ccf9d09b14771bf39e4238de856694255c647078ff089a2d9a9de6ef4
-
Filesize
348KB
MD5bd4fad02d389953f3355ddaad920fd70
SHA12bd5dd06f986d132702559ac2d0c290d3fc1af78
SHA256f5514db35210aa0784ffb5d0b9c27b3b35c46f87c20ff759870e3e2b13eb3333
SHA5126090544b66daa1e34b57a97cbd5dfaa93350bbea519c6eb115d46bf1bd1aedd1582d329ccf9d09b14771bf39e4238de856694255c647078ff089a2d9a9de6ef4
-
Filesize
12KB
MD510b1d68f151be4696a285a81031650f1
SHA11ce8d8786017986f8b108d0e5ce976e72b6b43c1
SHA256c8fff9cec16825772ff270c0263297c0fd65e097717288bb196438bf22ea4ce2
SHA5122c0c0f653d9b82d647fa8040209d1fa8a5473f104b00d4f87f1f5d159496e2a38cfa0f63ee2e01b0de81371a948527a23eda0fbb2e9abb3b94b7c5936ae76479
-
Filesize
12KB
MD510b1d68f151be4696a285a81031650f1
SHA11ce8d8786017986f8b108d0e5ce976e72b6b43c1
SHA256c8fff9cec16825772ff270c0263297c0fd65e097717288bb196438bf22ea4ce2
SHA5122c0c0f653d9b82d647fa8040209d1fa8a5473f104b00d4f87f1f5d159496e2a38cfa0f63ee2e01b0de81371a948527a23eda0fbb2e9abb3b94b7c5936ae76479
-
Filesize
378KB
MD51d396223d58be4738b4e6851f71d750d
SHA1e4deb65f819687846ec2bb7634378e58ed040d77
SHA2565f40ae523da5ea99d9d875fc793a90dd11384367e3ee6007d49dc07c7faa3816
SHA51229e6aafe0f8ede1f377b8483c478083adb57eb572af631b8c385768e09a3914d9f6bb8b03f39d40cbc944523e9125c10a42cceeeda0a522b918aae566463946d
-
Filesize
378KB
MD51d396223d58be4738b4e6851f71d750d
SHA1e4deb65f819687846ec2bb7634378e58ed040d77
SHA2565f40ae523da5ea99d9d875fc793a90dd11384367e3ee6007d49dc07c7faa3816
SHA51229e6aafe0f8ede1f377b8483c478083adb57eb572af631b8c385768e09a3914d9f6bb8b03f39d40cbc944523e9125c10a42cceeeda0a522b918aae566463946d