Analysis

  • max time kernel
    120s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 06:17

General

  • Target

    54bcd8a46464284c8f3aa7669e3f34ba8f4c26d029829e2bdcc8961dc53181b1.exe

  • Size

    1.1MB

  • MD5

    c0fbd9f2ed9354a6f6d5b0d2c2a53bba

  • SHA1

    79ce50fbd7a8e25c6e8e9172a3f0b571518ca06f

  • SHA256

    54bcd8a46464284c8f3aa7669e3f34ba8f4c26d029829e2bdcc8961dc53181b1

  • SHA512

    d9b3bbb8da38901a46ea1a6eaf20a6b440e231ef3c4667b17854d8ff99001b3260fdd9a6d300e253bbeb7330888d5c6b0d8dafa6c385a463a721fe6eb740ecec

  • SSDEEP

    24576:QylbMz+q4havVuWlimXFKQYkQ81geSFxG2SOKpN:XlbMzpMaMWlDFYz/eSFM2SO

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54bcd8a46464284c8f3aa7669e3f34ba8f4c26d029829e2bdcc8961dc53181b1.exe
    "C:\Users\Admin\AppData\Local\Temp\54bcd8a46464284c8f3aa7669e3f34ba8f4c26d029829e2bdcc8961dc53181b1.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3549627.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3549627.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4700411.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4700411.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2688
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8148472.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8148472.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2664
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8361509.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8361509.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2540
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3827619.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3827619.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2176
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2824
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 276
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3549627.exe

    Filesize

    981KB

    MD5

    2fb4f1fe7a20ae1746b224f99339ad4b

    SHA1

    2cd91669b3fdf68e657ab43a766974fb94de4df6

    SHA256

    03314d62069ce4f6573db7e6301b7b1a650127c1044c5765888ba15ae099cb62

    SHA512

    78b818768f29e66afa3af12f250854a553c1086cd011aba784392e27a70876630fd279059575b94cd78d024a71be0d17bce76e5d6d96bcad5bf51bdb3612b32d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3549627.exe

    Filesize

    981KB

    MD5

    2fb4f1fe7a20ae1746b224f99339ad4b

    SHA1

    2cd91669b3fdf68e657ab43a766974fb94de4df6

    SHA256

    03314d62069ce4f6573db7e6301b7b1a650127c1044c5765888ba15ae099cb62

    SHA512

    78b818768f29e66afa3af12f250854a553c1086cd011aba784392e27a70876630fd279059575b94cd78d024a71be0d17bce76e5d6d96bcad5bf51bdb3612b32d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4700411.exe

    Filesize

    799KB

    MD5

    924e4ab55b826fed041cc6fa4ad7f22d

    SHA1

    7867f15d02092a87800643b6e345b0d2fd3d3160

    SHA256

    2666a58488a330182caea685557911c4d3d6e86b9f39e2a52bde38a7f5a7025e

    SHA512

    5209111d44043cc22db65bb65279cf86ff36f4741c6b3a776c93e5e6e1249185cb6218add323e1ad9250cb87e083fd8b40695900658842a5e6084b2abf4b18c2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4700411.exe

    Filesize

    799KB

    MD5

    924e4ab55b826fed041cc6fa4ad7f22d

    SHA1

    7867f15d02092a87800643b6e345b0d2fd3d3160

    SHA256

    2666a58488a330182caea685557911c4d3d6e86b9f39e2a52bde38a7f5a7025e

    SHA512

    5209111d44043cc22db65bb65279cf86ff36f4741c6b3a776c93e5e6e1249185cb6218add323e1ad9250cb87e083fd8b40695900658842a5e6084b2abf4b18c2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8148472.exe

    Filesize

    616KB

    MD5

    2b261d4e5b8d7c050b5fe006eca40a5b

    SHA1

    7f79b7ae36cd85b4c57b9f86f059df576f16c238

    SHA256

    350290a556c7513bf5c9a47d002e386be6544ee7297317b0313f5378efc12d7f

    SHA512

    61e73b17b8060d18a5c6e3f85217bc7508371832613ec6bc40046890acb6cb68fb9969027b3d93e8434c0d4a6eba51febf23a1f073791d60c520563dcd4d015c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8148472.exe

    Filesize

    616KB

    MD5

    2b261d4e5b8d7c050b5fe006eca40a5b

    SHA1

    7f79b7ae36cd85b4c57b9f86f059df576f16c238

    SHA256

    350290a556c7513bf5c9a47d002e386be6544ee7297317b0313f5378efc12d7f

    SHA512

    61e73b17b8060d18a5c6e3f85217bc7508371832613ec6bc40046890acb6cb68fb9969027b3d93e8434c0d4a6eba51febf23a1f073791d60c520563dcd4d015c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8361509.exe

    Filesize

    345KB

    MD5

    110ccf91af80ea828fde3ac5438e3f26

    SHA1

    e0928d38aa4d207137f66ae49ba8d9496f5a8a13

    SHA256

    3df782516c79a63c5b2f5f8168698925405aee30ffeab5012e19072142f1af6e

    SHA512

    ad1476be13b19c74e44fc6dab618afc67f397e3d593cf568896d20b04a846624951ad7a94df013bc07affe4859b95670f3f11a4669c866a46d15f060e3cd4364

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8361509.exe

    Filesize

    345KB

    MD5

    110ccf91af80ea828fde3ac5438e3f26

    SHA1

    e0928d38aa4d207137f66ae49ba8d9496f5a8a13

    SHA256

    3df782516c79a63c5b2f5f8168698925405aee30ffeab5012e19072142f1af6e

    SHA512

    ad1476be13b19c74e44fc6dab618afc67f397e3d593cf568896d20b04a846624951ad7a94df013bc07affe4859b95670f3f11a4669c866a46d15f060e3cd4364

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3827619.exe

    Filesize

    227KB

    MD5

    7c4fadcd7ce810045c65afd1e15f12d3

    SHA1

    20004350cc29ce3793ecc77ff2f1e203bd315d9d

    SHA256

    4885f19258a2d8a55af680dac3e64a5d89e3b8fad063a1fc73adc2e25e3ddfaf

    SHA512

    6e5023f48f9ff135036275317022b85ad719a1de2801094406a46d8d6204af4e829e58d7b9b139bb7b4553edcdd918df68c075df7d3e51415ff6820ac2c4e09e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3827619.exe

    Filesize

    227KB

    MD5

    7c4fadcd7ce810045c65afd1e15f12d3

    SHA1

    20004350cc29ce3793ecc77ff2f1e203bd315d9d

    SHA256

    4885f19258a2d8a55af680dac3e64a5d89e3b8fad063a1fc73adc2e25e3ddfaf

    SHA512

    6e5023f48f9ff135036275317022b85ad719a1de2801094406a46d8d6204af4e829e58d7b9b139bb7b4553edcdd918df68c075df7d3e51415ff6820ac2c4e09e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3827619.exe

    Filesize

    227KB

    MD5

    7c4fadcd7ce810045c65afd1e15f12d3

    SHA1

    20004350cc29ce3793ecc77ff2f1e203bd315d9d

    SHA256

    4885f19258a2d8a55af680dac3e64a5d89e3b8fad063a1fc73adc2e25e3ddfaf

    SHA512

    6e5023f48f9ff135036275317022b85ad719a1de2801094406a46d8d6204af4e829e58d7b9b139bb7b4553edcdd918df68c075df7d3e51415ff6820ac2c4e09e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3549627.exe

    Filesize

    981KB

    MD5

    2fb4f1fe7a20ae1746b224f99339ad4b

    SHA1

    2cd91669b3fdf68e657ab43a766974fb94de4df6

    SHA256

    03314d62069ce4f6573db7e6301b7b1a650127c1044c5765888ba15ae099cb62

    SHA512

    78b818768f29e66afa3af12f250854a553c1086cd011aba784392e27a70876630fd279059575b94cd78d024a71be0d17bce76e5d6d96bcad5bf51bdb3612b32d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3549627.exe

    Filesize

    981KB

    MD5

    2fb4f1fe7a20ae1746b224f99339ad4b

    SHA1

    2cd91669b3fdf68e657ab43a766974fb94de4df6

    SHA256

    03314d62069ce4f6573db7e6301b7b1a650127c1044c5765888ba15ae099cb62

    SHA512

    78b818768f29e66afa3af12f250854a553c1086cd011aba784392e27a70876630fd279059575b94cd78d024a71be0d17bce76e5d6d96bcad5bf51bdb3612b32d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z4700411.exe

    Filesize

    799KB

    MD5

    924e4ab55b826fed041cc6fa4ad7f22d

    SHA1

    7867f15d02092a87800643b6e345b0d2fd3d3160

    SHA256

    2666a58488a330182caea685557911c4d3d6e86b9f39e2a52bde38a7f5a7025e

    SHA512

    5209111d44043cc22db65bb65279cf86ff36f4741c6b3a776c93e5e6e1249185cb6218add323e1ad9250cb87e083fd8b40695900658842a5e6084b2abf4b18c2

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z4700411.exe

    Filesize

    799KB

    MD5

    924e4ab55b826fed041cc6fa4ad7f22d

    SHA1

    7867f15d02092a87800643b6e345b0d2fd3d3160

    SHA256

    2666a58488a330182caea685557911c4d3d6e86b9f39e2a52bde38a7f5a7025e

    SHA512

    5209111d44043cc22db65bb65279cf86ff36f4741c6b3a776c93e5e6e1249185cb6218add323e1ad9250cb87e083fd8b40695900658842a5e6084b2abf4b18c2

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8148472.exe

    Filesize

    616KB

    MD5

    2b261d4e5b8d7c050b5fe006eca40a5b

    SHA1

    7f79b7ae36cd85b4c57b9f86f059df576f16c238

    SHA256

    350290a556c7513bf5c9a47d002e386be6544ee7297317b0313f5378efc12d7f

    SHA512

    61e73b17b8060d18a5c6e3f85217bc7508371832613ec6bc40046890acb6cb68fb9969027b3d93e8434c0d4a6eba51febf23a1f073791d60c520563dcd4d015c

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8148472.exe

    Filesize

    616KB

    MD5

    2b261d4e5b8d7c050b5fe006eca40a5b

    SHA1

    7f79b7ae36cd85b4c57b9f86f059df576f16c238

    SHA256

    350290a556c7513bf5c9a47d002e386be6544ee7297317b0313f5378efc12d7f

    SHA512

    61e73b17b8060d18a5c6e3f85217bc7508371832613ec6bc40046890acb6cb68fb9969027b3d93e8434c0d4a6eba51febf23a1f073791d60c520563dcd4d015c

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8361509.exe

    Filesize

    345KB

    MD5

    110ccf91af80ea828fde3ac5438e3f26

    SHA1

    e0928d38aa4d207137f66ae49ba8d9496f5a8a13

    SHA256

    3df782516c79a63c5b2f5f8168698925405aee30ffeab5012e19072142f1af6e

    SHA512

    ad1476be13b19c74e44fc6dab618afc67f397e3d593cf568896d20b04a846624951ad7a94df013bc07affe4859b95670f3f11a4669c866a46d15f060e3cd4364

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8361509.exe

    Filesize

    345KB

    MD5

    110ccf91af80ea828fde3ac5438e3f26

    SHA1

    e0928d38aa4d207137f66ae49ba8d9496f5a8a13

    SHA256

    3df782516c79a63c5b2f5f8168698925405aee30ffeab5012e19072142f1af6e

    SHA512

    ad1476be13b19c74e44fc6dab618afc67f397e3d593cf568896d20b04a846624951ad7a94df013bc07affe4859b95670f3f11a4669c866a46d15f060e3cd4364

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3827619.exe

    Filesize

    227KB

    MD5

    7c4fadcd7ce810045c65afd1e15f12d3

    SHA1

    20004350cc29ce3793ecc77ff2f1e203bd315d9d

    SHA256

    4885f19258a2d8a55af680dac3e64a5d89e3b8fad063a1fc73adc2e25e3ddfaf

    SHA512

    6e5023f48f9ff135036275317022b85ad719a1de2801094406a46d8d6204af4e829e58d7b9b139bb7b4553edcdd918df68c075df7d3e51415ff6820ac2c4e09e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3827619.exe

    Filesize

    227KB

    MD5

    7c4fadcd7ce810045c65afd1e15f12d3

    SHA1

    20004350cc29ce3793ecc77ff2f1e203bd315d9d

    SHA256

    4885f19258a2d8a55af680dac3e64a5d89e3b8fad063a1fc73adc2e25e3ddfaf

    SHA512

    6e5023f48f9ff135036275317022b85ad719a1de2801094406a46d8d6204af4e829e58d7b9b139bb7b4553edcdd918df68c075df7d3e51415ff6820ac2c4e09e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3827619.exe

    Filesize

    227KB

    MD5

    7c4fadcd7ce810045c65afd1e15f12d3

    SHA1

    20004350cc29ce3793ecc77ff2f1e203bd315d9d

    SHA256

    4885f19258a2d8a55af680dac3e64a5d89e3b8fad063a1fc73adc2e25e3ddfaf

    SHA512

    6e5023f48f9ff135036275317022b85ad719a1de2801094406a46d8d6204af4e829e58d7b9b139bb7b4553edcdd918df68c075df7d3e51415ff6820ac2c4e09e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3827619.exe

    Filesize

    227KB

    MD5

    7c4fadcd7ce810045c65afd1e15f12d3

    SHA1

    20004350cc29ce3793ecc77ff2f1e203bd315d9d

    SHA256

    4885f19258a2d8a55af680dac3e64a5d89e3b8fad063a1fc73adc2e25e3ddfaf

    SHA512

    6e5023f48f9ff135036275317022b85ad719a1de2801094406a46d8d6204af4e829e58d7b9b139bb7b4553edcdd918df68c075df7d3e51415ff6820ac2c4e09e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3827619.exe

    Filesize

    227KB

    MD5

    7c4fadcd7ce810045c65afd1e15f12d3

    SHA1

    20004350cc29ce3793ecc77ff2f1e203bd315d9d

    SHA256

    4885f19258a2d8a55af680dac3e64a5d89e3b8fad063a1fc73adc2e25e3ddfaf

    SHA512

    6e5023f48f9ff135036275317022b85ad719a1de2801094406a46d8d6204af4e829e58d7b9b139bb7b4553edcdd918df68c075df7d3e51415ff6820ac2c4e09e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3827619.exe

    Filesize

    227KB

    MD5

    7c4fadcd7ce810045c65afd1e15f12d3

    SHA1

    20004350cc29ce3793ecc77ff2f1e203bd315d9d

    SHA256

    4885f19258a2d8a55af680dac3e64a5d89e3b8fad063a1fc73adc2e25e3ddfaf

    SHA512

    6e5023f48f9ff135036275317022b85ad719a1de2801094406a46d8d6204af4e829e58d7b9b139bb7b4553edcdd918df68c075df7d3e51415ff6820ac2c4e09e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3827619.exe

    Filesize

    227KB

    MD5

    7c4fadcd7ce810045c65afd1e15f12d3

    SHA1

    20004350cc29ce3793ecc77ff2f1e203bd315d9d

    SHA256

    4885f19258a2d8a55af680dac3e64a5d89e3b8fad063a1fc73adc2e25e3ddfaf

    SHA512

    6e5023f48f9ff135036275317022b85ad719a1de2801094406a46d8d6204af4e829e58d7b9b139bb7b4553edcdd918df68c075df7d3e51415ff6820ac2c4e09e

  • memory/2824-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2824-61-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2824-64-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2824-66-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2824-59-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2824-57-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2824-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2824-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB