Analysis

  • max time kernel
    122s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 21:54

General

  • Target

    9d7698a3726c50204ea483e0028a0d7b1be8ccc81807bdabdee76b85ce715425.exe

  • Size

    1.3MB

  • MD5

    3bb6ab7c047e34a9026754bcb921be19

  • SHA1

    1254d4218022ac3d94fb3ec958cd814c654d61b3

  • SHA256

    9d7698a3726c50204ea483e0028a0d7b1be8ccc81807bdabdee76b85ce715425

  • SHA512

    4082af3673ae20c2a8e2b014db5ccec83ca9ab8bfb0f2db51f7c6b51b54f8cfaa5c4b0bd4bc0ba115c1d81662c9d8121adca4878a5ad85602dba68e314327b74

  • SSDEEP

    24576:XyrUwuuSGYRoMQI8YTKdEMa+YM/SE5QY74xV1wNT5BLR3lo6xWy8hdO:iowASMDTT4F5QqqwN9B91o6pU

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 17 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d7698a3726c50204ea483e0028a0d7b1be8ccc81807bdabdee76b85ce715425.exe
    "C:\Users\Admin\AppData\Local\Temp\9d7698a3726c50204ea483e0028a0d7b1be8ccc81807bdabdee76b85ce715425.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1608173.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1608173.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6735754.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6735754.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2824
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6103363.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6103363.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2624
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1419857.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1419857.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:804
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v7619866.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v7619866.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:2516
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a1594570.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a1594570.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:3020
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2484
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 272
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1608173.exe

    Filesize

    1.2MB

    MD5

    70b9632518b713baaefa845a40a9cd9e

    SHA1

    b506c52bfee4c858c320379f5a976b769b0fcaaa

    SHA256

    4697d2f703dc0b92222ad5348548a3bf6947fa1dec21affd9d3111cdcc6fc1aa

    SHA512

    00593ef155a0e1c73a97db0d6c4b918305b6be540aac0ae067f8a36d64ae25667de74081e4129205c62c8d8e0e4a30543d3159fd339335de6a797956eb3fce2d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1608173.exe

    Filesize

    1.2MB

    MD5

    70b9632518b713baaefa845a40a9cd9e

    SHA1

    b506c52bfee4c858c320379f5a976b769b0fcaaa

    SHA256

    4697d2f703dc0b92222ad5348548a3bf6947fa1dec21affd9d3111cdcc6fc1aa

    SHA512

    00593ef155a0e1c73a97db0d6c4b918305b6be540aac0ae067f8a36d64ae25667de74081e4129205c62c8d8e0e4a30543d3159fd339335de6a797956eb3fce2d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6735754.exe

    Filesize

    969KB

    MD5

    2caf88b27f82a98937481b3554126748

    SHA1

    44f26c6647966dad9a5281267f2a1884b210555e

    SHA256

    6c2773c276f19724ddc4a0b14e4a52004525458a94406d23661b1cd06171bb0b

    SHA512

    4c9ce1d8547fb519ed4118adcb08a825a0a2efb480959fd8a1e035816ce5052ef2be6788788f20cfc14d454b21e5b37d900b600baa1f6841f83162c4fbdf5cd6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6735754.exe

    Filesize

    969KB

    MD5

    2caf88b27f82a98937481b3554126748

    SHA1

    44f26c6647966dad9a5281267f2a1884b210555e

    SHA256

    6c2773c276f19724ddc4a0b14e4a52004525458a94406d23661b1cd06171bb0b

    SHA512

    4c9ce1d8547fb519ed4118adcb08a825a0a2efb480959fd8a1e035816ce5052ef2be6788788f20cfc14d454b21e5b37d900b600baa1f6841f83162c4fbdf5cd6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6103363.exe

    Filesize

    813KB

    MD5

    2a09ad945db2d58e64918f9d224bb492

    SHA1

    6c5eb7886936acfab725ec91856c65fdf2e1f593

    SHA256

    112ea0874135c26a099ad95203f6566c375c7f0506007c518528eda63858692e

    SHA512

    aef7bfadb537bb3e788be0700b42a4b91f0e9e88a759e81bc5c2478f1be20c9d9588504bd83b2166e898486ec0b5867849cf7edffda9778d7de5fe7c35e15017

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6103363.exe

    Filesize

    813KB

    MD5

    2a09ad945db2d58e64918f9d224bb492

    SHA1

    6c5eb7886936acfab725ec91856c65fdf2e1f593

    SHA256

    112ea0874135c26a099ad95203f6566c375c7f0506007c518528eda63858692e

    SHA512

    aef7bfadb537bb3e788be0700b42a4b91f0e9e88a759e81bc5c2478f1be20c9d9588504bd83b2166e898486ec0b5867849cf7edffda9778d7de5fe7c35e15017

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1419857.exe

    Filesize

    636KB

    MD5

    c06ab5d23847077d4c0ad6d38cec17bc

    SHA1

    58c32caccbb32fc03c5db2fef28e37555e47975d

    SHA256

    b7ed308453ed0d83e12bdea124299d175f8ff5b040bf9c15fba228c4722ff135

    SHA512

    97428009463167a74c1f13ac9237e8a770f64578edb7399281675ff0ae364972b828fa5cb798900ba3f65119571909a6cf0040d1fdaa7f4b47adcc6ec4686233

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1419857.exe

    Filesize

    636KB

    MD5

    c06ab5d23847077d4c0ad6d38cec17bc

    SHA1

    58c32caccbb32fc03c5db2fef28e37555e47975d

    SHA256

    b7ed308453ed0d83e12bdea124299d175f8ff5b040bf9c15fba228c4722ff135

    SHA512

    97428009463167a74c1f13ac9237e8a770f64578edb7399281675ff0ae364972b828fa5cb798900ba3f65119571909a6cf0040d1fdaa7f4b47adcc6ec4686233

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v7619866.exe

    Filesize

    363KB

    MD5

    438b212bc44004004f63a186949f8ef4

    SHA1

    6ffdac5e5f32c85c6086b6cadd71a70ccc35f9e8

    SHA256

    a275c9cec38cb5693331858682cc5ad6cea3bb2a198070cb42a3d5534c4220cc

    SHA512

    646a35c4336c3936018044f33ec974b3b8e8984f384066635ae436d7142ba47c9040aea789f30a6a9f991954f5aa915b2ff72426cce3d59dd120e6527775b3c4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v7619866.exe

    Filesize

    363KB

    MD5

    438b212bc44004004f63a186949f8ef4

    SHA1

    6ffdac5e5f32c85c6086b6cadd71a70ccc35f9e8

    SHA256

    a275c9cec38cb5693331858682cc5ad6cea3bb2a198070cb42a3d5534c4220cc

    SHA512

    646a35c4336c3936018044f33ec974b3b8e8984f384066635ae436d7142ba47c9040aea789f30a6a9f991954f5aa915b2ff72426cce3d59dd120e6527775b3c4

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a1594570.exe

    Filesize

    251KB

    MD5

    29f27cd218fe1c852e661e2bbb3c1e7a

    SHA1

    5856ca2ec89d2bfc3ebae85272e650b9eca185ff

    SHA256

    98dd8222b8063af97df160a209fc9675ec67429d195d02e4c933d343768d54d2

    SHA512

    1e80a5d32f1988cb26dc6baf397e3838c5aeef79191baeadc9b09a67ef2fc471113bf22911530d49bdc1d48f32596b1088a2872e8a5ce54f5e9923dc47bbe39a

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a1594570.exe

    Filesize

    251KB

    MD5

    29f27cd218fe1c852e661e2bbb3c1e7a

    SHA1

    5856ca2ec89d2bfc3ebae85272e650b9eca185ff

    SHA256

    98dd8222b8063af97df160a209fc9675ec67429d195d02e4c933d343768d54d2

    SHA512

    1e80a5d32f1988cb26dc6baf397e3838c5aeef79191baeadc9b09a67ef2fc471113bf22911530d49bdc1d48f32596b1088a2872e8a5ce54f5e9923dc47bbe39a

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a1594570.exe

    Filesize

    251KB

    MD5

    29f27cd218fe1c852e661e2bbb3c1e7a

    SHA1

    5856ca2ec89d2bfc3ebae85272e650b9eca185ff

    SHA256

    98dd8222b8063af97df160a209fc9675ec67429d195d02e4c933d343768d54d2

    SHA512

    1e80a5d32f1988cb26dc6baf397e3838c5aeef79191baeadc9b09a67ef2fc471113bf22911530d49bdc1d48f32596b1088a2872e8a5ce54f5e9923dc47bbe39a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v1608173.exe

    Filesize

    1.2MB

    MD5

    70b9632518b713baaefa845a40a9cd9e

    SHA1

    b506c52bfee4c858c320379f5a976b769b0fcaaa

    SHA256

    4697d2f703dc0b92222ad5348548a3bf6947fa1dec21affd9d3111cdcc6fc1aa

    SHA512

    00593ef155a0e1c73a97db0d6c4b918305b6be540aac0ae067f8a36d64ae25667de74081e4129205c62c8d8e0e4a30543d3159fd339335de6a797956eb3fce2d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v1608173.exe

    Filesize

    1.2MB

    MD5

    70b9632518b713baaefa845a40a9cd9e

    SHA1

    b506c52bfee4c858c320379f5a976b769b0fcaaa

    SHA256

    4697d2f703dc0b92222ad5348548a3bf6947fa1dec21affd9d3111cdcc6fc1aa

    SHA512

    00593ef155a0e1c73a97db0d6c4b918305b6be540aac0ae067f8a36d64ae25667de74081e4129205c62c8d8e0e4a30543d3159fd339335de6a797956eb3fce2d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6735754.exe

    Filesize

    969KB

    MD5

    2caf88b27f82a98937481b3554126748

    SHA1

    44f26c6647966dad9a5281267f2a1884b210555e

    SHA256

    6c2773c276f19724ddc4a0b14e4a52004525458a94406d23661b1cd06171bb0b

    SHA512

    4c9ce1d8547fb519ed4118adcb08a825a0a2efb480959fd8a1e035816ce5052ef2be6788788f20cfc14d454b21e5b37d900b600baa1f6841f83162c4fbdf5cd6

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6735754.exe

    Filesize

    969KB

    MD5

    2caf88b27f82a98937481b3554126748

    SHA1

    44f26c6647966dad9a5281267f2a1884b210555e

    SHA256

    6c2773c276f19724ddc4a0b14e4a52004525458a94406d23661b1cd06171bb0b

    SHA512

    4c9ce1d8547fb519ed4118adcb08a825a0a2efb480959fd8a1e035816ce5052ef2be6788788f20cfc14d454b21e5b37d900b600baa1f6841f83162c4fbdf5cd6

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v6103363.exe

    Filesize

    813KB

    MD5

    2a09ad945db2d58e64918f9d224bb492

    SHA1

    6c5eb7886936acfab725ec91856c65fdf2e1f593

    SHA256

    112ea0874135c26a099ad95203f6566c375c7f0506007c518528eda63858692e

    SHA512

    aef7bfadb537bb3e788be0700b42a4b91f0e9e88a759e81bc5c2478f1be20c9d9588504bd83b2166e898486ec0b5867849cf7edffda9778d7de5fe7c35e15017

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v6103363.exe

    Filesize

    813KB

    MD5

    2a09ad945db2d58e64918f9d224bb492

    SHA1

    6c5eb7886936acfab725ec91856c65fdf2e1f593

    SHA256

    112ea0874135c26a099ad95203f6566c375c7f0506007c518528eda63858692e

    SHA512

    aef7bfadb537bb3e788be0700b42a4b91f0e9e88a759e81bc5c2478f1be20c9d9588504bd83b2166e898486ec0b5867849cf7edffda9778d7de5fe7c35e15017

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v1419857.exe

    Filesize

    636KB

    MD5

    c06ab5d23847077d4c0ad6d38cec17bc

    SHA1

    58c32caccbb32fc03c5db2fef28e37555e47975d

    SHA256

    b7ed308453ed0d83e12bdea124299d175f8ff5b040bf9c15fba228c4722ff135

    SHA512

    97428009463167a74c1f13ac9237e8a770f64578edb7399281675ff0ae364972b828fa5cb798900ba3f65119571909a6cf0040d1fdaa7f4b47adcc6ec4686233

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v1419857.exe

    Filesize

    636KB

    MD5

    c06ab5d23847077d4c0ad6d38cec17bc

    SHA1

    58c32caccbb32fc03c5db2fef28e37555e47975d

    SHA256

    b7ed308453ed0d83e12bdea124299d175f8ff5b040bf9c15fba228c4722ff135

    SHA512

    97428009463167a74c1f13ac9237e8a770f64578edb7399281675ff0ae364972b828fa5cb798900ba3f65119571909a6cf0040d1fdaa7f4b47adcc6ec4686233

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v7619866.exe

    Filesize

    363KB

    MD5

    438b212bc44004004f63a186949f8ef4

    SHA1

    6ffdac5e5f32c85c6086b6cadd71a70ccc35f9e8

    SHA256

    a275c9cec38cb5693331858682cc5ad6cea3bb2a198070cb42a3d5534c4220cc

    SHA512

    646a35c4336c3936018044f33ec974b3b8e8984f384066635ae436d7142ba47c9040aea789f30a6a9f991954f5aa915b2ff72426cce3d59dd120e6527775b3c4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v7619866.exe

    Filesize

    363KB

    MD5

    438b212bc44004004f63a186949f8ef4

    SHA1

    6ffdac5e5f32c85c6086b6cadd71a70ccc35f9e8

    SHA256

    a275c9cec38cb5693331858682cc5ad6cea3bb2a198070cb42a3d5534c4220cc

    SHA512

    646a35c4336c3936018044f33ec974b3b8e8984f384066635ae436d7142ba47c9040aea789f30a6a9f991954f5aa915b2ff72426cce3d59dd120e6527775b3c4

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a1594570.exe

    Filesize

    251KB

    MD5

    29f27cd218fe1c852e661e2bbb3c1e7a

    SHA1

    5856ca2ec89d2bfc3ebae85272e650b9eca185ff

    SHA256

    98dd8222b8063af97df160a209fc9675ec67429d195d02e4c933d343768d54d2

    SHA512

    1e80a5d32f1988cb26dc6baf397e3838c5aeef79191baeadc9b09a67ef2fc471113bf22911530d49bdc1d48f32596b1088a2872e8a5ce54f5e9923dc47bbe39a

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a1594570.exe

    Filesize

    251KB

    MD5

    29f27cd218fe1c852e661e2bbb3c1e7a

    SHA1

    5856ca2ec89d2bfc3ebae85272e650b9eca185ff

    SHA256

    98dd8222b8063af97df160a209fc9675ec67429d195d02e4c933d343768d54d2

    SHA512

    1e80a5d32f1988cb26dc6baf397e3838c5aeef79191baeadc9b09a67ef2fc471113bf22911530d49bdc1d48f32596b1088a2872e8a5ce54f5e9923dc47bbe39a

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a1594570.exe

    Filesize

    251KB

    MD5

    29f27cd218fe1c852e661e2bbb3c1e7a

    SHA1

    5856ca2ec89d2bfc3ebae85272e650b9eca185ff

    SHA256

    98dd8222b8063af97df160a209fc9675ec67429d195d02e4c933d343768d54d2

    SHA512

    1e80a5d32f1988cb26dc6baf397e3838c5aeef79191baeadc9b09a67ef2fc471113bf22911530d49bdc1d48f32596b1088a2872e8a5ce54f5e9923dc47bbe39a

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a1594570.exe

    Filesize

    251KB

    MD5

    29f27cd218fe1c852e661e2bbb3c1e7a

    SHA1

    5856ca2ec89d2bfc3ebae85272e650b9eca185ff

    SHA256

    98dd8222b8063af97df160a209fc9675ec67429d195d02e4c933d343768d54d2

    SHA512

    1e80a5d32f1988cb26dc6baf397e3838c5aeef79191baeadc9b09a67ef2fc471113bf22911530d49bdc1d48f32596b1088a2872e8a5ce54f5e9923dc47bbe39a

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a1594570.exe

    Filesize

    251KB

    MD5

    29f27cd218fe1c852e661e2bbb3c1e7a

    SHA1

    5856ca2ec89d2bfc3ebae85272e650b9eca185ff

    SHA256

    98dd8222b8063af97df160a209fc9675ec67429d195d02e4c933d343768d54d2

    SHA512

    1e80a5d32f1988cb26dc6baf397e3838c5aeef79191baeadc9b09a67ef2fc471113bf22911530d49bdc1d48f32596b1088a2872e8a5ce54f5e9923dc47bbe39a

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a1594570.exe

    Filesize

    251KB

    MD5

    29f27cd218fe1c852e661e2bbb3c1e7a

    SHA1

    5856ca2ec89d2bfc3ebae85272e650b9eca185ff

    SHA256

    98dd8222b8063af97df160a209fc9675ec67429d195d02e4c933d343768d54d2

    SHA512

    1e80a5d32f1988cb26dc6baf397e3838c5aeef79191baeadc9b09a67ef2fc471113bf22911530d49bdc1d48f32596b1088a2872e8a5ce54f5e9923dc47bbe39a

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a1594570.exe

    Filesize

    251KB

    MD5

    29f27cd218fe1c852e661e2bbb3c1e7a

    SHA1

    5856ca2ec89d2bfc3ebae85272e650b9eca185ff

    SHA256

    98dd8222b8063af97df160a209fc9675ec67429d195d02e4c933d343768d54d2

    SHA512

    1e80a5d32f1988cb26dc6baf397e3838c5aeef79191baeadc9b09a67ef2fc471113bf22911530d49bdc1d48f32596b1088a2872e8a5ce54f5e9923dc47bbe39a

  • memory/2484-63-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2484-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2484-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2484-72-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2484-68-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2484-64-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2484-66-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2484-65-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB