Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2023 20:07

General

  • Target

    68a124a413a17ca571b1b3f98788afdb4b79d730c52f7a342012d0295cad9810_JC.exe

  • Size

    1.0MB

  • MD5

    30fd88f39f02f41c5630bc3cb5118ffb

  • SHA1

    6f28c09134b33177bc2a0f2d30a810bd6a907bf3

  • SHA256

    68a124a413a17ca571b1b3f98788afdb4b79d730c52f7a342012d0295cad9810

  • SHA512

    d3e5d317d3ee1cba448b985436a3bc443eb5421bfc2ecf4f144a8f86ebd9208c74221e7ba0c737914a682aa085755047ec93d668d3bf1c9d02067fd41d2afd8a

  • SSDEEP

    24576:ByWoZMS5I7ahhU3FlBp33mqY0WzaSt7W0+sCroaxSuIE:01BI7ahhIbBpn+BOStisgocSu

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68a124a413a17ca571b1b3f98788afdb4b79d730c52f7a342012d0295cad9810_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\68a124a413a17ca571b1b3f98788afdb4b79d730c52f7a342012d0295cad9810_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5195917.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5195917.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2104
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1187942.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1187942.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2424
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9878741.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9878741.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2272
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5298992.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5298992.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2764
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8171770.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8171770.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2616
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9126636.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9126636.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2672
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2024
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 268
                  8⤵
                  • Program crash
                  PID:2588
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 276
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5195917.exe

    Filesize

    966KB

    MD5

    bd3f34c1188859985894ceb58309b126

    SHA1

    33894ba88226ca51b97e21355a095c4e7907f11f

    SHA256

    f1e95ce4d285f16e76dd6c84352540fd8555642775f75784c1a88e81631ff085

    SHA512

    35d682e3c9201a24d8b13fd9cecb2426f7625ebfcc2a3ecc28d8526bee5099ae2d7ed10d6fcf5615ffbc98f57a52efd19f94d2b631a71d0ab66d1912d1513a2f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5195917.exe

    Filesize

    966KB

    MD5

    bd3f34c1188859985894ceb58309b126

    SHA1

    33894ba88226ca51b97e21355a095c4e7907f11f

    SHA256

    f1e95ce4d285f16e76dd6c84352540fd8555642775f75784c1a88e81631ff085

    SHA512

    35d682e3c9201a24d8b13fd9cecb2426f7625ebfcc2a3ecc28d8526bee5099ae2d7ed10d6fcf5615ffbc98f57a52efd19f94d2b631a71d0ab66d1912d1513a2f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1187942.exe

    Filesize

    789KB

    MD5

    490a11a065a1cfe3a6fb93921ed94a72

    SHA1

    5c281ee13effcdd0713b34cff2e96f1d6d6313cb

    SHA256

    03159fbc114fbe41a5dd7fc205ef4dbbc3b8daadc0cafeaeade9352b75e673c2

    SHA512

    c27078bfa0b268a87717e2065e6020324676ba1261583dc074a55e2e667be7c615cbab75c15a80714193093b558b3bb5d197bfaf33f0446126d31a86505fd99e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1187942.exe

    Filesize

    789KB

    MD5

    490a11a065a1cfe3a6fb93921ed94a72

    SHA1

    5c281ee13effcdd0713b34cff2e96f1d6d6313cb

    SHA256

    03159fbc114fbe41a5dd7fc205ef4dbbc3b8daadc0cafeaeade9352b75e673c2

    SHA512

    c27078bfa0b268a87717e2065e6020324676ba1261583dc074a55e2e667be7c615cbab75c15a80714193093b558b3bb5d197bfaf33f0446126d31a86505fd99e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9878741.exe

    Filesize

    606KB

    MD5

    7a22924d5f0760e249a8dba75e44bf8a

    SHA1

    596cc04d12392bd124ecded3929fddbd8cc3ae53

    SHA256

    96c293f9f5c951bc10563730e8154e62ec3147ec1090915868bcc2b5e4b15bc6

    SHA512

    3abc4b13dcab03c55229660015070e03809c414ebf254879ccfa06bf04ac00c9914eaa132603457f0255cf018ff82bdf315edb23eb933d6f42c37362d607b36d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9878741.exe

    Filesize

    606KB

    MD5

    7a22924d5f0760e249a8dba75e44bf8a

    SHA1

    596cc04d12392bd124ecded3929fddbd8cc3ae53

    SHA256

    96c293f9f5c951bc10563730e8154e62ec3147ec1090915868bcc2b5e4b15bc6

    SHA512

    3abc4b13dcab03c55229660015070e03809c414ebf254879ccfa06bf04ac00c9914eaa132603457f0255cf018ff82bdf315edb23eb933d6f42c37362d607b36d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5298992.exe

    Filesize

    335KB

    MD5

    1fd511e0e4ed95dd0812e3bd26ef292e

    SHA1

    c529054ad148d35803f22d245765a8187c85c716

    SHA256

    e6930d7b1531edc248a979efcb68ab694e1147d0072c9f5f7dc3441d9de9223c

    SHA512

    039065d0b7c744a63752a2f60a9609b1d6c8034e868b89b0f57566743bb5129aaf6a7ad9128c8bbb3121cf1c59a66eb81557a77323dd488e4dccb28778f119fb

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5298992.exe

    Filesize

    335KB

    MD5

    1fd511e0e4ed95dd0812e3bd26ef292e

    SHA1

    c529054ad148d35803f22d245765a8187c85c716

    SHA256

    e6930d7b1531edc248a979efcb68ab694e1147d0072c9f5f7dc3441d9de9223c

    SHA512

    039065d0b7c744a63752a2f60a9609b1d6c8034e868b89b0f57566743bb5129aaf6a7ad9128c8bbb3121cf1c59a66eb81557a77323dd488e4dccb28778f119fb

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8171770.exe

    Filesize

    11KB

    MD5

    e2b9c78bac12e7185638d725b01f41c7

    SHA1

    f85862e3193d583a8dea51a0dfd92ab9a650b65b

    SHA256

    e00f426d72d97900e744dd9cabbfe4858310f5ba2b8212b0b32e7d830a3e9377

    SHA512

    9a9f6b7068d35b8b7e624fc5ebe100c08edbb3a0dbb46555f6fcc5040da156acb93f83c6a1211c505a2072ef358ec52084057aba7ae75e29c377d6a6aee27c7c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8171770.exe

    Filesize

    11KB

    MD5

    e2b9c78bac12e7185638d725b01f41c7

    SHA1

    f85862e3193d583a8dea51a0dfd92ab9a650b65b

    SHA256

    e00f426d72d97900e744dd9cabbfe4858310f5ba2b8212b0b32e7d830a3e9377

    SHA512

    9a9f6b7068d35b8b7e624fc5ebe100c08edbb3a0dbb46555f6fcc5040da156acb93f83c6a1211c505a2072ef358ec52084057aba7ae75e29c377d6a6aee27c7c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9126636.exe

    Filesize

    356KB

    MD5

    cf8f7715080052a81d95259096d6924e

    SHA1

    1c975b8cf9ba9e7ee9bcad1e343c98dcdb98854a

    SHA256

    090a7083e6cee740d578c1a9733a5f0b892e1024ec855229feafcf966c97b868

    SHA512

    a4d5307f5f16c42a3177b7992315631b8a76d0b916aec7ded3e4e964bc7f16a39740df63ab3dce6f06c911b57de4b8639741e119baeafd89d623e6ae10341c75

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9126636.exe

    Filesize

    356KB

    MD5

    cf8f7715080052a81d95259096d6924e

    SHA1

    1c975b8cf9ba9e7ee9bcad1e343c98dcdb98854a

    SHA256

    090a7083e6cee740d578c1a9733a5f0b892e1024ec855229feafcf966c97b868

    SHA512

    a4d5307f5f16c42a3177b7992315631b8a76d0b916aec7ded3e4e964bc7f16a39740df63ab3dce6f06c911b57de4b8639741e119baeafd89d623e6ae10341c75

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9126636.exe

    Filesize

    356KB

    MD5

    cf8f7715080052a81d95259096d6924e

    SHA1

    1c975b8cf9ba9e7ee9bcad1e343c98dcdb98854a

    SHA256

    090a7083e6cee740d578c1a9733a5f0b892e1024ec855229feafcf966c97b868

    SHA512

    a4d5307f5f16c42a3177b7992315631b8a76d0b916aec7ded3e4e964bc7f16a39740df63ab3dce6f06c911b57de4b8639741e119baeafd89d623e6ae10341c75

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5195917.exe

    Filesize

    966KB

    MD5

    bd3f34c1188859985894ceb58309b126

    SHA1

    33894ba88226ca51b97e21355a095c4e7907f11f

    SHA256

    f1e95ce4d285f16e76dd6c84352540fd8555642775f75784c1a88e81631ff085

    SHA512

    35d682e3c9201a24d8b13fd9cecb2426f7625ebfcc2a3ecc28d8526bee5099ae2d7ed10d6fcf5615ffbc98f57a52efd19f94d2b631a71d0ab66d1912d1513a2f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5195917.exe

    Filesize

    966KB

    MD5

    bd3f34c1188859985894ceb58309b126

    SHA1

    33894ba88226ca51b97e21355a095c4e7907f11f

    SHA256

    f1e95ce4d285f16e76dd6c84352540fd8555642775f75784c1a88e81631ff085

    SHA512

    35d682e3c9201a24d8b13fd9cecb2426f7625ebfcc2a3ecc28d8526bee5099ae2d7ed10d6fcf5615ffbc98f57a52efd19f94d2b631a71d0ab66d1912d1513a2f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1187942.exe

    Filesize

    789KB

    MD5

    490a11a065a1cfe3a6fb93921ed94a72

    SHA1

    5c281ee13effcdd0713b34cff2e96f1d6d6313cb

    SHA256

    03159fbc114fbe41a5dd7fc205ef4dbbc3b8daadc0cafeaeade9352b75e673c2

    SHA512

    c27078bfa0b268a87717e2065e6020324676ba1261583dc074a55e2e667be7c615cbab75c15a80714193093b558b3bb5d197bfaf33f0446126d31a86505fd99e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1187942.exe

    Filesize

    789KB

    MD5

    490a11a065a1cfe3a6fb93921ed94a72

    SHA1

    5c281ee13effcdd0713b34cff2e96f1d6d6313cb

    SHA256

    03159fbc114fbe41a5dd7fc205ef4dbbc3b8daadc0cafeaeade9352b75e673c2

    SHA512

    c27078bfa0b268a87717e2065e6020324676ba1261583dc074a55e2e667be7c615cbab75c15a80714193093b558b3bb5d197bfaf33f0446126d31a86505fd99e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9878741.exe

    Filesize

    606KB

    MD5

    7a22924d5f0760e249a8dba75e44bf8a

    SHA1

    596cc04d12392bd124ecded3929fddbd8cc3ae53

    SHA256

    96c293f9f5c951bc10563730e8154e62ec3147ec1090915868bcc2b5e4b15bc6

    SHA512

    3abc4b13dcab03c55229660015070e03809c414ebf254879ccfa06bf04ac00c9914eaa132603457f0255cf018ff82bdf315edb23eb933d6f42c37362d607b36d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9878741.exe

    Filesize

    606KB

    MD5

    7a22924d5f0760e249a8dba75e44bf8a

    SHA1

    596cc04d12392bd124ecded3929fddbd8cc3ae53

    SHA256

    96c293f9f5c951bc10563730e8154e62ec3147ec1090915868bcc2b5e4b15bc6

    SHA512

    3abc4b13dcab03c55229660015070e03809c414ebf254879ccfa06bf04ac00c9914eaa132603457f0255cf018ff82bdf315edb23eb933d6f42c37362d607b36d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z5298992.exe

    Filesize

    335KB

    MD5

    1fd511e0e4ed95dd0812e3bd26ef292e

    SHA1

    c529054ad148d35803f22d245765a8187c85c716

    SHA256

    e6930d7b1531edc248a979efcb68ab694e1147d0072c9f5f7dc3441d9de9223c

    SHA512

    039065d0b7c744a63752a2f60a9609b1d6c8034e868b89b0f57566743bb5129aaf6a7ad9128c8bbb3121cf1c59a66eb81557a77323dd488e4dccb28778f119fb

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z5298992.exe

    Filesize

    335KB

    MD5

    1fd511e0e4ed95dd0812e3bd26ef292e

    SHA1

    c529054ad148d35803f22d245765a8187c85c716

    SHA256

    e6930d7b1531edc248a979efcb68ab694e1147d0072c9f5f7dc3441d9de9223c

    SHA512

    039065d0b7c744a63752a2f60a9609b1d6c8034e868b89b0f57566743bb5129aaf6a7ad9128c8bbb3121cf1c59a66eb81557a77323dd488e4dccb28778f119fb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8171770.exe

    Filesize

    11KB

    MD5

    e2b9c78bac12e7185638d725b01f41c7

    SHA1

    f85862e3193d583a8dea51a0dfd92ab9a650b65b

    SHA256

    e00f426d72d97900e744dd9cabbfe4858310f5ba2b8212b0b32e7d830a3e9377

    SHA512

    9a9f6b7068d35b8b7e624fc5ebe100c08edbb3a0dbb46555f6fcc5040da156acb93f83c6a1211c505a2072ef358ec52084057aba7ae75e29c377d6a6aee27c7c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9126636.exe

    Filesize

    356KB

    MD5

    cf8f7715080052a81d95259096d6924e

    SHA1

    1c975b8cf9ba9e7ee9bcad1e343c98dcdb98854a

    SHA256

    090a7083e6cee740d578c1a9733a5f0b892e1024ec855229feafcf966c97b868

    SHA512

    a4d5307f5f16c42a3177b7992315631b8a76d0b916aec7ded3e4e964bc7f16a39740df63ab3dce6f06c911b57de4b8639741e119baeafd89d623e6ae10341c75

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9126636.exe

    Filesize

    356KB

    MD5

    cf8f7715080052a81d95259096d6924e

    SHA1

    1c975b8cf9ba9e7ee9bcad1e343c98dcdb98854a

    SHA256

    090a7083e6cee740d578c1a9733a5f0b892e1024ec855229feafcf966c97b868

    SHA512

    a4d5307f5f16c42a3177b7992315631b8a76d0b916aec7ded3e4e964bc7f16a39740df63ab3dce6f06c911b57de4b8639741e119baeafd89d623e6ae10341c75

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9126636.exe

    Filesize

    356KB

    MD5

    cf8f7715080052a81d95259096d6924e

    SHA1

    1c975b8cf9ba9e7ee9bcad1e343c98dcdb98854a

    SHA256

    090a7083e6cee740d578c1a9733a5f0b892e1024ec855229feafcf966c97b868

    SHA512

    a4d5307f5f16c42a3177b7992315631b8a76d0b916aec7ded3e4e964bc7f16a39740df63ab3dce6f06c911b57de4b8639741e119baeafd89d623e6ae10341c75

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9126636.exe

    Filesize

    356KB

    MD5

    cf8f7715080052a81d95259096d6924e

    SHA1

    1c975b8cf9ba9e7ee9bcad1e343c98dcdb98854a

    SHA256

    090a7083e6cee740d578c1a9733a5f0b892e1024ec855229feafcf966c97b868

    SHA512

    a4d5307f5f16c42a3177b7992315631b8a76d0b916aec7ded3e4e964bc7f16a39740df63ab3dce6f06c911b57de4b8639741e119baeafd89d623e6ae10341c75

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9126636.exe

    Filesize

    356KB

    MD5

    cf8f7715080052a81d95259096d6924e

    SHA1

    1c975b8cf9ba9e7ee9bcad1e343c98dcdb98854a

    SHA256

    090a7083e6cee740d578c1a9733a5f0b892e1024ec855229feafcf966c97b868

    SHA512

    a4d5307f5f16c42a3177b7992315631b8a76d0b916aec7ded3e4e964bc7f16a39740df63ab3dce6f06c911b57de4b8639741e119baeafd89d623e6ae10341c75

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9126636.exe

    Filesize

    356KB

    MD5

    cf8f7715080052a81d95259096d6924e

    SHA1

    1c975b8cf9ba9e7ee9bcad1e343c98dcdb98854a

    SHA256

    090a7083e6cee740d578c1a9733a5f0b892e1024ec855229feafcf966c97b868

    SHA512

    a4d5307f5f16c42a3177b7992315631b8a76d0b916aec7ded3e4e964bc7f16a39740df63ab3dce6f06c911b57de4b8639741e119baeafd89d623e6ae10341c75

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9126636.exe

    Filesize

    356KB

    MD5

    cf8f7715080052a81d95259096d6924e

    SHA1

    1c975b8cf9ba9e7ee9bcad1e343c98dcdb98854a

    SHA256

    090a7083e6cee740d578c1a9733a5f0b892e1024ec855229feafcf966c97b868

    SHA512

    a4d5307f5f16c42a3177b7992315631b8a76d0b916aec7ded3e4e964bc7f16a39740df63ab3dce6f06c911b57de4b8639741e119baeafd89d623e6ae10341c75

  • memory/2024-64-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2024-62-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2024-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2024-68-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2024-66-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2024-65-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2024-63-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2024-61-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2024-70-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2024-72-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2616-51-0x000007FEF5530000-0x000007FEF5F1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2616-50-0x000007FEF5530000-0x000007FEF5F1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2616-49-0x000007FEF5530000-0x000007FEF5F1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2616-48-0x0000000000940000-0x000000000094A000-memory.dmp

    Filesize

    40KB