Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 06:25

General

  • Target

    0c35fb23b7014c7fffbad321c7ad12256d7109a2a7cb7a9b2a47528bbf91dd0b.exe

  • Size

    1.1MB

  • MD5

    b0b45c125b92487371f35d5cf4d11eec

  • SHA1

    ef41ca074d9b70b6664df90a1ab6c14b0e2c45ea

  • SHA256

    0c35fb23b7014c7fffbad321c7ad12256d7109a2a7cb7a9b2a47528bbf91dd0b

  • SHA512

    00868c9a745aa5d0fcfed65b767cb625b5aca82a2167b1bd242a2cb082e68522918bb91f585919e9e59eeebc84ca7cb7f48f99864bfc4caa485c52259b29bc85

  • SSDEEP

    24576:+yJNquFKPuRnF7IoMUt8eixbMYvhxXvqgtGz5N3ugrZ:NJNqu8PulFsdEi/vHXigtGzSe

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c35fb23b7014c7fffbad321c7ad12256d7109a2a7cb7a9b2a47528bbf91dd0b.exe
    "C:\Users\Admin\AppData\Local\Temp\0c35fb23b7014c7fffbad321c7ad12256d7109a2a7cb7a9b2a47528bbf91dd0b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8540274.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8540274.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1508
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2887455.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2887455.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4072498.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4072498.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2660
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7742218.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7742218.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2664
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5731712.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5731712.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2996
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2516
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2996 -s 276
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8540274.exe
    Filesize

    980KB

    MD5

    add4f8743e2cd35d6dae324bffde6366

    SHA1

    f8ed5c1fced056eae1260a9a67f3598dd2945319

    SHA256

    c41568355e1712cd5912e29927ddf7780c0e45fa22233551c3c965a209440de4

    SHA512

    6b9a25720221834867f5960d872edd9f002012fc724a262eba03cd9fc5120952dca7450e18205efbfc702749f7b0d3d6fd80667ea8188139082b9fb496f5ba29

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8540274.exe
    Filesize

    980KB

    MD5

    add4f8743e2cd35d6dae324bffde6366

    SHA1

    f8ed5c1fced056eae1260a9a67f3598dd2945319

    SHA256

    c41568355e1712cd5912e29927ddf7780c0e45fa22233551c3c965a209440de4

    SHA512

    6b9a25720221834867f5960d872edd9f002012fc724a262eba03cd9fc5120952dca7450e18205efbfc702749f7b0d3d6fd80667ea8188139082b9fb496f5ba29

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2887455.exe
    Filesize

    800KB

    MD5

    f79c61620d25885693bb14e0e2b57689

    SHA1

    540c8726ae59a69113e3e467c5dc9674e82dab80

    SHA256

    3af09477daebea4c1b8cec5660b0819f275583f65649fa3df8c776247a0d1e9b

    SHA512

    621d5cd529444aa9056256d7b99623d258a69a2ee7970f983a4be4f6629ffee769b85385f255be62ab0bc15fb3019308e2cf54517eb0f1cf7e4b5098848623f3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2887455.exe
    Filesize

    800KB

    MD5

    f79c61620d25885693bb14e0e2b57689

    SHA1

    540c8726ae59a69113e3e467c5dc9674e82dab80

    SHA256

    3af09477daebea4c1b8cec5660b0819f275583f65649fa3df8c776247a0d1e9b

    SHA512

    621d5cd529444aa9056256d7b99623d258a69a2ee7970f983a4be4f6629ffee769b85385f255be62ab0bc15fb3019308e2cf54517eb0f1cf7e4b5098848623f3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4072498.exe
    Filesize

    617KB

    MD5

    6ea59783b52008a1e650f8c732256cca

    SHA1

    2f266953368e4469264bb8ca9c50f271c0426811

    SHA256

    6ebc6bcbb4854d451c26204bf2ec92f2ab641afb019636ff5e65294402859592

    SHA512

    9a514d5b854634756fbf967099b32da5a0c7b1250598cbf2478fadfcc47b4c7742a40b2c4314bb2e5a29c37dcd1504a239ae861dc124576e058a250a36674b14

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4072498.exe
    Filesize

    617KB

    MD5

    6ea59783b52008a1e650f8c732256cca

    SHA1

    2f266953368e4469264bb8ca9c50f271c0426811

    SHA256

    6ebc6bcbb4854d451c26204bf2ec92f2ab641afb019636ff5e65294402859592

    SHA512

    9a514d5b854634756fbf967099b32da5a0c7b1250598cbf2478fadfcc47b4c7742a40b2c4314bb2e5a29c37dcd1504a239ae861dc124576e058a250a36674b14

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7742218.exe
    Filesize

    347KB

    MD5

    5fc1e6fb87d2bc6004f404856e90fb46

    SHA1

    fd49a8c2e983b0f0bd264fb6e09b2be1c15e1b56

    SHA256

    60e3e6e3232ee6bf13fcc2aabadf439a535b1c22e03205e9de25db733497bc32

    SHA512

    a71d7c352086498e9b4a406052312da6abcb834e5413f87ebd284ab17057a1849906d062ffabcf4bbcd8d0793b627de31de3442b92e3746d9ec7d476aed52b3c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7742218.exe
    Filesize

    347KB

    MD5

    5fc1e6fb87d2bc6004f404856e90fb46

    SHA1

    fd49a8c2e983b0f0bd264fb6e09b2be1c15e1b56

    SHA256

    60e3e6e3232ee6bf13fcc2aabadf439a535b1c22e03205e9de25db733497bc32

    SHA512

    a71d7c352086498e9b4a406052312da6abcb834e5413f87ebd284ab17057a1849906d062ffabcf4bbcd8d0793b627de31de3442b92e3746d9ec7d476aed52b3c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5731712.exe
    Filesize

    227KB

    MD5

    84e4925743a2c792a06584b0f633fa23

    SHA1

    83f26d4f97c43f4487c2d2d8fe5b80ba1d335642

    SHA256

    df9d807a5fe6f5f3e75e90e9f599d9fec49fb6e2b046987a94feacf8ffe74c01

    SHA512

    6616ed2d2bee7c3670e9b46aea15a4b485497f9dfe006fafb504a2b4ee5e3566e53e2cbaa99c3cac86ee413572a1251a86b9f91a9a4c3d90293342dc7b4fec47

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5731712.exe
    Filesize

    227KB

    MD5

    84e4925743a2c792a06584b0f633fa23

    SHA1

    83f26d4f97c43f4487c2d2d8fe5b80ba1d335642

    SHA256

    df9d807a5fe6f5f3e75e90e9f599d9fec49fb6e2b046987a94feacf8ffe74c01

    SHA512

    6616ed2d2bee7c3670e9b46aea15a4b485497f9dfe006fafb504a2b4ee5e3566e53e2cbaa99c3cac86ee413572a1251a86b9f91a9a4c3d90293342dc7b4fec47

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5731712.exe
    Filesize

    227KB

    MD5

    84e4925743a2c792a06584b0f633fa23

    SHA1

    83f26d4f97c43f4487c2d2d8fe5b80ba1d335642

    SHA256

    df9d807a5fe6f5f3e75e90e9f599d9fec49fb6e2b046987a94feacf8ffe74c01

    SHA512

    6616ed2d2bee7c3670e9b46aea15a4b485497f9dfe006fafb504a2b4ee5e3566e53e2cbaa99c3cac86ee413572a1251a86b9f91a9a4c3d90293342dc7b4fec47

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8540274.exe
    Filesize

    980KB

    MD5

    add4f8743e2cd35d6dae324bffde6366

    SHA1

    f8ed5c1fced056eae1260a9a67f3598dd2945319

    SHA256

    c41568355e1712cd5912e29927ddf7780c0e45fa22233551c3c965a209440de4

    SHA512

    6b9a25720221834867f5960d872edd9f002012fc724a262eba03cd9fc5120952dca7450e18205efbfc702749f7b0d3d6fd80667ea8188139082b9fb496f5ba29

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8540274.exe
    Filesize

    980KB

    MD5

    add4f8743e2cd35d6dae324bffde6366

    SHA1

    f8ed5c1fced056eae1260a9a67f3598dd2945319

    SHA256

    c41568355e1712cd5912e29927ddf7780c0e45fa22233551c3c965a209440de4

    SHA512

    6b9a25720221834867f5960d872edd9f002012fc724a262eba03cd9fc5120952dca7450e18205efbfc702749f7b0d3d6fd80667ea8188139082b9fb496f5ba29

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2887455.exe
    Filesize

    800KB

    MD5

    f79c61620d25885693bb14e0e2b57689

    SHA1

    540c8726ae59a69113e3e467c5dc9674e82dab80

    SHA256

    3af09477daebea4c1b8cec5660b0819f275583f65649fa3df8c776247a0d1e9b

    SHA512

    621d5cd529444aa9056256d7b99623d258a69a2ee7970f983a4be4f6629ffee769b85385f255be62ab0bc15fb3019308e2cf54517eb0f1cf7e4b5098848623f3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2887455.exe
    Filesize

    800KB

    MD5

    f79c61620d25885693bb14e0e2b57689

    SHA1

    540c8726ae59a69113e3e467c5dc9674e82dab80

    SHA256

    3af09477daebea4c1b8cec5660b0819f275583f65649fa3df8c776247a0d1e9b

    SHA512

    621d5cd529444aa9056256d7b99623d258a69a2ee7970f983a4be4f6629ffee769b85385f255be62ab0bc15fb3019308e2cf54517eb0f1cf7e4b5098848623f3

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4072498.exe
    Filesize

    617KB

    MD5

    6ea59783b52008a1e650f8c732256cca

    SHA1

    2f266953368e4469264bb8ca9c50f271c0426811

    SHA256

    6ebc6bcbb4854d451c26204bf2ec92f2ab641afb019636ff5e65294402859592

    SHA512

    9a514d5b854634756fbf967099b32da5a0c7b1250598cbf2478fadfcc47b4c7742a40b2c4314bb2e5a29c37dcd1504a239ae861dc124576e058a250a36674b14

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4072498.exe
    Filesize

    617KB

    MD5

    6ea59783b52008a1e650f8c732256cca

    SHA1

    2f266953368e4469264bb8ca9c50f271c0426811

    SHA256

    6ebc6bcbb4854d451c26204bf2ec92f2ab641afb019636ff5e65294402859592

    SHA512

    9a514d5b854634756fbf967099b32da5a0c7b1250598cbf2478fadfcc47b4c7742a40b2c4314bb2e5a29c37dcd1504a239ae861dc124576e058a250a36674b14

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7742218.exe
    Filesize

    347KB

    MD5

    5fc1e6fb87d2bc6004f404856e90fb46

    SHA1

    fd49a8c2e983b0f0bd264fb6e09b2be1c15e1b56

    SHA256

    60e3e6e3232ee6bf13fcc2aabadf439a535b1c22e03205e9de25db733497bc32

    SHA512

    a71d7c352086498e9b4a406052312da6abcb834e5413f87ebd284ab17057a1849906d062ffabcf4bbcd8d0793b627de31de3442b92e3746d9ec7d476aed52b3c

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7742218.exe
    Filesize

    347KB

    MD5

    5fc1e6fb87d2bc6004f404856e90fb46

    SHA1

    fd49a8c2e983b0f0bd264fb6e09b2be1c15e1b56

    SHA256

    60e3e6e3232ee6bf13fcc2aabadf439a535b1c22e03205e9de25db733497bc32

    SHA512

    a71d7c352086498e9b4a406052312da6abcb834e5413f87ebd284ab17057a1849906d062ffabcf4bbcd8d0793b627de31de3442b92e3746d9ec7d476aed52b3c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5731712.exe
    Filesize

    227KB

    MD5

    84e4925743a2c792a06584b0f633fa23

    SHA1

    83f26d4f97c43f4487c2d2d8fe5b80ba1d335642

    SHA256

    df9d807a5fe6f5f3e75e90e9f599d9fec49fb6e2b046987a94feacf8ffe74c01

    SHA512

    6616ed2d2bee7c3670e9b46aea15a4b485497f9dfe006fafb504a2b4ee5e3566e53e2cbaa99c3cac86ee413572a1251a86b9f91a9a4c3d90293342dc7b4fec47

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5731712.exe
    Filesize

    227KB

    MD5

    84e4925743a2c792a06584b0f633fa23

    SHA1

    83f26d4f97c43f4487c2d2d8fe5b80ba1d335642

    SHA256

    df9d807a5fe6f5f3e75e90e9f599d9fec49fb6e2b046987a94feacf8ffe74c01

    SHA512

    6616ed2d2bee7c3670e9b46aea15a4b485497f9dfe006fafb504a2b4ee5e3566e53e2cbaa99c3cac86ee413572a1251a86b9f91a9a4c3d90293342dc7b4fec47

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5731712.exe
    Filesize

    227KB

    MD5

    84e4925743a2c792a06584b0f633fa23

    SHA1

    83f26d4f97c43f4487c2d2d8fe5b80ba1d335642

    SHA256

    df9d807a5fe6f5f3e75e90e9f599d9fec49fb6e2b046987a94feacf8ffe74c01

    SHA512

    6616ed2d2bee7c3670e9b46aea15a4b485497f9dfe006fafb504a2b4ee5e3566e53e2cbaa99c3cac86ee413572a1251a86b9f91a9a4c3d90293342dc7b4fec47

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5731712.exe
    Filesize

    227KB

    MD5

    84e4925743a2c792a06584b0f633fa23

    SHA1

    83f26d4f97c43f4487c2d2d8fe5b80ba1d335642

    SHA256

    df9d807a5fe6f5f3e75e90e9f599d9fec49fb6e2b046987a94feacf8ffe74c01

    SHA512

    6616ed2d2bee7c3670e9b46aea15a4b485497f9dfe006fafb504a2b4ee5e3566e53e2cbaa99c3cac86ee413572a1251a86b9f91a9a4c3d90293342dc7b4fec47

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5731712.exe
    Filesize

    227KB

    MD5

    84e4925743a2c792a06584b0f633fa23

    SHA1

    83f26d4f97c43f4487c2d2d8fe5b80ba1d335642

    SHA256

    df9d807a5fe6f5f3e75e90e9f599d9fec49fb6e2b046987a94feacf8ffe74c01

    SHA512

    6616ed2d2bee7c3670e9b46aea15a4b485497f9dfe006fafb504a2b4ee5e3566e53e2cbaa99c3cac86ee413572a1251a86b9f91a9a4c3d90293342dc7b4fec47

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5731712.exe
    Filesize

    227KB

    MD5

    84e4925743a2c792a06584b0f633fa23

    SHA1

    83f26d4f97c43f4487c2d2d8fe5b80ba1d335642

    SHA256

    df9d807a5fe6f5f3e75e90e9f599d9fec49fb6e2b046987a94feacf8ffe74c01

    SHA512

    6616ed2d2bee7c3670e9b46aea15a4b485497f9dfe006fafb504a2b4ee5e3566e53e2cbaa99c3cac86ee413572a1251a86b9f91a9a4c3d90293342dc7b4fec47

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5731712.exe
    Filesize

    227KB

    MD5

    84e4925743a2c792a06584b0f633fa23

    SHA1

    83f26d4f97c43f4487c2d2d8fe5b80ba1d335642

    SHA256

    df9d807a5fe6f5f3e75e90e9f599d9fec49fb6e2b046987a94feacf8ffe74c01

    SHA512

    6616ed2d2bee7c3670e9b46aea15a4b485497f9dfe006fafb504a2b4ee5e3566e53e2cbaa99c3cac86ee413572a1251a86b9f91a9a4c3d90293342dc7b4fec47

  • memory/2516-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2516-56-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2516-62-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2516-60-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2516-58-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2516-55-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2516-54-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2516-53-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB