Analysis

  • max time kernel
    119s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 06:21

General

  • Target

    b92114283b26e5d05da5f89a206c7f680082a01caf5831b3b1afc8ea4741102d_JC.exe

  • Size

    1.1MB

  • MD5

    fafc62b9215345003160cbde5263ebd5

  • SHA1

    80650b4a0c9ec5b2afad5ac06c18b204c9869a51

  • SHA256

    b92114283b26e5d05da5f89a206c7f680082a01caf5831b3b1afc8ea4741102d

  • SHA512

    fd1f48bb97f8bfc366b1d4e5c3fb700c3f127c93acf622dda0a9ef9ad899a92358d35d85055745a0de2e2ee28a8c5f8b85943bf3c9ea223d414323e66cc8424f

  • SSDEEP

    24576:dyC17jHDA3oSjASR2dr/Pyeg2eDANU24Vqqo:4C1XIo3C2dieg2a

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b92114283b26e5d05da5f89a206c7f680082a01caf5831b3b1afc8ea4741102d_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\b92114283b26e5d05da5f89a206c7f680082a01caf5831b3b1afc8ea4741102d_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3369295.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3369295.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1884
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3697928.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3697928.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2648
  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2241715.exe
    C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2241715.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5322879.exe
      C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5322879.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2468
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2488
  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3542142.exe
    C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3542142.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 272
      2⤵
      • Loads dropped DLL
      • Program crash
      PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3369295.exe

    Filesize

    997KB

    MD5

    43b2e340f76a521617f01e5fa10c1400

    SHA1

    d2157ac295f3b18223c692ab87e7abafcb0650e9

    SHA256

    518563a69784e4c0f1ffc369fcfcf5a22c5381ff5d1ff0ba6bae351ede772fd4

    SHA512

    035cd5c8a4df4e84d40a9a23c2dd9fa52f57801a3e488ab23ed36f5904f7457ffea1ad3a43171be295d607cf17eb281176b972a30f1b2e04b65b581541a9d890

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3369295.exe

    Filesize

    997KB

    MD5

    43b2e340f76a521617f01e5fa10c1400

    SHA1

    d2157ac295f3b18223c692ab87e7abafcb0650e9

    SHA256

    518563a69784e4c0f1ffc369fcfcf5a22c5381ff5d1ff0ba6bae351ede772fd4

    SHA512

    035cd5c8a4df4e84d40a9a23c2dd9fa52f57801a3e488ab23ed36f5904f7457ffea1ad3a43171be295d607cf17eb281176b972a30f1b2e04b65b581541a9d890

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3697928.exe

    Filesize

    814KB

    MD5

    a3b33512d3926c6cdd140de63b13941a

    SHA1

    4fe4e7b870378b54082e9dea5db38fc85e5cba3c

    SHA256

    cd5daa62c106d3e3ff56c28c82f17ac1e7a1a28a5966d367f2733b3b38d8b878

    SHA512

    14deb7db81d2f2593ac3b1209814193f49b4f89fdb2611e7f7bd0649e827eadc9988c673e3ffbe7cce7d5eba4d11c0fadc0fe7544b4ace5068de3e1c17a8df83

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3697928.exe

    Filesize

    814KB

    MD5

    a3b33512d3926c6cdd140de63b13941a

    SHA1

    4fe4e7b870378b54082e9dea5db38fc85e5cba3c

    SHA256

    cd5daa62c106d3e3ff56c28c82f17ac1e7a1a28a5966d367f2733b3b38d8b878

    SHA512

    14deb7db81d2f2593ac3b1209814193f49b4f89fdb2611e7f7bd0649e827eadc9988c673e3ffbe7cce7d5eba4d11c0fadc0fe7544b4ace5068de3e1c17a8df83

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2241715.exe

    Filesize

    631KB

    MD5

    f5d47eec8de04ef99c4879d38dbf6cbe

    SHA1

    d781c956af6425370241657db5b8e78ef0e67a9a

    SHA256

    13640e56420f7c89e4bffb1d0b5ebaf874c705ddbc18d16d9b870a013145083d

    SHA512

    4a01c0e3da29b687f4edd0aee4416eca9fa3bd8d567453e56b0fd342b68f3efb828b71cb12537af22f40e294d94c6d8758d73b2a3b67c97623d8fb4a5015bbbe

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2241715.exe

    Filesize

    631KB

    MD5

    f5d47eec8de04ef99c4879d38dbf6cbe

    SHA1

    d781c956af6425370241657db5b8e78ef0e67a9a

    SHA256

    13640e56420f7c89e4bffb1d0b5ebaf874c705ddbc18d16d9b870a013145083d

    SHA512

    4a01c0e3da29b687f4edd0aee4416eca9fa3bd8d567453e56b0fd342b68f3efb828b71cb12537af22f40e294d94c6d8758d73b2a3b67c97623d8fb4a5015bbbe

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5322879.exe

    Filesize

    354KB

    MD5

    6a3389a7eb61b558465a8c5e2800cd30

    SHA1

    ce8d3da7e8188ad6b25240b28c0cc3baecdaf4ef

    SHA256

    df9baab802dea5c88556abe981af0ab3c01cd12dc98d8d20668d1fe26dca8cf0

    SHA512

    e54ff4ab34947f6a0f53e4fb9e72065db3ea9e8030625f022773cc7ddc0711b73792a938dcf816e2e7afa00765aad0b2139fa9a3a90ddf31cc40bd18ce27df9f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5322879.exe

    Filesize

    354KB

    MD5

    6a3389a7eb61b558465a8c5e2800cd30

    SHA1

    ce8d3da7e8188ad6b25240b28c0cc3baecdaf4ef

    SHA256

    df9baab802dea5c88556abe981af0ab3c01cd12dc98d8d20668d1fe26dca8cf0

    SHA512

    e54ff4ab34947f6a0f53e4fb9e72065db3ea9e8030625f022773cc7ddc0711b73792a938dcf816e2e7afa00765aad0b2139fa9a3a90ddf31cc40bd18ce27df9f

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3542142.exe

    Filesize

    250KB

    MD5

    1df6699c2ac64d07b36d70d354d7a090

    SHA1

    05734dce299499e8dd5a620cd3dccefce40ede52

    SHA256

    b31ad5193cee53a043722448b5d89c1b586ed501a9210c303d195ca0329d93b7

    SHA512

    ec02f527aa0dc9eda05f33f60fbe92731943709d9f34bf8cd5601cec3225362f01377e1097b72c1c36c59fa871e2006b9166f1d1244101944e2cd28a3369a884

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3542142.exe

    Filesize

    250KB

    MD5

    1df6699c2ac64d07b36d70d354d7a090

    SHA1

    05734dce299499e8dd5a620cd3dccefce40ede52

    SHA256

    b31ad5193cee53a043722448b5d89c1b586ed501a9210c303d195ca0329d93b7

    SHA512

    ec02f527aa0dc9eda05f33f60fbe92731943709d9f34bf8cd5601cec3225362f01377e1097b72c1c36c59fa871e2006b9166f1d1244101944e2cd28a3369a884

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3542142.exe

    Filesize

    250KB

    MD5

    1df6699c2ac64d07b36d70d354d7a090

    SHA1

    05734dce299499e8dd5a620cd3dccefce40ede52

    SHA256

    b31ad5193cee53a043722448b5d89c1b586ed501a9210c303d195ca0329d93b7

    SHA512

    ec02f527aa0dc9eda05f33f60fbe92731943709d9f34bf8cd5601cec3225362f01377e1097b72c1c36c59fa871e2006b9166f1d1244101944e2cd28a3369a884

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3369295.exe

    Filesize

    997KB

    MD5

    43b2e340f76a521617f01e5fa10c1400

    SHA1

    d2157ac295f3b18223c692ab87e7abafcb0650e9

    SHA256

    518563a69784e4c0f1ffc369fcfcf5a22c5381ff5d1ff0ba6bae351ede772fd4

    SHA512

    035cd5c8a4df4e84d40a9a23c2dd9fa52f57801a3e488ab23ed36f5904f7457ffea1ad3a43171be295d607cf17eb281176b972a30f1b2e04b65b581541a9d890

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3369295.exe

    Filesize

    997KB

    MD5

    43b2e340f76a521617f01e5fa10c1400

    SHA1

    d2157ac295f3b18223c692ab87e7abafcb0650e9

    SHA256

    518563a69784e4c0f1ffc369fcfcf5a22c5381ff5d1ff0ba6bae351ede772fd4

    SHA512

    035cd5c8a4df4e84d40a9a23c2dd9fa52f57801a3e488ab23ed36f5904f7457ffea1ad3a43171be295d607cf17eb281176b972a30f1b2e04b65b581541a9d890

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3697928.exe

    Filesize

    814KB

    MD5

    a3b33512d3926c6cdd140de63b13941a

    SHA1

    4fe4e7b870378b54082e9dea5db38fc85e5cba3c

    SHA256

    cd5daa62c106d3e3ff56c28c82f17ac1e7a1a28a5966d367f2733b3b38d8b878

    SHA512

    14deb7db81d2f2593ac3b1209814193f49b4f89fdb2611e7f7bd0649e827eadc9988c673e3ffbe7cce7d5eba4d11c0fadc0fe7544b4ace5068de3e1c17a8df83

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3697928.exe

    Filesize

    814KB

    MD5

    a3b33512d3926c6cdd140de63b13941a

    SHA1

    4fe4e7b870378b54082e9dea5db38fc85e5cba3c

    SHA256

    cd5daa62c106d3e3ff56c28c82f17ac1e7a1a28a5966d367f2733b3b38d8b878

    SHA512

    14deb7db81d2f2593ac3b1209814193f49b4f89fdb2611e7f7bd0649e827eadc9988c673e3ffbe7cce7d5eba4d11c0fadc0fe7544b4ace5068de3e1c17a8df83

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2241715.exe

    Filesize

    631KB

    MD5

    f5d47eec8de04ef99c4879d38dbf6cbe

    SHA1

    d781c956af6425370241657db5b8e78ef0e67a9a

    SHA256

    13640e56420f7c89e4bffb1d0b5ebaf874c705ddbc18d16d9b870a013145083d

    SHA512

    4a01c0e3da29b687f4edd0aee4416eca9fa3bd8d567453e56b0fd342b68f3efb828b71cb12537af22f40e294d94c6d8758d73b2a3b67c97623d8fb4a5015bbbe

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2241715.exe

    Filesize

    631KB

    MD5

    f5d47eec8de04ef99c4879d38dbf6cbe

    SHA1

    d781c956af6425370241657db5b8e78ef0e67a9a

    SHA256

    13640e56420f7c89e4bffb1d0b5ebaf874c705ddbc18d16d9b870a013145083d

    SHA512

    4a01c0e3da29b687f4edd0aee4416eca9fa3bd8d567453e56b0fd342b68f3efb828b71cb12537af22f40e294d94c6d8758d73b2a3b67c97623d8fb4a5015bbbe

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z5322879.exe

    Filesize

    354KB

    MD5

    6a3389a7eb61b558465a8c5e2800cd30

    SHA1

    ce8d3da7e8188ad6b25240b28c0cc3baecdaf4ef

    SHA256

    df9baab802dea5c88556abe981af0ab3c01cd12dc98d8d20668d1fe26dca8cf0

    SHA512

    e54ff4ab34947f6a0f53e4fb9e72065db3ea9e8030625f022773cc7ddc0711b73792a938dcf816e2e7afa00765aad0b2139fa9a3a90ddf31cc40bd18ce27df9f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z5322879.exe

    Filesize

    354KB

    MD5

    6a3389a7eb61b558465a8c5e2800cd30

    SHA1

    ce8d3da7e8188ad6b25240b28c0cc3baecdaf4ef

    SHA256

    df9baab802dea5c88556abe981af0ab3c01cd12dc98d8d20668d1fe26dca8cf0

    SHA512

    e54ff4ab34947f6a0f53e4fb9e72065db3ea9e8030625f022773cc7ddc0711b73792a938dcf816e2e7afa00765aad0b2139fa9a3a90ddf31cc40bd18ce27df9f

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3542142.exe

    Filesize

    250KB

    MD5

    1df6699c2ac64d07b36d70d354d7a090

    SHA1

    05734dce299499e8dd5a620cd3dccefce40ede52

    SHA256

    b31ad5193cee53a043722448b5d89c1b586ed501a9210c303d195ca0329d93b7

    SHA512

    ec02f527aa0dc9eda05f33f60fbe92731943709d9f34bf8cd5601cec3225362f01377e1097b72c1c36c59fa871e2006b9166f1d1244101944e2cd28a3369a884

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3542142.exe

    Filesize

    250KB

    MD5

    1df6699c2ac64d07b36d70d354d7a090

    SHA1

    05734dce299499e8dd5a620cd3dccefce40ede52

    SHA256

    b31ad5193cee53a043722448b5d89c1b586ed501a9210c303d195ca0329d93b7

    SHA512

    ec02f527aa0dc9eda05f33f60fbe92731943709d9f34bf8cd5601cec3225362f01377e1097b72c1c36c59fa871e2006b9166f1d1244101944e2cd28a3369a884

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3542142.exe

    Filesize

    250KB

    MD5

    1df6699c2ac64d07b36d70d354d7a090

    SHA1

    05734dce299499e8dd5a620cd3dccefce40ede52

    SHA256

    b31ad5193cee53a043722448b5d89c1b586ed501a9210c303d195ca0329d93b7

    SHA512

    ec02f527aa0dc9eda05f33f60fbe92731943709d9f34bf8cd5601cec3225362f01377e1097b72c1c36c59fa871e2006b9166f1d1244101944e2cd28a3369a884

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3542142.exe

    Filesize

    250KB

    MD5

    1df6699c2ac64d07b36d70d354d7a090

    SHA1

    05734dce299499e8dd5a620cd3dccefce40ede52

    SHA256

    b31ad5193cee53a043722448b5d89c1b586ed501a9210c303d195ca0329d93b7

    SHA512

    ec02f527aa0dc9eda05f33f60fbe92731943709d9f34bf8cd5601cec3225362f01377e1097b72c1c36c59fa871e2006b9166f1d1244101944e2cd28a3369a884

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3542142.exe

    Filesize

    250KB

    MD5

    1df6699c2ac64d07b36d70d354d7a090

    SHA1

    05734dce299499e8dd5a620cd3dccefce40ede52

    SHA256

    b31ad5193cee53a043722448b5d89c1b586ed501a9210c303d195ca0329d93b7

    SHA512

    ec02f527aa0dc9eda05f33f60fbe92731943709d9f34bf8cd5601cec3225362f01377e1097b72c1c36c59fa871e2006b9166f1d1244101944e2cd28a3369a884

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3542142.exe

    Filesize

    250KB

    MD5

    1df6699c2ac64d07b36d70d354d7a090

    SHA1

    05734dce299499e8dd5a620cd3dccefce40ede52

    SHA256

    b31ad5193cee53a043722448b5d89c1b586ed501a9210c303d195ca0329d93b7

    SHA512

    ec02f527aa0dc9eda05f33f60fbe92731943709d9f34bf8cd5601cec3225362f01377e1097b72c1c36c59fa871e2006b9166f1d1244101944e2cd28a3369a884

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3542142.exe

    Filesize

    250KB

    MD5

    1df6699c2ac64d07b36d70d354d7a090

    SHA1

    05734dce299499e8dd5a620cd3dccefce40ede52

    SHA256

    b31ad5193cee53a043722448b5d89c1b586ed501a9210c303d195ca0329d93b7

    SHA512

    ec02f527aa0dc9eda05f33f60fbe92731943709d9f34bf8cd5601cec3225362f01377e1097b72c1c36c59fa871e2006b9166f1d1244101944e2cd28a3369a884

  • memory/2488-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2488-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2488-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2488-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2488-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2488-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2488-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2488-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB