Analysis

  • max time kernel
    117s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 06:25

General

  • Target

    8328c211c3b4fa61873d7cb2d1e4c39d5ed13549f0c82ebbc12c84a14f022b32_JC.exe

  • Size

    1.1MB

  • MD5

    e4fe4d1ca19c2cad87cffd6b0901a694

  • SHA1

    c8c1449bac2c3e82e58841698590ec3393755aa3

  • SHA256

    8328c211c3b4fa61873d7cb2d1e4c39d5ed13549f0c82ebbc12c84a14f022b32

  • SHA512

    886f3fe924206f8985ac4749cb58f1ceac7c52a4067fd5c07a0da6b2a3b46b9a5c92aac04b2dd373796676815ac02951635c8c7c5584dec70257516dd4917197

  • SSDEEP

    24576:xy2KXuOp5d7QoNdzBcouCRP+nJpOTH5WiwzTYmwYDrO3Bnww2+9:kPD6g+JIHUjDrORn

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8328c211c3b4fa61873d7cb2d1e4c39d5ed13549f0c82ebbc12c84a14f022b32_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\8328c211c3b4fa61873d7cb2d1e4c39d5ed13549f0c82ebbc12c84a14f022b32_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9140860.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9140860.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1964
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4677776.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4677776.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2292
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7225385.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7225385.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2748
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6480505.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6480505.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2812
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2517955.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2517955.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2572
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2640
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3020
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 280
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2500

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9140860.exe
      Filesize

      994KB

      MD5

      4e85a2aee151d8415c25b032b6d57f23

      SHA1

      0bb0d0681aef9ad88ab79ae6b1a3e294362164e9

      SHA256

      a0555a1eef0dd281683071e1b4ff1875d956a61f7013d8f8ccb5d7391683124f

      SHA512

      3f4c42137315b1c73e9ffa967f44cbb6dc66e03d31d174ee917ad5400260aa538185aba26293bbf1d822891a11f70ddbb670deaa7151ec6aabefa182878f4af5

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9140860.exe
      Filesize

      994KB

      MD5

      4e85a2aee151d8415c25b032b6d57f23

      SHA1

      0bb0d0681aef9ad88ab79ae6b1a3e294362164e9

      SHA256

      a0555a1eef0dd281683071e1b4ff1875d956a61f7013d8f8ccb5d7391683124f

      SHA512

      3f4c42137315b1c73e9ffa967f44cbb6dc66e03d31d174ee917ad5400260aa538185aba26293bbf1d822891a11f70ddbb670deaa7151ec6aabefa182878f4af5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4677776.exe
      Filesize

      815KB

      MD5

      29d3629b696cc8bde9f88e5c26710c8a

      SHA1

      b4f76b8717f4bfbb06674fb811924606cdf1594f

      SHA256

      4ead1d68e2553f940f3a15461aaf94dd53c13b8ede37401a6926e1dc8a4f16de

      SHA512

      fa096fb8b33de2252b04d9261cce3444bf8e9ba9269ff599890a96e5fe8663362b1f21fda349950e75a70b5ee28d2c69b7340a2533b3daeafe8570110c64b7c4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4677776.exe
      Filesize

      815KB

      MD5

      29d3629b696cc8bde9f88e5c26710c8a

      SHA1

      b4f76b8717f4bfbb06674fb811924606cdf1594f

      SHA256

      4ead1d68e2553f940f3a15461aaf94dd53c13b8ede37401a6926e1dc8a4f16de

      SHA512

      fa096fb8b33de2252b04d9261cce3444bf8e9ba9269ff599890a96e5fe8663362b1f21fda349950e75a70b5ee28d2c69b7340a2533b3daeafe8570110c64b7c4

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7225385.exe
      Filesize

      632KB

      MD5

      1ba07a03cf6ad934edf075c809b90250

      SHA1

      cd36ea8a43801b5a2a38bf18ddefb98ed2215fd3

      SHA256

      3aaed6ffbdf03dc303a91f0279e08e68db08c0f0eea8fb0e94ef46704bffbe30

      SHA512

      e49f29586413e9785b50d7250d9920326dca782433a6519aeea6c5049401a383facf6b46d4991184437ec6eafa145dd819656532eebd4330802c162060dc0003

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7225385.exe
      Filesize

      632KB

      MD5

      1ba07a03cf6ad934edf075c809b90250

      SHA1

      cd36ea8a43801b5a2a38bf18ddefb98ed2215fd3

      SHA256

      3aaed6ffbdf03dc303a91f0279e08e68db08c0f0eea8fb0e94ef46704bffbe30

      SHA512

      e49f29586413e9785b50d7250d9920326dca782433a6519aeea6c5049401a383facf6b46d4991184437ec6eafa145dd819656532eebd4330802c162060dc0003

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6480505.exe
      Filesize

      355KB

      MD5

      4eaf13826bdf488b7da7fd52fd85775d

      SHA1

      e47486261e2e18baf2301c68d9af74f3b3f59868

      SHA256

      f666c164a626a89a00e28b467d9fb233a1dadbbe52d719e723f8c13c1dd968ab

      SHA512

      6f636a8ad589a6b9cbd2a36aa3d9c103fb6d8c71d0a4e368dfb758b4e6f4a13d179747bb65e8df5caaa2de4a7d504b507f42e3edada213ed7a1545ddd8193a26

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6480505.exe
      Filesize

      355KB

      MD5

      4eaf13826bdf488b7da7fd52fd85775d

      SHA1

      e47486261e2e18baf2301c68d9af74f3b3f59868

      SHA256

      f666c164a626a89a00e28b467d9fb233a1dadbbe52d719e723f8c13c1dd968ab

      SHA512

      6f636a8ad589a6b9cbd2a36aa3d9c103fb6d8c71d0a4e368dfb758b4e6f4a13d179747bb65e8df5caaa2de4a7d504b507f42e3edada213ed7a1545ddd8193a26

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2517955.exe
      Filesize

      250KB

      MD5

      c0c369b0fceb712e56c343a0c1e6117e

      SHA1

      7ed6195e8021e3888d1198a5c1548f6ae250fb5b

      SHA256

      f7e1b91e4564189b7220ad2c3466f92f495a0842610a8f32ce7d9be8917a97d7

      SHA512

      fb3ccf8b2e4c02e1c4bedaf9700ec5c4814b9e82245bc30b6b0a6624ecdadc8b05b627751a49497ea38fd189baf58d3cfe3bdfdef410401e24ba1c737ceb45e7

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2517955.exe
      Filesize

      250KB

      MD5

      c0c369b0fceb712e56c343a0c1e6117e

      SHA1

      7ed6195e8021e3888d1198a5c1548f6ae250fb5b

      SHA256

      f7e1b91e4564189b7220ad2c3466f92f495a0842610a8f32ce7d9be8917a97d7

      SHA512

      fb3ccf8b2e4c02e1c4bedaf9700ec5c4814b9e82245bc30b6b0a6624ecdadc8b05b627751a49497ea38fd189baf58d3cfe3bdfdef410401e24ba1c737ceb45e7

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2517955.exe
      Filesize

      250KB

      MD5

      c0c369b0fceb712e56c343a0c1e6117e

      SHA1

      7ed6195e8021e3888d1198a5c1548f6ae250fb5b

      SHA256

      f7e1b91e4564189b7220ad2c3466f92f495a0842610a8f32ce7d9be8917a97d7

      SHA512

      fb3ccf8b2e4c02e1c4bedaf9700ec5c4814b9e82245bc30b6b0a6624ecdadc8b05b627751a49497ea38fd189baf58d3cfe3bdfdef410401e24ba1c737ceb45e7

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9140860.exe
      Filesize

      994KB

      MD5

      4e85a2aee151d8415c25b032b6d57f23

      SHA1

      0bb0d0681aef9ad88ab79ae6b1a3e294362164e9

      SHA256

      a0555a1eef0dd281683071e1b4ff1875d956a61f7013d8f8ccb5d7391683124f

      SHA512

      3f4c42137315b1c73e9ffa967f44cbb6dc66e03d31d174ee917ad5400260aa538185aba26293bbf1d822891a11f70ddbb670deaa7151ec6aabefa182878f4af5

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9140860.exe
      Filesize

      994KB

      MD5

      4e85a2aee151d8415c25b032b6d57f23

      SHA1

      0bb0d0681aef9ad88ab79ae6b1a3e294362164e9

      SHA256

      a0555a1eef0dd281683071e1b4ff1875d956a61f7013d8f8ccb5d7391683124f

      SHA512

      3f4c42137315b1c73e9ffa967f44cbb6dc66e03d31d174ee917ad5400260aa538185aba26293bbf1d822891a11f70ddbb670deaa7151ec6aabefa182878f4af5

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z4677776.exe
      Filesize

      815KB

      MD5

      29d3629b696cc8bde9f88e5c26710c8a

      SHA1

      b4f76b8717f4bfbb06674fb811924606cdf1594f

      SHA256

      4ead1d68e2553f940f3a15461aaf94dd53c13b8ede37401a6926e1dc8a4f16de

      SHA512

      fa096fb8b33de2252b04d9261cce3444bf8e9ba9269ff599890a96e5fe8663362b1f21fda349950e75a70b5ee28d2c69b7340a2533b3daeafe8570110c64b7c4

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z4677776.exe
      Filesize

      815KB

      MD5

      29d3629b696cc8bde9f88e5c26710c8a

      SHA1

      b4f76b8717f4bfbb06674fb811924606cdf1594f

      SHA256

      4ead1d68e2553f940f3a15461aaf94dd53c13b8ede37401a6926e1dc8a4f16de

      SHA512

      fa096fb8b33de2252b04d9261cce3444bf8e9ba9269ff599890a96e5fe8663362b1f21fda349950e75a70b5ee28d2c69b7340a2533b3daeafe8570110c64b7c4

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7225385.exe
      Filesize

      632KB

      MD5

      1ba07a03cf6ad934edf075c809b90250

      SHA1

      cd36ea8a43801b5a2a38bf18ddefb98ed2215fd3

      SHA256

      3aaed6ffbdf03dc303a91f0279e08e68db08c0f0eea8fb0e94ef46704bffbe30

      SHA512

      e49f29586413e9785b50d7250d9920326dca782433a6519aeea6c5049401a383facf6b46d4991184437ec6eafa145dd819656532eebd4330802c162060dc0003

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7225385.exe
      Filesize

      632KB

      MD5

      1ba07a03cf6ad934edf075c809b90250

      SHA1

      cd36ea8a43801b5a2a38bf18ddefb98ed2215fd3

      SHA256

      3aaed6ffbdf03dc303a91f0279e08e68db08c0f0eea8fb0e94ef46704bffbe30

      SHA512

      e49f29586413e9785b50d7250d9920326dca782433a6519aeea6c5049401a383facf6b46d4991184437ec6eafa145dd819656532eebd4330802c162060dc0003

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6480505.exe
      Filesize

      355KB

      MD5

      4eaf13826bdf488b7da7fd52fd85775d

      SHA1

      e47486261e2e18baf2301c68d9af74f3b3f59868

      SHA256

      f666c164a626a89a00e28b467d9fb233a1dadbbe52d719e723f8c13c1dd968ab

      SHA512

      6f636a8ad589a6b9cbd2a36aa3d9c103fb6d8c71d0a4e368dfb758b4e6f4a13d179747bb65e8df5caaa2de4a7d504b507f42e3edada213ed7a1545ddd8193a26

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6480505.exe
      Filesize

      355KB

      MD5

      4eaf13826bdf488b7da7fd52fd85775d

      SHA1

      e47486261e2e18baf2301c68d9af74f3b3f59868

      SHA256

      f666c164a626a89a00e28b467d9fb233a1dadbbe52d719e723f8c13c1dd968ab

      SHA512

      6f636a8ad589a6b9cbd2a36aa3d9c103fb6d8c71d0a4e368dfb758b4e6f4a13d179747bb65e8df5caaa2de4a7d504b507f42e3edada213ed7a1545ddd8193a26

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2517955.exe
      Filesize

      250KB

      MD5

      c0c369b0fceb712e56c343a0c1e6117e

      SHA1

      7ed6195e8021e3888d1198a5c1548f6ae250fb5b

      SHA256

      f7e1b91e4564189b7220ad2c3466f92f495a0842610a8f32ce7d9be8917a97d7

      SHA512

      fb3ccf8b2e4c02e1c4bedaf9700ec5c4814b9e82245bc30b6b0a6624ecdadc8b05b627751a49497ea38fd189baf58d3cfe3bdfdef410401e24ba1c737ceb45e7

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2517955.exe
      Filesize

      250KB

      MD5

      c0c369b0fceb712e56c343a0c1e6117e

      SHA1

      7ed6195e8021e3888d1198a5c1548f6ae250fb5b

      SHA256

      f7e1b91e4564189b7220ad2c3466f92f495a0842610a8f32ce7d9be8917a97d7

      SHA512

      fb3ccf8b2e4c02e1c4bedaf9700ec5c4814b9e82245bc30b6b0a6624ecdadc8b05b627751a49497ea38fd189baf58d3cfe3bdfdef410401e24ba1c737ceb45e7

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2517955.exe
      Filesize

      250KB

      MD5

      c0c369b0fceb712e56c343a0c1e6117e

      SHA1

      7ed6195e8021e3888d1198a5c1548f6ae250fb5b

      SHA256

      f7e1b91e4564189b7220ad2c3466f92f495a0842610a8f32ce7d9be8917a97d7

      SHA512

      fb3ccf8b2e4c02e1c4bedaf9700ec5c4814b9e82245bc30b6b0a6624ecdadc8b05b627751a49497ea38fd189baf58d3cfe3bdfdef410401e24ba1c737ceb45e7

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2517955.exe
      Filesize

      250KB

      MD5

      c0c369b0fceb712e56c343a0c1e6117e

      SHA1

      7ed6195e8021e3888d1198a5c1548f6ae250fb5b

      SHA256

      f7e1b91e4564189b7220ad2c3466f92f495a0842610a8f32ce7d9be8917a97d7

      SHA512

      fb3ccf8b2e4c02e1c4bedaf9700ec5c4814b9e82245bc30b6b0a6624ecdadc8b05b627751a49497ea38fd189baf58d3cfe3bdfdef410401e24ba1c737ceb45e7

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2517955.exe
      Filesize

      250KB

      MD5

      c0c369b0fceb712e56c343a0c1e6117e

      SHA1

      7ed6195e8021e3888d1198a5c1548f6ae250fb5b

      SHA256

      f7e1b91e4564189b7220ad2c3466f92f495a0842610a8f32ce7d9be8917a97d7

      SHA512

      fb3ccf8b2e4c02e1c4bedaf9700ec5c4814b9e82245bc30b6b0a6624ecdadc8b05b627751a49497ea38fd189baf58d3cfe3bdfdef410401e24ba1c737ceb45e7

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2517955.exe
      Filesize

      250KB

      MD5

      c0c369b0fceb712e56c343a0c1e6117e

      SHA1

      7ed6195e8021e3888d1198a5c1548f6ae250fb5b

      SHA256

      f7e1b91e4564189b7220ad2c3466f92f495a0842610a8f32ce7d9be8917a97d7

      SHA512

      fb3ccf8b2e4c02e1c4bedaf9700ec5c4814b9e82245bc30b6b0a6624ecdadc8b05b627751a49497ea38fd189baf58d3cfe3bdfdef410401e24ba1c737ceb45e7

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2517955.exe
      Filesize

      250KB

      MD5

      c0c369b0fceb712e56c343a0c1e6117e

      SHA1

      7ed6195e8021e3888d1198a5c1548f6ae250fb5b

      SHA256

      f7e1b91e4564189b7220ad2c3466f92f495a0842610a8f32ce7d9be8917a97d7

      SHA512

      fb3ccf8b2e4c02e1c4bedaf9700ec5c4814b9e82245bc30b6b0a6624ecdadc8b05b627751a49497ea38fd189baf58d3cfe3bdfdef410401e24ba1c737ceb45e7

    • memory/3020-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
      Filesize

      4KB

    • memory/3020-58-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/3020-62-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/3020-60-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/3020-56-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/3020-55-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/3020-54-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/3020-53-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB