Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 05:25

General

  • Target

    3b4d96bd868a0a2aa0071b1b72b092e193b79922808ddeb407c41a491f8cd3e6.exe

  • Size

    1.1MB

  • MD5

    7093b06a9d0dadb9a5f4208aa95043bd

  • SHA1

    0e36b117f5ca6a0293aaa88c0c7e97b78f2834fe

  • SHA256

    3b4d96bd868a0a2aa0071b1b72b092e193b79922808ddeb407c41a491f8cd3e6

  • SHA512

    55d06b5679d7f12a4f85c58e1507ac76661e1f2d08e5285adf07f5e3dd8553b5b2059ba7c1d97a164f591e3bdbdfa794004d69e15dbc2e7621fbb1f40b350878

  • SSDEEP

    24576:DyArphrmosaGQKA1o0Vp3tjRq96BofKdDHOoQxl7Kin:W4HSJko0VrjwBfKJVQ

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b4d96bd868a0a2aa0071b1b72b092e193b79922808ddeb407c41a491f8cd3e6.exe
    "C:\Users\Admin\AppData\Local\Temp\3b4d96bd868a0a2aa0071b1b72b092e193b79922808ddeb407c41a491f8cd3e6.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1463980.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1463980.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9391516.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9391516.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3012
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8911322.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8911322.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3064
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5613847.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5613847.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2784
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1021552.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1021552.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2896
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2524
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 276
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1463980.exe

    Filesize

    974KB

    MD5

    8a028eb771b8aa5a498e23aabd57fd23

    SHA1

    2a63e46417fe3398be29dd58ab25bcd14f9b681d

    SHA256

    09b8444c6edc03d9412c09e3b0f83937e51150abad336e7e05180689aeb41203

    SHA512

    772cc65b9d647508137ffb34c04bf381dfd8a9d06453ed576a8d034aaa601999abd85357c27565dadbfd6b45640276da186ccd156b5e04f5a2529f8e410151c5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1463980.exe

    Filesize

    974KB

    MD5

    8a028eb771b8aa5a498e23aabd57fd23

    SHA1

    2a63e46417fe3398be29dd58ab25bcd14f9b681d

    SHA256

    09b8444c6edc03d9412c09e3b0f83937e51150abad336e7e05180689aeb41203

    SHA512

    772cc65b9d647508137ffb34c04bf381dfd8a9d06453ed576a8d034aaa601999abd85357c27565dadbfd6b45640276da186ccd156b5e04f5a2529f8e410151c5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9391516.exe

    Filesize

    799KB

    MD5

    2d5808be99da61c158a6eb6b892ba461

    SHA1

    e4a3678366ed96bd71df52cf5eeb67e96fe246e3

    SHA256

    f4f79aee721f3e6dbcbab3085e4b19cee7593f5c92eaa6ac9c24cdc8c5cdcc14

    SHA512

    b4881a96846cbf7bf814707df36e396a70347b9a531ebb143d21d0fbdd52cbb905a17e466edad7f9d9bcea5f4a1205ecb0e50923131c04f872c6620445d60a5b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9391516.exe

    Filesize

    799KB

    MD5

    2d5808be99da61c158a6eb6b892ba461

    SHA1

    e4a3678366ed96bd71df52cf5eeb67e96fe246e3

    SHA256

    f4f79aee721f3e6dbcbab3085e4b19cee7593f5c92eaa6ac9c24cdc8c5cdcc14

    SHA512

    b4881a96846cbf7bf814707df36e396a70347b9a531ebb143d21d0fbdd52cbb905a17e466edad7f9d9bcea5f4a1205ecb0e50923131c04f872c6620445d60a5b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8911322.exe

    Filesize

    617KB

    MD5

    0e8fe9e629b720c373c5a8b5a55ea634

    SHA1

    9a5acfd11efe5badfff3ca1dcb21b6e6c0976eb6

    SHA256

    b5b5a248b410b718a2332c2544163aa8e4ff0235b898e0aa03749728a4b814f7

    SHA512

    ae8c627ab4553aa3a984255387f33654e88d747fd3237b2a13f9a62e8f76fad86307edc0de2f360f6d283a22d6ae614b696e9de310587a52d677c9a1f1e5a501

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8911322.exe

    Filesize

    617KB

    MD5

    0e8fe9e629b720c373c5a8b5a55ea634

    SHA1

    9a5acfd11efe5badfff3ca1dcb21b6e6c0976eb6

    SHA256

    b5b5a248b410b718a2332c2544163aa8e4ff0235b898e0aa03749728a4b814f7

    SHA512

    ae8c627ab4553aa3a984255387f33654e88d747fd3237b2a13f9a62e8f76fad86307edc0de2f360f6d283a22d6ae614b696e9de310587a52d677c9a1f1e5a501

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5613847.exe

    Filesize

    346KB

    MD5

    e78ad6a484fa88f9630419622d0c6ce5

    SHA1

    cc053a476b88c27c621db32c17be7fb0577d0231

    SHA256

    6513bc9d43fc457eecd800dd48217d226124bbbc7570594408256732dd8f8db0

    SHA512

    7600aac148a9f93c7926d97dbd03fa1d3bbec9f4f81c89ad9fc2fc4d36fe33f0d881f79ad5f1a1c8a043f46ced53742c6214d0c8e05570df8b937f028486b282

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5613847.exe

    Filesize

    346KB

    MD5

    e78ad6a484fa88f9630419622d0c6ce5

    SHA1

    cc053a476b88c27c621db32c17be7fb0577d0231

    SHA256

    6513bc9d43fc457eecd800dd48217d226124bbbc7570594408256732dd8f8db0

    SHA512

    7600aac148a9f93c7926d97dbd03fa1d3bbec9f4f81c89ad9fc2fc4d36fe33f0d881f79ad5f1a1c8a043f46ced53742c6214d0c8e05570df8b937f028486b282

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1021552.exe

    Filesize

    227KB

    MD5

    c460d3036bfa43ae53ae213efada810d

    SHA1

    def1ac8f9d22d402772e1e38464bc6af9549d2df

    SHA256

    3c3c48149a3aad722f272717b3e684b441ded4e47f6892bd631a5d670ba11c40

    SHA512

    fa5f8ec2033b404d76875a0cd4a95e390b7ec1f7957df3008d0f41a7b737cf607fc7e7b439e0f85b5df14284ba944082a585a77dbd5d6ae0deee590555d0e0a5

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1021552.exe

    Filesize

    227KB

    MD5

    c460d3036bfa43ae53ae213efada810d

    SHA1

    def1ac8f9d22d402772e1e38464bc6af9549d2df

    SHA256

    3c3c48149a3aad722f272717b3e684b441ded4e47f6892bd631a5d670ba11c40

    SHA512

    fa5f8ec2033b404d76875a0cd4a95e390b7ec1f7957df3008d0f41a7b737cf607fc7e7b439e0f85b5df14284ba944082a585a77dbd5d6ae0deee590555d0e0a5

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1021552.exe

    Filesize

    227KB

    MD5

    c460d3036bfa43ae53ae213efada810d

    SHA1

    def1ac8f9d22d402772e1e38464bc6af9549d2df

    SHA256

    3c3c48149a3aad722f272717b3e684b441ded4e47f6892bd631a5d670ba11c40

    SHA512

    fa5f8ec2033b404d76875a0cd4a95e390b7ec1f7957df3008d0f41a7b737cf607fc7e7b439e0f85b5df14284ba944082a585a77dbd5d6ae0deee590555d0e0a5

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1463980.exe

    Filesize

    974KB

    MD5

    8a028eb771b8aa5a498e23aabd57fd23

    SHA1

    2a63e46417fe3398be29dd58ab25bcd14f9b681d

    SHA256

    09b8444c6edc03d9412c09e3b0f83937e51150abad336e7e05180689aeb41203

    SHA512

    772cc65b9d647508137ffb34c04bf381dfd8a9d06453ed576a8d034aaa601999abd85357c27565dadbfd6b45640276da186ccd156b5e04f5a2529f8e410151c5

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1463980.exe

    Filesize

    974KB

    MD5

    8a028eb771b8aa5a498e23aabd57fd23

    SHA1

    2a63e46417fe3398be29dd58ab25bcd14f9b681d

    SHA256

    09b8444c6edc03d9412c09e3b0f83937e51150abad336e7e05180689aeb41203

    SHA512

    772cc65b9d647508137ffb34c04bf381dfd8a9d06453ed576a8d034aaa601999abd85357c27565dadbfd6b45640276da186ccd156b5e04f5a2529f8e410151c5

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9391516.exe

    Filesize

    799KB

    MD5

    2d5808be99da61c158a6eb6b892ba461

    SHA1

    e4a3678366ed96bd71df52cf5eeb67e96fe246e3

    SHA256

    f4f79aee721f3e6dbcbab3085e4b19cee7593f5c92eaa6ac9c24cdc8c5cdcc14

    SHA512

    b4881a96846cbf7bf814707df36e396a70347b9a531ebb143d21d0fbdd52cbb905a17e466edad7f9d9bcea5f4a1205ecb0e50923131c04f872c6620445d60a5b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9391516.exe

    Filesize

    799KB

    MD5

    2d5808be99da61c158a6eb6b892ba461

    SHA1

    e4a3678366ed96bd71df52cf5eeb67e96fe246e3

    SHA256

    f4f79aee721f3e6dbcbab3085e4b19cee7593f5c92eaa6ac9c24cdc8c5cdcc14

    SHA512

    b4881a96846cbf7bf814707df36e396a70347b9a531ebb143d21d0fbdd52cbb905a17e466edad7f9d9bcea5f4a1205ecb0e50923131c04f872c6620445d60a5b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8911322.exe

    Filesize

    617KB

    MD5

    0e8fe9e629b720c373c5a8b5a55ea634

    SHA1

    9a5acfd11efe5badfff3ca1dcb21b6e6c0976eb6

    SHA256

    b5b5a248b410b718a2332c2544163aa8e4ff0235b898e0aa03749728a4b814f7

    SHA512

    ae8c627ab4553aa3a984255387f33654e88d747fd3237b2a13f9a62e8f76fad86307edc0de2f360f6d283a22d6ae614b696e9de310587a52d677c9a1f1e5a501

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8911322.exe

    Filesize

    617KB

    MD5

    0e8fe9e629b720c373c5a8b5a55ea634

    SHA1

    9a5acfd11efe5badfff3ca1dcb21b6e6c0976eb6

    SHA256

    b5b5a248b410b718a2332c2544163aa8e4ff0235b898e0aa03749728a4b814f7

    SHA512

    ae8c627ab4553aa3a984255387f33654e88d747fd3237b2a13f9a62e8f76fad86307edc0de2f360f6d283a22d6ae614b696e9de310587a52d677c9a1f1e5a501

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z5613847.exe

    Filesize

    346KB

    MD5

    e78ad6a484fa88f9630419622d0c6ce5

    SHA1

    cc053a476b88c27c621db32c17be7fb0577d0231

    SHA256

    6513bc9d43fc457eecd800dd48217d226124bbbc7570594408256732dd8f8db0

    SHA512

    7600aac148a9f93c7926d97dbd03fa1d3bbec9f4f81c89ad9fc2fc4d36fe33f0d881f79ad5f1a1c8a043f46ced53742c6214d0c8e05570df8b937f028486b282

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z5613847.exe

    Filesize

    346KB

    MD5

    e78ad6a484fa88f9630419622d0c6ce5

    SHA1

    cc053a476b88c27c621db32c17be7fb0577d0231

    SHA256

    6513bc9d43fc457eecd800dd48217d226124bbbc7570594408256732dd8f8db0

    SHA512

    7600aac148a9f93c7926d97dbd03fa1d3bbec9f4f81c89ad9fc2fc4d36fe33f0d881f79ad5f1a1c8a043f46ced53742c6214d0c8e05570df8b937f028486b282

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1021552.exe

    Filesize

    227KB

    MD5

    c460d3036bfa43ae53ae213efada810d

    SHA1

    def1ac8f9d22d402772e1e38464bc6af9549d2df

    SHA256

    3c3c48149a3aad722f272717b3e684b441ded4e47f6892bd631a5d670ba11c40

    SHA512

    fa5f8ec2033b404d76875a0cd4a95e390b7ec1f7957df3008d0f41a7b737cf607fc7e7b439e0f85b5df14284ba944082a585a77dbd5d6ae0deee590555d0e0a5

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1021552.exe

    Filesize

    227KB

    MD5

    c460d3036bfa43ae53ae213efada810d

    SHA1

    def1ac8f9d22d402772e1e38464bc6af9549d2df

    SHA256

    3c3c48149a3aad722f272717b3e684b441ded4e47f6892bd631a5d670ba11c40

    SHA512

    fa5f8ec2033b404d76875a0cd4a95e390b7ec1f7957df3008d0f41a7b737cf607fc7e7b439e0f85b5df14284ba944082a585a77dbd5d6ae0deee590555d0e0a5

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1021552.exe

    Filesize

    227KB

    MD5

    c460d3036bfa43ae53ae213efada810d

    SHA1

    def1ac8f9d22d402772e1e38464bc6af9549d2df

    SHA256

    3c3c48149a3aad722f272717b3e684b441ded4e47f6892bd631a5d670ba11c40

    SHA512

    fa5f8ec2033b404d76875a0cd4a95e390b7ec1f7957df3008d0f41a7b737cf607fc7e7b439e0f85b5df14284ba944082a585a77dbd5d6ae0deee590555d0e0a5

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1021552.exe

    Filesize

    227KB

    MD5

    c460d3036bfa43ae53ae213efada810d

    SHA1

    def1ac8f9d22d402772e1e38464bc6af9549d2df

    SHA256

    3c3c48149a3aad722f272717b3e684b441ded4e47f6892bd631a5d670ba11c40

    SHA512

    fa5f8ec2033b404d76875a0cd4a95e390b7ec1f7957df3008d0f41a7b737cf607fc7e7b439e0f85b5df14284ba944082a585a77dbd5d6ae0deee590555d0e0a5

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1021552.exe

    Filesize

    227KB

    MD5

    c460d3036bfa43ae53ae213efada810d

    SHA1

    def1ac8f9d22d402772e1e38464bc6af9549d2df

    SHA256

    3c3c48149a3aad722f272717b3e684b441ded4e47f6892bd631a5d670ba11c40

    SHA512

    fa5f8ec2033b404d76875a0cd4a95e390b7ec1f7957df3008d0f41a7b737cf607fc7e7b439e0f85b5df14284ba944082a585a77dbd5d6ae0deee590555d0e0a5

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1021552.exe

    Filesize

    227KB

    MD5

    c460d3036bfa43ae53ae213efada810d

    SHA1

    def1ac8f9d22d402772e1e38464bc6af9549d2df

    SHA256

    3c3c48149a3aad722f272717b3e684b441ded4e47f6892bd631a5d670ba11c40

    SHA512

    fa5f8ec2033b404d76875a0cd4a95e390b7ec1f7957df3008d0f41a7b737cf607fc7e7b439e0f85b5df14284ba944082a585a77dbd5d6ae0deee590555d0e0a5

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1021552.exe

    Filesize

    227KB

    MD5

    c460d3036bfa43ae53ae213efada810d

    SHA1

    def1ac8f9d22d402772e1e38464bc6af9549d2df

    SHA256

    3c3c48149a3aad722f272717b3e684b441ded4e47f6892bd631a5d670ba11c40

    SHA512

    fa5f8ec2033b404d76875a0cd4a95e390b7ec1f7957df3008d0f41a7b737cf607fc7e7b439e0f85b5df14284ba944082a585a77dbd5d6ae0deee590555d0e0a5

  • memory/2524-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2524-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2524-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2524-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2524-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2524-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2524-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2524-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB