Analysis

  • max time kernel
    117s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 22:54

General

  • Target

    55a329084a46e90e74ec2d0133bb862268c11af5e17d4af416a1c5417928f8d7.exe

  • Size

    1.1MB

  • MD5

    9cd9b89143289d7335f6e34dff5bad32

  • SHA1

    ee22b4c6d217688c9d537bdf51d08fb4cdb53f21

  • SHA256

    55a329084a46e90e74ec2d0133bb862268c11af5e17d4af416a1c5417928f8d7

  • SHA512

    6947b87ef44c8b33bd96091c38a46566f417c022ed38846c7bf67a57ca438ad9a59aed6c1dee61e8ab5848904d89ac1bd1293241c811d60e4cf9b65d9618f791

  • SSDEEP

    24576:ayKznZwBXhuXzO1HbdMHP0nzJ22t7EQgb7lY8dsjAJkudBSy6n:hKWEXY7wP0zXqQgN7dzJfB9

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55a329084a46e90e74ec2d0133bb862268c11af5e17d4af416a1c5417928f8d7.exe
    "C:\Users\Admin\AppData\Local\Temp\55a329084a46e90e74ec2d0133bb862268c11af5e17d4af416a1c5417928f8d7.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5500185.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5500185.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3744457.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3744457.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8707879.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8707879.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2576
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0010713.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0010713.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2472
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0875161.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0875161.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2556
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2220
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2904
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 284
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:524

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5500185.exe

      Filesize

      983KB

      MD5

      58266f83af667061e2cfc393569a7b9f

      SHA1

      08c254dd833bb2bb8c1f242c9ce0780c78b7842a

      SHA256

      76387b1412798f585e66f151a514dd12e1b86708ac828082dc4c9e8ffceb5029

      SHA512

      32815366926a6f0167d74ed7eaf52eae7a024bb08fdaed49972f8099149dfe63d4b1c5d4bebabc411331c40caace9db43610f8eb2f2a3c7269c62f84776f22c4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5500185.exe

      Filesize

      983KB

      MD5

      58266f83af667061e2cfc393569a7b9f

      SHA1

      08c254dd833bb2bb8c1f242c9ce0780c78b7842a

      SHA256

      76387b1412798f585e66f151a514dd12e1b86708ac828082dc4c9e8ffceb5029

      SHA512

      32815366926a6f0167d74ed7eaf52eae7a024bb08fdaed49972f8099149dfe63d4b1c5d4bebabc411331c40caace9db43610f8eb2f2a3c7269c62f84776f22c4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3744457.exe

      Filesize

      801KB

      MD5

      ef9955b255f82ffc464c93ed45dbb404

      SHA1

      b151fdf41f8ed90d1e080a030a8286eba9361152

      SHA256

      85639143956a8ba8f0f2ec71a4c86e0670b6c53c934956d8fbaaec6074c22dc6

      SHA512

      777d38ad19d822b91c2a71bffc69617bf279a2796888990924e99770ff3d53b00c348d0dff36b3408fc568ea5ec995ffbe7cc061ef270aa269a30f210ba0e6eb

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3744457.exe

      Filesize

      801KB

      MD5

      ef9955b255f82ffc464c93ed45dbb404

      SHA1

      b151fdf41f8ed90d1e080a030a8286eba9361152

      SHA256

      85639143956a8ba8f0f2ec71a4c86e0670b6c53c934956d8fbaaec6074c22dc6

      SHA512

      777d38ad19d822b91c2a71bffc69617bf279a2796888990924e99770ff3d53b00c348d0dff36b3408fc568ea5ec995ffbe7cc061ef270aa269a30f210ba0e6eb

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8707879.exe

      Filesize

      618KB

      MD5

      cde3f62527cfc4a3d9459f873a9747c4

      SHA1

      fe406d86edb0a4fdea49e851c32007e614e21967

      SHA256

      d5d0a05d02601ae0ece66361c430a603b29250b4093fccc0811e87d728d47a95

      SHA512

      60d7c5125d3da5bd02553a2df11fcaa247440729c85e4741c1aae9b975475687daed3abdcd611907f42c1791ea76af9be9dc01e528c1dcd6633ab94fd80b1e1f

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8707879.exe

      Filesize

      618KB

      MD5

      cde3f62527cfc4a3d9459f873a9747c4

      SHA1

      fe406d86edb0a4fdea49e851c32007e614e21967

      SHA256

      d5d0a05d02601ae0ece66361c430a603b29250b4093fccc0811e87d728d47a95

      SHA512

      60d7c5125d3da5bd02553a2df11fcaa247440729c85e4741c1aae9b975475687daed3abdcd611907f42c1791ea76af9be9dc01e528c1dcd6633ab94fd80b1e1f

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0010713.exe

      Filesize

      346KB

      MD5

      6997cd3f34a4804aaa2455b658d5611a

      SHA1

      9f34421328cd348985fc711ef4cd73ef92a8a3be

      SHA256

      7e1e35765c16f6075ee09e4c5e3aaf0c55bd7c3fc82dccc85b6d25535bb9c8e4

      SHA512

      e2b6b9744e6be384af9ff5c9ff3946d5113b8344e9e099de623197c3ac4d02a901958d4cd18b6f0b3f9b3feeed945fbefbf38d8686e75ff10a69681c9f01cdd6

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0010713.exe

      Filesize

      346KB

      MD5

      6997cd3f34a4804aaa2455b658d5611a

      SHA1

      9f34421328cd348985fc711ef4cd73ef92a8a3be

      SHA256

      7e1e35765c16f6075ee09e4c5e3aaf0c55bd7c3fc82dccc85b6d25535bb9c8e4

      SHA512

      e2b6b9744e6be384af9ff5c9ff3946d5113b8344e9e099de623197c3ac4d02a901958d4cd18b6f0b3f9b3feeed945fbefbf38d8686e75ff10a69681c9f01cdd6

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0875161.exe

      Filesize

      227KB

      MD5

      7a0fc5717e796bbedf54e146c9a8af7a

      SHA1

      6ebcabbbf3af955bca39253f70ee39f5babb8ef0

      SHA256

      8e5749576a0fb67ef59d38167bb58416dd3732bfc486d3c0ae2136d160c532b5

      SHA512

      2fdda36a2df94de47833ca50be24bdf40a54b5c1a905d3dc5e3f3937c84f033152dfe96ebee2953653a5e8a238e66f1319cf0a644fa672aa583b1a72f1c81a99

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0875161.exe

      Filesize

      227KB

      MD5

      7a0fc5717e796bbedf54e146c9a8af7a

      SHA1

      6ebcabbbf3af955bca39253f70ee39f5babb8ef0

      SHA256

      8e5749576a0fb67ef59d38167bb58416dd3732bfc486d3c0ae2136d160c532b5

      SHA512

      2fdda36a2df94de47833ca50be24bdf40a54b5c1a905d3dc5e3f3937c84f033152dfe96ebee2953653a5e8a238e66f1319cf0a644fa672aa583b1a72f1c81a99

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0875161.exe

      Filesize

      227KB

      MD5

      7a0fc5717e796bbedf54e146c9a8af7a

      SHA1

      6ebcabbbf3af955bca39253f70ee39f5babb8ef0

      SHA256

      8e5749576a0fb67ef59d38167bb58416dd3732bfc486d3c0ae2136d160c532b5

      SHA512

      2fdda36a2df94de47833ca50be24bdf40a54b5c1a905d3dc5e3f3937c84f033152dfe96ebee2953653a5e8a238e66f1319cf0a644fa672aa583b1a72f1c81a99

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5500185.exe

      Filesize

      983KB

      MD5

      58266f83af667061e2cfc393569a7b9f

      SHA1

      08c254dd833bb2bb8c1f242c9ce0780c78b7842a

      SHA256

      76387b1412798f585e66f151a514dd12e1b86708ac828082dc4c9e8ffceb5029

      SHA512

      32815366926a6f0167d74ed7eaf52eae7a024bb08fdaed49972f8099149dfe63d4b1c5d4bebabc411331c40caace9db43610f8eb2f2a3c7269c62f84776f22c4

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5500185.exe

      Filesize

      983KB

      MD5

      58266f83af667061e2cfc393569a7b9f

      SHA1

      08c254dd833bb2bb8c1f242c9ce0780c78b7842a

      SHA256

      76387b1412798f585e66f151a514dd12e1b86708ac828082dc4c9e8ffceb5029

      SHA512

      32815366926a6f0167d74ed7eaf52eae7a024bb08fdaed49972f8099149dfe63d4b1c5d4bebabc411331c40caace9db43610f8eb2f2a3c7269c62f84776f22c4

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3744457.exe

      Filesize

      801KB

      MD5

      ef9955b255f82ffc464c93ed45dbb404

      SHA1

      b151fdf41f8ed90d1e080a030a8286eba9361152

      SHA256

      85639143956a8ba8f0f2ec71a4c86e0670b6c53c934956d8fbaaec6074c22dc6

      SHA512

      777d38ad19d822b91c2a71bffc69617bf279a2796888990924e99770ff3d53b00c348d0dff36b3408fc568ea5ec995ffbe7cc061ef270aa269a30f210ba0e6eb

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3744457.exe

      Filesize

      801KB

      MD5

      ef9955b255f82ffc464c93ed45dbb404

      SHA1

      b151fdf41f8ed90d1e080a030a8286eba9361152

      SHA256

      85639143956a8ba8f0f2ec71a4c86e0670b6c53c934956d8fbaaec6074c22dc6

      SHA512

      777d38ad19d822b91c2a71bffc69617bf279a2796888990924e99770ff3d53b00c348d0dff36b3408fc568ea5ec995ffbe7cc061ef270aa269a30f210ba0e6eb

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8707879.exe

      Filesize

      618KB

      MD5

      cde3f62527cfc4a3d9459f873a9747c4

      SHA1

      fe406d86edb0a4fdea49e851c32007e614e21967

      SHA256

      d5d0a05d02601ae0ece66361c430a603b29250b4093fccc0811e87d728d47a95

      SHA512

      60d7c5125d3da5bd02553a2df11fcaa247440729c85e4741c1aae9b975475687daed3abdcd611907f42c1791ea76af9be9dc01e528c1dcd6633ab94fd80b1e1f

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8707879.exe

      Filesize

      618KB

      MD5

      cde3f62527cfc4a3d9459f873a9747c4

      SHA1

      fe406d86edb0a4fdea49e851c32007e614e21967

      SHA256

      d5d0a05d02601ae0ece66361c430a603b29250b4093fccc0811e87d728d47a95

      SHA512

      60d7c5125d3da5bd02553a2df11fcaa247440729c85e4741c1aae9b975475687daed3abdcd611907f42c1791ea76af9be9dc01e528c1dcd6633ab94fd80b1e1f

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z0010713.exe

      Filesize

      346KB

      MD5

      6997cd3f34a4804aaa2455b658d5611a

      SHA1

      9f34421328cd348985fc711ef4cd73ef92a8a3be

      SHA256

      7e1e35765c16f6075ee09e4c5e3aaf0c55bd7c3fc82dccc85b6d25535bb9c8e4

      SHA512

      e2b6b9744e6be384af9ff5c9ff3946d5113b8344e9e099de623197c3ac4d02a901958d4cd18b6f0b3f9b3feeed945fbefbf38d8686e75ff10a69681c9f01cdd6

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z0010713.exe

      Filesize

      346KB

      MD5

      6997cd3f34a4804aaa2455b658d5611a

      SHA1

      9f34421328cd348985fc711ef4cd73ef92a8a3be

      SHA256

      7e1e35765c16f6075ee09e4c5e3aaf0c55bd7c3fc82dccc85b6d25535bb9c8e4

      SHA512

      e2b6b9744e6be384af9ff5c9ff3946d5113b8344e9e099de623197c3ac4d02a901958d4cd18b6f0b3f9b3feeed945fbefbf38d8686e75ff10a69681c9f01cdd6

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0875161.exe

      Filesize

      227KB

      MD5

      7a0fc5717e796bbedf54e146c9a8af7a

      SHA1

      6ebcabbbf3af955bca39253f70ee39f5babb8ef0

      SHA256

      8e5749576a0fb67ef59d38167bb58416dd3732bfc486d3c0ae2136d160c532b5

      SHA512

      2fdda36a2df94de47833ca50be24bdf40a54b5c1a905d3dc5e3f3937c84f033152dfe96ebee2953653a5e8a238e66f1319cf0a644fa672aa583b1a72f1c81a99

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0875161.exe

      Filesize

      227KB

      MD5

      7a0fc5717e796bbedf54e146c9a8af7a

      SHA1

      6ebcabbbf3af955bca39253f70ee39f5babb8ef0

      SHA256

      8e5749576a0fb67ef59d38167bb58416dd3732bfc486d3c0ae2136d160c532b5

      SHA512

      2fdda36a2df94de47833ca50be24bdf40a54b5c1a905d3dc5e3f3937c84f033152dfe96ebee2953653a5e8a238e66f1319cf0a644fa672aa583b1a72f1c81a99

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0875161.exe

      Filesize

      227KB

      MD5

      7a0fc5717e796bbedf54e146c9a8af7a

      SHA1

      6ebcabbbf3af955bca39253f70ee39f5babb8ef0

      SHA256

      8e5749576a0fb67ef59d38167bb58416dd3732bfc486d3c0ae2136d160c532b5

      SHA512

      2fdda36a2df94de47833ca50be24bdf40a54b5c1a905d3dc5e3f3937c84f033152dfe96ebee2953653a5e8a238e66f1319cf0a644fa672aa583b1a72f1c81a99

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0875161.exe

      Filesize

      227KB

      MD5

      7a0fc5717e796bbedf54e146c9a8af7a

      SHA1

      6ebcabbbf3af955bca39253f70ee39f5babb8ef0

      SHA256

      8e5749576a0fb67ef59d38167bb58416dd3732bfc486d3c0ae2136d160c532b5

      SHA512

      2fdda36a2df94de47833ca50be24bdf40a54b5c1a905d3dc5e3f3937c84f033152dfe96ebee2953653a5e8a238e66f1319cf0a644fa672aa583b1a72f1c81a99

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0875161.exe

      Filesize

      227KB

      MD5

      7a0fc5717e796bbedf54e146c9a8af7a

      SHA1

      6ebcabbbf3af955bca39253f70ee39f5babb8ef0

      SHA256

      8e5749576a0fb67ef59d38167bb58416dd3732bfc486d3c0ae2136d160c532b5

      SHA512

      2fdda36a2df94de47833ca50be24bdf40a54b5c1a905d3dc5e3f3937c84f033152dfe96ebee2953653a5e8a238e66f1319cf0a644fa672aa583b1a72f1c81a99

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0875161.exe

      Filesize

      227KB

      MD5

      7a0fc5717e796bbedf54e146c9a8af7a

      SHA1

      6ebcabbbf3af955bca39253f70ee39f5babb8ef0

      SHA256

      8e5749576a0fb67ef59d38167bb58416dd3732bfc486d3c0ae2136d160c532b5

      SHA512

      2fdda36a2df94de47833ca50be24bdf40a54b5c1a905d3dc5e3f3937c84f033152dfe96ebee2953653a5e8a238e66f1319cf0a644fa672aa583b1a72f1c81a99

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0875161.exe

      Filesize

      227KB

      MD5

      7a0fc5717e796bbedf54e146c9a8af7a

      SHA1

      6ebcabbbf3af955bca39253f70ee39f5babb8ef0

      SHA256

      8e5749576a0fb67ef59d38167bb58416dd3732bfc486d3c0ae2136d160c532b5

      SHA512

      2fdda36a2df94de47833ca50be24bdf40a54b5c1a905d3dc5e3f3937c84f033152dfe96ebee2953653a5e8a238e66f1319cf0a644fa672aa583b1a72f1c81a99

    • memory/2904-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2904-58-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2904-60-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2904-62-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2904-56-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2904-55-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2904-54-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2904-53-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB