Analysis

  • max time kernel
    71s
  • max time network
    87s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30/09/2023, 08:42

General

  • Target

    e83953dd2f4d7d6fa05adcf0dc828b41565ccedf44d2ca4b13fd35db6f3747d3.exe

  • Size

    1.0MB

  • MD5

    c486726f13f0dbbec13efd792e6b5bb6

  • SHA1

    efca615191e6f727a9ea84c1e8b3ce0f7fe5b4a8

  • SHA256

    e83953dd2f4d7d6fa05adcf0dc828b41565ccedf44d2ca4b13fd35db6f3747d3

  • SHA512

    b919b0efd42a5a808ec6fba95fde75100275eea65bff098c355231b16e6faef089e1bb434ddd89a43b051b960d1b8c8f032e96b50f945076e606882bb4e73ab6

  • SSDEEP

    24576:6yTCl2edVsyAHK2rFtlzpqZ24angh/aM6sAjdzhwgEOL:BTCo4VsXq8tJ4gA05dlwg

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e83953dd2f4d7d6fa05adcf0dc828b41565ccedf44d2ca4b13fd35db6f3747d3.exe
    "C:\Users\Admin\AppData\Local\Temp\e83953dd2f4d7d6fa05adcf0dc828b41565ccedf44d2ca4b13fd35db6f3747d3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9367816.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9367816.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4456
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5273005.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5273005.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:828
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8887252.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8887252.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1172
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1865727.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1865727.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4836
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0011811.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0011811.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:868
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3254871.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3254871.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1124
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:1600
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 568
                    8⤵
                    • Program crash
                    PID:3124
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 592
                  7⤵
                  • Program crash
                  PID:3648

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9367816.exe

      Filesize

      972KB

      MD5

      8c70087513dac7a4ac4c8cbb42900f46

      SHA1

      403c1aae8a1ab0912ce56d97c35c075c50be600d

      SHA256

      7d046c395fb2751544e2220dd509864d6e050322040af6fe2cf62f9876523346

      SHA512

      0b818514087d8e442a3dc14bc135a69e6b32634758061050f3e9d2ba49b9c1f8769a2f4b0b1663d42ad60785c1ff239245368f708e42c1eb3f6ac2c9d35c2e5e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9367816.exe

      Filesize

      972KB

      MD5

      8c70087513dac7a4ac4c8cbb42900f46

      SHA1

      403c1aae8a1ab0912ce56d97c35c075c50be600d

      SHA256

      7d046c395fb2751544e2220dd509864d6e050322040af6fe2cf62f9876523346

      SHA512

      0b818514087d8e442a3dc14bc135a69e6b32634758061050f3e9d2ba49b9c1f8769a2f4b0b1663d42ad60785c1ff239245368f708e42c1eb3f6ac2c9d35c2e5e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5273005.exe

      Filesize

      789KB

      MD5

      a51c8b8bdc62735d3f053e8118f421f6

      SHA1

      e4d464dbd5a2ad8357aeb623c8e0d82f761220e2

      SHA256

      a8e8a20e6e74d0bfbb1d513e0e2c94ff118a4e7014830ed01052571e86b2a4e3

      SHA512

      30a15ed36969fbcf476c5c13850fab35445255bb2a901bf5ca0b9b6a2e7831d770b8101c262476b12252dd65da1eb0c2167489417878931d009c48136d0a58a7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5273005.exe

      Filesize

      789KB

      MD5

      a51c8b8bdc62735d3f053e8118f421f6

      SHA1

      e4d464dbd5a2ad8357aeb623c8e0d82f761220e2

      SHA256

      a8e8a20e6e74d0bfbb1d513e0e2c94ff118a4e7014830ed01052571e86b2a4e3

      SHA512

      30a15ed36969fbcf476c5c13850fab35445255bb2a901bf5ca0b9b6a2e7831d770b8101c262476b12252dd65da1eb0c2167489417878931d009c48136d0a58a7

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8887252.exe

      Filesize

      606KB

      MD5

      7736059183e6c766feedfb63a8ebceb0

      SHA1

      f7e4bc1bad97acb6d536dea445a0e911e9d689e7

      SHA256

      ea9795725a433548388da25a73f37ec8cc1e327e0d1aa730bdc4229a339fbc25

      SHA512

      48d3b762d819207fafcce4e8a807c2441171cb255254ab4f305ed7952b53a50cad28cab44286e8448d55dc36bcb987c816bc7271b387acd396a1d9a5b68f875e

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8887252.exe

      Filesize

      606KB

      MD5

      7736059183e6c766feedfb63a8ebceb0

      SHA1

      f7e4bc1bad97acb6d536dea445a0e911e9d689e7

      SHA256

      ea9795725a433548388da25a73f37ec8cc1e327e0d1aa730bdc4229a339fbc25

      SHA512

      48d3b762d819207fafcce4e8a807c2441171cb255254ab4f305ed7952b53a50cad28cab44286e8448d55dc36bcb987c816bc7271b387acd396a1d9a5b68f875e

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1865727.exe

      Filesize

      335KB

      MD5

      1763fa184dea8737f2701fa7abaa21d0

      SHA1

      77264fdf1872fcaa07dc7712a71b592e659a6238

      SHA256

      3705e88ae0bbc661af7ece8052efd0f46436d28c1b034c1c81d4fec48f406bd5

      SHA512

      0319bc00a8a61d0a723dd4b826775a1f92b860213933a884da075c1a8b7b6eedb3285869194b21adf1e050f2d53f10195170051761ecd337be81884dddae866f

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1865727.exe

      Filesize

      335KB

      MD5

      1763fa184dea8737f2701fa7abaa21d0

      SHA1

      77264fdf1872fcaa07dc7712a71b592e659a6238

      SHA256

      3705e88ae0bbc661af7ece8052efd0f46436d28c1b034c1c81d4fec48f406bd5

      SHA512

      0319bc00a8a61d0a723dd4b826775a1f92b860213933a884da075c1a8b7b6eedb3285869194b21adf1e050f2d53f10195170051761ecd337be81884dddae866f

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0011811.exe

      Filesize

      11KB

      MD5

      b968cb5ee58d2be7a39da9dbe566c5e2

      SHA1

      4c5aee95f0541f56342489494fb55f4540861903

      SHA256

      2706a36e942b9cc9fa797c7cf817d554238b8dfa1f71ef0fa6e3706382627356

      SHA512

      c8ec877350d9ac098b194c2b1a3ecec27f9d198e91064ab5a016879df16e8d5caaa9077ad210ffd623f0ffec9502ae00e4e312d577027f1ef2ab15af966f37c1

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0011811.exe

      Filesize

      11KB

      MD5

      b968cb5ee58d2be7a39da9dbe566c5e2

      SHA1

      4c5aee95f0541f56342489494fb55f4540861903

      SHA256

      2706a36e942b9cc9fa797c7cf817d554238b8dfa1f71ef0fa6e3706382627356

      SHA512

      c8ec877350d9ac098b194c2b1a3ecec27f9d198e91064ab5a016879df16e8d5caaa9077ad210ffd623f0ffec9502ae00e4e312d577027f1ef2ab15af966f37c1

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3254871.exe

      Filesize

      356KB

      MD5

      21b44babbf7baeeeb2ec506828644075

      SHA1

      162670005a5a4d9e18d72a94f3124db60b533ae5

      SHA256

      5154b0aa9ee983cc5fae04fa26b8d5bb27ea91f77214e546eb9523a9e9a5dbb0

      SHA512

      f81ed16af92bd83fde84d2cdb83723cd57f0458874710d8435e29433e8020539b624b868c8e97a76368f0d4ec0ea27712ebf22596840d067b213a55b98751c07

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3254871.exe

      Filesize

      356KB

      MD5

      21b44babbf7baeeeb2ec506828644075

      SHA1

      162670005a5a4d9e18d72a94f3124db60b533ae5

      SHA256

      5154b0aa9ee983cc5fae04fa26b8d5bb27ea91f77214e546eb9523a9e9a5dbb0

      SHA512

      f81ed16af92bd83fde84d2cdb83723cd57f0458874710d8435e29433e8020539b624b868c8e97a76368f0d4ec0ea27712ebf22596840d067b213a55b98751c07

    • memory/868-35-0x0000000000EE0000-0x0000000000EEA000-memory.dmp

      Filesize

      40KB

    • memory/868-36-0x00007FF89D050000-0x00007FF89DA3C000-memory.dmp

      Filesize

      9.9MB

    • memory/868-38-0x00007FF89D050000-0x00007FF89DA3C000-memory.dmp

      Filesize

      9.9MB

    • memory/1600-42-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1600-45-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1600-46-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1600-48-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB