Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2023 07:49

General

  • Target

    0f9ee942d9cf4fba7afe2a9ab0188e3241fc767ce455c4a3fdc9ab5c85df0a00.exe

  • Size

    877KB

  • MD5

    c637196886000a0dab1d2b18f2821dec

  • SHA1

    8589b1473fff7ccb83677808504b99a62da1cc61

  • SHA256

    0f9ee942d9cf4fba7afe2a9ab0188e3241fc767ce455c4a3fdc9ab5c85df0a00

  • SHA512

    37b751181c213817a517f9b02e5b7672e3abc69a66e163f6c3dc56721b2133d879cb3d5f5564fbe98400e5acbffd03a10898f4fe56e590ac8db38443fd7301b8

  • SSDEEP

    24576:hyKTJb0MBTn1huJwOiUlI3P8Lskkic0pBk:UyJbXBTnrCQU+8Ads

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f9ee942d9cf4fba7afe2a9ab0188e3241fc767ce455c4a3fdc9ab5c85df0a00.exe
    "C:\Users\Admin\AppData\Local\Temp\0f9ee942d9cf4fba7afe2a9ab0188e3241fc767ce455c4a3fdc9ab5c85df0a00.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ha6BX41.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ha6BX41.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eB7Ra85.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eB7Ra85.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2288
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jO0xL40.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jO0xL40.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1zC86Le5.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1zC86Le5.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2644
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2UN8703.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2UN8703.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1448
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2912
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 268
                7⤵
                • Program crash
                PID:2504
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ha6BX41.exe

    Filesize

    737KB

    MD5

    ba40c854de47a97ee54cb24821ccc85a

    SHA1

    dc8e0ef07bec0e10ae3f8a6424dc61cf9b8d70f4

    SHA256

    ae23bb5d71298b31be62f52e11f8cabb3c924b08785700530b94d942ba2c603e

    SHA512

    edea2707e322484384a94c2b0d3688dc605f4b4610e0b6a4646f2263d7056bc968d97d48a40b4171539eab7948ca5b504b13450607c59cad88c7334baf2af39c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ha6BX41.exe

    Filesize

    737KB

    MD5

    ba40c854de47a97ee54cb24821ccc85a

    SHA1

    dc8e0ef07bec0e10ae3f8a6424dc61cf9b8d70f4

    SHA256

    ae23bb5d71298b31be62f52e11f8cabb3c924b08785700530b94d942ba2c603e

    SHA512

    edea2707e322484384a94c2b0d3688dc605f4b4610e0b6a4646f2263d7056bc968d97d48a40b4171539eab7948ca5b504b13450607c59cad88c7334baf2af39c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eB7Ra85.exe

    Filesize

    490KB

    MD5

    fb4d65693acf58e1904e19987b2d67cc

    SHA1

    e59952ee935a752c9dc5edfb00d8c68461be8408

    SHA256

    c3cc94260a9a3c7e7b3164dba24d14784ce861f867a6cb86c78c0f7c26d073c7

    SHA512

    761786a52dfb0ebebbb6dbfeea94e88f9deb65fc657aa6057ec6f87a625c6791aa9fa301f8b6f2fc08f786da8723b2a54ebe0f64cfb058e81f8001c0565d57eb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eB7Ra85.exe

    Filesize

    490KB

    MD5

    fb4d65693acf58e1904e19987b2d67cc

    SHA1

    e59952ee935a752c9dc5edfb00d8c68461be8408

    SHA256

    c3cc94260a9a3c7e7b3164dba24d14784ce861f867a6cb86c78c0f7c26d073c7

    SHA512

    761786a52dfb0ebebbb6dbfeea94e88f9deb65fc657aa6057ec6f87a625c6791aa9fa301f8b6f2fc08f786da8723b2a54ebe0f64cfb058e81f8001c0565d57eb

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jO0xL40.exe

    Filesize

    293KB

    MD5

    0b423746f3e5684cdf50a8b53cbfbbb3

    SHA1

    99cab2fb070ebffad806afa3171654d676d0f281

    SHA256

    df67c6c5b84dd8f46aee914699e924ec1d905941935243f03d236f4d510b22f1

    SHA512

    8febdd647482fc301d7a2fa2bac5b0c45b994cde83cc1dbcb3768831da646c23bd5dd4552d57206dbf65b4340f7fbae0921ad2bc8100b5225910f6b700033b53

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jO0xL40.exe

    Filesize

    293KB

    MD5

    0b423746f3e5684cdf50a8b53cbfbbb3

    SHA1

    99cab2fb070ebffad806afa3171654d676d0f281

    SHA256

    df67c6c5b84dd8f46aee914699e924ec1d905941935243f03d236f4d510b22f1

    SHA512

    8febdd647482fc301d7a2fa2bac5b0c45b994cde83cc1dbcb3768831da646c23bd5dd4552d57206dbf65b4340f7fbae0921ad2bc8100b5225910f6b700033b53

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1zC86Le5.exe

    Filesize

    12KB

    MD5

    4f191e922f5c2ff112332544c3757383

    SHA1

    6ab3c7f33b49aec5c55cc0eb75c4dce1e3e6e8f9

    SHA256

    ebf3a4cf7d9df6e3875c37b12340e5753a01066f8f96176f1753433f5c2e226f

    SHA512

    851bc4e5fa88718217e08d82093b45db7d08412b6b8d3fddb12ad603619a33a0310e8d9a6f47efd7093c8223d9220488db3743d564faf066e182f7d49e9a6963

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1zC86Le5.exe

    Filesize

    12KB

    MD5

    4f191e922f5c2ff112332544c3757383

    SHA1

    6ab3c7f33b49aec5c55cc0eb75c4dce1e3e6e8f9

    SHA256

    ebf3a4cf7d9df6e3875c37b12340e5753a01066f8f96176f1753433f5c2e226f

    SHA512

    851bc4e5fa88718217e08d82093b45db7d08412b6b8d3fddb12ad603619a33a0310e8d9a6f47efd7093c8223d9220488db3743d564faf066e182f7d49e9a6963

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2UN8703.exe

    Filesize

    285KB

    MD5

    b9504e6ef8445f8fc3726d07f81acc73

    SHA1

    10facc9f0d611cd05017d98888a65a8eb2e4fc74

    SHA256

    ab5647e26c4cc4d14a091db7edf744b984a86692aad3cdb551b649443812a403

    SHA512

    5f05f27648fb84820f99a076dd6caf39dd3788b98e38de1f334376d0bb7bc40b9b8cb9dea6920f8908ddff03f402b6f80118ca35e2f25a51dd8bce28f9286647

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2UN8703.exe

    Filesize

    285KB

    MD5

    b9504e6ef8445f8fc3726d07f81acc73

    SHA1

    10facc9f0d611cd05017d98888a65a8eb2e4fc74

    SHA256

    ab5647e26c4cc4d14a091db7edf744b984a86692aad3cdb551b649443812a403

    SHA512

    5f05f27648fb84820f99a076dd6caf39dd3788b98e38de1f334376d0bb7bc40b9b8cb9dea6920f8908ddff03f402b6f80118ca35e2f25a51dd8bce28f9286647

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Ha6BX41.exe

    Filesize

    737KB

    MD5

    ba40c854de47a97ee54cb24821ccc85a

    SHA1

    dc8e0ef07bec0e10ae3f8a6424dc61cf9b8d70f4

    SHA256

    ae23bb5d71298b31be62f52e11f8cabb3c924b08785700530b94d942ba2c603e

    SHA512

    edea2707e322484384a94c2b0d3688dc605f4b4610e0b6a4646f2263d7056bc968d97d48a40b4171539eab7948ca5b504b13450607c59cad88c7334baf2af39c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Ha6BX41.exe

    Filesize

    737KB

    MD5

    ba40c854de47a97ee54cb24821ccc85a

    SHA1

    dc8e0ef07bec0e10ae3f8a6424dc61cf9b8d70f4

    SHA256

    ae23bb5d71298b31be62f52e11f8cabb3c924b08785700530b94d942ba2c603e

    SHA512

    edea2707e322484384a94c2b0d3688dc605f4b4610e0b6a4646f2263d7056bc968d97d48a40b4171539eab7948ca5b504b13450607c59cad88c7334baf2af39c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\eB7Ra85.exe

    Filesize

    490KB

    MD5

    fb4d65693acf58e1904e19987b2d67cc

    SHA1

    e59952ee935a752c9dc5edfb00d8c68461be8408

    SHA256

    c3cc94260a9a3c7e7b3164dba24d14784ce861f867a6cb86c78c0f7c26d073c7

    SHA512

    761786a52dfb0ebebbb6dbfeea94e88f9deb65fc657aa6057ec6f87a625c6791aa9fa301f8b6f2fc08f786da8723b2a54ebe0f64cfb058e81f8001c0565d57eb

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\eB7Ra85.exe

    Filesize

    490KB

    MD5

    fb4d65693acf58e1904e19987b2d67cc

    SHA1

    e59952ee935a752c9dc5edfb00d8c68461be8408

    SHA256

    c3cc94260a9a3c7e7b3164dba24d14784ce861f867a6cb86c78c0f7c26d073c7

    SHA512

    761786a52dfb0ebebbb6dbfeea94e88f9deb65fc657aa6057ec6f87a625c6791aa9fa301f8b6f2fc08f786da8723b2a54ebe0f64cfb058e81f8001c0565d57eb

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\jO0xL40.exe

    Filesize

    293KB

    MD5

    0b423746f3e5684cdf50a8b53cbfbbb3

    SHA1

    99cab2fb070ebffad806afa3171654d676d0f281

    SHA256

    df67c6c5b84dd8f46aee914699e924ec1d905941935243f03d236f4d510b22f1

    SHA512

    8febdd647482fc301d7a2fa2bac5b0c45b994cde83cc1dbcb3768831da646c23bd5dd4552d57206dbf65b4340f7fbae0921ad2bc8100b5225910f6b700033b53

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\jO0xL40.exe

    Filesize

    293KB

    MD5

    0b423746f3e5684cdf50a8b53cbfbbb3

    SHA1

    99cab2fb070ebffad806afa3171654d676d0f281

    SHA256

    df67c6c5b84dd8f46aee914699e924ec1d905941935243f03d236f4d510b22f1

    SHA512

    8febdd647482fc301d7a2fa2bac5b0c45b994cde83cc1dbcb3768831da646c23bd5dd4552d57206dbf65b4340f7fbae0921ad2bc8100b5225910f6b700033b53

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1zC86Le5.exe

    Filesize

    12KB

    MD5

    4f191e922f5c2ff112332544c3757383

    SHA1

    6ab3c7f33b49aec5c55cc0eb75c4dce1e3e6e8f9

    SHA256

    ebf3a4cf7d9df6e3875c37b12340e5753a01066f8f96176f1753433f5c2e226f

    SHA512

    851bc4e5fa88718217e08d82093b45db7d08412b6b8d3fddb12ad603619a33a0310e8d9a6f47efd7093c8223d9220488db3743d564faf066e182f7d49e9a6963

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2UN8703.exe

    Filesize

    285KB

    MD5

    b9504e6ef8445f8fc3726d07f81acc73

    SHA1

    10facc9f0d611cd05017d98888a65a8eb2e4fc74

    SHA256

    ab5647e26c4cc4d14a091db7edf744b984a86692aad3cdb551b649443812a403

    SHA512

    5f05f27648fb84820f99a076dd6caf39dd3788b98e38de1f334376d0bb7bc40b9b8cb9dea6920f8908ddff03f402b6f80118ca35e2f25a51dd8bce28f9286647

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2UN8703.exe

    Filesize

    285KB

    MD5

    b9504e6ef8445f8fc3726d07f81acc73

    SHA1

    10facc9f0d611cd05017d98888a65a8eb2e4fc74

    SHA256

    ab5647e26c4cc4d14a091db7edf744b984a86692aad3cdb551b649443812a403

    SHA512

    5f05f27648fb84820f99a076dd6caf39dd3788b98e38de1f334376d0bb7bc40b9b8cb9dea6920f8908ddff03f402b6f80118ca35e2f25a51dd8bce28f9286647

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2UN8703.exe

    Filesize

    285KB

    MD5

    b9504e6ef8445f8fc3726d07f81acc73

    SHA1

    10facc9f0d611cd05017d98888a65a8eb2e4fc74

    SHA256

    ab5647e26c4cc4d14a091db7edf744b984a86692aad3cdb551b649443812a403

    SHA512

    5f05f27648fb84820f99a076dd6caf39dd3788b98e38de1f334376d0bb7bc40b9b8cb9dea6920f8908ddff03f402b6f80118ca35e2f25a51dd8bce28f9286647

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2UN8703.exe

    Filesize

    285KB

    MD5

    b9504e6ef8445f8fc3726d07f81acc73

    SHA1

    10facc9f0d611cd05017d98888a65a8eb2e4fc74

    SHA256

    ab5647e26c4cc4d14a091db7edf744b984a86692aad3cdb551b649443812a403

    SHA512

    5f05f27648fb84820f99a076dd6caf39dd3788b98e38de1f334376d0bb7bc40b9b8cb9dea6920f8908ddff03f402b6f80118ca35e2f25a51dd8bce28f9286647

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2UN8703.exe

    Filesize

    285KB

    MD5

    b9504e6ef8445f8fc3726d07f81acc73

    SHA1

    10facc9f0d611cd05017d98888a65a8eb2e4fc74

    SHA256

    ab5647e26c4cc4d14a091db7edf744b984a86692aad3cdb551b649443812a403

    SHA512

    5f05f27648fb84820f99a076dd6caf39dd3788b98e38de1f334376d0bb7bc40b9b8cb9dea6920f8908ddff03f402b6f80118ca35e2f25a51dd8bce28f9286647

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2UN8703.exe

    Filesize

    285KB

    MD5

    b9504e6ef8445f8fc3726d07f81acc73

    SHA1

    10facc9f0d611cd05017d98888a65a8eb2e4fc74

    SHA256

    ab5647e26c4cc4d14a091db7edf744b984a86692aad3cdb551b649443812a403

    SHA512

    5f05f27648fb84820f99a076dd6caf39dd3788b98e38de1f334376d0bb7bc40b9b8cb9dea6920f8908ddff03f402b6f80118ca35e2f25a51dd8bce28f9286647

  • memory/2644-41-0x000007FEF58D0000-0x000007FEF62BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2644-40-0x000007FEF58D0000-0x000007FEF62BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2644-38-0x00000000012B0000-0x00000000012BA000-memory.dmp

    Filesize

    40KB

  • memory/2644-39-0x000007FEF58D0000-0x000007FEF62BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2912-55-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2912-53-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2912-54-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2912-49-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2912-59-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2912-57-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2912-48-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2912-52-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2912-51-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2912-50-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB