Analysis

  • max time kernel
    27s
  • max time network
    24s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 06:23

General

  • Target

    a3cfc15b75ce02a9831bf7e63016021bb52c7c5a2dd1aa6a70ed9073cfcc53de_JC.exe

  • Size

    1.1MB

  • MD5

    632bfa0890fa7ba1c8c66ec16a74bf34

  • SHA1

    393eb5ce4e35bc2a9edfcc5fbd7f43819440adff

  • SHA256

    a3cfc15b75ce02a9831bf7e63016021bb52c7c5a2dd1aa6a70ed9073cfcc53de

  • SHA512

    332a6bd7ea1d250ebc69421a06b240b0eac8f5b2b59a9f9d46822c738b3edf522c92cab3cb01d0c24d8b4814d8981ac7288b4c0e6e92fdf70fb645c15fdbcc66

  • SSDEEP

    24576:KyX2HhZCX4EcmmoQwC5+FiX2NOmBLVZxT92B3ja17bho9yzRsyQxu:RXqZM4EcmCb5SiX2bZV3ZO4HiYSyQx

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3cfc15b75ce02a9831bf7e63016021bb52c7c5a2dd1aa6a70ed9073cfcc53de_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\a3cfc15b75ce02a9831bf7e63016021bb52c7c5a2dd1aa6a70ed9073cfcc53de_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9809398.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9809398.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7218242.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7218242.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1704
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1109743.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1109743.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2744
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0929838.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0929838.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2732
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4850740.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4850740.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2788
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2636
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2672
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 280
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2520

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9809398.exe

      Filesize

      997KB

      MD5

      fdb3bbcfa50a1679827dfa76c77c1c6b

      SHA1

      26ac7956d0448732da84998f37f44972fbad6c59

      SHA256

      1b4725916a2abb07183ba2ee38d9116d15a1d8f90e2cde06699fcb93e5039ee1

      SHA512

      caf1c1f2f9b650ba53bda0894a6d23beedcc4a10a192d9f0c678e41b99bfaed0ca0f30e5fa0c4cd0c8e837ff547d549bf97e53d1a0351642d0e16ff4cbe134e9

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9809398.exe

      Filesize

      997KB

      MD5

      fdb3bbcfa50a1679827dfa76c77c1c6b

      SHA1

      26ac7956d0448732da84998f37f44972fbad6c59

      SHA256

      1b4725916a2abb07183ba2ee38d9116d15a1d8f90e2cde06699fcb93e5039ee1

      SHA512

      caf1c1f2f9b650ba53bda0894a6d23beedcc4a10a192d9f0c678e41b99bfaed0ca0f30e5fa0c4cd0c8e837ff547d549bf97e53d1a0351642d0e16ff4cbe134e9

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7218242.exe

      Filesize

      814KB

      MD5

      1970f2288c98e21b5e9800b6aa3db66c

      SHA1

      b5e82ea619ccb03749bb886d150774ccc121e2ea

      SHA256

      c0f429a2db07ad1953cbb8084ee59d0889ebb9be2870a8b60df7a198ddd2021b

      SHA512

      5abd0017469fc3b8c7462fc3b8b37af4e072070da8417e7ecab5be96f3c3715e74a71f2c82d2302f5367ed06786c031fecd02eee8d684ab1b25c062fe67da1a6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7218242.exe

      Filesize

      814KB

      MD5

      1970f2288c98e21b5e9800b6aa3db66c

      SHA1

      b5e82ea619ccb03749bb886d150774ccc121e2ea

      SHA256

      c0f429a2db07ad1953cbb8084ee59d0889ebb9be2870a8b60df7a198ddd2021b

      SHA512

      5abd0017469fc3b8c7462fc3b8b37af4e072070da8417e7ecab5be96f3c3715e74a71f2c82d2302f5367ed06786c031fecd02eee8d684ab1b25c062fe67da1a6

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1109743.exe

      Filesize

      631KB

      MD5

      bfe5d91ee9cab04042839af7368103ba

      SHA1

      cbb56fce813832f74632a917e433e0f1ceb2aae2

      SHA256

      0272254af837f302f6f4e376f8bed5f3385897566366a77245d674ec6ac3ce24

      SHA512

      f4a7658c86d64f10c755ed5287af236beda1f8920fb03271c27a34243ab0df4683e178e90e3836e01cbdd98e9dc6cb23b41c2bbf917af8c4d32898d6869b2ee8

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1109743.exe

      Filesize

      631KB

      MD5

      bfe5d91ee9cab04042839af7368103ba

      SHA1

      cbb56fce813832f74632a917e433e0f1ceb2aae2

      SHA256

      0272254af837f302f6f4e376f8bed5f3385897566366a77245d674ec6ac3ce24

      SHA512

      f4a7658c86d64f10c755ed5287af236beda1f8920fb03271c27a34243ab0df4683e178e90e3836e01cbdd98e9dc6cb23b41c2bbf917af8c4d32898d6869b2ee8

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0929838.exe

      Filesize

      354KB

      MD5

      718ba91b55d57454098cc0881605db98

      SHA1

      13ed09e8862ca36d22f08934e2be5cc2dc7be8fd

      SHA256

      d00b15149914c977574483921787a5a890e5f574a380bb0e476ad1297706801f

      SHA512

      ab48327ee6f8446cd70100f88f4eabf14b229725030d4f1185e022855f70578f48ace8189740fa832317c35ffb95be0e073078e0ae6836e19025448f06691ef7

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0929838.exe

      Filesize

      354KB

      MD5

      718ba91b55d57454098cc0881605db98

      SHA1

      13ed09e8862ca36d22f08934e2be5cc2dc7be8fd

      SHA256

      d00b15149914c977574483921787a5a890e5f574a380bb0e476ad1297706801f

      SHA512

      ab48327ee6f8446cd70100f88f4eabf14b229725030d4f1185e022855f70578f48ace8189740fa832317c35ffb95be0e073078e0ae6836e19025448f06691ef7

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4850740.exe

      Filesize

      250KB

      MD5

      93dd128175cd12116a8204abad218c70

      SHA1

      592b2ed16aba983213550938d12d16351bc831cb

      SHA256

      bcd1564c8cb755796292b243b0792461043fe8322bb9417d049a00f15786b165

      SHA512

      7dbd6819a8148da4aa54ce74f0345119a467b6d9d3b1f63a5e60807df9c8c1afb2a34a3abf79797fb66b433da0050898e5b7c1dec289efd38aa682ba9275a976

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4850740.exe

      Filesize

      250KB

      MD5

      93dd128175cd12116a8204abad218c70

      SHA1

      592b2ed16aba983213550938d12d16351bc831cb

      SHA256

      bcd1564c8cb755796292b243b0792461043fe8322bb9417d049a00f15786b165

      SHA512

      7dbd6819a8148da4aa54ce74f0345119a467b6d9d3b1f63a5e60807df9c8c1afb2a34a3abf79797fb66b433da0050898e5b7c1dec289efd38aa682ba9275a976

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4850740.exe

      Filesize

      250KB

      MD5

      93dd128175cd12116a8204abad218c70

      SHA1

      592b2ed16aba983213550938d12d16351bc831cb

      SHA256

      bcd1564c8cb755796292b243b0792461043fe8322bb9417d049a00f15786b165

      SHA512

      7dbd6819a8148da4aa54ce74f0345119a467b6d9d3b1f63a5e60807df9c8c1afb2a34a3abf79797fb66b433da0050898e5b7c1dec289efd38aa682ba9275a976

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9809398.exe

      Filesize

      997KB

      MD5

      fdb3bbcfa50a1679827dfa76c77c1c6b

      SHA1

      26ac7956d0448732da84998f37f44972fbad6c59

      SHA256

      1b4725916a2abb07183ba2ee38d9116d15a1d8f90e2cde06699fcb93e5039ee1

      SHA512

      caf1c1f2f9b650ba53bda0894a6d23beedcc4a10a192d9f0c678e41b99bfaed0ca0f30e5fa0c4cd0c8e837ff547d549bf97e53d1a0351642d0e16ff4cbe134e9

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9809398.exe

      Filesize

      997KB

      MD5

      fdb3bbcfa50a1679827dfa76c77c1c6b

      SHA1

      26ac7956d0448732da84998f37f44972fbad6c59

      SHA256

      1b4725916a2abb07183ba2ee38d9116d15a1d8f90e2cde06699fcb93e5039ee1

      SHA512

      caf1c1f2f9b650ba53bda0894a6d23beedcc4a10a192d9f0c678e41b99bfaed0ca0f30e5fa0c4cd0c8e837ff547d549bf97e53d1a0351642d0e16ff4cbe134e9

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7218242.exe

      Filesize

      814KB

      MD5

      1970f2288c98e21b5e9800b6aa3db66c

      SHA1

      b5e82ea619ccb03749bb886d150774ccc121e2ea

      SHA256

      c0f429a2db07ad1953cbb8084ee59d0889ebb9be2870a8b60df7a198ddd2021b

      SHA512

      5abd0017469fc3b8c7462fc3b8b37af4e072070da8417e7ecab5be96f3c3715e74a71f2c82d2302f5367ed06786c031fecd02eee8d684ab1b25c062fe67da1a6

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7218242.exe

      Filesize

      814KB

      MD5

      1970f2288c98e21b5e9800b6aa3db66c

      SHA1

      b5e82ea619ccb03749bb886d150774ccc121e2ea

      SHA256

      c0f429a2db07ad1953cbb8084ee59d0889ebb9be2870a8b60df7a198ddd2021b

      SHA512

      5abd0017469fc3b8c7462fc3b8b37af4e072070da8417e7ecab5be96f3c3715e74a71f2c82d2302f5367ed06786c031fecd02eee8d684ab1b25c062fe67da1a6

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1109743.exe

      Filesize

      631KB

      MD5

      bfe5d91ee9cab04042839af7368103ba

      SHA1

      cbb56fce813832f74632a917e433e0f1ceb2aae2

      SHA256

      0272254af837f302f6f4e376f8bed5f3385897566366a77245d674ec6ac3ce24

      SHA512

      f4a7658c86d64f10c755ed5287af236beda1f8920fb03271c27a34243ab0df4683e178e90e3836e01cbdd98e9dc6cb23b41c2bbf917af8c4d32898d6869b2ee8

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1109743.exe

      Filesize

      631KB

      MD5

      bfe5d91ee9cab04042839af7368103ba

      SHA1

      cbb56fce813832f74632a917e433e0f1ceb2aae2

      SHA256

      0272254af837f302f6f4e376f8bed5f3385897566366a77245d674ec6ac3ce24

      SHA512

      f4a7658c86d64f10c755ed5287af236beda1f8920fb03271c27a34243ab0df4683e178e90e3836e01cbdd98e9dc6cb23b41c2bbf917af8c4d32898d6869b2ee8

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z0929838.exe

      Filesize

      354KB

      MD5

      718ba91b55d57454098cc0881605db98

      SHA1

      13ed09e8862ca36d22f08934e2be5cc2dc7be8fd

      SHA256

      d00b15149914c977574483921787a5a890e5f574a380bb0e476ad1297706801f

      SHA512

      ab48327ee6f8446cd70100f88f4eabf14b229725030d4f1185e022855f70578f48ace8189740fa832317c35ffb95be0e073078e0ae6836e19025448f06691ef7

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z0929838.exe

      Filesize

      354KB

      MD5

      718ba91b55d57454098cc0881605db98

      SHA1

      13ed09e8862ca36d22f08934e2be5cc2dc7be8fd

      SHA256

      d00b15149914c977574483921787a5a890e5f574a380bb0e476ad1297706801f

      SHA512

      ab48327ee6f8446cd70100f88f4eabf14b229725030d4f1185e022855f70578f48ace8189740fa832317c35ffb95be0e073078e0ae6836e19025448f06691ef7

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4850740.exe

      Filesize

      250KB

      MD5

      93dd128175cd12116a8204abad218c70

      SHA1

      592b2ed16aba983213550938d12d16351bc831cb

      SHA256

      bcd1564c8cb755796292b243b0792461043fe8322bb9417d049a00f15786b165

      SHA512

      7dbd6819a8148da4aa54ce74f0345119a467b6d9d3b1f63a5e60807df9c8c1afb2a34a3abf79797fb66b433da0050898e5b7c1dec289efd38aa682ba9275a976

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4850740.exe

      Filesize

      250KB

      MD5

      93dd128175cd12116a8204abad218c70

      SHA1

      592b2ed16aba983213550938d12d16351bc831cb

      SHA256

      bcd1564c8cb755796292b243b0792461043fe8322bb9417d049a00f15786b165

      SHA512

      7dbd6819a8148da4aa54ce74f0345119a467b6d9d3b1f63a5e60807df9c8c1afb2a34a3abf79797fb66b433da0050898e5b7c1dec289efd38aa682ba9275a976

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4850740.exe

      Filesize

      250KB

      MD5

      93dd128175cd12116a8204abad218c70

      SHA1

      592b2ed16aba983213550938d12d16351bc831cb

      SHA256

      bcd1564c8cb755796292b243b0792461043fe8322bb9417d049a00f15786b165

      SHA512

      7dbd6819a8148da4aa54ce74f0345119a467b6d9d3b1f63a5e60807df9c8c1afb2a34a3abf79797fb66b433da0050898e5b7c1dec289efd38aa682ba9275a976

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4850740.exe

      Filesize

      250KB

      MD5

      93dd128175cd12116a8204abad218c70

      SHA1

      592b2ed16aba983213550938d12d16351bc831cb

      SHA256

      bcd1564c8cb755796292b243b0792461043fe8322bb9417d049a00f15786b165

      SHA512

      7dbd6819a8148da4aa54ce74f0345119a467b6d9d3b1f63a5e60807df9c8c1afb2a34a3abf79797fb66b433da0050898e5b7c1dec289efd38aa682ba9275a976

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4850740.exe

      Filesize

      250KB

      MD5

      93dd128175cd12116a8204abad218c70

      SHA1

      592b2ed16aba983213550938d12d16351bc831cb

      SHA256

      bcd1564c8cb755796292b243b0792461043fe8322bb9417d049a00f15786b165

      SHA512

      7dbd6819a8148da4aa54ce74f0345119a467b6d9d3b1f63a5e60807df9c8c1afb2a34a3abf79797fb66b433da0050898e5b7c1dec289efd38aa682ba9275a976

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4850740.exe

      Filesize

      250KB

      MD5

      93dd128175cd12116a8204abad218c70

      SHA1

      592b2ed16aba983213550938d12d16351bc831cb

      SHA256

      bcd1564c8cb755796292b243b0792461043fe8322bb9417d049a00f15786b165

      SHA512

      7dbd6819a8148da4aa54ce74f0345119a467b6d9d3b1f63a5e60807df9c8c1afb2a34a3abf79797fb66b433da0050898e5b7c1dec289efd38aa682ba9275a976

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4850740.exe

      Filesize

      250KB

      MD5

      93dd128175cd12116a8204abad218c70

      SHA1

      592b2ed16aba983213550938d12d16351bc831cb

      SHA256

      bcd1564c8cb755796292b243b0792461043fe8322bb9417d049a00f15786b165

      SHA512

      7dbd6819a8148da4aa54ce74f0345119a467b6d9d3b1f63a5e60807df9c8c1afb2a34a3abf79797fb66b433da0050898e5b7c1dec289efd38aa682ba9275a976

    • memory/2672-58-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2672-55-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2672-60-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2672-62-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2672-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2672-56-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2672-54-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2672-53-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB