Analysis

  • max time kernel
    120s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2023 19:34

General

  • Target

    1a4df824b20e3ce9a552aaa98fad5a3235940b4f9631d37d084f4ebd67b88863_JC.exe

  • Size

    1.0MB

  • MD5

    eb326f653ba0d49d00e57dcece8b35bb

  • SHA1

    6b4c8556eaf3e6344872ffd688c567163140f3fe

  • SHA256

    1a4df824b20e3ce9a552aaa98fad5a3235940b4f9631d37d084f4ebd67b88863

  • SHA512

    8d3ed6fcf1f072c14995fcec3ec685db8cca18122d37726fb2d18c6eea7c464a9511ffa3d28087cde43b4f0efa4530312e7d734cc23b1d3542a215588cc4ba1c

  • SSDEEP

    24576:sy+GQ1nmLASp2WWG7XM/nw32+FcVTeNnU674ts/mN:b+GQ1nmLASVpXzNT+s

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a4df824b20e3ce9a552aaa98fad5a3235940b4f9631d37d084f4ebd67b88863_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\1a4df824b20e3ce9a552aaa98fad5a3235940b4f9631d37d084f4ebd67b88863_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1148654.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1148654.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1269223.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1269223.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2872
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4922398.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4922398.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2516
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6782030.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6782030.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2736
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6788692.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6788692.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2572
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4225931.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4225931.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1908
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2700
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 276
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:1864

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1148654.exe
      Filesize

      972KB

      MD5

      0a73a92f319f5ce0581f2b382382f0ef

      SHA1

      7001cc4d8aedeb5b32043f55da20707412fed1fd

      SHA256

      770671752d43be0b094bc54562b4aeedd83c793ebf257e6e8d919daf37bc352e

      SHA512

      79fb4f890107e717a5998be3976d8c9f7d40a122da9233218928eecb582b01c86582336312266d1f5bc8aedaccc54fdc08dd89d436fca710f371cc780cf9259e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1148654.exe
      Filesize

      972KB

      MD5

      0a73a92f319f5ce0581f2b382382f0ef

      SHA1

      7001cc4d8aedeb5b32043f55da20707412fed1fd

      SHA256

      770671752d43be0b094bc54562b4aeedd83c793ebf257e6e8d919daf37bc352e

      SHA512

      79fb4f890107e717a5998be3976d8c9f7d40a122da9233218928eecb582b01c86582336312266d1f5bc8aedaccc54fdc08dd89d436fca710f371cc780cf9259e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1269223.exe
      Filesize

      789KB

      MD5

      2ce1945cfdc919b012532e8c38df5c6b

      SHA1

      b93f567846e095591df75fad136fa33b63dc1777

      SHA256

      bccce5d3bdaf616baaf1615f9047096efc80c238512b6e5b1ae1d05201c27693

      SHA512

      208ef9c00ef602603e8be99550946bae8f6d4e02e8ca6f10c25212d16a03a525d82b52a060b80510cc530855649d2574bcf05d248cd1342f581c8f30c1e53474

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1269223.exe
      Filesize

      789KB

      MD5

      2ce1945cfdc919b012532e8c38df5c6b

      SHA1

      b93f567846e095591df75fad136fa33b63dc1777

      SHA256

      bccce5d3bdaf616baaf1615f9047096efc80c238512b6e5b1ae1d05201c27693

      SHA512

      208ef9c00ef602603e8be99550946bae8f6d4e02e8ca6f10c25212d16a03a525d82b52a060b80510cc530855649d2574bcf05d248cd1342f581c8f30c1e53474

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4922398.exe
      Filesize

      606KB

      MD5

      d7935a466c03dc60983a893f753259ac

      SHA1

      a672f5a14684729cd04f95e13d23da9839f7f689

      SHA256

      c87d870a512068a10a79c79596c1ee642eb6491fb772bd6718c49fe44039938d

      SHA512

      9bdb9b4b22ea5c583171c32035c257c96121ff818009912d921dc29e1e79ea984197a271fe1642a9b9d0c5ec070c3651817207bf0058419c21baf05e6371d6ba

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4922398.exe
      Filesize

      606KB

      MD5

      d7935a466c03dc60983a893f753259ac

      SHA1

      a672f5a14684729cd04f95e13d23da9839f7f689

      SHA256

      c87d870a512068a10a79c79596c1ee642eb6491fb772bd6718c49fe44039938d

      SHA512

      9bdb9b4b22ea5c583171c32035c257c96121ff818009912d921dc29e1e79ea984197a271fe1642a9b9d0c5ec070c3651817207bf0058419c21baf05e6371d6ba

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6782030.exe
      Filesize

      335KB

      MD5

      1cee9b769d7701af7a2d718d84e5f1cc

      SHA1

      ee365c823346848ddff81e729fdaf785656803f1

      SHA256

      b6f760405f6c705f864b4edd914bdfc7767e84d1238b88c8a626779ce312397b

      SHA512

      ed6800c261016cdd0f7f2f279f3269fc15d22221686db6a90689b171e4b7572798a7e355435efef29ffc5c79061c9eb4c09f861dfa1a55566e6510b6a9c572cb

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6782030.exe
      Filesize

      335KB

      MD5

      1cee9b769d7701af7a2d718d84e5f1cc

      SHA1

      ee365c823346848ddff81e729fdaf785656803f1

      SHA256

      b6f760405f6c705f864b4edd914bdfc7767e84d1238b88c8a626779ce312397b

      SHA512

      ed6800c261016cdd0f7f2f279f3269fc15d22221686db6a90689b171e4b7572798a7e355435efef29ffc5c79061c9eb4c09f861dfa1a55566e6510b6a9c572cb

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6788692.exe
      Filesize

      11KB

      MD5

      f2ebf762262c6349dabbb635967a9f59

      SHA1

      8a389b38d9d3120e1d5121eee37c31a12dc51a78

      SHA256

      660ab1ad0826b93c961bb19c56db2b908ba34ae001e6abaf0e3481c9a6ab9a45

      SHA512

      fa5ca9247c8657146a5fc33581f0458c6f328737d695a46f0187727963141a577143ead0c42ebac3c87e221d8648dfb1bdfc32f07b5b365acd4b8677ef6481c8

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6788692.exe
      Filesize

      11KB

      MD5

      f2ebf762262c6349dabbb635967a9f59

      SHA1

      8a389b38d9d3120e1d5121eee37c31a12dc51a78

      SHA256

      660ab1ad0826b93c961bb19c56db2b908ba34ae001e6abaf0e3481c9a6ab9a45

      SHA512

      fa5ca9247c8657146a5fc33581f0458c6f328737d695a46f0187727963141a577143ead0c42ebac3c87e221d8648dfb1bdfc32f07b5b365acd4b8677ef6481c8

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4225931.exe
      Filesize

      356KB

      MD5

      4b10f421dfc0c9165067ae187766655d

      SHA1

      7adb7c8e6ad927928c0ee839ef61fa6a7332b1c1

      SHA256

      6b3819b53b6154344fab0948b35223eb578db07326f04c65d9489af42be250a1

      SHA512

      a2842baa2642c49c74e371d74fa8431d24f41a3ad481ddf753d774cb7b292e7e54a74c58374a712fb1ba7e27e665fedc51a26a628ea89e7a2ebc7febab4cc1d8

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4225931.exe
      Filesize

      356KB

      MD5

      4b10f421dfc0c9165067ae187766655d

      SHA1

      7adb7c8e6ad927928c0ee839ef61fa6a7332b1c1

      SHA256

      6b3819b53b6154344fab0948b35223eb578db07326f04c65d9489af42be250a1

      SHA512

      a2842baa2642c49c74e371d74fa8431d24f41a3ad481ddf753d774cb7b292e7e54a74c58374a712fb1ba7e27e665fedc51a26a628ea89e7a2ebc7febab4cc1d8

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4225931.exe
      Filesize

      356KB

      MD5

      4b10f421dfc0c9165067ae187766655d

      SHA1

      7adb7c8e6ad927928c0ee839ef61fa6a7332b1c1

      SHA256

      6b3819b53b6154344fab0948b35223eb578db07326f04c65d9489af42be250a1

      SHA512

      a2842baa2642c49c74e371d74fa8431d24f41a3ad481ddf753d774cb7b292e7e54a74c58374a712fb1ba7e27e665fedc51a26a628ea89e7a2ebc7febab4cc1d8

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1148654.exe
      Filesize

      972KB

      MD5

      0a73a92f319f5ce0581f2b382382f0ef

      SHA1

      7001cc4d8aedeb5b32043f55da20707412fed1fd

      SHA256

      770671752d43be0b094bc54562b4aeedd83c793ebf257e6e8d919daf37bc352e

      SHA512

      79fb4f890107e717a5998be3976d8c9f7d40a122da9233218928eecb582b01c86582336312266d1f5bc8aedaccc54fdc08dd89d436fca710f371cc780cf9259e

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1148654.exe
      Filesize

      972KB

      MD5

      0a73a92f319f5ce0581f2b382382f0ef

      SHA1

      7001cc4d8aedeb5b32043f55da20707412fed1fd

      SHA256

      770671752d43be0b094bc54562b4aeedd83c793ebf257e6e8d919daf37bc352e

      SHA512

      79fb4f890107e717a5998be3976d8c9f7d40a122da9233218928eecb582b01c86582336312266d1f5bc8aedaccc54fdc08dd89d436fca710f371cc780cf9259e

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1269223.exe
      Filesize

      789KB

      MD5

      2ce1945cfdc919b012532e8c38df5c6b

      SHA1

      b93f567846e095591df75fad136fa33b63dc1777

      SHA256

      bccce5d3bdaf616baaf1615f9047096efc80c238512b6e5b1ae1d05201c27693

      SHA512

      208ef9c00ef602603e8be99550946bae8f6d4e02e8ca6f10c25212d16a03a525d82b52a060b80510cc530855649d2574bcf05d248cd1342f581c8f30c1e53474

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1269223.exe
      Filesize

      789KB

      MD5

      2ce1945cfdc919b012532e8c38df5c6b

      SHA1

      b93f567846e095591df75fad136fa33b63dc1777

      SHA256

      bccce5d3bdaf616baaf1615f9047096efc80c238512b6e5b1ae1d05201c27693

      SHA512

      208ef9c00ef602603e8be99550946bae8f6d4e02e8ca6f10c25212d16a03a525d82b52a060b80510cc530855649d2574bcf05d248cd1342f581c8f30c1e53474

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4922398.exe
      Filesize

      606KB

      MD5

      d7935a466c03dc60983a893f753259ac

      SHA1

      a672f5a14684729cd04f95e13d23da9839f7f689

      SHA256

      c87d870a512068a10a79c79596c1ee642eb6491fb772bd6718c49fe44039938d

      SHA512

      9bdb9b4b22ea5c583171c32035c257c96121ff818009912d921dc29e1e79ea984197a271fe1642a9b9d0c5ec070c3651817207bf0058419c21baf05e6371d6ba

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4922398.exe
      Filesize

      606KB

      MD5

      d7935a466c03dc60983a893f753259ac

      SHA1

      a672f5a14684729cd04f95e13d23da9839f7f689

      SHA256

      c87d870a512068a10a79c79596c1ee642eb6491fb772bd6718c49fe44039938d

      SHA512

      9bdb9b4b22ea5c583171c32035c257c96121ff818009912d921dc29e1e79ea984197a271fe1642a9b9d0c5ec070c3651817207bf0058419c21baf05e6371d6ba

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6782030.exe
      Filesize

      335KB

      MD5

      1cee9b769d7701af7a2d718d84e5f1cc

      SHA1

      ee365c823346848ddff81e729fdaf785656803f1

      SHA256

      b6f760405f6c705f864b4edd914bdfc7767e84d1238b88c8a626779ce312397b

      SHA512

      ed6800c261016cdd0f7f2f279f3269fc15d22221686db6a90689b171e4b7572798a7e355435efef29ffc5c79061c9eb4c09f861dfa1a55566e6510b6a9c572cb

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6782030.exe
      Filesize

      335KB

      MD5

      1cee9b769d7701af7a2d718d84e5f1cc

      SHA1

      ee365c823346848ddff81e729fdaf785656803f1

      SHA256

      b6f760405f6c705f864b4edd914bdfc7767e84d1238b88c8a626779ce312397b

      SHA512

      ed6800c261016cdd0f7f2f279f3269fc15d22221686db6a90689b171e4b7572798a7e355435efef29ffc5c79061c9eb4c09f861dfa1a55566e6510b6a9c572cb

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6788692.exe
      Filesize

      11KB

      MD5

      f2ebf762262c6349dabbb635967a9f59

      SHA1

      8a389b38d9d3120e1d5121eee37c31a12dc51a78

      SHA256

      660ab1ad0826b93c961bb19c56db2b908ba34ae001e6abaf0e3481c9a6ab9a45

      SHA512

      fa5ca9247c8657146a5fc33581f0458c6f328737d695a46f0187727963141a577143ead0c42ebac3c87e221d8648dfb1bdfc32f07b5b365acd4b8677ef6481c8

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4225931.exe
      Filesize

      356KB

      MD5

      4b10f421dfc0c9165067ae187766655d

      SHA1

      7adb7c8e6ad927928c0ee839ef61fa6a7332b1c1

      SHA256

      6b3819b53b6154344fab0948b35223eb578db07326f04c65d9489af42be250a1

      SHA512

      a2842baa2642c49c74e371d74fa8431d24f41a3ad481ddf753d774cb7b292e7e54a74c58374a712fb1ba7e27e665fedc51a26a628ea89e7a2ebc7febab4cc1d8

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4225931.exe
      Filesize

      356KB

      MD5

      4b10f421dfc0c9165067ae187766655d

      SHA1

      7adb7c8e6ad927928c0ee839ef61fa6a7332b1c1

      SHA256

      6b3819b53b6154344fab0948b35223eb578db07326f04c65d9489af42be250a1

      SHA512

      a2842baa2642c49c74e371d74fa8431d24f41a3ad481ddf753d774cb7b292e7e54a74c58374a712fb1ba7e27e665fedc51a26a628ea89e7a2ebc7febab4cc1d8

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4225931.exe
      Filesize

      356KB

      MD5

      4b10f421dfc0c9165067ae187766655d

      SHA1

      7adb7c8e6ad927928c0ee839ef61fa6a7332b1c1

      SHA256

      6b3819b53b6154344fab0948b35223eb578db07326f04c65d9489af42be250a1

      SHA512

      a2842baa2642c49c74e371d74fa8431d24f41a3ad481ddf753d774cb7b292e7e54a74c58374a712fb1ba7e27e665fedc51a26a628ea89e7a2ebc7febab4cc1d8

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4225931.exe
      Filesize

      356KB

      MD5

      4b10f421dfc0c9165067ae187766655d

      SHA1

      7adb7c8e6ad927928c0ee839ef61fa6a7332b1c1

      SHA256

      6b3819b53b6154344fab0948b35223eb578db07326f04c65d9489af42be250a1

      SHA512

      a2842baa2642c49c74e371d74fa8431d24f41a3ad481ddf753d774cb7b292e7e54a74c58374a712fb1ba7e27e665fedc51a26a628ea89e7a2ebc7febab4cc1d8

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4225931.exe
      Filesize

      356KB

      MD5

      4b10f421dfc0c9165067ae187766655d

      SHA1

      7adb7c8e6ad927928c0ee839ef61fa6a7332b1c1

      SHA256

      6b3819b53b6154344fab0948b35223eb578db07326f04c65d9489af42be250a1

      SHA512

      a2842baa2642c49c74e371d74fa8431d24f41a3ad481ddf753d774cb7b292e7e54a74c58374a712fb1ba7e27e665fedc51a26a628ea89e7a2ebc7febab4cc1d8

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4225931.exe
      Filesize

      356KB

      MD5

      4b10f421dfc0c9165067ae187766655d

      SHA1

      7adb7c8e6ad927928c0ee839ef61fa6a7332b1c1

      SHA256

      6b3819b53b6154344fab0948b35223eb578db07326f04c65d9489af42be250a1

      SHA512

      a2842baa2642c49c74e371d74fa8431d24f41a3ad481ddf753d774cb7b292e7e54a74c58374a712fb1ba7e27e665fedc51a26a628ea89e7a2ebc7febab4cc1d8

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4225931.exe
      Filesize

      356KB

      MD5

      4b10f421dfc0c9165067ae187766655d

      SHA1

      7adb7c8e6ad927928c0ee839ef61fa6a7332b1c1

      SHA256

      6b3819b53b6154344fab0948b35223eb578db07326f04c65d9489af42be250a1

      SHA512

      a2842baa2642c49c74e371d74fa8431d24f41a3ad481ddf753d774cb7b292e7e54a74c58374a712fb1ba7e27e665fedc51a26a628ea89e7a2ebc7febab4cc1d8

    • memory/2572-51-0x000007FEF55F0000-0x000007FEF5FDC000-memory.dmp
      Filesize

      9.9MB

    • memory/2572-50-0x000007FEF55F0000-0x000007FEF5FDC000-memory.dmp
      Filesize

      9.9MB

    • memory/2572-48-0x0000000001320000-0x000000000132A000-memory.dmp
      Filesize

      40KB

    • memory/2572-49-0x000007FEF55F0000-0x000007FEF5FDC000-memory.dmp
      Filesize

      9.9MB

    • memory/2700-63-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2700-69-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2700-67-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2700-65-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2700-76-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2700-78-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2700-79-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2700-61-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2700-74-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2700-73-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
      Filesize

      4KB

    • memory/2700-71-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2700-84-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB