Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2023 14:34

General

  • Target

    file.exe

  • Size

    1.4MB

  • MD5

    a0954dcc5c5a6b3a2e945b5da27d605f

  • SHA1

    7cbac1343a1cb299dd003915585848529ed7eeaa

  • SHA256

    e920970ed1de88fb55f521007c10e12a677a5f43523cb4a73e10e2c70735d8e2

  • SHA512

    ed0268da7e6cad2d685a9bbcc75c58d34b2acd9da9cc6685971fd5694eda639a8e11b16c1ccf2c08c983627a295252877f098ce21ef8e37df55247264c018c57

  • SSDEEP

    24576:UyokEU35PYRARCWqRHUtWJ+bMsLh3MQhm57A9W6K/XBjGQn79KsnkN/NRc73:jokEUJPTCKWn2hcQhu76K/XBjGQn5KNl

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lj4CC29.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lj4CC29.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\CA3Qe22.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\CA3Qe22.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\BG9wh77.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\BG9wh77.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1716
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Uw80nz8.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Uw80nz8.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1344
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2gX1242.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2gX1242.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2692
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2572
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:2600
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  6⤵
                    PID:2468
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    6⤵
                      PID:2976
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 308
                      6⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:588

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lj4CC29.exe

            Filesize

            1.3MB

            MD5

            a8d5258bd2dbae42af8ff28e46840914

            SHA1

            196950350f389be23b6dfeab64a7260f30be0e3b

            SHA256

            e7f12c98b6e84d330b846db2fb76f56795cffd28cdabf0a07df4d9ad78173cc7

            SHA512

            09a12a457d507e4f138f742be995ecc0edf68fa46b51e0682a32f9c288017ae6e502032c93c87b82e3a5dec27a58be440a7d1f043312b0bdc39dfdd5beb1352c

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lj4CC29.exe

            Filesize

            1.3MB

            MD5

            a8d5258bd2dbae42af8ff28e46840914

            SHA1

            196950350f389be23b6dfeab64a7260f30be0e3b

            SHA256

            e7f12c98b6e84d330b846db2fb76f56795cffd28cdabf0a07df4d9ad78173cc7

            SHA512

            09a12a457d507e4f138f742be995ecc0edf68fa46b51e0682a32f9c288017ae6e502032c93c87b82e3a5dec27a58be440a7d1f043312b0bdc39dfdd5beb1352c

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\CA3Qe22.exe

            Filesize

            876KB

            MD5

            37cdd3660d32bd7f662f9478711545d8

            SHA1

            25fedcbb0863e573047d5a6dc4de88e5dca23e88

            SHA256

            4b8ae915943b9e35e415592b49aa93abcea5343fd10ea524d3d545961c67f50b

            SHA512

            c044eb41e9df5bba92f35b88acea7a2608adccebf6e02e2fb8ea08b8809287b371917f0fddf394efa390ec700f83d690ceb3d69f9b67bab1b14c8ed14e953775

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\CA3Qe22.exe

            Filesize

            876KB

            MD5

            37cdd3660d32bd7f662f9478711545d8

            SHA1

            25fedcbb0863e573047d5a6dc4de88e5dca23e88

            SHA256

            4b8ae915943b9e35e415592b49aa93abcea5343fd10ea524d3d545961c67f50b

            SHA512

            c044eb41e9df5bba92f35b88acea7a2608adccebf6e02e2fb8ea08b8809287b371917f0fddf394efa390ec700f83d690ceb3d69f9b67bab1b14c8ed14e953775

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\BG9wh77.exe

            Filesize

            490KB

            MD5

            d00d73e011f947cf4c076d5587ffb456

            SHA1

            b04221d535bdec6fd783d7d34c35180e07336942

            SHA256

            fe1cf6eeb0e6cf9b043f69dc9e7cba829a06f5661000e27103193e1f34881303

            SHA512

            3cf6e64db669b3dc0d32b2bbf143f326cc39ea6d4449795b33e881e25bcf8417a5324f8602d1cac342b3e2287a2f4e84dcca7dba0427002bcdd5eaafdaae991c

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\BG9wh77.exe

            Filesize

            490KB

            MD5

            d00d73e011f947cf4c076d5587ffb456

            SHA1

            b04221d535bdec6fd783d7d34c35180e07336942

            SHA256

            fe1cf6eeb0e6cf9b043f69dc9e7cba829a06f5661000e27103193e1f34881303

            SHA512

            3cf6e64db669b3dc0d32b2bbf143f326cc39ea6d4449795b33e881e25bcf8417a5324f8602d1cac342b3e2287a2f4e84dcca7dba0427002bcdd5eaafdaae991c

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Uw80nz8.exe

            Filesize

            21KB

            MD5

            756eb314a60bf916c46b4a295459b5a1

            SHA1

            39f6ee51f655d0de08e617404cdf1d9689c61951

            SHA256

            263bcddb84d31147374037d655968257639a5e7b3293d102d5e60f10fa04c303

            SHA512

            d1f22fbab615378a6e30b49fa037ab41ee3e82705f12f752d64e1f92a863f6ed39e7eb4c43d5fd50eecfeaab977bbb0c95ec9eabf3358d5b1732b37f2118ed2c

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Uw80nz8.exe

            Filesize

            21KB

            MD5

            756eb314a60bf916c46b4a295459b5a1

            SHA1

            39f6ee51f655d0de08e617404cdf1d9689c61951

            SHA256

            263bcddb84d31147374037d655968257639a5e7b3293d102d5e60f10fa04c303

            SHA512

            d1f22fbab615378a6e30b49fa037ab41ee3e82705f12f752d64e1f92a863f6ed39e7eb4c43d5fd50eecfeaab977bbb0c95ec9eabf3358d5b1732b37f2118ed2c

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2gX1242.exe

            Filesize

            1.4MB

            MD5

            91eeaed5134d39f4926ae2a841852624

            SHA1

            c5975ef578f85ad1a47276185bb575ea1b42aba6

            SHA256

            2fb675beb1d908c08446ee35f1f38d5f7cb370b48e2ea3a3fb7563806dcb36b1

            SHA512

            7543c29194c7ed97f9c08be52da54b25e56a783affc8e33ce4e30016065494161c18ecdfd8cd2d706e529b0b47e94e824c872f0c712aebf5a5a53328bc345ffe

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2gX1242.exe

            Filesize

            1.4MB

            MD5

            91eeaed5134d39f4926ae2a841852624

            SHA1

            c5975ef578f85ad1a47276185bb575ea1b42aba6

            SHA256

            2fb675beb1d908c08446ee35f1f38d5f7cb370b48e2ea3a3fb7563806dcb36b1

            SHA512

            7543c29194c7ed97f9c08be52da54b25e56a783affc8e33ce4e30016065494161c18ecdfd8cd2d706e529b0b47e94e824c872f0c712aebf5a5a53328bc345ffe

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Lj4CC29.exe

            Filesize

            1.3MB

            MD5

            a8d5258bd2dbae42af8ff28e46840914

            SHA1

            196950350f389be23b6dfeab64a7260f30be0e3b

            SHA256

            e7f12c98b6e84d330b846db2fb76f56795cffd28cdabf0a07df4d9ad78173cc7

            SHA512

            09a12a457d507e4f138f742be995ecc0edf68fa46b51e0682a32f9c288017ae6e502032c93c87b82e3a5dec27a58be440a7d1f043312b0bdc39dfdd5beb1352c

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Lj4CC29.exe

            Filesize

            1.3MB

            MD5

            a8d5258bd2dbae42af8ff28e46840914

            SHA1

            196950350f389be23b6dfeab64a7260f30be0e3b

            SHA256

            e7f12c98b6e84d330b846db2fb76f56795cffd28cdabf0a07df4d9ad78173cc7

            SHA512

            09a12a457d507e4f138f742be995ecc0edf68fa46b51e0682a32f9c288017ae6e502032c93c87b82e3a5dec27a58be440a7d1f043312b0bdc39dfdd5beb1352c

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\CA3Qe22.exe

            Filesize

            876KB

            MD5

            37cdd3660d32bd7f662f9478711545d8

            SHA1

            25fedcbb0863e573047d5a6dc4de88e5dca23e88

            SHA256

            4b8ae915943b9e35e415592b49aa93abcea5343fd10ea524d3d545961c67f50b

            SHA512

            c044eb41e9df5bba92f35b88acea7a2608adccebf6e02e2fb8ea08b8809287b371917f0fddf394efa390ec700f83d690ceb3d69f9b67bab1b14c8ed14e953775

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\CA3Qe22.exe

            Filesize

            876KB

            MD5

            37cdd3660d32bd7f662f9478711545d8

            SHA1

            25fedcbb0863e573047d5a6dc4de88e5dca23e88

            SHA256

            4b8ae915943b9e35e415592b49aa93abcea5343fd10ea524d3d545961c67f50b

            SHA512

            c044eb41e9df5bba92f35b88acea7a2608adccebf6e02e2fb8ea08b8809287b371917f0fddf394efa390ec700f83d690ceb3d69f9b67bab1b14c8ed14e953775

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\BG9wh77.exe

            Filesize

            490KB

            MD5

            d00d73e011f947cf4c076d5587ffb456

            SHA1

            b04221d535bdec6fd783d7d34c35180e07336942

            SHA256

            fe1cf6eeb0e6cf9b043f69dc9e7cba829a06f5661000e27103193e1f34881303

            SHA512

            3cf6e64db669b3dc0d32b2bbf143f326cc39ea6d4449795b33e881e25bcf8417a5324f8602d1cac342b3e2287a2f4e84dcca7dba0427002bcdd5eaafdaae991c

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\BG9wh77.exe

            Filesize

            490KB

            MD5

            d00d73e011f947cf4c076d5587ffb456

            SHA1

            b04221d535bdec6fd783d7d34c35180e07336942

            SHA256

            fe1cf6eeb0e6cf9b043f69dc9e7cba829a06f5661000e27103193e1f34881303

            SHA512

            3cf6e64db669b3dc0d32b2bbf143f326cc39ea6d4449795b33e881e25bcf8417a5324f8602d1cac342b3e2287a2f4e84dcca7dba0427002bcdd5eaafdaae991c

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Uw80nz8.exe

            Filesize

            21KB

            MD5

            756eb314a60bf916c46b4a295459b5a1

            SHA1

            39f6ee51f655d0de08e617404cdf1d9689c61951

            SHA256

            263bcddb84d31147374037d655968257639a5e7b3293d102d5e60f10fa04c303

            SHA512

            d1f22fbab615378a6e30b49fa037ab41ee3e82705f12f752d64e1f92a863f6ed39e7eb4c43d5fd50eecfeaab977bbb0c95ec9eabf3358d5b1732b37f2118ed2c

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2gX1242.exe

            Filesize

            1.4MB

            MD5

            91eeaed5134d39f4926ae2a841852624

            SHA1

            c5975ef578f85ad1a47276185bb575ea1b42aba6

            SHA256

            2fb675beb1d908c08446ee35f1f38d5f7cb370b48e2ea3a3fb7563806dcb36b1

            SHA512

            7543c29194c7ed97f9c08be52da54b25e56a783affc8e33ce4e30016065494161c18ecdfd8cd2d706e529b0b47e94e824c872f0c712aebf5a5a53328bc345ffe

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2gX1242.exe

            Filesize

            1.4MB

            MD5

            91eeaed5134d39f4926ae2a841852624

            SHA1

            c5975ef578f85ad1a47276185bb575ea1b42aba6

            SHA256

            2fb675beb1d908c08446ee35f1f38d5f7cb370b48e2ea3a3fb7563806dcb36b1

            SHA512

            7543c29194c7ed97f9c08be52da54b25e56a783affc8e33ce4e30016065494161c18ecdfd8cd2d706e529b0b47e94e824c872f0c712aebf5a5a53328bc345ffe

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2gX1242.exe

            Filesize

            1.4MB

            MD5

            91eeaed5134d39f4926ae2a841852624

            SHA1

            c5975ef578f85ad1a47276185bb575ea1b42aba6

            SHA256

            2fb675beb1d908c08446ee35f1f38d5f7cb370b48e2ea3a3fb7563806dcb36b1

            SHA512

            7543c29194c7ed97f9c08be52da54b25e56a783affc8e33ce4e30016065494161c18ecdfd8cd2d706e529b0b47e94e824c872f0c712aebf5a5a53328bc345ffe

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2gX1242.exe

            Filesize

            1.4MB

            MD5

            91eeaed5134d39f4926ae2a841852624

            SHA1

            c5975ef578f85ad1a47276185bb575ea1b42aba6

            SHA256

            2fb675beb1d908c08446ee35f1f38d5f7cb370b48e2ea3a3fb7563806dcb36b1

            SHA512

            7543c29194c7ed97f9c08be52da54b25e56a783affc8e33ce4e30016065494161c18ecdfd8cd2d706e529b0b47e94e824c872f0c712aebf5a5a53328bc345ffe

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2gX1242.exe

            Filesize

            1.4MB

            MD5

            91eeaed5134d39f4926ae2a841852624

            SHA1

            c5975ef578f85ad1a47276185bb575ea1b42aba6

            SHA256

            2fb675beb1d908c08446ee35f1f38d5f7cb370b48e2ea3a3fb7563806dcb36b1

            SHA512

            7543c29194c7ed97f9c08be52da54b25e56a783affc8e33ce4e30016065494161c18ecdfd8cd2d706e529b0b47e94e824c872f0c712aebf5a5a53328bc345ffe

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2gX1242.exe

            Filesize

            1.4MB

            MD5

            91eeaed5134d39f4926ae2a841852624

            SHA1

            c5975ef578f85ad1a47276185bb575ea1b42aba6

            SHA256

            2fb675beb1d908c08446ee35f1f38d5f7cb370b48e2ea3a3fb7563806dcb36b1

            SHA512

            7543c29194c7ed97f9c08be52da54b25e56a783affc8e33ce4e30016065494161c18ecdfd8cd2d706e529b0b47e94e824c872f0c712aebf5a5a53328bc345ffe

          • memory/1344-41-0x000007FEF5560000-0x000007FEF5F4C000-memory.dmp

            Filesize

            9.9MB

          • memory/1344-40-0x000007FEF5560000-0x000007FEF5F4C000-memory.dmp

            Filesize

            9.9MB

          • memory/1344-38-0x0000000000F20000-0x0000000000F2A000-memory.dmp

            Filesize

            40KB

          • memory/1344-39-0x000007FEF5560000-0x000007FEF5F4C000-memory.dmp

            Filesize

            9.9MB

          • memory/2976-58-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2976-61-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2976-60-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

            Filesize

            4KB

          • memory/2976-54-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2976-63-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2976-65-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2976-66-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2976-50-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2976-56-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2976-48-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2976-70-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2976-52-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB