Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 06:23

General

  • Target

    a19d4bbf0e2a3d9ad16265b3dc6fdb2c83a4942ff87690d1b8fd9252f4ed3a37_JC.exe

  • Size

    1.0MB

  • MD5

    6fbab6e5765c1ceba34480f29e6ac3a4

  • SHA1

    e62ae24af48f3345f3beeefb05a0b5b6b04c4397

  • SHA256

    a19d4bbf0e2a3d9ad16265b3dc6fdb2c83a4942ff87690d1b8fd9252f4ed3a37

  • SHA512

    c48c6de6e63560cff58f19090eeb0ba682a02d8d315eadfedadaef306ffa06e3e093e27498bbf5ba08c6a38c4eab40698226399d67132c6c77bffce3bb6c743a

  • SSDEEP

    24576:OyqK3ORHuA+LRPXbLHDjEPNzPZfjHdFU5YmEK603ilYQTaqBLCo:dL3fXjgPN7NpEYmEKAraqBLC

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a19d4bbf0e2a3d9ad16265b3dc6fdb2c83a4942ff87690d1b8fd9252f4ed3a37_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\a19d4bbf0e2a3d9ad16265b3dc6fdb2c83a4942ff87690d1b8fd9252f4ed3a37_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1135380.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1135380.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2528
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7346986.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7346986.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6482031.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6482031.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2488
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6596204.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6596204.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3056
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7453350.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7453350.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2476
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2896
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1135380.exe
    Filesize

    967KB

    MD5

    45b8cd253470fbd34eb6a1d60013dbd5

    SHA1

    7a324cc58d8ae70942a5b5e88b2ad5a28dd03662

    SHA256

    c7f8f24e8b713f494c662c44ae2bc4792ea282a2d305a4162046b60700f5788d

    SHA512

    24af94a4afab9571ccc3ac04f6f1acd5a5c939159c6e26d59ac33ce4d9efcddaf256c7ea3e35e14285dd28f999bf585f95a250d6c30799c3644a00e7154bdec7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1135380.exe
    Filesize

    967KB

    MD5

    45b8cd253470fbd34eb6a1d60013dbd5

    SHA1

    7a324cc58d8ae70942a5b5e88b2ad5a28dd03662

    SHA256

    c7f8f24e8b713f494c662c44ae2bc4792ea282a2d305a4162046b60700f5788d

    SHA512

    24af94a4afab9571ccc3ac04f6f1acd5a5c939159c6e26d59ac33ce4d9efcddaf256c7ea3e35e14285dd28f999bf585f95a250d6c30799c3644a00e7154bdec7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7346986.exe
    Filesize

    784KB

    MD5

    612c2deec5666929de5e60077b430fb2

    SHA1

    37fc01f6877bc0cd28d1810722bd18fb597e9c40

    SHA256

    e04fc4354a6b3d2bdfa867cfdb7acf736315d6f834641e5c4a79b91fd2028ada

    SHA512

    8757bf92158587b8ba2d2ba7bf867d797d2eca34e388044ae1ceb6ea4ae82f3a261cceb9d798e7c307f88c309c1d5ea3b6b66a803222f14dcd2633a351cc3a3b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7346986.exe
    Filesize

    784KB

    MD5

    612c2deec5666929de5e60077b430fb2

    SHA1

    37fc01f6877bc0cd28d1810722bd18fb597e9c40

    SHA256

    e04fc4354a6b3d2bdfa867cfdb7acf736315d6f834641e5c4a79b91fd2028ada

    SHA512

    8757bf92158587b8ba2d2ba7bf867d797d2eca34e388044ae1ceb6ea4ae82f3a261cceb9d798e7c307f88c309c1d5ea3b6b66a803222f14dcd2633a351cc3a3b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6482031.exe
    Filesize

    601KB

    MD5

    4ec2bb63dc1b80dd358dd5e35a291f98

    SHA1

    427281680c0a984f06de1f9c0ecb4d5c3d8356c6

    SHA256

    fea71d6ecd5126ce097261eacc786a64258fed7c02f75cc8137a588fb299cff9

    SHA512

    cec515bcdb53d3af42ee35cc0f964b92107af2a403dbf731f050c6944a69738139be3a76f1ae9fb79fd12311557a3eaaa24a2f6afdb71b738aa5bb16a52ce3b0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6482031.exe
    Filesize

    601KB

    MD5

    4ec2bb63dc1b80dd358dd5e35a291f98

    SHA1

    427281680c0a984f06de1f9c0ecb4d5c3d8356c6

    SHA256

    fea71d6ecd5126ce097261eacc786a64258fed7c02f75cc8137a588fb299cff9

    SHA512

    cec515bcdb53d3af42ee35cc0f964b92107af2a403dbf731f050c6944a69738139be3a76f1ae9fb79fd12311557a3eaaa24a2f6afdb71b738aa5bb16a52ce3b0

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6596204.exe
    Filesize

    338KB

    MD5

    fe9f686d02815088966ef2c44ec1a55f

    SHA1

    f0cd80c6d4b396607992171bcc7e457ecf819825

    SHA256

    b909edc86c8d3da98618b2cb8eef1f19b1bbbc302b42e9e83f1f5f3427aac849

    SHA512

    5d6dac7f0c1f677e51a8fdcfad22350443b74679191076a8938dd6e6ff177a889ace54806708f260000f3e5bb0ec4a7e7af3ce6ccd96943253cb076dcb6a7968

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6596204.exe
    Filesize

    338KB

    MD5

    fe9f686d02815088966ef2c44ec1a55f

    SHA1

    f0cd80c6d4b396607992171bcc7e457ecf819825

    SHA256

    b909edc86c8d3da98618b2cb8eef1f19b1bbbc302b42e9e83f1f5f3427aac849

    SHA512

    5d6dac7f0c1f677e51a8fdcfad22350443b74679191076a8938dd6e6ff177a889ace54806708f260000f3e5bb0ec4a7e7af3ce6ccd96943253cb076dcb6a7968

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7453350.exe
    Filesize

    217KB

    MD5

    efb5b818f2ccadb1907ba6b92ffa53f5

    SHA1

    c11e9155dfb5efbfd8c428bf0b0d1f92a3764846

    SHA256

    79a425964e6eafd28035bf2abcb72ec2c453fe7814d71e06a4949c060d399ab9

    SHA512

    14188f38c5f487244914f2c4459137a7005bf8ea763a6cbb4ac89d481763012309e08ae7b57877b4e68775ef2bd476fc505e6f0eddc15c4054c751d64b5aabc9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7453350.exe
    Filesize

    217KB

    MD5

    efb5b818f2ccadb1907ba6b92ffa53f5

    SHA1

    c11e9155dfb5efbfd8c428bf0b0d1f92a3764846

    SHA256

    79a425964e6eafd28035bf2abcb72ec2c453fe7814d71e06a4949c060d399ab9

    SHA512

    14188f38c5f487244914f2c4459137a7005bf8ea763a6cbb4ac89d481763012309e08ae7b57877b4e68775ef2bd476fc505e6f0eddc15c4054c751d64b5aabc9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7453350.exe
    Filesize

    217KB

    MD5

    efb5b818f2ccadb1907ba6b92ffa53f5

    SHA1

    c11e9155dfb5efbfd8c428bf0b0d1f92a3764846

    SHA256

    79a425964e6eafd28035bf2abcb72ec2c453fe7814d71e06a4949c060d399ab9

    SHA512

    14188f38c5f487244914f2c4459137a7005bf8ea763a6cbb4ac89d481763012309e08ae7b57877b4e68775ef2bd476fc505e6f0eddc15c4054c751d64b5aabc9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1135380.exe
    Filesize

    967KB

    MD5

    45b8cd253470fbd34eb6a1d60013dbd5

    SHA1

    7a324cc58d8ae70942a5b5e88b2ad5a28dd03662

    SHA256

    c7f8f24e8b713f494c662c44ae2bc4792ea282a2d305a4162046b60700f5788d

    SHA512

    24af94a4afab9571ccc3ac04f6f1acd5a5c939159c6e26d59ac33ce4d9efcddaf256c7ea3e35e14285dd28f999bf585f95a250d6c30799c3644a00e7154bdec7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1135380.exe
    Filesize

    967KB

    MD5

    45b8cd253470fbd34eb6a1d60013dbd5

    SHA1

    7a324cc58d8ae70942a5b5e88b2ad5a28dd03662

    SHA256

    c7f8f24e8b713f494c662c44ae2bc4792ea282a2d305a4162046b60700f5788d

    SHA512

    24af94a4afab9571ccc3ac04f6f1acd5a5c939159c6e26d59ac33ce4d9efcddaf256c7ea3e35e14285dd28f999bf585f95a250d6c30799c3644a00e7154bdec7

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7346986.exe
    Filesize

    784KB

    MD5

    612c2deec5666929de5e60077b430fb2

    SHA1

    37fc01f6877bc0cd28d1810722bd18fb597e9c40

    SHA256

    e04fc4354a6b3d2bdfa867cfdb7acf736315d6f834641e5c4a79b91fd2028ada

    SHA512

    8757bf92158587b8ba2d2ba7bf867d797d2eca34e388044ae1ceb6ea4ae82f3a261cceb9d798e7c307f88c309c1d5ea3b6b66a803222f14dcd2633a351cc3a3b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7346986.exe
    Filesize

    784KB

    MD5

    612c2deec5666929de5e60077b430fb2

    SHA1

    37fc01f6877bc0cd28d1810722bd18fb597e9c40

    SHA256

    e04fc4354a6b3d2bdfa867cfdb7acf736315d6f834641e5c4a79b91fd2028ada

    SHA512

    8757bf92158587b8ba2d2ba7bf867d797d2eca34e388044ae1ceb6ea4ae82f3a261cceb9d798e7c307f88c309c1d5ea3b6b66a803222f14dcd2633a351cc3a3b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6482031.exe
    Filesize

    601KB

    MD5

    4ec2bb63dc1b80dd358dd5e35a291f98

    SHA1

    427281680c0a984f06de1f9c0ecb4d5c3d8356c6

    SHA256

    fea71d6ecd5126ce097261eacc786a64258fed7c02f75cc8137a588fb299cff9

    SHA512

    cec515bcdb53d3af42ee35cc0f964b92107af2a403dbf731f050c6944a69738139be3a76f1ae9fb79fd12311557a3eaaa24a2f6afdb71b738aa5bb16a52ce3b0

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6482031.exe
    Filesize

    601KB

    MD5

    4ec2bb63dc1b80dd358dd5e35a291f98

    SHA1

    427281680c0a984f06de1f9c0ecb4d5c3d8356c6

    SHA256

    fea71d6ecd5126ce097261eacc786a64258fed7c02f75cc8137a588fb299cff9

    SHA512

    cec515bcdb53d3af42ee35cc0f964b92107af2a403dbf731f050c6944a69738139be3a76f1ae9fb79fd12311557a3eaaa24a2f6afdb71b738aa5bb16a52ce3b0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6596204.exe
    Filesize

    338KB

    MD5

    fe9f686d02815088966ef2c44ec1a55f

    SHA1

    f0cd80c6d4b396607992171bcc7e457ecf819825

    SHA256

    b909edc86c8d3da98618b2cb8eef1f19b1bbbc302b42e9e83f1f5f3427aac849

    SHA512

    5d6dac7f0c1f677e51a8fdcfad22350443b74679191076a8938dd6e6ff177a889ace54806708f260000f3e5bb0ec4a7e7af3ce6ccd96943253cb076dcb6a7968

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6596204.exe
    Filesize

    338KB

    MD5

    fe9f686d02815088966ef2c44ec1a55f

    SHA1

    f0cd80c6d4b396607992171bcc7e457ecf819825

    SHA256

    b909edc86c8d3da98618b2cb8eef1f19b1bbbc302b42e9e83f1f5f3427aac849

    SHA512

    5d6dac7f0c1f677e51a8fdcfad22350443b74679191076a8938dd6e6ff177a889ace54806708f260000f3e5bb0ec4a7e7af3ce6ccd96943253cb076dcb6a7968

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7453350.exe
    Filesize

    217KB

    MD5

    efb5b818f2ccadb1907ba6b92ffa53f5

    SHA1

    c11e9155dfb5efbfd8c428bf0b0d1f92a3764846

    SHA256

    79a425964e6eafd28035bf2abcb72ec2c453fe7814d71e06a4949c060d399ab9

    SHA512

    14188f38c5f487244914f2c4459137a7005bf8ea763a6cbb4ac89d481763012309e08ae7b57877b4e68775ef2bd476fc505e6f0eddc15c4054c751d64b5aabc9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7453350.exe
    Filesize

    217KB

    MD5

    efb5b818f2ccadb1907ba6b92ffa53f5

    SHA1

    c11e9155dfb5efbfd8c428bf0b0d1f92a3764846

    SHA256

    79a425964e6eafd28035bf2abcb72ec2c453fe7814d71e06a4949c060d399ab9

    SHA512

    14188f38c5f487244914f2c4459137a7005bf8ea763a6cbb4ac89d481763012309e08ae7b57877b4e68775ef2bd476fc505e6f0eddc15c4054c751d64b5aabc9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7453350.exe
    Filesize

    217KB

    MD5

    efb5b818f2ccadb1907ba6b92ffa53f5

    SHA1

    c11e9155dfb5efbfd8c428bf0b0d1f92a3764846

    SHA256

    79a425964e6eafd28035bf2abcb72ec2c453fe7814d71e06a4949c060d399ab9

    SHA512

    14188f38c5f487244914f2c4459137a7005bf8ea763a6cbb4ac89d481763012309e08ae7b57877b4e68775ef2bd476fc505e6f0eddc15c4054c751d64b5aabc9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7453350.exe
    Filesize

    217KB

    MD5

    efb5b818f2ccadb1907ba6b92ffa53f5

    SHA1

    c11e9155dfb5efbfd8c428bf0b0d1f92a3764846

    SHA256

    79a425964e6eafd28035bf2abcb72ec2c453fe7814d71e06a4949c060d399ab9

    SHA512

    14188f38c5f487244914f2c4459137a7005bf8ea763a6cbb4ac89d481763012309e08ae7b57877b4e68775ef2bd476fc505e6f0eddc15c4054c751d64b5aabc9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7453350.exe
    Filesize

    217KB

    MD5

    efb5b818f2ccadb1907ba6b92ffa53f5

    SHA1

    c11e9155dfb5efbfd8c428bf0b0d1f92a3764846

    SHA256

    79a425964e6eafd28035bf2abcb72ec2c453fe7814d71e06a4949c060d399ab9

    SHA512

    14188f38c5f487244914f2c4459137a7005bf8ea763a6cbb4ac89d481763012309e08ae7b57877b4e68775ef2bd476fc505e6f0eddc15c4054c751d64b5aabc9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7453350.exe
    Filesize

    217KB

    MD5

    efb5b818f2ccadb1907ba6b92ffa53f5

    SHA1

    c11e9155dfb5efbfd8c428bf0b0d1f92a3764846

    SHA256

    79a425964e6eafd28035bf2abcb72ec2c453fe7814d71e06a4949c060d399ab9

    SHA512

    14188f38c5f487244914f2c4459137a7005bf8ea763a6cbb4ac89d481763012309e08ae7b57877b4e68775ef2bd476fc505e6f0eddc15c4054c751d64b5aabc9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7453350.exe
    Filesize

    217KB

    MD5

    efb5b818f2ccadb1907ba6b92ffa53f5

    SHA1

    c11e9155dfb5efbfd8c428bf0b0d1f92a3764846

    SHA256

    79a425964e6eafd28035bf2abcb72ec2c453fe7814d71e06a4949c060d399ab9

    SHA512

    14188f38c5f487244914f2c4459137a7005bf8ea763a6cbb4ac89d481763012309e08ae7b57877b4e68775ef2bd476fc505e6f0eddc15c4054c751d64b5aabc9

  • memory/2896-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2896-58-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2896-62-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2896-60-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2896-56-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2896-55-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2896-54-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2896-53-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB