Analysis
-
max time kernel
41s -
max time network
79s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 05:22
Static task
static1
Behavioral task
behavioral1
Sample
da56b4443c27cbd9e3e1ba19b4a2e8eb.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
da56b4443c27cbd9e3e1ba19b4a2e8eb.exe
Resource
win10v2004-20230915-en
General
-
Target
da56b4443c27cbd9e3e1ba19b4a2e8eb.exe
-
Size
1.1MB
-
MD5
da56b4443c27cbd9e3e1ba19b4a2e8eb
-
SHA1
a4637e9e1953d0b11fd48f3a6a7dcc26f5dbe3c1
-
SHA256
42b60a994ed52d36d56ac579bcab08db2041892b5c6f2ac29f4f9f1adf084382
-
SHA512
d830fc97c8911d12e4ab4781105672575b5fd0616d390cb41c1dd71fc3ac809694bdbfb3a3d2010acadfd22ded5210463c4bc75b65d640a41c29c62e8765b80e
-
SSDEEP
24576:9ynY+7MhwEa7VMX7N9asGuGnOhROYcFVLc2l:YYmESmnROYcVL
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/5076-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Executes dropped EXE 5 IoCs
pid Process 4248 z6357886.exe 4732 z3641072.exe 1056 z3010631.exe 1700 z4388990.exe 60 q0821020.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z3010631.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z4388990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" da56b4443c27cbd9e3e1ba19b4a2e8eb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6357886.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3641072.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 60 set thread context of 5076 60 q0821020.exe 94 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3028 wrote to memory of 4248 3028 da56b4443c27cbd9e3e1ba19b4a2e8eb.exe 85 PID 3028 wrote to memory of 4248 3028 da56b4443c27cbd9e3e1ba19b4a2e8eb.exe 85 PID 3028 wrote to memory of 4248 3028 da56b4443c27cbd9e3e1ba19b4a2e8eb.exe 85 PID 4248 wrote to memory of 4732 4248 z6357886.exe 86 PID 4248 wrote to memory of 4732 4248 z6357886.exe 86 PID 4248 wrote to memory of 4732 4248 z6357886.exe 86 PID 4732 wrote to memory of 1056 4732 z3641072.exe 87 PID 4732 wrote to memory of 1056 4732 z3641072.exe 87 PID 4732 wrote to memory of 1056 4732 z3641072.exe 87 PID 1056 wrote to memory of 1700 1056 z3010631.exe 90 PID 1056 wrote to memory of 1700 1056 z3010631.exe 90 PID 1056 wrote to memory of 1700 1056 z3010631.exe 90 PID 1700 wrote to memory of 60 1700 z4388990.exe 91 PID 1700 wrote to memory of 60 1700 z4388990.exe 91 PID 1700 wrote to memory of 60 1700 z4388990.exe 91 PID 60 wrote to memory of 5076 60 q0821020.exe 94 PID 60 wrote to memory of 5076 60 q0821020.exe 94 PID 60 wrote to memory of 5076 60 q0821020.exe 94 PID 60 wrote to memory of 5076 60 q0821020.exe 94 PID 60 wrote to memory of 5076 60 q0821020.exe 94 PID 60 wrote to memory of 5076 60 q0821020.exe 94 PID 60 wrote to memory of 5076 60 q0821020.exe 94 PID 60 wrote to memory of 5076 60 q0821020.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\da56b4443c27cbd9e3e1ba19b4a2e8eb.exe"C:\Users\Admin\AppData\Local\Temp\da56b4443c27cbd9e3e1ba19b4a2e8eb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6357886.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6357886.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3641072.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3641072.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3010631.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3010631.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4388990.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4388990.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0821020.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0821020.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:5076
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
982KB
MD5eaacd88a33681c9e6e4c228f218d2259
SHA1e8cb8fa90a5b9c4df2e75e3f745f2802a5236e63
SHA25689c64e811575d03590e959828eb75a5e5248cccc09ceba08c57cd8114ee1a9b8
SHA512aed1fc5355f5e26690e7b205c8604eea448963707c33bf8183379b63699cb5c3a7ea4d120b6dc42e3a3d7d1b22ffac54420657938654f68d170b6884b7c6a53c
-
Filesize
982KB
MD5eaacd88a33681c9e6e4c228f218d2259
SHA1e8cb8fa90a5b9c4df2e75e3f745f2802a5236e63
SHA25689c64e811575d03590e959828eb75a5e5248cccc09ceba08c57cd8114ee1a9b8
SHA512aed1fc5355f5e26690e7b205c8604eea448963707c33bf8183379b63699cb5c3a7ea4d120b6dc42e3a3d7d1b22ffac54420657938654f68d170b6884b7c6a53c
-
Filesize
799KB
MD5d7a0eb836d6efeebf123085148f9e6c5
SHA13f77fff52e8dd360c361f722ac4f8fa5047b7c21
SHA256f1df44a11417745c5ca730818f9c4da7d575d7c8130479c9f2a655a1382b054d
SHA512f5fbbd9f0df8e6da4116c94ebd669b20fa0ec59b37fb2c40df84971cde8185359623a9510a478bc8be0fabda82b8d39a183442fa36cdd4fee1066a8b3a63b16d
-
Filesize
799KB
MD5d7a0eb836d6efeebf123085148f9e6c5
SHA13f77fff52e8dd360c361f722ac4f8fa5047b7c21
SHA256f1df44a11417745c5ca730818f9c4da7d575d7c8130479c9f2a655a1382b054d
SHA512f5fbbd9f0df8e6da4116c94ebd669b20fa0ec59b37fb2c40df84971cde8185359623a9510a478bc8be0fabda82b8d39a183442fa36cdd4fee1066a8b3a63b16d
-
Filesize
617KB
MD5fe0ef187caab86fae1a7aaed21e24ec8
SHA159cfa06f99c411f2bc44e9ae8718eaa3ac092e59
SHA256be907f17e656720f97a24610260dc84c0372e28905d2f3041adb4c0c8d37b812
SHA5126b2b91155e126c3902e6c1dfefc1356c9da0755d9161d63e0ee3973e69e200ac78b6cc379375e23a432600258adc412f159f24034371d623d961e4ffbf444e7d
-
Filesize
617KB
MD5fe0ef187caab86fae1a7aaed21e24ec8
SHA159cfa06f99c411f2bc44e9ae8718eaa3ac092e59
SHA256be907f17e656720f97a24610260dc84c0372e28905d2f3041adb4c0c8d37b812
SHA5126b2b91155e126c3902e6c1dfefc1356c9da0755d9161d63e0ee3973e69e200ac78b6cc379375e23a432600258adc412f159f24034371d623d961e4ffbf444e7d
-
Filesize
346KB
MD5fe6a9baefed6261bf57e71f8567a4de7
SHA1a6caeac86f9a536c5def4992d597da8913d994fc
SHA256d91f6543283975934dfa45f1cf499a070e039e8caac3a7a0e118a67b56b72549
SHA5123ca1646e2297356cd1ff884a69d75f2e6811ac18fcd31cebd7f7d5af2d263b876adbda80e1fa36c5a7430d506ce6de1bfc02eb186193b89dbc4a665593bca365
-
Filesize
346KB
MD5fe6a9baefed6261bf57e71f8567a4de7
SHA1a6caeac86f9a536c5def4992d597da8913d994fc
SHA256d91f6543283975934dfa45f1cf499a070e039e8caac3a7a0e118a67b56b72549
SHA5123ca1646e2297356cd1ff884a69d75f2e6811ac18fcd31cebd7f7d5af2d263b876adbda80e1fa36c5a7430d506ce6de1bfc02eb186193b89dbc4a665593bca365
-
Filesize
227KB
MD5ae0508125dd38948ad36f4e3af713da1
SHA1a57fbc25d631ef2d0a2074e73329f5d5f8b2f0fe
SHA25621b24b5ba16f9214338ebab7cc0c47aff6a461a388dbcc7f19c3cc75c986f15c
SHA5127124f61d360cb84eab02f1e4448850c9876a201da09c7a5568f495d9287929a1dcac356cfcf711d084d6973c8b78960a5cf749ed7a5bfd27a502722450ce05ce
-
Filesize
227KB
MD5ae0508125dd38948ad36f4e3af713da1
SHA1a57fbc25d631ef2d0a2074e73329f5d5f8b2f0fe
SHA25621b24b5ba16f9214338ebab7cc0c47aff6a461a388dbcc7f19c3cc75c986f15c
SHA5127124f61d360cb84eab02f1e4448850c9876a201da09c7a5568f495d9287929a1dcac356cfcf711d084d6973c8b78960a5cf749ed7a5bfd27a502722450ce05ce