Analysis

  • max time kernel
    118s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 22:04

General

  • Target

    652172ad445aa1c8a938f648e9ffa8a6f6cf98d42360e172c64b26bf458733f7.exe

  • Size

    1.3MB

  • MD5

    2e8567723aaa87b49fd94246f14e38a8

  • SHA1

    36668635afded3ec3fa87d7e3e290dc55aaebb8a

  • SHA256

    652172ad445aa1c8a938f648e9ffa8a6f6cf98d42360e172c64b26bf458733f7

  • SHA512

    d0470b373d403d2fbba3aa3e50163bb762cdd97041946937d6481da8247af4caae424b6bce7ce29a874c29394ca680b0ba092b218c7d3f138c749e84832d55b9

  • SSDEEP

    24576:LyIYKAnMirrs0OBArPlep+eS4SHJimHLWz0rUzZoKqwC1HL8p/SFZ1i:+oAMes0O2LkoeS4Spb/o5qwELe/SFZ1

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 17 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\652172ad445aa1c8a938f648e9ffa8a6f6cf98d42360e172c64b26bf458733f7.exe
    "C:\Users\Admin\AppData\Local\Temp\652172ad445aa1c8a938f648e9ffa8a6f6cf98d42360e172c64b26bf458733f7.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0677851.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0677851.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6430048.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6430048.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6071444.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6071444.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2584
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3264993.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3264993.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2448
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v4694824.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v4694824.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:2616
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0147330.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0147330.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2648
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2492
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 272
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2864

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0677851.exe

          Filesize

          1.2MB

          MD5

          d9d2776a4348d5ceac64ccc3f6db1144

          SHA1

          076a0089de05ea2fabcaa62fab6950fb78280da9

          SHA256

          4795a75f6accf0c6ee4256c4aa6592b8a0350551ad93c04e5b5621ecb876e9ae

          SHA512

          f8aedfef17f55140f22a240cbb4c3f125540e0e3da8e065284dc1c936ad49285ee6007313019b9176424c3da93356e1b4e52d6a3d5302056e94b25417cbc6e64

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0677851.exe

          Filesize

          1.2MB

          MD5

          d9d2776a4348d5ceac64ccc3f6db1144

          SHA1

          076a0089de05ea2fabcaa62fab6950fb78280da9

          SHA256

          4795a75f6accf0c6ee4256c4aa6592b8a0350551ad93c04e5b5621ecb876e9ae

          SHA512

          f8aedfef17f55140f22a240cbb4c3f125540e0e3da8e065284dc1c936ad49285ee6007313019b9176424c3da93356e1b4e52d6a3d5302056e94b25417cbc6e64

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6430048.exe

          Filesize

          969KB

          MD5

          994bec903f7269ec72db198d32ee3891

          SHA1

          fbc9eea3aba148c556f52a5aab992d09252133dc

          SHA256

          cbfc3c350853c25ab52a4f046297b82954a2b40f379ef51d08c86c017f5b7b6e

          SHA512

          2078ec80689ebc01c7e8e242bad867f0a34e3702a3fbe7c23999fef3b4c706ad96ca5669dd4be521fba4e49def5a8f3e4c269e9fe1c875c66b23be1e65726c10

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6430048.exe

          Filesize

          969KB

          MD5

          994bec903f7269ec72db198d32ee3891

          SHA1

          fbc9eea3aba148c556f52a5aab992d09252133dc

          SHA256

          cbfc3c350853c25ab52a4f046297b82954a2b40f379ef51d08c86c017f5b7b6e

          SHA512

          2078ec80689ebc01c7e8e242bad867f0a34e3702a3fbe7c23999fef3b4c706ad96ca5669dd4be521fba4e49def5a8f3e4c269e9fe1c875c66b23be1e65726c10

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6071444.exe

          Filesize

          814KB

          MD5

          b22bd4aedc86e9388fb044af062d0e8e

          SHA1

          b9b85c529dce618799d051341a16ebf48d58c826

          SHA256

          3a77a3d5c8ca51f094f73cbe53e556d7c78939b0f4fd513d4d39e78b72457f06

          SHA512

          6e8735151cc50afa3cbad22ff60697ad155d70c0ce073d3a8227c802fe8e83a84e517d669cdced28023700f369cd972fe934b2caa7d05762e8d7e80cdc96a26a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6071444.exe

          Filesize

          814KB

          MD5

          b22bd4aedc86e9388fb044af062d0e8e

          SHA1

          b9b85c529dce618799d051341a16ebf48d58c826

          SHA256

          3a77a3d5c8ca51f094f73cbe53e556d7c78939b0f4fd513d4d39e78b72457f06

          SHA512

          6e8735151cc50afa3cbad22ff60697ad155d70c0ce073d3a8227c802fe8e83a84e517d669cdced28023700f369cd972fe934b2caa7d05762e8d7e80cdc96a26a

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3264993.exe

          Filesize

          637KB

          MD5

          6bdf1ca9e3a113e931ba743caf7babf4

          SHA1

          159da37e5413e980820f10f80cd99ebc23ae1098

          SHA256

          250072d81f74b7f95f69e36a53037e806f58518fc299e099cdb08caa6b653940

          SHA512

          ce1d9eb4e7a7bdebb06ae57fd80e7f343ea808b2fa6c3e20b281d3ee9ff562b550de9cfb9658b148e6bef464918749f3b4d6d612c6989cd157bb0c17a333b88c

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3264993.exe

          Filesize

          637KB

          MD5

          6bdf1ca9e3a113e931ba743caf7babf4

          SHA1

          159da37e5413e980820f10f80cd99ebc23ae1098

          SHA256

          250072d81f74b7f95f69e36a53037e806f58518fc299e099cdb08caa6b653940

          SHA512

          ce1d9eb4e7a7bdebb06ae57fd80e7f343ea808b2fa6c3e20b281d3ee9ff562b550de9cfb9658b148e6bef464918749f3b4d6d612c6989cd157bb0c17a333b88c

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v4694824.exe

          Filesize

          363KB

          MD5

          d392e49256b8cd3062582484930def1d

          SHA1

          3c31cacd4d5b496a7668de6c9e99ff8a52791398

          SHA256

          1a101d187b53cbdbbe4d97bedb2c18bd42ca9825b907e2a3751370929d0f3f28

          SHA512

          f6026657e83b3e74fe3f1cf0e669c5601fe91f2d7a28663b2f9e7ddb63f33e9b04ad090d2cbd9cbbbfadc71ed0c54f8232b79f07bcbc33aad4178e8ea4aecdb6

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v4694824.exe

          Filesize

          363KB

          MD5

          d392e49256b8cd3062582484930def1d

          SHA1

          3c31cacd4d5b496a7668de6c9e99ff8a52791398

          SHA256

          1a101d187b53cbdbbe4d97bedb2c18bd42ca9825b907e2a3751370929d0f3f28

          SHA512

          f6026657e83b3e74fe3f1cf0e669c5601fe91f2d7a28663b2f9e7ddb63f33e9b04ad090d2cbd9cbbbfadc71ed0c54f8232b79f07bcbc33aad4178e8ea4aecdb6

        • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0147330.exe

          Filesize

          251KB

          MD5

          d22b6ecc0ee57bb5743fff3118de7e36

          SHA1

          420cdd287fc5cd6feafd21a46506dcd50b49c49b

          SHA256

          80909e2fc757f0d4ad2102ab55a1dd9ef3e23cc2aab722b57fde604a3a99fa95

          SHA512

          140d46e862087b00989dd08bf546b6736974a4c0a57048ad7544878252dc0dd9953d9041c73583c123cfe07c43b9d0ae0dce96f32cc9c175d5118935997b9f38

        • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0147330.exe

          Filesize

          251KB

          MD5

          d22b6ecc0ee57bb5743fff3118de7e36

          SHA1

          420cdd287fc5cd6feafd21a46506dcd50b49c49b

          SHA256

          80909e2fc757f0d4ad2102ab55a1dd9ef3e23cc2aab722b57fde604a3a99fa95

          SHA512

          140d46e862087b00989dd08bf546b6736974a4c0a57048ad7544878252dc0dd9953d9041c73583c123cfe07c43b9d0ae0dce96f32cc9c175d5118935997b9f38

        • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0147330.exe

          Filesize

          251KB

          MD5

          d22b6ecc0ee57bb5743fff3118de7e36

          SHA1

          420cdd287fc5cd6feafd21a46506dcd50b49c49b

          SHA256

          80909e2fc757f0d4ad2102ab55a1dd9ef3e23cc2aab722b57fde604a3a99fa95

          SHA512

          140d46e862087b00989dd08bf546b6736974a4c0a57048ad7544878252dc0dd9953d9041c73583c123cfe07c43b9d0ae0dce96f32cc9c175d5118935997b9f38

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v0677851.exe

          Filesize

          1.2MB

          MD5

          d9d2776a4348d5ceac64ccc3f6db1144

          SHA1

          076a0089de05ea2fabcaa62fab6950fb78280da9

          SHA256

          4795a75f6accf0c6ee4256c4aa6592b8a0350551ad93c04e5b5621ecb876e9ae

          SHA512

          f8aedfef17f55140f22a240cbb4c3f125540e0e3da8e065284dc1c936ad49285ee6007313019b9176424c3da93356e1b4e52d6a3d5302056e94b25417cbc6e64

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v0677851.exe

          Filesize

          1.2MB

          MD5

          d9d2776a4348d5ceac64ccc3f6db1144

          SHA1

          076a0089de05ea2fabcaa62fab6950fb78280da9

          SHA256

          4795a75f6accf0c6ee4256c4aa6592b8a0350551ad93c04e5b5621ecb876e9ae

          SHA512

          f8aedfef17f55140f22a240cbb4c3f125540e0e3da8e065284dc1c936ad49285ee6007313019b9176424c3da93356e1b4e52d6a3d5302056e94b25417cbc6e64

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6430048.exe

          Filesize

          969KB

          MD5

          994bec903f7269ec72db198d32ee3891

          SHA1

          fbc9eea3aba148c556f52a5aab992d09252133dc

          SHA256

          cbfc3c350853c25ab52a4f046297b82954a2b40f379ef51d08c86c017f5b7b6e

          SHA512

          2078ec80689ebc01c7e8e242bad867f0a34e3702a3fbe7c23999fef3b4c706ad96ca5669dd4be521fba4e49def5a8f3e4c269e9fe1c875c66b23be1e65726c10

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6430048.exe

          Filesize

          969KB

          MD5

          994bec903f7269ec72db198d32ee3891

          SHA1

          fbc9eea3aba148c556f52a5aab992d09252133dc

          SHA256

          cbfc3c350853c25ab52a4f046297b82954a2b40f379ef51d08c86c017f5b7b6e

          SHA512

          2078ec80689ebc01c7e8e242bad867f0a34e3702a3fbe7c23999fef3b4c706ad96ca5669dd4be521fba4e49def5a8f3e4c269e9fe1c875c66b23be1e65726c10

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v6071444.exe

          Filesize

          814KB

          MD5

          b22bd4aedc86e9388fb044af062d0e8e

          SHA1

          b9b85c529dce618799d051341a16ebf48d58c826

          SHA256

          3a77a3d5c8ca51f094f73cbe53e556d7c78939b0f4fd513d4d39e78b72457f06

          SHA512

          6e8735151cc50afa3cbad22ff60697ad155d70c0ce073d3a8227c802fe8e83a84e517d669cdced28023700f369cd972fe934b2caa7d05762e8d7e80cdc96a26a

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v6071444.exe

          Filesize

          814KB

          MD5

          b22bd4aedc86e9388fb044af062d0e8e

          SHA1

          b9b85c529dce618799d051341a16ebf48d58c826

          SHA256

          3a77a3d5c8ca51f094f73cbe53e556d7c78939b0f4fd513d4d39e78b72457f06

          SHA512

          6e8735151cc50afa3cbad22ff60697ad155d70c0ce073d3a8227c802fe8e83a84e517d669cdced28023700f369cd972fe934b2caa7d05762e8d7e80cdc96a26a

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v3264993.exe

          Filesize

          637KB

          MD5

          6bdf1ca9e3a113e931ba743caf7babf4

          SHA1

          159da37e5413e980820f10f80cd99ebc23ae1098

          SHA256

          250072d81f74b7f95f69e36a53037e806f58518fc299e099cdb08caa6b653940

          SHA512

          ce1d9eb4e7a7bdebb06ae57fd80e7f343ea808b2fa6c3e20b281d3ee9ff562b550de9cfb9658b148e6bef464918749f3b4d6d612c6989cd157bb0c17a333b88c

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v3264993.exe

          Filesize

          637KB

          MD5

          6bdf1ca9e3a113e931ba743caf7babf4

          SHA1

          159da37e5413e980820f10f80cd99ebc23ae1098

          SHA256

          250072d81f74b7f95f69e36a53037e806f58518fc299e099cdb08caa6b653940

          SHA512

          ce1d9eb4e7a7bdebb06ae57fd80e7f343ea808b2fa6c3e20b281d3ee9ff562b550de9cfb9658b148e6bef464918749f3b4d6d612c6989cd157bb0c17a333b88c

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v4694824.exe

          Filesize

          363KB

          MD5

          d392e49256b8cd3062582484930def1d

          SHA1

          3c31cacd4d5b496a7668de6c9e99ff8a52791398

          SHA256

          1a101d187b53cbdbbe4d97bedb2c18bd42ca9825b907e2a3751370929d0f3f28

          SHA512

          f6026657e83b3e74fe3f1cf0e669c5601fe91f2d7a28663b2f9e7ddb63f33e9b04ad090d2cbd9cbbbfadc71ed0c54f8232b79f07bcbc33aad4178e8ea4aecdb6

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v4694824.exe

          Filesize

          363KB

          MD5

          d392e49256b8cd3062582484930def1d

          SHA1

          3c31cacd4d5b496a7668de6c9e99ff8a52791398

          SHA256

          1a101d187b53cbdbbe4d97bedb2c18bd42ca9825b907e2a3751370929d0f3f28

          SHA512

          f6026657e83b3e74fe3f1cf0e669c5601fe91f2d7a28663b2f9e7ddb63f33e9b04ad090d2cbd9cbbbfadc71ed0c54f8232b79f07bcbc33aad4178e8ea4aecdb6

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0147330.exe

          Filesize

          251KB

          MD5

          d22b6ecc0ee57bb5743fff3118de7e36

          SHA1

          420cdd287fc5cd6feafd21a46506dcd50b49c49b

          SHA256

          80909e2fc757f0d4ad2102ab55a1dd9ef3e23cc2aab722b57fde604a3a99fa95

          SHA512

          140d46e862087b00989dd08bf546b6736974a4c0a57048ad7544878252dc0dd9953d9041c73583c123cfe07c43b9d0ae0dce96f32cc9c175d5118935997b9f38

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0147330.exe

          Filesize

          251KB

          MD5

          d22b6ecc0ee57bb5743fff3118de7e36

          SHA1

          420cdd287fc5cd6feafd21a46506dcd50b49c49b

          SHA256

          80909e2fc757f0d4ad2102ab55a1dd9ef3e23cc2aab722b57fde604a3a99fa95

          SHA512

          140d46e862087b00989dd08bf546b6736974a4c0a57048ad7544878252dc0dd9953d9041c73583c123cfe07c43b9d0ae0dce96f32cc9c175d5118935997b9f38

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0147330.exe

          Filesize

          251KB

          MD5

          d22b6ecc0ee57bb5743fff3118de7e36

          SHA1

          420cdd287fc5cd6feafd21a46506dcd50b49c49b

          SHA256

          80909e2fc757f0d4ad2102ab55a1dd9ef3e23cc2aab722b57fde604a3a99fa95

          SHA512

          140d46e862087b00989dd08bf546b6736974a4c0a57048ad7544878252dc0dd9953d9041c73583c123cfe07c43b9d0ae0dce96f32cc9c175d5118935997b9f38

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0147330.exe

          Filesize

          251KB

          MD5

          d22b6ecc0ee57bb5743fff3118de7e36

          SHA1

          420cdd287fc5cd6feafd21a46506dcd50b49c49b

          SHA256

          80909e2fc757f0d4ad2102ab55a1dd9ef3e23cc2aab722b57fde604a3a99fa95

          SHA512

          140d46e862087b00989dd08bf546b6736974a4c0a57048ad7544878252dc0dd9953d9041c73583c123cfe07c43b9d0ae0dce96f32cc9c175d5118935997b9f38

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0147330.exe

          Filesize

          251KB

          MD5

          d22b6ecc0ee57bb5743fff3118de7e36

          SHA1

          420cdd287fc5cd6feafd21a46506dcd50b49c49b

          SHA256

          80909e2fc757f0d4ad2102ab55a1dd9ef3e23cc2aab722b57fde604a3a99fa95

          SHA512

          140d46e862087b00989dd08bf546b6736974a4c0a57048ad7544878252dc0dd9953d9041c73583c123cfe07c43b9d0ae0dce96f32cc9c175d5118935997b9f38

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0147330.exe

          Filesize

          251KB

          MD5

          d22b6ecc0ee57bb5743fff3118de7e36

          SHA1

          420cdd287fc5cd6feafd21a46506dcd50b49c49b

          SHA256

          80909e2fc757f0d4ad2102ab55a1dd9ef3e23cc2aab722b57fde604a3a99fa95

          SHA512

          140d46e862087b00989dd08bf546b6736974a4c0a57048ad7544878252dc0dd9953d9041c73583c123cfe07c43b9d0ae0dce96f32cc9c175d5118935997b9f38

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0147330.exe

          Filesize

          251KB

          MD5

          d22b6ecc0ee57bb5743fff3118de7e36

          SHA1

          420cdd287fc5cd6feafd21a46506dcd50b49c49b

          SHA256

          80909e2fc757f0d4ad2102ab55a1dd9ef3e23cc2aab722b57fde604a3a99fa95

          SHA512

          140d46e862087b00989dd08bf546b6736974a4c0a57048ad7544878252dc0dd9953d9041c73583c123cfe07c43b9d0ae0dce96f32cc9c175d5118935997b9f38

        • memory/2492-68-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2492-66-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2492-70-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2492-72-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2492-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2492-65-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2492-64-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2492-63-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB