Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2023, 05:16

General

  • Target

    1021b0c43b683deb6910b1b3a6c9918e.exe

  • Size

    1.2MB

  • MD5

    1021b0c43b683deb6910b1b3a6c9918e

  • SHA1

    113380e3139e8e92253535a2acef00ca3b88f4af

  • SHA256

    e93c853d0d82036acc0051a040ccd31a51f8b91261609b2f17e1350f58ef5bc0

  • SHA512

    faf013951f686282b653ee821b0fb331834817ec36d0a7ccce67adbe47d6728efc1360d7250ef607dd31b1d11c1cc35ea338c39ad4585f2029c350349bbccac5

  • SSDEEP

    24576:oynrxm58MGOrJVEu+LZ8iInsq9WyzmRaseV3VTnldyOfKE:vn1iG4JVEuEWspyzmRPehVTnDJK

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1021b0c43b683deb6910b1b3a6c9918e.exe
    "C:\Users\Admin\AppData\Local\Temp\1021b0c43b683deb6910b1b3a6c9918e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8116205.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8116205.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1264
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4694547.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4694547.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1164
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6955267.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6955267.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2796
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7446446.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7446446.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2656
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1304462.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1304462.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2792
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2660
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8116205.exe

    Filesize

    941KB

    MD5

    db55fbd8b9d14e3df159377dc08c44a6

    SHA1

    5602a435206b4d88a462700ea3e578745a89636e

    SHA256

    2b4f29ce061dee83ec71a24bfe2d39d8e1eeffe6408b24a59a482990017b65f5

    SHA512

    d8cfd62813627727039e9af29ba5794d37b8f009bc03ebbc89dc49636cbb1a5b265f37b3a2a7314b298281a9aaf9e4c0732d458ff786acd80d76f32e43471ca6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8116205.exe

    Filesize

    941KB

    MD5

    db55fbd8b9d14e3df159377dc08c44a6

    SHA1

    5602a435206b4d88a462700ea3e578745a89636e

    SHA256

    2b4f29ce061dee83ec71a24bfe2d39d8e1eeffe6408b24a59a482990017b65f5

    SHA512

    d8cfd62813627727039e9af29ba5794d37b8f009bc03ebbc89dc49636cbb1a5b265f37b3a2a7314b298281a9aaf9e4c0732d458ff786acd80d76f32e43471ca6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4694547.exe

    Filesize

    785KB

    MD5

    7c5ed407ca52c3a62673cd592d9cc75b

    SHA1

    1f931fcdd4ff411e22ef717695585fc9657cf928

    SHA256

    efe0fd60ec8e7abe9f6803d472c3d0733e0f3a999e6e101a06c4698b0e18e05b

    SHA512

    de4bb2423a71afcf7f0b75fe8ac648f2ef2af6f9fe7047e4be7da8f1e794a85f01d35af60e52563c8a40bd0f5a27b263650b8bac230ef846982a962ea57d8b3b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4694547.exe

    Filesize

    785KB

    MD5

    7c5ed407ca52c3a62673cd592d9cc75b

    SHA1

    1f931fcdd4ff411e22ef717695585fc9657cf928

    SHA256

    efe0fd60ec8e7abe9f6803d472c3d0733e0f3a999e6e101a06c4698b0e18e05b

    SHA512

    de4bb2423a71afcf7f0b75fe8ac648f2ef2af6f9fe7047e4be7da8f1e794a85f01d35af60e52563c8a40bd0f5a27b263650b8bac230ef846982a962ea57d8b3b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6955267.exe

    Filesize

    619KB

    MD5

    3caddfb039bba87212a1c0b5d0bae6b0

    SHA1

    65fa5653f9fa9e6513320dea70d89303d04e4417

    SHA256

    d26619b77dfb11949a7e351e245f1c009006d53bd4ac8da009a042fbc2ca6854

    SHA512

    d9265223ebf7363e5ef8542a5f6fb1e1cc7f89a51354ff0a6cc2a399e95e2e0dfc3038be5bfd1a9af302c2c7bb3a0b0676e3bee99f851f04ca149bce3850a9b2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6955267.exe

    Filesize

    619KB

    MD5

    3caddfb039bba87212a1c0b5d0bae6b0

    SHA1

    65fa5653f9fa9e6513320dea70d89303d04e4417

    SHA256

    d26619b77dfb11949a7e351e245f1c009006d53bd4ac8da009a042fbc2ca6854

    SHA512

    d9265223ebf7363e5ef8542a5f6fb1e1cc7f89a51354ff0a6cc2a399e95e2e0dfc3038be5bfd1a9af302c2c7bb3a0b0676e3bee99f851f04ca149bce3850a9b2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7446446.exe

    Filesize

    348KB

    MD5

    c8277368b9a986e4ec31b2792aa1f7ef

    SHA1

    cb2c49df38f6d3c76f1bccb9063dd6412c85e9c2

    SHA256

    066244d5ea7014376c4c322a3e67b876cb9ab939aa5ec9873946f6545ef97a7f

    SHA512

    4550d565dcd84354a816cc1a558c75595a4309b1282bee730e5fc67f9d5184af0c16748e402fa4fe22227c3952579c97d7d1d2422d1f073a64ac178ac40d4648

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7446446.exe

    Filesize

    348KB

    MD5

    c8277368b9a986e4ec31b2792aa1f7ef

    SHA1

    cb2c49df38f6d3c76f1bccb9063dd6412c85e9c2

    SHA256

    066244d5ea7014376c4c322a3e67b876cb9ab939aa5ec9873946f6545ef97a7f

    SHA512

    4550d565dcd84354a816cc1a558c75595a4309b1282bee730e5fc67f9d5184af0c16748e402fa4fe22227c3952579c97d7d1d2422d1f073a64ac178ac40d4648

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1304462.exe

    Filesize

    235KB

    MD5

    019da32fb3475cfdcdd0413f8e0009fb

    SHA1

    47615a5662525c55b80d8fd28602821d49f17270

    SHA256

    6d1192f93e7a6206904e8c98b6fb8bee8b925a798d183544c60e290b1bd43bfa

    SHA512

    ef1c71ef03761b2df752db3fc576510cced7e5d2c77108d019314e232e42d649b1c1de12e0c0a39ab967eb6a5dd460ec31d3d96837ed7f11573c13a970f4d321

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1304462.exe

    Filesize

    235KB

    MD5

    019da32fb3475cfdcdd0413f8e0009fb

    SHA1

    47615a5662525c55b80d8fd28602821d49f17270

    SHA256

    6d1192f93e7a6206904e8c98b6fb8bee8b925a798d183544c60e290b1bd43bfa

    SHA512

    ef1c71ef03761b2df752db3fc576510cced7e5d2c77108d019314e232e42d649b1c1de12e0c0a39ab967eb6a5dd460ec31d3d96837ed7f11573c13a970f4d321

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1304462.exe

    Filesize

    235KB

    MD5

    019da32fb3475cfdcdd0413f8e0009fb

    SHA1

    47615a5662525c55b80d8fd28602821d49f17270

    SHA256

    6d1192f93e7a6206904e8c98b6fb8bee8b925a798d183544c60e290b1bd43bfa

    SHA512

    ef1c71ef03761b2df752db3fc576510cced7e5d2c77108d019314e232e42d649b1c1de12e0c0a39ab967eb6a5dd460ec31d3d96837ed7f11573c13a970f4d321

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v8116205.exe

    Filesize

    941KB

    MD5

    db55fbd8b9d14e3df159377dc08c44a6

    SHA1

    5602a435206b4d88a462700ea3e578745a89636e

    SHA256

    2b4f29ce061dee83ec71a24bfe2d39d8e1eeffe6408b24a59a482990017b65f5

    SHA512

    d8cfd62813627727039e9af29ba5794d37b8f009bc03ebbc89dc49636cbb1a5b265f37b3a2a7314b298281a9aaf9e4c0732d458ff786acd80d76f32e43471ca6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v8116205.exe

    Filesize

    941KB

    MD5

    db55fbd8b9d14e3df159377dc08c44a6

    SHA1

    5602a435206b4d88a462700ea3e578745a89636e

    SHA256

    2b4f29ce061dee83ec71a24bfe2d39d8e1eeffe6408b24a59a482990017b65f5

    SHA512

    d8cfd62813627727039e9af29ba5794d37b8f009bc03ebbc89dc49636cbb1a5b265f37b3a2a7314b298281a9aaf9e4c0732d458ff786acd80d76f32e43471ca6

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v4694547.exe

    Filesize

    785KB

    MD5

    7c5ed407ca52c3a62673cd592d9cc75b

    SHA1

    1f931fcdd4ff411e22ef717695585fc9657cf928

    SHA256

    efe0fd60ec8e7abe9f6803d472c3d0733e0f3a999e6e101a06c4698b0e18e05b

    SHA512

    de4bb2423a71afcf7f0b75fe8ac648f2ef2af6f9fe7047e4be7da8f1e794a85f01d35af60e52563c8a40bd0f5a27b263650b8bac230ef846982a962ea57d8b3b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v4694547.exe

    Filesize

    785KB

    MD5

    7c5ed407ca52c3a62673cd592d9cc75b

    SHA1

    1f931fcdd4ff411e22ef717695585fc9657cf928

    SHA256

    efe0fd60ec8e7abe9f6803d472c3d0733e0f3a999e6e101a06c4698b0e18e05b

    SHA512

    de4bb2423a71afcf7f0b75fe8ac648f2ef2af6f9fe7047e4be7da8f1e794a85f01d35af60e52563c8a40bd0f5a27b263650b8bac230ef846982a962ea57d8b3b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v6955267.exe

    Filesize

    619KB

    MD5

    3caddfb039bba87212a1c0b5d0bae6b0

    SHA1

    65fa5653f9fa9e6513320dea70d89303d04e4417

    SHA256

    d26619b77dfb11949a7e351e245f1c009006d53bd4ac8da009a042fbc2ca6854

    SHA512

    d9265223ebf7363e5ef8542a5f6fb1e1cc7f89a51354ff0a6cc2a399e95e2e0dfc3038be5bfd1a9af302c2c7bb3a0b0676e3bee99f851f04ca149bce3850a9b2

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v6955267.exe

    Filesize

    619KB

    MD5

    3caddfb039bba87212a1c0b5d0bae6b0

    SHA1

    65fa5653f9fa9e6513320dea70d89303d04e4417

    SHA256

    d26619b77dfb11949a7e351e245f1c009006d53bd4ac8da009a042fbc2ca6854

    SHA512

    d9265223ebf7363e5ef8542a5f6fb1e1cc7f89a51354ff0a6cc2a399e95e2e0dfc3038be5bfd1a9af302c2c7bb3a0b0676e3bee99f851f04ca149bce3850a9b2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v7446446.exe

    Filesize

    348KB

    MD5

    c8277368b9a986e4ec31b2792aa1f7ef

    SHA1

    cb2c49df38f6d3c76f1bccb9063dd6412c85e9c2

    SHA256

    066244d5ea7014376c4c322a3e67b876cb9ab939aa5ec9873946f6545ef97a7f

    SHA512

    4550d565dcd84354a816cc1a558c75595a4309b1282bee730e5fc67f9d5184af0c16748e402fa4fe22227c3952579c97d7d1d2422d1f073a64ac178ac40d4648

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v7446446.exe

    Filesize

    348KB

    MD5

    c8277368b9a986e4ec31b2792aa1f7ef

    SHA1

    cb2c49df38f6d3c76f1bccb9063dd6412c85e9c2

    SHA256

    066244d5ea7014376c4c322a3e67b876cb9ab939aa5ec9873946f6545ef97a7f

    SHA512

    4550d565dcd84354a816cc1a558c75595a4309b1282bee730e5fc67f9d5184af0c16748e402fa4fe22227c3952579c97d7d1d2422d1f073a64ac178ac40d4648

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a1304462.exe

    Filesize

    235KB

    MD5

    019da32fb3475cfdcdd0413f8e0009fb

    SHA1

    47615a5662525c55b80d8fd28602821d49f17270

    SHA256

    6d1192f93e7a6206904e8c98b6fb8bee8b925a798d183544c60e290b1bd43bfa

    SHA512

    ef1c71ef03761b2df752db3fc576510cced7e5d2c77108d019314e232e42d649b1c1de12e0c0a39ab967eb6a5dd460ec31d3d96837ed7f11573c13a970f4d321

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a1304462.exe

    Filesize

    235KB

    MD5

    019da32fb3475cfdcdd0413f8e0009fb

    SHA1

    47615a5662525c55b80d8fd28602821d49f17270

    SHA256

    6d1192f93e7a6206904e8c98b6fb8bee8b925a798d183544c60e290b1bd43bfa

    SHA512

    ef1c71ef03761b2df752db3fc576510cced7e5d2c77108d019314e232e42d649b1c1de12e0c0a39ab967eb6a5dd460ec31d3d96837ed7f11573c13a970f4d321

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a1304462.exe

    Filesize

    235KB

    MD5

    019da32fb3475cfdcdd0413f8e0009fb

    SHA1

    47615a5662525c55b80d8fd28602821d49f17270

    SHA256

    6d1192f93e7a6206904e8c98b6fb8bee8b925a798d183544c60e290b1bd43bfa

    SHA512

    ef1c71ef03761b2df752db3fc576510cced7e5d2c77108d019314e232e42d649b1c1de12e0c0a39ab967eb6a5dd460ec31d3d96837ed7f11573c13a970f4d321

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a1304462.exe

    Filesize

    235KB

    MD5

    019da32fb3475cfdcdd0413f8e0009fb

    SHA1

    47615a5662525c55b80d8fd28602821d49f17270

    SHA256

    6d1192f93e7a6206904e8c98b6fb8bee8b925a798d183544c60e290b1bd43bfa

    SHA512

    ef1c71ef03761b2df752db3fc576510cced7e5d2c77108d019314e232e42d649b1c1de12e0c0a39ab967eb6a5dd460ec31d3d96837ed7f11573c13a970f4d321

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a1304462.exe

    Filesize

    235KB

    MD5

    019da32fb3475cfdcdd0413f8e0009fb

    SHA1

    47615a5662525c55b80d8fd28602821d49f17270

    SHA256

    6d1192f93e7a6206904e8c98b6fb8bee8b925a798d183544c60e290b1bd43bfa

    SHA512

    ef1c71ef03761b2df752db3fc576510cced7e5d2c77108d019314e232e42d649b1c1de12e0c0a39ab967eb6a5dd460ec31d3d96837ed7f11573c13a970f4d321

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a1304462.exe

    Filesize

    235KB

    MD5

    019da32fb3475cfdcdd0413f8e0009fb

    SHA1

    47615a5662525c55b80d8fd28602821d49f17270

    SHA256

    6d1192f93e7a6206904e8c98b6fb8bee8b925a798d183544c60e290b1bd43bfa

    SHA512

    ef1c71ef03761b2df752db3fc576510cced7e5d2c77108d019314e232e42d649b1c1de12e0c0a39ab967eb6a5dd460ec31d3d96837ed7f11573c13a970f4d321

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a1304462.exe

    Filesize

    235KB

    MD5

    019da32fb3475cfdcdd0413f8e0009fb

    SHA1

    47615a5662525c55b80d8fd28602821d49f17270

    SHA256

    6d1192f93e7a6206904e8c98b6fb8bee8b925a798d183544c60e290b1bd43bfa

    SHA512

    ef1c71ef03761b2df752db3fc576510cced7e5d2c77108d019314e232e42d649b1c1de12e0c0a39ab967eb6a5dd460ec31d3d96837ed7f11573c13a970f4d321

  • memory/2660-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2660-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2660-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2660-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2660-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2660-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2660-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2660-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB