Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
30/09/2023, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exe
Resource
win10-20230831-en
General
-
Target
13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exe
-
Size
994KB
-
MD5
34ef23c18f8dad13ed7cfd023f5f29d4
-
SHA1
be19fd0f3452cec270a74be2bb7d7f4632d9ac5c
-
SHA256
13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484
-
SHA512
b1916c400525a82bbcd2cb01e36be9ad3fc391bf19ab954b7ae7d68ff32e6850aa76493d314086647a0faad0baaaa3607e94bab98b0f473e14f050922e93f3b9
-
SSDEEP
12288:3Mrgy90XfNF4s3hbXW0FclsuQbPDENDRJZaiiznv9heykaPsYFUbLR+bEc2N:7yQfNaMDFEsugPDeRJZa9lPsYgMq
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001af9a-33.dat healer behavioral1/files/0x000700000001af9a-34.dat healer behavioral1/memory/4576-35-0x00000000007A0000-0x00000000007AA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q5569338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q5569338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q5569338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q5569338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q5569338.exe -
Executes dropped EXE 6 IoCs
pid Process 4504 z7485974.exe 1884 z3813204.exe 1000 z4696145.exe 4916 z4585205.exe 4576 q5569338.exe 4488 r5444812.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q5569338.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7485974.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3813204.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z4696145.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z4585205.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4488 set thread context of 4740 4488 r5444812.exe 78 -
Program crash 2 IoCs
pid pid_target Process procid_target 4232 4488 WerFault.exe 75 4944 4740 WerFault.exe 78 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4576 q5569338.exe 4576 q5569338.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4576 q5569338.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3336 wrote to memory of 4504 3336 13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exe 70 PID 3336 wrote to memory of 4504 3336 13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exe 70 PID 3336 wrote to memory of 4504 3336 13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exe 70 PID 4504 wrote to memory of 1884 4504 z7485974.exe 71 PID 4504 wrote to memory of 1884 4504 z7485974.exe 71 PID 4504 wrote to memory of 1884 4504 z7485974.exe 71 PID 1884 wrote to memory of 1000 1884 z3813204.exe 72 PID 1884 wrote to memory of 1000 1884 z3813204.exe 72 PID 1884 wrote to memory of 1000 1884 z3813204.exe 72 PID 1000 wrote to memory of 4916 1000 z4696145.exe 73 PID 1000 wrote to memory of 4916 1000 z4696145.exe 73 PID 1000 wrote to memory of 4916 1000 z4696145.exe 73 PID 4916 wrote to memory of 4576 4916 z4585205.exe 74 PID 4916 wrote to memory of 4576 4916 z4585205.exe 74 PID 4916 wrote to memory of 4488 4916 z4585205.exe 75 PID 4916 wrote to memory of 4488 4916 z4585205.exe 75 PID 4916 wrote to memory of 4488 4916 z4585205.exe 75 PID 4488 wrote to memory of 728 4488 r5444812.exe 77 PID 4488 wrote to memory of 728 4488 r5444812.exe 77 PID 4488 wrote to memory of 728 4488 r5444812.exe 77 PID 4488 wrote to memory of 4740 4488 r5444812.exe 78 PID 4488 wrote to memory of 4740 4488 r5444812.exe 78 PID 4488 wrote to memory of 4740 4488 r5444812.exe 78 PID 4488 wrote to memory of 4740 4488 r5444812.exe 78 PID 4488 wrote to memory of 4740 4488 r5444812.exe 78 PID 4488 wrote to memory of 4740 4488 r5444812.exe 78 PID 4488 wrote to memory of 4740 4488 r5444812.exe 78 PID 4488 wrote to memory of 4740 4488 r5444812.exe 78 PID 4488 wrote to memory of 4740 4488 r5444812.exe 78 PID 4488 wrote to memory of 4740 4488 r5444812.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exe"C:\Users\Admin\AppData\Local\Temp\13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7485974.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7485974.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3813204.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3813204.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4696145.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4696145.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4585205.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4585205.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5569338.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5569338.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5444812.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5444812.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:728
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 5688⤵
- Program crash
PID:4944
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 5927⤵
- Program crash
PID:4232
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
892KB
MD5a984915e88bde85e9dbc9fbca4fd6a19
SHA181a6cbddbdb662071c1d419b9a93d13e49e1a9b1
SHA2562d74a8c8a87f12566e36ad65a899f98673b763e6f6bd305f0bec2fd70f69f5ba
SHA5124c839743dde5c07fe00231fac432396c173656f46ea4d9022740cdd79e1077f53c49e4360a5ba322e1262c32e4f524a3751187bc149e9c34c1ddcdcf91815ee3
-
Filesize
892KB
MD5a984915e88bde85e9dbc9fbca4fd6a19
SHA181a6cbddbdb662071c1d419b9a93d13e49e1a9b1
SHA2562d74a8c8a87f12566e36ad65a899f98673b763e6f6bd305f0bec2fd70f69f5ba
SHA5124c839743dde5c07fe00231fac432396c173656f46ea4d9022740cdd79e1077f53c49e4360a5ba322e1262c32e4f524a3751187bc149e9c34c1ddcdcf91815ee3
-
Filesize
709KB
MD53a310e1b67a1bca891462bcf9902d2be
SHA13b2ebcc85d458fad57ea8d44c2ec857fcebe3c3d
SHA25637928abb0aa708362f1e304dd9db4ed8a2776653af701fb535d64fc126640522
SHA512ba1d313c601f553c9281852260610ddac18e3d7be92f48efc99655e5255567ed4353d0a0816bbb944472e5c575ecf586ed1bd2319b1dd1662e82aa6b40a168ba
-
Filesize
709KB
MD53a310e1b67a1bca891462bcf9902d2be
SHA13b2ebcc85d458fad57ea8d44c2ec857fcebe3c3d
SHA25637928abb0aa708362f1e304dd9db4ed8a2776653af701fb535d64fc126640522
SHA512ba1d313c601f553c9281852260610ddac18e3d7be92f48efc99655e5255567ed4353d0a0816bbb944472e5c575ecf586ed1bd2319b1dd1662e82aa6b40a168ba
-
Filesize
527KB
MD52d92010b8fda72ec3fa8c6959d08cf42
SHA1e40e19d084348cb2fa0cd4a6986ac16823167190
SHA25697ae64c4d24454f100c7664a89454adecec50f83eadbce6c991d9efb89b00844
SHA5126f7e90ceb872fc3ff48c21588d9ab0f298884e08047aba3621e16b97889bfbe706e694def77580f5393c57ccb63c98b791365e706f753bbe669f2caad28e79ee
-
Filesize
527KB
MD52d92010b8fda72ec3fa8c6959d08cf42
SHA1e40e19d084348cb2fa0cd4a6986ac16823167190
SHA25697ae64c4d24454f100c7664a89454adecec50f83eadbce6c991d9efb89b00844
SHA5126f7e90ceb872fc3ff48c21588d9ab0f298884e08047aba3621e16b97889bfbe706e694def77580f5393c57ccb63c98b791365e706f753bbe669f2caad28e79ee
-
Filesize
296KB
MD52e5cdedd303f1e7e3fa07c916771154f
SHA1891b2102c6f572636a4768d77f08cd3bc8cad23f
SHA2564f768f8e34322cd9dcf6b5ab0ab55b8b437fa53e4321b3b528c2d55af602d9fa
SHA512b74c6937f0082322acc29bfc883322ccc601734f502aa0117ec8f5467618dda34f6e8dde64b42359a7a7b9dad8e5840f6947e11372f832d19d851d39e10fc41a
-
Filesize
296KB
MD52e5cdedd303f1e7e3fa07c916771154f
SHA1891b2102c6f572636a4768d77f08cd3bc8cad23f
SHA2564f768f8e34322cd9dcf6b5ab0ab55b8b437fa53e4321b3b528c2d55af602d9fa
SHA512b74c6937f0082322acc29bfc883322ccc601734f502aa0117ec8f5467618dda34f6e8dde64b42359a7a7b9dad8e5840f6947e11372f832d19d851d39e10fc41a
-
Filesize
11KB
MD53f801188b87b3efd69c51f1c93f62561
SHA194364c72a405693364c2ee1af3ab50a0ad735886
SHA256343fd64400facd46b29f171733ea51d2353aa998de205735d098ffca3d141b9a
SHA5127dad5bb07fc165910c8c43705c8f6cebe82ebece16d25913409c254ba43bbdff4892627534591088cc98d8ec1094d78d9dd3cd48598844fa277d5cf72db8778c
-
Filesize
11KB
MD53f801188b87b3efd69c51f1c93f62561
SHA194364c72a405693364c2ee1af3ab50a0ad735886
SHA256343fd64400facd46b29f171733ea51d2353aa998de205735d098ffca3d141b9a
SHA5127dad5bb07fc165910c8c43705c8f6cebe82ebece16d25913409c254ba43bbdff4892627534591088cc98d8ec1094d78d9dd3cd48598844fa277d5cf72db8778c
-
Filesize
276KB
MD556521a0f333ba20257a34abe918bc1de
SHA1759a684b0c08487504d2fb56dba71be75532194a
SHA256a38410123170c8c50284782861bf188b832b1468f1c068c61e90f241a17b565a
SHA51233d83f2ca92abf5f283647e5424dc31b7c54a5fd65f4d8109b6f707ede8e7e95266d32719411203054938d44b8c26ac4740c9ecff4f71f2e9729c0b0d65817a3
-
Filesize
276KB
MD556521a0f333ba20257a34abe918bc1de
SHA1759a684b0c08487504d2fb56dba71be75532194a
SHA256a38410123170c8c50284782861bf188b832b1468f1c068c61e90f241a17b565a
SHA51233d83f2ca92abf5f283647e5424dc31b7c54a5fd65f4d8109b6f707ede8e7e95266d32719411203054938d44b8c26ac4740c9ecff4f71f2e9729c0b0d65817a3