Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 06:06

General

  • Target

    70f3e3111eeac71b52843f25ac554e7124831a73aa9e9574c30380d652e49ae3_JC.exe

  • Size

    1.0MB

  • MD5

    fa558d14f9eedd33e5629bee81631a4e

  • SHA1

    ca41bfac3fdcbfd25577ceeee33e38d15277a046

  • SHA256

    70f3e3111eeac71b52843f25ac554e7124831a73aa9e9574c30380d652e49ae3

  • SHA512

    3e91c426711a824b082720b97f8cc1dbfae8664d3b43a4b44f090999b2794788946c49f0c5f1fd5f24ee5b139e505521cafd4cabb9473d228fecfe5525ac6f6f

  • SSDEEP

    24576:CyH5/br4cNiAYnpyO3F4qflx2KlDumGmfcHWb:pH9br4pAYnkWlgKlsHW

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70f3e3111eeac71b52843f25ac554e7124831a73aa9e9574c30380d652e49ae3_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\70f3e3111eeac71b52843f25ac554e7124831a73aa9e9574c30380d652e49ae3_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0303615.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0303615.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:796
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6539507.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6539507.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1824
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4858403.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4858403.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1944
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1865370.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1865370.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2696
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9879363.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9879363.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2836
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2784
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0303615.exe
    Filesize

    961KB

    MD5

    ef237b4470ac450199cd221c1abe74cf

    SHA1

    9d8c208c03b7f3451ae0f4536f6d987b38f050ad

    SHA256

    8978802596ddded90cb42149122ef5a26c411ce2371ef12364b7a95858b6eb7a

    SHA512

    f9b53e508ab831d01ff8037e7f50c2a2bf3b09e513b8a2889d926c99e306acad95ad21b60b5322977e0f34687d550cf1c1af74768d07b32c30ad242fde6b4282

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0303615.exe
    Filesize

    961KB

    MD5

    ef237b4470ac450199cd221c1abe74cf

    SHA1

    9d8c208c03b7f3451ae0f4536f6d987b38f050ad

    SHA256

    8978802596ddded90cb42149122ef5a26c411ce2371ef12364b7a95858b6eb7a

    SHA512

    f9b53e508ab831d01ff8037e7f50c2a2bf3b09e513b8a2889d926c99e306acad95ad21b60b5322977e0f34687d550cf1c1af74768d07b32c30ad242fde6b4282

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6539507.exe
    Filesize

    778KB

    MD5

    bb6435a9e7eb8f1df87f464061992643

    SHA1

    2879809e16e2c43c3ad76dc6ea274ef378c8743c

    SHA256

    2e8086410c415b8e29eb43b4849e6475193e18f31fbb0def73a117d6eb70c488

    SHA512

    cfbc032b65195e772385490a3c23acab934dd9edeb78f1fed812f7b8a907cf2561c664923b4bc19e8d465d865a67a0b949900c06cb1f655cd571e87cadf31673

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6539507.exe
    Filesize

    778KB

    MD5

    bb6435a9e7eb8f1df87f464061992643

    SHA1

    2879809e16e2c43c3ad76dc6ea274ef378c8743c

    SHA256

    2e8086410c415b8e29eb43b4849e6475193e18f31fbb0def73a117d6eb70c488

    SHA512

    cfbc032b65195e772385490a3c23acab934dd9edeb78f1fed812f7b8a907cf2561c664923b4bc19e8d465d865a67a0b949900c06cb1f655cd571e87cadf31673

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4858403.exe
    Filesize

    596KB

    MD5

    2a226ab6e2ee19350a0b9435ffaca4dd

    SHA1

    77d6f43075415b641be13e44ae60920d14387e33

    SHA256

    59ac1bca9b8264c440361de03bb549080972be65ac7c1d594b96eee15778ac38

    SHA512

    d471d2afbb3da73e2784549cb2999254d10c160fc2b07160c196dcd016e287ddd749ce714c4b7484b17a0cef527ca640f75a4ad3ee7c51947882b379880c5fe7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4858403.exe
    Filesize

    596KB

    MD5

    2a226ab6e2ee19350a0b9435ffaca4dd

    SHA1

    77d6f43075415b641be13e44ae60920d14387e33

    SHA256

    59ac1bca9b8264c440361de03bb549080972be65ac7c1d594b96eee15778ac38

    SHA512

    d471d2afbb3da73e2784549cb2999254d10c160fc2b07160c196dcd016e287ddd749ce714c4b7484b17a0cef527ca640f75a4ad3ee7c51947882b379880c5fe7

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1865370.exe
    Filesize

    336KB

    MD5

    c6f0b08e55d4d7c72e311128f5bb67e9

    SHA1

    159314030ce3f7bd725e5f2c4ff85d52e4c401b9

    SHA256

    19f8d9ed5d96f8763bcde52d3f657e5c4185ae18ed7ff91c538047b079c774a6

    SHA512

    ee6b46f08cee51e142aeffddbd6f6d64537f3dcd10ac70a8cf3d25a7e6abb8cc483dc8300fd867e6bdb88f44b3f481c8f8df33ee82ee017f3b48dc6e6217f7ab

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1865370.exe
    Filesize

    336KB

    MD5

    c6f0b08e55d4d7c72e311128f5bb67e9

    SHA1

    159314030ce3f7bd725e5f2c4ff85d52e4c401b9

    SHA256

    19f8d9ed5d96f8763bcde52d3f657e5c4185ae18ed7ff91c538047b079c774a6

    SHA512

    ee6b46f08cee51e142aeffddbd6f6d64537f3dcd10ac70a8cf3d25a7e6abb8cc483dc8300fd867e6bdb88f44b3f481c8f8df33ee82ee017f3b48dc6e6217f7ab

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9879363.exe
    Filesize

    221KB

    MD5

    a10acfc02d8adfa63df54be90ed59bd6

    SHA1

    9d0412c341ebf5a2e7b04e507dace3df7d241f84

    SHA256

    2a77bb3958c296cb57e2662ce0ed3e8ee6dc50c1e193e5f4d4b71a3e31b8d707

    SHA512

    751e5f6d9f6a675e84714ddee8898c48cb7918d27483b8fdf857fc4aef3582744844925cbe09c2835332e898e7548d603ffc203c340422a45da27fe501b2d329

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9879363.exe
    Filesize

    221KB

    MD5

    a10acfc02d8adfa63df54be90ed59bd6

    SHA1

    9d0412c341ebf5a2e7b04e507dace3df7d241f84

    SHA256

    2a77bb3958c296cb57e2662ce0ed3e8ee6dc50c1e193e5f4d4b71a3e31b8d707

    SHA512

    751e5f6d9f6a675e84714ddee8898c48cb7918d27483b8fdf857fc4aef3582744844925cbe09c2835332e898e7548d603ffc203c340422a45da27fe501b2d329

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9879363.exe
    Filesize

    221KB

    MD5

    a10acfc02d8adfa63df54be90ed59bd6

    SHA1

    9d0412c341ebf5a2e7b04e507dace3df7d241f84

    SHA256

    2a77bb3958c296cb57e2662ce0ed3e8ee6dc50c1e193e5f4d4b71a3e31b8d707

    SHA512

    751e5f6d9f6a675e84714ddee8898c48cb7918d27483b8fdf857fc4aef3582744844925cbe09c2835332e898e7548d603ffc203c340422a45da27fe501b2d329

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0303615.exe
    Filesize

    961KB

    MD5

    ef237b4470ac450199cd221c1abe74cf

    SHA1

    9d8c208c03b7f3451ae0f4536f6d987b38f050ad

    SHA256

    8978802596ddded90cb42149122ef5a26c411ce2371ef12364b7a95858b6eb7a

    SHA512

    f9b53e508ab831d01ff8037e7f50c2a2bf3b09e513b8a2889d926c99e306acad95ad21b60b5322977e0f34687d550cf1c1af74768d07b32c30ad242fde6b4282

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0303615.exe
    Filesize

    961KB

    MD5

    ef237b4470ac450199cd221c1abe74cf

    SHA1

    9d8c208c03b7f3451ae0f4536f6d987b38f050ad

    SHA256

    8978802596ddded90cb42149122ef5a26c411ce2371ef12364b7a95858b6eb7a

    SHA512

    f9b53e508ab831d01ff8037e7f50c2a2bf3b09e513b8a2889d926c99e306acad95ad21b60b5322977e0f34687d550cf1c1af74768d07b32c30ad242fde6b4282

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6539507.exe
    Filesize

    778KB

    MD5

    bb6435a9e7eb8f1df87f464061992643

    SHA1

    2879809e16e2c43c3ad76dc6ea274ef378c8743c

    SHA256

    2e8086410c415b8e29eb43b4849e6475193e18f31fbb0def73a117d6eb70c488

    SHA512

    cfbc032b65195e772385490a3c23acab934dd9edeb78f1fed812f7b8a907cf2561c664923b4bc19e8d465d865a67a0b949900c06cb1f655cd571e87cadf31673

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6539507.exe
    Filesize

    778KB

    MD5

    bb6435a9e7eb8f1df87f464061992643

    SHA1

    2879809e16e2c43c3ad76dc6ea274ef378c8743c

    SHA256

    2e8086410c415b8e29eb43b4849e6475193e18f31fbb0def73a117d6eb70c488

    SHA512

    cfbc032b65195e772385490a3c23acab934dd9edeb78f1fed812f7b8a907cf2561c664923b4bc19e8d465d865a67a0b949900c06cb1f655cd571e87cadf31673

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4858403.exe
    Filesize

    596KB

    MD5

    2a226ab6e2ee19350a0b9435ffaca4dd

    SHA1

    77d6f43075415b641be13e44ae60920d14387e33

    SHA256

    59ac1bca9b8264c440361de03bb549080972be65ac7c1d594b96eee15778ac38

    SHA512

    d471d2afbb3da73e2784549cb2999254d10c160fc2b07160c196dcd016e287ddd749ce714c4b7484b17a0cef527ca640f75a4ad3ee7c51947882b379880c5fe7

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4858403.exe
    Filesize

    596KB

    MD5

    2a226ab6e2ee19350a0b9435ffaca4dd

    SHA1

    77d6f43075415b641be13e44ae60920d14387e33

    SHA256

    59ac1bca9b8264c440361de03bb549080972be65ac7c1d594b96eee15778ac38

    SHA512

    d471d2afbb3da73e2784549cb2999254d10c160fc2b07160c196dcd016e287ddd749ce714c4b7484b17a0cef527ca640f75a4ad3ee7c51947882b379880c5fe7

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z1865370.exe
    Filesize

    336KB

    MD5

    c6f0b08e55d4d7c72e311128f5bb67e9

    SHA1

    159314030ce3f7bd725e5f2c4ff85d52e4c401b9

    SHA256

    19f8d9ed5d96f8763bcde52d3f657e5c4185ae18ed7ff91c538047b079c774a6

    SHA512

    ee6b46f08cee51e142aeffddbd6f6d64537f3dcd10ac70a8cf3d25a7e6abb8cc483dc8300fd867e6bdb88f44b3f481c8f8df33ee82ee017f3b48dc6e6217f7ab

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z1865370.exe
    Filesize

    336KB

    MD5

    c6f0b08e55d4d7c72e311128f5bb67e9

    SHA1

    159314030ce3f7bd725e5f2c4ff85d52e4c401b9

    SHA256

    19f8d9ed5d96f8763bcde52d3f657e5c4185ae18ed7ff91c538047b079c774a6

    SHA512

    ee6b46f08cee51e142aeffddbd6f6d64537f3dcd10ac70a8cf3d25a7e6abb8cc483dc8300fd867e6bdb88f44b3f481c8f8df33ee82ee017f3b48dc6e6217f7ab

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9879363.exe
    Filesize

    221KB

    MD5

    a10acfc02d8adfa63df54be90ed59bd6

    SHA1

    9d0412c341ebf5a2e7b04e507dace3df7d241f84

    SHA256

    2a77bb3958c296cb57e2662ce0ed3e8ee6dc50c1e193e5f4d4b71a3e31b8d707

    SHA512

    751e5f6d9f6a675e84714ddee8898c48cb7918d27483b8fdf857fc4aef3582744844925cbe09c2835332e898e7548d603ffc203c340422a45da27fe501b2d329

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9879363.exe
    Filesize

    221KB

    MD5

    a10acfc02d8adfa63df54be90ed59bd6

    SHA1

    9d0412c341ebf5a2e7b04e507dace3df7d241f84

    SHA256

    2a77bb3958c296cb57e2662ce0ed3e8ee6dc50c1e193e5f4d4b71a3e31b8d707

    SHA512

    751e5f6d9f6a675e84714ddee8898c48cb7918d27483b8fdf857fc4aef3582744844925cbe09c2835332e898e7548d603ffc203c340422a45da27fe501b2d329

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9879363.exe
    Filesize

    221KB

    MD5

    a10acfc02d8adfa63df54be90ed59bd6

    SHA1

    9d0412c341ebf5a2e7b04e507dace3df7d241f84

    SHA256

    2a77bb3958c296cb57e2662ce0ed3e8ee6dc50c1e193e5f4d4b71a3e31b8d707

    SHA512

    751e5f6d9f6a675e84714ddee8898c48cb7918d27483b8fdf857fc4aef3582744844925cbe09c2835332e898e7548d603ffc203c340422a45da27fe501b2d329

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9879363.exe
    Filesize

    221KB

    MD5

    a10acfc02d8adfa63df54be90ed59bd6

    SHA1

    9d0412c341ebf5a2e7b04e507dace3df7d241f84

    SHA256

    2a77bb3958c296cb57e2662ce0ed3e8ee6dc50c1e193e5f4d4b71a3e31b8d707

    SHA512

    751e5f6d9f6a675e84714ddee8898c48cb7918d27483b8fdf857fc4aef3582744844925cbe09c2835332e898e7548d603ffc203c340422a45da27fe501b2d329

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9879363.exe
    Filesize

    221KB

    MD5

    a10acfc02d8adfa63df54be90ed59bd6

    SHA1

    9d0412c341ebf5a2e7b04e507dace3df7d241f84

    SHA256

    2a77bb3958c296cb57e2662ce0ed3e8ee6dc50c1e193e5f4d4b71a3e31b8d707

    SHA512

    751e5f6d9f6a675e84714ddee8898c48cb7918d27483b8fdf857fc4aef3582744844925cbe09c2835332e898e7548d603ffc203c340422a45da27fe501b2d329

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9879363.exe
    Filesize

    221KB

    MD5

    a10acfc02d8adfa63df54be90ed59bd6

    SHA1

    9d0412c341ebf5a2e7b04e507dace3df7d241f84

    SHA256

    2a77bb3958c296cb57e2662ce0ed3e8ee6dc50c1e193e5f4d4b71a3e31b8d707

    SHA512

    751e5f6d9f6a675e84714ddee8898c48cb7918d27483b8fdf857fc4aef3582744844925cbe09c2835332e898e7548d603ffc203c340422a45da27fe501b2d329

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9879363.exe
    Filesize

    221KB

    MD5

    a10acfc02d8adfa63df54be90ed59bd6

    SHA1

    9d0412c341ebf5a2e7b04e507dace3df7d241f84

    SHA256

    2a77bb3958c296cb57e2662ce0ed3e8ee6dc50c1e193e5f4d4b71a3e31b8d707

    SHA512

    751e5f6d9f6a675e84714ddee8898c48cb7918d27483b8fdf857fc4aef3582744844925cbe09c2835332e898e7548d603ffc203c340422a45da27fe501b2d329

  • memory/2784-54-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2784-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2784-60-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2784-62-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2784-58-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2784-53-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2784-56-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2784-55-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB