Analysis

  • max time kernel
    120s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 05:52

General

  • Target

    585e899a89870fb57ddde846f5a5b3bf960a043dab619b41bf640664754e31fb.exe

  • Size

    1.1MB

  • MD5

    6ec9c17f956436e7793de63e277e4118

  • SHA1

    38840d321c6c349ba6b6f0c38b55a14017a4c5b4

  • SHA256

    585e899a89870fb57ddde846f5a5b3bf960a043dab619b41bf640664754e31fb

  • SHA512

    c85f6764325a0c2be624af6a654db05f465a615af005bb66c3ba108eb09e00b29ca37d33907f1ac59cdbd9383ce5655151a981dcd3e9ef1a0c50d1dc2619468f

  • SSDEEP

    12288:5MrHy90LECgbmBKOK2Lg+WWVScHg2GI+KfkxkpAFXZ8fXSMkJeTrI4J0UI7pCooG:uyRCTVSchQKqMsXZ8a5KrIa6CfZkFg2

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\585e899a89870fb57ddde846f5a5b3bf960a043dab619b41bf640664754e31fb.exe
    "C:\Users\Admin\AppData\Local\Temp\585e899a89870fb57ddde846f5a5b3bf960a043dab619b41bf640664754e31fb.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5255812.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5255812.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9370989.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9370989.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7488988.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7488988.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2504
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3184100.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3184100.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1876
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0287975.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0287975.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2552
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3068
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 276
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:1084

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5255812.exe
    Filesize

    980KB

    MD5

    cfb4f116f334220b7c56943971dc817d

    SHA1

    ce871aa51d3fa5d50a3281e60135c3e4e7556355

    SHA256

    854f04fb64c7be53cb848ccc1557b902b556d7be91382ad7379a5ff5dd06d615

    SHA512

    26f3ddcb5c58148e188c0cee44af38550d3bab592ec745c72b7039bc16d81004e5a2cf5c84ad4c17bc62132174600b774e06c72920a23068df5f853ee9984e38

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5255812.exe
    Filesize

    980KB

    MD5

    cfb4f116f334220b7c56943971dc817d

    SHA1

    ce871aa51d3fa5d50a3281e60135c3e4e7556355

    SHA256

    854f04fb64c7be53cb848ccc1557b902b556d7be91382ad7379a5ff5dd06d615

    SHA512

    26f3ddcb5c58148e188c0cee44af38550d3bab592ec745c72b7039bc16d81004e5a2cf5c84ad4c17bc62132174600b774e06c72920a23068df5f853ee9984e38

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9370989.exe
    Filesize

    798KB

    MD5

    10c1b489d010266b3a73cdd8f4dfce26

    SHA1

    528667c07357ac0dae496df884f043daf57fa6b8

    SHA256

    425e04fb6241712905062ae567f86261529a312af8aae47fa4f62f6f091dcd0b

    SHA512

    cb78b2b7694b4b3a026195adc580f4948269d9f0dbdd587d17ac2dc710028a11d92f6bbd371cb775997113248c7df44901af77992cb3ea4ad97194078a7d3488

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9370989.exe
    Filesize

    798KB

    MD5

    10c1b489d010266b3a73cdd8f4dfce26

    SHA1

    528667c07357ac0dae496df884f043daf57fa6b8

    SHA256

    425e04fb6241712905062ae567f86261529a312af8aae47fa4f62f6f091dcd0b

    SHA512

    cb78b2b7694b4b3a026195adc580f4948269d9f0dbdd587d17ac2dc710028a11d92f6bbd371cb775997113248c7df44901af77992cb3ea4ad97194078a7d3488

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7488988.exe
    Filesize

    615KB

    MD5

    4ada1f61d444846dc64af87ad74848aa

    SHA1

    0c6421a9709986d389cfd1979639297757861c19

    SHA256

    120e9be99d58e5ed0d50f90086b485040c6ed12c86f851132f9aa40ffd49b9b8

    SHA512

    ee9f15aa2926e2f5b0c498b2d57999369641133ea5231d2f55640709dc1bbc4fff665ca0c136ac701f161b1736bf760833414da8ac4554411f8317364d5b1dbf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7488988.exe
    Filesize

    615KB

    MD5

    4ada1f61d444846dc64af87ad74848aa

    SHA1

    0c6421a9709986d389cfd1979639297757861c19

    SHA256

    120e9be99d58e5ed0d50f90086b485040c6ed12c86f851132f9aa40ffd49b9b8

    SHA512

    ee9f15aa2926e2f5b0c498b2d57999369641133ea5231d2f55640709dc1bbc4fff665ca0c136ac701f161b1736bf760833414da8ac4554411f8317364d5b1dbf

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3184100.exe
    Filesize

    344KB

    MD5

    b693865b782dd97ac141f3d681d291b4

    SHA1

    4d62f2e09af68cb607dc70a137e49dc264d508ac

    SHA256

    6d907a22ec5a7e9871ecb663588f8add6e147ebee4c1a7c92adf7934301ce961

    SHA512

    c3363d089ea0cad2be9f5cd87006729d4c20ef168788a1ae67da0ae2ef752bbedc51f5dda13119846ff59840b5a8e18aa546bff9ddc80d0e307b3470ca4dff08

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3184100.exe
    Filesize

    344KB

    MD5

    b693865b782dd97ac141f3d681d291b4

    SHA1

    4d62f2e09af68cb607dc70a137e49dc264d508ac

    SHA256

    6d907a22ec5a7e9871ecb663588f8add6e147ebee4c1a7c92adf7934301ce961

    SHA512

    c3363d089ea0cad2be9f5cd87006729d4c20ef168788a1ae67da0ae2ef752bbedc51f5dda13119846ff59840b5a8e18aa546bff9ddc80d0e307b3470ca4dff08

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0287975.exe
    Filesize

    227KB

    MD5

    e1c3b79cb50dd6bc2b1fbea641e132d7

    SHA1

    cee9d34e4425b804ea0ebc65098316411024b314

    SHA256

    76c7bb30337645011910043623b8be9a11949618e05a42b14ebded017ee05076

    SHA512

    367cb2211759dca8ad5ae5c4476134e169000f508d12bb3d473cc6ce5bece1fabf693fd6536cc39bb4177c7378e43f755501a4a62442ee282c383da6c7616ffd

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0287975.exe
    Filesize

    227KB

    MD5

    e1c3b79cb50dd6bc2b1fbea641e132d7

    SHA1

    cee9d34e4425b804ea0ebc65098316411024b314

    SHA256

    76c7bb30337645011910043623b8be9a11949618e05a42b14ebded017ee05076

    SHA512

    367cb2211759dca8ad5ae5c4476134e169000f508d12bb3d473cc6ce5bece1fabf693fd6536cc39bb4177c7378e43f755501a4a62442ee282c383da6c7616ffd

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0287975.exe
    Filesize

    227KB

    MD5

    e1c3b79cb50dd6bc2b1fbea641e132d7

    SHA1

    cee9d34e4425b804ea0ebc65098316411024b314

    SHA256

    76c7bb30337645011910043623b8be9a11949618e05a42b14ebded017ee05076

    SHA512

    367cb2211759dca8ad5ae5c4476134e169000f508d12bb3d473cc6ce5bece1fabf693fd6536cc39bb4177c7378e43f755501a4a62442ee282c383da6c7616ffd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5255812.exe
    Filesize

    980KB

    MD5

    cfb4f116f334220b7c56943971dc817d

    SHA1

    ce871aa51d3fa5d50a3281e60135c3e4e7556355

    SHA256

    854f04fb64c7be53cb848ccc1557b902b556d7be91382ad7379a5ff5dd06d615

    SHA512

    26f3ddcb5c58148e188c0cee44af38550d3bab592ec745c72b7039bc16d81004e5a2cf5c84ad4c17bc62132174600b774e06c72920a23068df5f853ee9984e38

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5255812.exe
    Filesize

    980KB

    MD5

    cfb4f116f334220b7c56943971dc817d

    SHA1

    ce871aa51d3fa5d50a3281e60135c3e4e7556355

    SHA256

    854f04fb64c7be53cb848ccc1557b902b556d7be91382ad7379a5ff5dd06d615

    SHA512

    26f3ddcb5c58148e188c0cee44af38550d3bab592ec745c72b7039bc16d81004e5a2cf5c84ad4c17bc62132174600b774e06c72920a23068df5f853ee9984e38

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9370989.exe
    Filesize

    798KB

    MD5

    10c1b489d010266b3a73cdd8f4dfce26

    SHA1

    528667c07357ac0dae496df884f043daf57fa6b8

    SHA256

    425e04fb6241712905062ae567f86261529a312af8aae47fa4f62f6f091dcd0b

    SHA512

    cb78b2b7694b4b3a026195adc580f4948269d9f0dbdd587d17ac2dc710028a11d92f6bbd371cb775997113248c7df44901af77992cb3ea4ad97194078a7d3488

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9370989.exe
    Filesize

    798KB

    MD5

    10c1b489d010266b3a73cdd8f4dfce26

    SHA1

    528667c07357ac0dae496df884f043daf57fa6b8

    SHA256

    425e04fb6241712905062ae567f86261529a312af8aae47fa4f62f6f091dcd0b

    SHA512

    cb78b2b7694b4b3a026195adc580f4948269d9f0dbdd587d17ac2dc710028a11d92f6bbd371cb775997113248c7df44901af77992cb3ea4ad97194078a7d3488

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7488988.exe
    Filesize

    615KB

    MD5

    4ada1f61d444846dc64af87ad74848aa

    SHA1

    0c6421a9709986d389cfd1979639297757861c19

    SHA256

    120e9be99d58e5ed0d50f90086b485040c6ed12c86f851132f9aa40ffd49b9b8

    SHA512

    ee9f15aa2926e2f5b0c498b2d57999369641133ea5231d2f55640709dc1bbc4fff665ca0c136ac701f161b1736bf760833414da8ac4554411f8317364d5b1dbf

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7488988.exe
    Filesize

    615KB

    MD5

    4ada1f61d444846dc64af87ad74848aa

    SHA1

    0c6421a9709986d389cfd1979639297757861c19

    SHA256

    120e9be99d58e5ed0d50f90086b485040c6ed12c86f851132f9aa40ffd49b9b8

    SHA512

    ee9f15aa2926e2f5b0c498b2d57999369641133ea5231d2f55640709dc1bbc4fff665ca0c136ac701f161b1736bf760833414da8ac4554411f8317364d5b1dbf

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z3184100.exe
    Filesize

    344KB

    MD5

    b693865b782dd97ac141f3d681d291b4

    SHA1

    4d62f2e09af68cb607dc70a137e49dc264d508ac

    SHA256

    6d907a22ec5a7e9871ecb663588f8add6e147ebee4c1a7c92adf7934301ce961

    SHA512

    c3363d089ea0cad2be9f5cd87006729d4c20ef168788a1ae67da0ae2ef752bbedc51f5dda13119846ff59840b5a8e18aa546bff9ddc80d0e307b3470ca4dff08

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z3184100.exe
    Filesize

    344KB

    MD5

    b693865b782dd97ac141f3d681d291b4

    SHA1

    4d62f2e09af68cb607dc70a137e49dc264d508ac

    SHA256

    6d907a22ec5a7e9871ecb663588f8add6e147ebee4c1a7c92adf7934301ce961

    SHA512

    c3363d089ea0cad2be9f5cd87006729d4c20ef168788a1ae67da0ae2ef752bbedc51f5dda13119846ff59840b5a8e18aa546bff9ddc80d0e307b3470ca4dff08

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0287975.exe
    Filesize

    227KB

    MD5

    e1c3b79cb50dd6bc2b1fbea641e132d7

    SHA1

    cee9d34e4425b804ea0ebc65098316411024b314

    SHA256

    76c7bb30337645011910043623b8be9a11949618e05a42b14ebded017ee05076

    SHA512

    367cb2211759dca8ad5ae5c4476134e169000f508d12bb3d473cc6ce5bece1fabf693fd6536cc39bb4177c7378e43f755501a4a62442ee282c383da6c7616ffd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0287975.exe
    Filesize

    227KB

    MD5

    e1c3b79cb50dd6bc2b1fbea641e132d7

    SHA1

    cee9d34e4425b804ea0ebc65098316411024b314

    SHA256

    76c7bb30337645011910043623b8be9a11949618e05a42b14ebded017ee05076

    SHA512

    367cb2211759dca8ad5ae5c4476134e169000f508d12bb3d473cc6ce5bece1fabf693fd6536cc39bb4177c7378e43f755501a4a62442ee282c383da6c7616ffd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0287975.exe
    Filesize

    227KB

    MD5

    e1c3b79cb50dd6bc2b1fbea641e132d7

    SHA1

    cee9d34e4425b804ea0ebc65098316411024b314

    SHA256

    76c7bb30337645011910043623b8be9a11949618e05a42b14ebded017ee05076

    SHA512

    367cb2211759dca8ad5ae5c4476134e169000f508d12bb3d473cc6ce5bece1fabf693fd6536cc39bb4177c7378e43f755501a4a62442ee282c383da6c7616ffd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0287975.exe
    Filesize

    227KB

    MD5

    e1c3b79cb50dd6bc2b1fbea641e132d7

    SHA1

    cee9d34e4425b804ea0ebc65098316411024b314

    SHA256

    76c7bb30337645011910043623b8be9a11949618e05a42b14ebded017ee05076

    SHA512

    367cb2211759dca8ad5ae5c4476134e169000f508d12bb3d473cc6ce5bece1fabf693fd6536cc39bb4177c7378e43f755501a4a62442ee282c383da6c7616ffd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0287975.exe
    Filesize

    227KB

    MD5

    e1c3b79cb50dd6bc2b1fbea641e132d7

    SHA1

    cee9d34e4425b804ea0ebc65098316411024b314

    SHA256

    76c7bb30337645011910043623b8be9a11949618e05a42b14ebded017ee05076

    SHA512

    367cb2211759dca8ad5ae5c4476134e169000f508d12bb3d473cc6ce5bece1fabf693fd6536cc39bb4177c7378e43f755501a4a62442ee282c383da6c7616ffd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0287975.exe
    Filesize

    227KB

    MD5

    e1c3b79cb50dd6bc2b1fbea641e132d7

    SHA1

    cee9d34e4425b804ea0ebc65098316411024b314

    SHA256

    76c7bb30337645011910043623b8be9a11949618e05a42b14ebded017ee05076

    SHA512

    367cb2211759dca8ad5ae5c4476134e169000f508d12bb3d473cc6ce5bece1fabf693fd6536cc39bb4177c7378e43f755501a4a62442ee282c383da6c7616ffd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0287975.exe
    Filesize

    227KB

    MD5

    e1c3b79cb50dd6bc2b1fbea641e132d7

    SHA1

    cee9d34e4425b804ea0ebc65098316411024b314

    SHA256

    76c7bb30337645011910043623b8be9a11949618e05a42b14ebded017ee05076

    SHA512

    367cb2211759dca8ad5ae5c4476134e169000f508d12bb3d473cc6ce5bece1fabf693fd6536cc39bb4177c7378e43f755501a4a62442ee282c383da6c7616ffd

  • memory/3068-53-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/3068-54-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/3068-55-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/3068-56-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/3068-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/3068-58-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/3068-60-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/3068-62-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB