Analysis

  • max time kernel
    122s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 05:06

General

  • Target

    37e5c43c490a6a0c4d0c6345f07a69ef.exe

  • Size

    802KB

  • MD5

    37e5c43c490a6a0c4d0c6345f07a69ef

  • SHA1

    310e97e1dbe9a6c854a92fe0df453f397288ca6e

  • SHA256

    12fb005f8400051a07486a0b93e1429ec4db0ac2575d9eb1630e7d804813d60f

  • SHA512

    dd2d0b1834dde0009d5b58153d91f2292f27ae73f4d5e750f78fa0c8807393df6632f87351e497bfc8cc1fbac29e6514203db7f34dd79a87c037b518a5b60925

  • SSDEEP

    12288:PMruy905bnvC7qQJAYscbZdIvmmFUt+4MTwMsQrn14qtY8JmLgIuPR2UHtYsbTT1:pymvCHpxZdIvlQxSsQr14KJmLLO7e8J

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37e5c43c490a6a0c4d0c6345f07a69ef.exe
    "C:\Users\Admin\AppData\Local\Temp\37e5c43c490a6a0c4d0c6345f07a69ef.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7870118.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7870118.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1479898.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1479898.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1680
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8533027.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8533027.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3068
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q6124914.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q6124914.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2920
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2696
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 276
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7870118.exe

    Filesize

    710KB

    MD5

    a6dc2efa53796aac51d9a9fd35d5e1e3

    SHA1

    6a8450c4bc717423ebc9b627e99b4404672971b1

    SHA256

    183691bba39a6a34f488251706d4d1685b960430623e9260d8fe5f0675ddf710

    SHA512

    0b4461d3f19aee68dfe319412415d8d5f6e237617308834578f8cb42d168cb86b52e385dcb0eab58f3718f1f5aada6f12ca9b0bc83d5cdf5010184dceb8bb37d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7870118.exe

    Filesize

    710KB

    MD5

    a6dc2efa53796aac51d9a9fd35d5e1e3

    SHA1

    6a8450c4bc717423ebc9b627e99b4404672971b1

    SHA256

    183691bba39a6a34f488251706d4d1685b960430623e9260d8fe5f0675ddf710

    SHA512

    0b4461d3f19aee68dfe319412415d8d5f6e237617308834578f8cb42d168cb86b52e385dcb0eab58f3718f1f5aada6f12ca9b0bc83d5cdf5010184dceb8bb37d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1479898.exe

    Filesize

    527KB

    MD5

    e7a1bd2f10bbe3abc689386504c19bd9

    SHA1

    7ed4bc611ad131dd064cdea18d314de71f2cb510

    SHA256

    ea870a19eb89c813d733f2e0fbee9cd222da224d5925b9c8501570c3fbc20ca5

    SHA512

    1bcbf7138eac9457c9e07af45ef248eb466ad9e9f7c50094ceeba604bf1a8e6d2e6eb2d4c8839489c34dffd5bab1ebdd90fed6efde1e847147290d7da1a121aa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1479898.exe

    Filesize

    527KB

    MD5

    e7a1bd2f10bbe3abc689386504c19bd9

    SHA1

    7ed4bc611ad131dd064cdea18d314de71f2cb510

    SHA256

    ea870a19eb89c813d733f2e0fbee9cd222da224d5925b9c8501570c3fbc20ca5

    SHA512

    1bcbf7138eac9457c9e07af45ef248eb466ad9e9f7c50094ceeba604bf1a8e6d2e6eb2d4c8839489c34dffd5bab1ebdd90fed6efde1e847147290d7da1a121aa

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8533027.exe

    Filesize

    346KB

    MD5

    03f3490a6edf307d9e23db065e64461d

    SHA1

    797b3962099766e155b781b9e2b1b192b3831bd3

    SHA256

    61a76f706c731540527ee3c2041fbd6187de3d5f83f38122b91cb2b6384b121c

    SHA512

    f8565f1a878a2b94b00c7548f3c49c84c2920e47a5cab32761a2a0f703148752d17f6c7879dcf30c23dd03e66f623848edb4d94c8e1e7e58ac35aaa02f360a73

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8533027.exe

    Filesize

    346KB

    MD5

    03f3490a6edf307d9e23db065e64461d

    SHA1

    797b3962099766e155b781b9e2b1b192b3831bd3

    SHA256

    61a76f706c731540527ee3c2041fbd6187de3d5f83f38122b91cb2b6384b121c

    SHA512

    f8565f1a878a2b94b00c7548f3c49c84c2920e47a5cab32761a2a0f703148752d17f6c7879dcf30c23dd03e66f623848edb4d94c8e1e7e58ac35aaa02f360a73

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q6124914.exe

    Filesize

    227KB

    MD5

    e1b9eb8e59d1458e957c540ead33cdea

    SHA1

    c87985222cc8cf511d790887b7f88b590b77d68f

    SHA256

    ef877e32a922e83bc4702a17cfe9807bc7287538e5fee234e2010891c755af03

    SHA512

    32225d2cc84918b23bf70e5545b60df21cfc474cdd97bf26384a47bef733fe0032a1f3792727ffd90e50cb656efd74b72dad80203f2584f579823111894767b9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q6124914.exe

    Filesize

    227KB

    MD5

    e1b9eb8e59d1458e957c540ead33cdea

    SHA1

    c87985222cc8cf511d790887b7f88b590b77d68f

    SHA256

    ef877e32a922e83bc4702a17cfe9807bc7287538e5fee234e2010891c755af03

    SHA512

    32225d2cc84918b23bf70e5545b60df21cfc474cdd97bf26384a47bef733fe0032a1f3792727ffd90e50cb656efd74b72dad80203f2584f579823111894767b9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q6124914.exe

    Filesize

    227KB

    MD5

    e1b9eb8e59d1458e957c540ead33cdea

    SHA1

    c87985222cc8cf511d790887b7f88b590b77d68f

    SHA256

    ef877e32a922e83bc4702a17cfe9807bc7287538e5fee234e2010891c755af03

    SHA512

    32225d2cc84918b23bf70e5545b60df21cfc474cdd97bf26384a47bef733fe0032a1f3792727ffd90e50cb656efd74b72dad80203f2584f579823111894767b9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7870118.exe

    Filesize

    710KB

    MD5

    a6dc2efa53796aac51d9a9fd35d5e1e3

    SHA1

    6a8450c4bc717423ebc9b627e99b4404672971b1

    SHA256

    183691bba39a6a34f488251706d4d1685b960430623e9260d8fe5f0675ddf710

    SHA512

    0b4461d3f19aee68dfe319412415d8d5f6e237617308834578f8cb42d168cb86b52e385dcb0eab58f3718f1f5aada6f12ca9b0bc83d5cdf5010184dceb8bb37d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7870118.exe

    Filesize

    710KB

    MD5

    a6dc2efa53796aac51d9a9fd35d5e1e3

    SHA1

    6a8450c4bc717423ebc9b627e99b4404672971b1

    SHA256

    183691bba39a6a34f488251706d4d1685b960430623e9260d8fe5f0675ddf710

    SHA512

    0b4461d3f19aee68dfe319412415d8d5f6e237617308834578f8cb42d168cb86b52e385dcb0eab58f3718f1f5aada6f12ca9b0bc83d5cdf5010184dceb8bb37d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1479898.exe

    Filesize

    527KB

    MD5

    e7a1bd2f10bbe3abc689386504c19bd9

    SHA1

    7ed4bc611ad131dd064cdea18d314de71f2cb510

    SHA256

    ea870a19eb89c813d733f2e0fbee9cd222da224d5925b9c8501570c3fbc20ca5

    SHA512

    1bcbf7138eac9457c9e07af45ef248eb466ad9e9f7c50094ceeba604bf1a8e6d2e6eb2d4c8839489c34dffd5bab1ebdd90fed6efde1e847147290d7da1a121aa

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1479898.exe

    Filesize

    527KB

    MD5

    e7a1bd2f10bbe3abc689386504c19bd9

    SHA1

    7ed4bc611ad131dd064cdea18d314de71f2cb510

    SHA256

    ea870a19eb89c813d733f2e0fbee9cd222da224d5925b9c8501570c3fbc20ca5

    SHA512

    1bcbf7138eac9457c9e07af45ef248eb466ad9e9f7c50094ceeba604bf1a8e6d2e6eb2d4c8839489c34dffd5bab1ebdd90fed6efde1e847147290d7da1a121aa

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8533027.exe

    Filesize

    346KB

    MD5

    03f3490a6edf307d9e23db065e64461d

    SHA1

    797b3962099766e155b781b9e2b1b192b3831bd3

    SHA256

    61a76f706c731540527ee3c2041fbd6187de3d5f83f38122b91cb2b6384b121c

    SHA512

    f8565f1a878a2b94b00c7548f3c49c84c2920e47a5cab32761a2a0f703148752d17f6c7879dcf30c23dd03e66f623848edb4d94c8e1e7e58ac35aaa02f360a73

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8533027.exe

    Filesize

    346KB

    MD5

    03f3490a6edf307d9e23db065e64461d

    SHA1

    797b3962099766e155b781b9e2b1b192b3831bd3

    SHA256

    61a76f706c731540527ee3c2041fbd6187de3d5f83f38122b91cb2b6384b121c

    SHA512

    f8565f1a878a2b94b00c7548f3c49c84c2920e47a5cab32761a2a0f703148752d17f6c7879dcf30c23dd03e66f623848edb4d94c8e1e7e58ac35aaa02f360a73

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\q6124914.exe

    Filesize

    227KB

    MD5

    e1b9eb8e59d1458e957c540ead33cdea

    SHA1

    c87985222cc8cf511d790887b7f88b590b77d68f

    SHA256

    ef877e32a922e83bc4702a17cfe9807bc7287538e5fee234e2010891c755af03

    SHA512

    32225d2cc84918b23bf70e5545b60df21cfc474cdd97bf26384a47bef733fe0032a1f3792727ffd90e50cb656efd74b72dad80203f2584f579823111894767b9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\q6124914.exe

    Filesize

    227KB

    MD5

    e1b9eb8e59d1458e957c540ead33cdea

    SHA1

    c87985222cc8cf511d790887b7f88b590b77d68f

    SHA256

    ef877e32a922e83bc4702a17cfe9807bc7287538e5fee234e2010891c755af03

    SHA512

    32225d2cc84918b23bf70e5545b60df21cfc474cdd97bf26384a47bef733fe0032a1f3792727ffd90e50cb656efd74b72dad80203f2584f579823111894767b9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\q6124914.exe

    Filesize

    227KB

    MD5

    e1b9eb8e59d1458e957c540ead33cdea

    SHA1

    c87985222cc8cf511d790887b7f88b590b77d68f

    SHA256

    ef877e32a922e83bc4702a17cfe9807bc7287538e5fee234e2010891c755af03

    SHA512

    32225d2cc84918b23bf70e5545b60df21cfc474cdd97bf26384a47bef733fe0032a1f3792727ffd90e50cb656efd74b72dad80203f2584f579823111894767b9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\q6124914.exe

    Filesize

    227KB

    MD5

    e1b9eb8e59d1458e957c540ead33cdea

    SHA1

    c87985222cc8cf511d790887b7f88b590b77d68f

    SHA256

    ef877e32a922e83bc4702a17cfe9807bc7287538e5fee234e2010891c755af03

    SHA512

    32225d2cc84918b23bf70e5545b60df21cfc474cdd97bf26384a47bef733fe0032a1f3792727ffd90e50cb656efd74b72dad80203f2584f579823111894767b9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\q6124914.exe

    Filesize

    227KB

    MD5

    e1b9eb8e59d1458e957c540ead33cdea

    SHA1

    c87985222cc8cf511d790887b7f88b590b77d68f

    SHA256

    ef877e32a922e83bc4702a17cfe9807bc7287538e5fee234e2010891c755af03

    SHA512

    32225d2cc84918b23bf70e5545b60df21cfc474cdd97bf26384a47bef733fe0032a1f3792727ffd90e50cb656efd74b72dad80203f2584f579823111894767b9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\q6124914.exe

    Filesize

    227KB

    MD5

    e1b9eb8e59d1458e957c540ead33cdea

    SHA1

    c87985222cc8cf511d790887b7f88b590b77d68f

    SHA256

    ef877e32a922e83bc4702a17cfe9807bc7287538e5fee234e2010891c755af03

    SHA512

    32225d2cc84918b23bf70e5545b60df21cfc474cdd97bf26384a47bef733fe0032a1f3792727ffd90e50cb656efd74b72dad80203f2584f579823111894767b9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\q6124914.exe

    Filesize

    227KB

    MD5

    e1b9eb8e59d1458e957c540ead33cdea

    SHA1

    c87985222cc8cf511d790887b7f88b590b77d68f

    SHA256

    ef877e32a922e83bc4702a17cfe9807bc7287538e5fee234e2010891c755af03

    SHA512

    32225d2cc84918b23bf70e5545b60df21cfc474cdd97bf26384a47bef733fe0032a1f3792727ffd90e50cb656efd74b72dad80203f2584f579823111894767b9

  • memory/2696-44-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2696-47-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2696-50-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2696-52-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2696-48-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2696-45-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2696-46-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2696-43-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB