Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2023 08:01

General

  • Target

    cac9b44a895c9dc8da9af116dcdc882b0805e40b1f3ef76fb4be3d2c99e53027.exe

  • Size

    1.0MB

  • MD5

    d31c2d7514378d75f7a18cdfc2973068

  • SHA1

    847f0a7e0879704755727c658b3ac066d5353ffe

  • SHA256

    cac9b44a895c9dc8da9af116dcdc882b0805e40b1f3ef76fb4be3d2c99e53027

  • SHA512

    0f92bc19bedd8c51b9a6879f27aa363ea44fa19aab8abc757d0492a94da62013f5c279d6ae9126bc7410137d37ff1aa1bf32e13c3fc0dbdb5b5aab052a594c95

  • SSDEEP

    24576:CyoX7Tcpn6o2XKlYqQuft+1BxtLw7YMiRr2/wL9o4qX:pITcNz2EYruk9Jw7sppL+4q

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cac9b44a895c9dc8da9af116dcdc882b0805e40b1f3ef76fb4be3d2c99e53027.exe
    "C:\Users\Admin\AppData\Local\Temp\cac9b44a895c9dc8da9af116dcdc882b0805e40b1f3ef76fb4be3d2c99e53027.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5585745.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5585745.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1743222.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1743222.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2552
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1234524.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1234524.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2716
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1041463.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1041463.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2916
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2871309.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2871309.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3064
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0714601.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0714601.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3012
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2456
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 268
                  8⤵
                  • Program crash
                  PID:2508
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 284
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5585745.exe

    Filesize

    905KB

    MD5

    326e5dca22494b1e9c2db2de6d93804a

    SHA1

    23ec863835e534b9844de8a889cd332ca4c49484

    SHA256

    00add8a7331c8e669eb306353ac0ceb114d0b72db1f333b5403ff4c3181ac3f7

    SHA512

    a268189eb8b220002e970b9236310e666a3104403016f76bae2ab47d3458b0ce201e4309dbc10715a356fc2d2653ad2103c5511a7260e4f7a550d9acf6b18772

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5585745.exe

    Filesize

    905KB

    MD5

    326e5dca22494b1e9c2db2de6d93804a

    SHA1

    23ec863835e534b9844de8a889cd332ca4c49484

    SHA256

    00add8a7331c8e669eb306353ac0ceb114d0b72db1f333b5403ff4c3181ac3f7

    SHA512

    a268189eb8b220002e970b9236310e666a3104403016f76bae2ab47d3458b0ce201e4309dbc10715a356fc2d2653ad2103c5511a7260e4f7a550d9acf6b18772

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1743222.exe

    Filesize

    723KB

    MD5

    747e21b5da0ebd863f16048b755e490b

    SHA1

    217a27350149875deebc4d01381acc6e2e8ffd7c

    SHA256

    72332926a0f10427f6f111973f67b28ba34b102e7213af574d5bb1b2237f0e14

    SHA512

    ee43d353e0dbb635daa4bc5d47867776d8576521d367de3218e6a65ba8dd5651a987aaf39aa23d2bfd02f97fc4c04e72e2fa827ecb877381600d22c8475c91e8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1743222.exe

    Filesize

    723KB

    MD5

    747e21b5da0ebd863f16048b755e490b

    SHA1

    217a27350149875deebc4d01381acc6e2e8ffd7c

    SHA256

    72332926a0f10427f6f111973f67b28ba34b102e7213af574d5bb1b2237f0e14

    SHA512

    ee43d353e0dbb635daa4bc5d47867776d8576521d367de3218e6a65ba8dd5651a987aaf39aa23d2bfd02f97fc4c04e72e2fa827ecb877381600d22c8475c91e8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1234524.exe

    Filesize

    540KB

    MD5

    6c7d7ba687f345af36bd38bb740967a4

    SHA1

    908109654e4350b0f666cc9ebfd691d2027a5a6c

    SHA256

    509d450db0df25445243a316493b86d313a7630f84e24e2e2039cb9ffc8c85a5

    SHA512

    515867784f7d251ebf4d32dc4814d1bd312602ac25ede19e0d0b771ab312d110d7f2249ac16a69e46736a89c2d670eb53e133fa3d4b0cb47acf504d957a70237

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1234524.exe

    Filesize

    540KB

    MD5

    6c7d7ba687f345af36bd38bb740967a4

    SHA1

    908109654e4350b0f666cc9ebfd691d2027a5a6c

    SHA256

    509d450db0df25445243a316493b86d313a7630f84e24e2e2039cb9ffc8c85a5

    SHA512

    515867784f7d251ebf4d32dc4814d1bd312602ac25ede19e0d0b771ab312d110d7f2249ac16a69e46736a89c2d670eb53e133fa3d4b0cb47acf504d957a70237

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1041463.exe

    Filesize

    293KB

    MD5

    3e63f95916b1e1b36cd34aca007bdea1

    SHA1

    441cde843181bddf3a47d66ee30effa04543f1f6

    SHA256

    2793340617e64e0f620c4c6838c2f3e34f5b0b7f4da667a963056826bad5f093

    SHA512

    fdabd931e066debac03be27b535362a8a3b7a6f76489669c11a66285f79e87021707fa4639a1cafd95371f0f3c3f1987bdbc35c9d5b90e5d29975d9541cf5cae

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1041463.exe

    Filesize

    293KB

    MD5

    3e63f95916b1e1b36cd34aca007bdea1

    SHA1

    441cde843181bddf3a47d66ee30effa04543f1f6

    SHA256

    2793340617e64e0f620c4c6838c2f3e34f5b0b7f4da667a963056826bad5f093

    SHA512

    fdabd931e066debac03be27b535362a8a3b7a6f76489669c11a66285f79e87021707fa4639a1cafd95371f0f3c3f1987bdbc35c9d5b90e5d29975d9541cf5cae

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2871309.exe

    Filesize

    12KB

    MD5

    5460431933feb409b4202705c068a428

    SHA1

    58e20f712e69932eb03178c43a8ae43f80fb7b7f

    SHA256

    914ae44a7c8e60ae8056fdb0a88b64f31383926356c77d8b523fdebfb22c65d5

    SHA512

    341a72c5a83ac2c8e2e841f6d0d8ccd8e77d1715324002d449138cad04ff267c57473b1db8c58f3178d67b6806dd4e72e6e83c0b0355abe41f02a24b5721e011

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2871309.exe

    Filesize

    12KB

    MD5

    5460431933feb409b4202705c068a428

    SHA1

    58e20f712e69932eb03178c43a8ae43f80fb7b7f

    SHA256

    914ae44a7c8e60ae8056fdb0a88b64f31383926356c77d8b523fdebfb22c65d5

    SHA512

    341a72c5a83ac2c8e2e841f6d0d8ccd8e77d1715324002d449138cad04ff267c57473b1db8c58f3178d67b6806dd4e72e6e83c0b0355abe41f02a24b5721e011

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0714601.exe

    Filesize

    285KB

    MD5

    ced95782f06d813465aa26f8d99cc09c

    SHA1

    54507a7f39a531cc3b01020d060ecd9bd5b21d65

    SHA256

    05fe675c65e75d043bd33045d6d321c60e2b2622ab86f8aa150636668df7f6b4

    SHA512

    3dbbc54e0466ddce220b1e2a6065f21b943b607adc23505cfc06e68770987f0c74ce22c3530e37c3de92daaef025f16224319af247f5e2c6a28a33c3491d2305

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0714601.exe

    Filesize

    285KB

    MD5

    ced95782f06d813465aa26f8d99cc09c

    SHA1

    54507a7f39a531cc3b01020d060ecd9bd5b21d65

    SHA256

    05fe675c65e75d043bd33045d6d321c60e2b2622ab86f8aa150636668df7f6b4

    SHA512

    3dbbc54e0466ddce220b1e2a6065f21b943b607adc23505cfc06e68770987f0c74ce22c3530e37c3de92daaef025f16224319af247f5e2c6a28a33c3491d2305

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5585745.exe

    Filesize

    905KB

    MD5

    326e5dca22494b1e9c2db2de6d93804a

    SHA1

    23ec863835e534b9844de8a889cd332ca4c49484

    SHA256

    00add8a7331c8e669eb306353ac0ceb114d0b72db1f333b5403ff4c3181ac3f7

    SHA512

    a268189eb8b220002e970b9236310e666a3104403016f76bae2ab47d3458b0ce201e4309dbc10715a356fc2d2653ad2103c5511a7260e4f7a550d9acf6b18772

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5585745.exe

    Filesize

    905KB

    MD5

    326e5dca22494b1e9c2db2de6d93804a

    SHA1

    23ec863835e534b9844de8a889cd332ca4c49484

    SHA256

    00add8a7331c8e669eb306353ac0ceb114d0b72db1f333b5403ff4c3181ac3f7

    SHA512

    a268189eb8b220002e970b9236310e666a3104403016f76bae2ab47d3458b0ce201e4309dbc10715a356fc2d2653ad2103c5511a7260e4f7a550d9acf6b18772

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1743222.exe

    Filesize

    723KB

    MD5

    747e21b5da0ebd863f16048b755e490b

    SHA1

    217a27350149875deebc4d01381acc6e2e8ffd7c

    SHA256

    72332926a0f10427f6f111973f67b28ba34b102e7213af574d5bb1b2237f0e14

    SHA512

    ee43d353e0dbb635daa4bc5d47867776d8576521d367de3218e6a65ba8dd5651a987aaf39aa23d2bfd02f97fc4c04e72e2fa827ecb877381600d22c8475c91e8

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1743222.exe

    Filesize

    723KB

    MD5

    747e21b5da0ebd863f16048b755e490b

    SHA1

    217a27350149875deebc4d01381acc6e2e8ffd7c

    SHA256

    72332926a0f10427f6f111973f67b28ba34b102e7213af574d5bb1b2237f0e14

    SHA512

    ee43d353e0dbb635daa4bc5d47867776d8576521d367de3218e6a65ba8dd5651a987aaf39aa23d2bfd02f97fc4c04e72e2fa827ecb877381600d22c8475c91e8

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1234524.exe

    Filesize

    540KB

    MD5

    6c7d7ba687f345af36bd38bb740967a4

    SHA1

    908109654e4350b0f666cc9ebfd691d2027a5a6c

    SHA256

    509d450db0df25445243a316493b86d313a7630f84e24e2e2039cb9ffc8c85a5

    SHA512

    515867784f7d251ebf4d32dc4814d1bd312602ac25ede19e0d0b771ab312d110d7f2249ac16a69e46736a89c2d670eb53e133fa3d4b0cb47acf504d957a70237

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1234524.exe

    Filesize

    540KB

    MD5

    6c7d7ba687f345af36bd38bb740967a4

    SHA1

    908109654e4350b0f666cc9ebfd691d2027a5a6c

    SHA256

    509d450db0df25445243a316493b86d313a7630f84e24e2e2039cb9ffc8c85a5

    SHA512

    515867784f7d251ebf4d32dc4814d1bd312602ac25ede19e0d0b771ab312d110d7f2249ac16a69e46736a89c2d670eb53e133fa3d4b0cb47acf504d957a70237

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z1041463.exe

    Filesize

    293KB

    MD5

    3e63f95916b1e1b36cd34aca007bdea1

    SHA1

    441cde843181bddf3a47d66ee30effa04543f1f6

    SHA256

    2793340617e64e0f620c4c6838c2f3e34f5b0b7f4da667a963056826bad5f093

    SHA512

    fdabd931e066debac03be27b535362a8a3b7a6f76489669c11a66285f79e87021707fa4639a1cafd95371f0f3c3f1987bdbc35c9d5b90e5d29975d9541cf5cae

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z1041463.exe

    Filesize

    293KB

    MD5

    3e63f95916b1e1b36cd34aca007bdea1

    SHA1

    441cde843181bddf3a47d66ee30effa04543f1f6

    SHA256

    2793340617e64e0f620c4c6838c2f3e34f5b0b7f4da667a963056826bad5f093

    SHA512

    fdabd931e066debac03be27b535362a8a3b7a6f76489669c11a66285f79e87021707fa4639a1cafd95371f0f3c3f1987bdbc35c9d5b90e5d29975d9541cf5cae

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2871309.exe

    Filesize

    12KB

    MD5

    5460431933feb409b4202705c068a428

    SHA1

    58e20f712e69932eb03178c43a8ae43f80fb7b7f

    SHA256

    914ae44a7c8e60ae8056fdb0a88b64f31383926356c77d8b523fdebfb22c65d5

    SHA512

    341a72c5a83ac2c8e2e841f6d0d8ccd8e77d1715324002d449138cad04ff267c57473b1db8c58f3178d67b6806dd4e72e6e83c0b0355abe41f02a24b5721e011

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0714601.exe

    Filesize

    285KB

    MD5

    ced95782f06d813465aa26f8d99cc09c

    SHA1

    54507a7f39a531cc3b01020d060ecd9bd5b21d65

    SHA256

    05fe675c65e75d043bd33045d6d321c60e2b2622ab86f8aa150636668df7f6b4

    SHA512

    3dbbc54e0466ddce220b1e2a6065f21b943b607adc23505cfc06e68770987f0c74ce22c3530e37c3de92daaef025f16224319af247f5e2c6a28a33c3491d2305

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0714601.exe

    Filesize

    285KB

    MD5

    ced95782f06d813465aa26f8d99cc09c

    SHA1

    54507a7f39a531cc3b01020d060ecd9bd5b21d65

    SHA256

    05fe675c65e75d043bd33045d6d321c60e2b2622ab86f8aa150636668df7f6b4

    SHA512

    3dbbc54e0466ddce220b1e2a6065f21b943b607adc23505cfc06e68770987f0c74ce22c3530e37c3de92daaef025f16224319af247f5e2c6a28a33c3491d2305

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0714601.exe

    Filesize

    285KB

    MD5

    ced95782f06d813465aa26f8d99cc09c

    SHA1

    54507a7f39a531cc3b01020d060ecd9bd5b21d65

    SHA256

    05fe675c65e75d043bd33045d6d321c60e2b2622ab86f8aa150636668df7f6b4

    SHA512

    3dbbc54e0466ddce220b1e2a6065f21b943b607adc23505cfc06e68770987f0c74ce22c3530e37c3de92daaef025f16224319af247f5e2c6a28a33c3491d2305

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0714601.exe

    Filesize

    285KB

    MD5

    ced95782f06d813465aa26f8d99cc09c

    SHA1

    54507a7f39a531cc3b01020d060ecd9bd5b21d65

    SHA256

    05fe675c65e75d043bd33045d6d321c60e2b2622ab86f8aa150636668df7f6b4

    SHA512

    3dbbc54e0466ddce220b1e2a6065f21b943b607adc23505cfc06e68770987f0c74ce22c3530e37c3de92daaef025f16224319af247f5e2c6a28a33c3491d2305

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0714601.exe

    Filesize

    285KB

    MD5

    ced95782f06d813465aa26f8d99cc09c

    SHA1

    54507a7f39a531cc3b01020d060ecd9bd5b21d65

    SHA256

    05fe675c65e75d043bd33045d6d321c60e2b2622ab86f8aa150636668df7f6b4

    SHA512

    3dbbc54e0466ddce220b1e2a6065f21b943b607adc23505cfc06e68770987f0c74ce22c3530e37c3de92daaef025f16224319af247f5e2c6a28a33c3491d2305

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0714601.exe

    Filesize

    285KB

    MD5

    ced95782f06d813465aa26f8d99cc09c

    SHA1

    54507a7f39a531cc3b01020d060ecd9bd5b21d65

    SHA256

    05fe675c65e75d043bd33045d6d321c60e2b2622ab86f8aa150636668df7f6b4

    SHA512

    3dbbc54e0466ddce220b1e2a6065f21b943b607adc23505cfc06e68770987f0c74ce22c3530e37c3de92daaef025f16224319af247f5e2c6a28a33c3491d2305

  • memory/2456-59-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2456-62-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2456-60-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2456-61-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2456-58-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2456-63-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2456-64-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2456-65-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2456-67-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2456-69-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3064-51-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/3064-50-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/3064-49-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/3064-48-0x0000000000D10000-0x0000000000D1A000-memory.dmp

    Filesize

    40KB