Analysis

  • max time kernel
    117s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 06:12

General

  • Target

    a6184c9199dbb3af92d8e8a8ab98f972316104e1ad2cb4c5f8108a6ac6b6a95b.exe

  • Size

    1.1MB

  • MD5

    31b3ab9a4fa33fa9ce8b5682f0c0b45d

  • SHA1

    e6641583051afd1e9af9e4b8339fd888b9a3fe40

  • SHA256

    a6184c9199dbb3af92d8e8a8ab98f972316104e1ad2cb4c5f8108a6ac6b6a95b

  • SHA512

    41dec9e411733a610746e54b98525cf512a0c7423ff53d1dafe540b973ea157f3070c901481a404208721c87e19c1f5a65503e322a172e4cd8019df2bf24f0e6

  • SSDEEP

    24576:+yNNiBKRv4WC1PmlSLMRoeB/8iesCV21r4YfxclU:NbFRx0GB/UfV211fxc

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6184c9199dbb3af92d8e8a8ab98f972316104e1ad2cb4c5f8108a6ac6b6a95b.exe
    "C:\Users\Admin\AppData\Local\Temp\a6184c9199dbb3af92d8e8a8ab98f972316104e1ad2cb4c5f8108a6ac6b6a95b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7371582.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7371582.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0775997.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0775997.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2872
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4426695.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4426695.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2964
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8508354.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8508354.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2736
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1906502.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1906502.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2596
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2448
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 276
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7371582.exe
    Filesize

    979KB

    MD5

    2ae85e1b5432019cc484cb9174fee127

    SHA1

    20196d5c45b9d422e5ca8f6d833c93e87e301933

    SHA256

    8001d5e07da7fcc52578e468f70a0e322a9995daf51db83dd57c01ea09c8fc24

    SHA512

    48104c11c275f0b730051be60474672ecf9fbe99b5b8c56ffcce92b0d358610d8a1f73edcf28edf66f73d37f74f67ff71ecbde720738b45369f7607170eec70a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7371582.exe
    Filesize

    979KB

    MD5

    2ae85e1b5432019cc484cb9174fee127

    SHA1

    20196d5c45b9d422e5ca8f6d833c93e87e301933

    SHA256

    8001d5e07da7fcc52578e468f70a0e322a9995daf51db83dd57c01ea09c8fc24

    SHA512

    48104c11c275f0b730051be60474672ecf9fbe99b5b8c56ffcce92b0d358610d8a1f73edcf28edf66f73d37f74f67ff71ecbde720738b45369f7607170eec70a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0775997.exe
    Filesize

    800KB

    MD5

    31e9cf8c9042ebd5aab21d6665b57ca0

    SHA1

    de0171f5e3f7cccf4b626c560fa879cba52c4d7a

    SHA256

    ddc842a06e73b1c6c63cf2a0563559347732fa4d2652f44b75a7e5748503a60e

    SHA512

    85754ddd6a9db2656cae1560baff47fba2d2b4d41da883842e7b051f48f135366a9f736d7620d1e4d0d556c11fd43422f0f81ca2d8e11172e12e3f3babd15c20

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0775997.exe
    Filesize

    800KB

    MD5

    31e9cf8c9042ebd5aab21d6665b57ca0

    SHA1

    de0171f5e3f7cccf4b626c560fa879cba52c4d7a

    SHA256

    ddc842a06e73b1c6c63cf2a0563559347732fa4d2652f44b75a7e5748503a60e

    SHA512

    85754ddd6a9db2656cae1560baff47fba2d2b4d41da883842e7b051f48f135366a9f736d7620d1e4d0d556c11fd43422f0f81ca2d8e11172e12e3f3babd15c20

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4426695.exe
    Filesize

    617KB

    MD5

    f9b2aebbf39ba5e2aba3e4b11285f55b

    SHA1

    0708e6f798cc10d9f49233e653389be9d69baa89

    SHA256

    e6bde5fb0f7063ffa28d9fb4ee48ae1f36477580cceb29369fed7138301bc766

    SHA512

    960b1705e9a29a7db0d54d37fe4e2d100f4e50fa2b8902b5890b51fb368c38fd216bc1b9344ff42618b7547d37cf1a0cf76ff00007c0ee02fb13002b39728190

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4426695.exe
    Filesize

    617KB

    MD5

    f9b2aebbf39ba5e2aba3e4b11285f55b

    SHA1

    0708e6f798cc10d9f49233e653389be9d69baa89

    SHA256

    e6bde5fb0f7063ffa28d9fb4ee48ae1f36477580cceb29369fed7138301bc766

    SHA512

    960b1705e9a29a7db0d54d37fe4e2d100f4e50fa2b8902b5890b51fb368c38fd216bc1b9344ff42618b7547d37cf1a0cf76ff00007c0ee02fb13002b39728190

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8508354.exe
    Filesize

    346KB

    MD5

    1bfa86e5c0ce1929e85bc2859bdc2b85

    SHA1

    063304813706e1d2f267c23143f313789728a5f4

    SHA256

    be19e28c08f761468370f19211623b9a407625405bd3face7b5bcabc1895ab92

    SHA512

    9fecd25947b096cb37f31831150b72739c54c1c385812a46aed30355cd28584d393e094b7b1323c1062a8f3ec68009800d90d879c1c10799393f7a575208ab41

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8508354.exe
    Filesize

    346KB

    MD5

    1bfa86e5c0ce1929e85bc2859bdc2b85

    SHA1

    063304813706e1d2f267c23143f313789728a5f4

    SHA256

    be19e28c08f761468370f19211623b9a407625405bd3face7b5bcabc1895ab92

    SHA512

    9fecd25947b096cb37f31831150b72739c54c1c385812a46aed30355cd28584d393e094b7b1323c1062a8f3ec68009800d90d879c1c10799393f7a575208ab41

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1906502.exe
    Filesize

    227KB

    MD5

    8326167839f72916e86b87015fbece74

    SHA1

    99ea86e63980a69751a3fd2b2a88cca4493b2210

    SHA256

    b3414655d0fd3c83755079adde0cfad6baf6c012f989466fae961801fca92a96

    SHA512

    edb27ed0aae009707313b9f6b2a90b167b982fd09db32d2de2f9013039fbde79594b78b58240ef7797d1b74f1cfeab7717e836010420763bdbff68685649a45c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1906502.exe
    Filesize

    227KB

    MD5

    8326167839f72916e86b87015fbece74

    SHA1

    99ea86e63980a69751a3fd2b2a88cca4493b2210

    SHA256

    b3414655d0fd3c83755079adde0cfad6baf6c012f989466fae961801fca92a96

    SHA512

    edb27ed0aae009707313b9f6b2a90b167b982fd09db32d2de2f9013039fbde79594b78b58240ef7797d1b74f1cfeab7717e836010420763bdbff68685649a45c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1906502.exe
    Filesize

    227KB

    MD5

    8326167839f72916e86b87015fbece74

    SHA1

    99ea86e63980a69751a3fd2b2a88cca4493b2210

    SHA256

    b3414655d0fd3c83755079adde0cfad6baf6c012f989466fae961801fca92a96

    SHA512

    edb27ed0aae009707313b9f6b2a90b167b982fd09db32d2de2f9013039fbde79594b78b58240ef7797d1b74f1cfeab7717e836010420763bdbff68685649a45c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7371582.exe
    Filesize

    979KB

    MD5

    2ae85e1b5432019cc484cb9174fee127

    SHA1

    20196d5c45b9d422e5ca8f6d833c93e87e301933

    SHA256

    8001d5e07da7fcc52578e468f70a0e322a9995daf51db83dd57c01ea09c8fc24

    SHA512

    48104c11c275f0b730051be60474672ecf9fbe99b5b8c56ffcce92b0d358610d8a1f73edcf28edf66f73d37f74f67ff71ecbde720738b45369f7607170eec70a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7371582.exe
    Filesize

    979KB

    MD5

    2ae85e1b5432019cc484cb9174fee127

    SHA1

    20196d5c45b9d422e5ca8f6d833c93e87e301933

    SHA256

    8001d5e07da7fcc52578e468f70a0e322a9995daf51db83dd57c01ea09c8fc24

    SHA512

    48104c11c275f0b730051be60474672ecf9fbe99b5b8c56ffcce92b0d358610d8a1f73edcf28edf66f73d37f74f67ff71ecbde720738b45369f7607170eec70a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z0775997.exe
    Filesize

    800KB

    MD5

    31e9cf8c9042ebd5aab21d6665b57ca0

    SHA1

    de0171f5e3f7cccf4b626c560fa879cba52c4d7a

    SHA256

    ddc842a06e73b1c6c63cf2a0563559347732fa4d2652f44b75a7e5748503a60e

    SHA512

    85754ddd6a9db2656cae1560baff47fba2d2b4d41da883842e7b051f48f135366a9f736d7620d1e4d0d556c11fd43422f0f81ca2d8e11172e12e3f3babd15c20

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z0775997.exe
    Filesize

    800KB

    MD5

    31e9cf8c9042ebd5aab21d6665b57ca0

    SHA1

    de0171f5e3f7cccf4b626c560fa879cba52c4d7a

    SHA256

    ddc842a06e73b1c6c63cf2a0563559347732fa4d2652f44b75a7e5748503a60e

    SHA512

    85754ddd6a9db2656cae1560baff47fba2d2b4d41da883842e7b051f48f135366a9f736d7620d1e4d0d556c11fd43422f0f81ca2d8e11172e12e3f3babd15c20

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4426695.exe
    Filesize

    617KB

    MD5

    f9b2aebbf39ba5e2aba3e4b11285f55b

    SHA1

    0708e6f798cc10d9f49233e653389be9d69baa89

    SHA256

    e6bde5fb0f7063ffa28d9fb4ee48ae1f36477580cceb29369fed7138301bc766

    SHA512

    960b1705e9a29a7db0d54d37fe4e2d100f4e50fa2b8902b5890b51fb368c38fd216bc1b9344ff42618b7547d37cf1a0cf76ff00007c0ee02fb13002b39728190

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4426695.exe
    Filesize

    617KB

    MD5

    f9b2aebbf39ba5e2aba3e4b11285f55b

    SHA1

    0708e6f798cc10d9f49233e653389be9d69baa89

    SHA256

    e6bde5fb0f7063ffa28d9fb4ee48ae1f36477580cceb29369fed7138301bc766

    SHA512

    960b1705e9a29a7db0d54d37fe4e2d100f4e50fa2b8902b5890b51fb368c38fd216bc1b9344ff42618b7547d37cf1a0cf76ff00007c0ee02fb13002b39728190

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8508354.exe
    Filesize

    346KB

    MD5

    1bfa86e5c0ce1929e85bc2859bdc2b85

    SHA1

    063304813706e1d2f267c23143f313789728a5f4

    SHA256

    be19e28c08f761468370f19211623b9a407625405bd3face7b5bcabc1895ab92

    SHA512

    9fecd25947b096cb37f31831150b72739c54c1c385812a46aed30355cd28584d393e094b7b1323c1062a8f3ec68009800d90d879c1c10799393f7a575208ab41

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8508354.exe
    Filesize

    346KB

    MD5

    1bfa86e5c0ce1929e85bc2859bdc2b85

    SHA1

    063304813706e1d2f267c23143f313789728a5f4

    SHA256

    be19e28c08f761468370f19211623b9a407625405bd3face7b5bcabc1895ab92

    SHA512

    9fecd25947b096cb37f31831150b72739c54c1c385812a46aed30355cd28584d393e094b7b1323c1062a8f3ec68009800d90d879c1c10799393f7a575208ab41

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1906502.exe
    Filesize

    227KB

    MD5

    8326167839f72916e86b87015fbece74

    SHA1

    99ea86e63980a69751a3fd2b2a88cca4493b2210

    SHA256

    b3414655d0fd3c83755079adde0cfad6baf6c012f989466fae961801fca92a96

    SHA512

    edb27ed0aae009707313b9f6b2a90b167b982fd09db32d2de2f9013039fbde79594b78b58240ef7797d1b74f1cfeab7717e836010420763bdbff68685649a45c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1906502.exe
    Filesize

    227KB

    MD5

    8326167839f72916e86b87015fbece74

    SHA1

    99ea86e63980a69751a3fd2b2a88cca4493b2210

    SHA256

    b3414655d0fd3c83755079adde0cfad6baf6c012f989466fae961801fca92a96

    SHA512

    edb27ed0aae009707313b9f6b2a90b167b982fd09db32d2de2f9013039fbde79594b78b58240ef7797d1b74f1cfeab7717e836010420763bdbff68685649a45c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1906502.exe
    Filesize

    227KB

    MD5

    8326167839f72916e86b87015fbece74

    SHA1

    99ea86e63980a69751a3fd2b2a88cca4493b2210

    SHA256

    b3414655d0fd3c83755079adde0cfad6baf6c012f989466fae961801fca92a96

    SHA512

    edb27ed0aae009707313b9f6b2a90b167b982fd09db32d2de2f9013039fbde79594b78b58240ef7797d1b74f1cfeab7717e836010420763bdbff68685649a45c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1906502.exe
    Filesize

    227KB

    MD5

    8326167839f72916e86b87015fbece74

    SHA1

    99ea86e63980a69751a3fd2b2a88cca4493b2210

    SHA256

    b3414655d0fd3c83755079adde0cfad6baf6c012f989466fae961801fca92a96

    SHA512

    edb27ed0aae009707313b9f6b2a90b167b982fd09db32d2de2f9013039fbde79594b78b58240ef7797d1b74f1cfeab7717e836010420763bdbff68685649a45c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1906502.exe
    Filesize

    227KB

    MD5

    8326167839f72916e86b87015fbece74

    SHA1

    99ea86e63980a69751a3fd2b2a88cca4493b2210

    SHA256

    b3414655d0fd3c83755079adde0cfad6baf6c012f989466fae961801fca92a96

    SHA512

    edb27ed0aae009707313b9f6b2a90b167b982fd09db32d2de2f9013039fbde79594b78b58240ef7797d1b74f1cfeab7717e836010420763bdbff68685649a45c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1906502.exe
    Filesize

    227KB

    MD5

    8326167839f72916e86b87015fbece74

    SHA1

    99ea86e63980a69751a3fd2b2a88cca4493b2210

    SHA256

    b3414655d0fd3c83755079adde0cfad6baf6c012f989466fae961801fca92a96

    SHA512

    edb27ed0aae009707313b9f6b2a90b167b982fd09db32d2de2f9013039fbde79594b78b58240ef7797d1b74f1cfeab7717e836010420763bdbff68685649a45c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1906502.exe
    Filesize

    227KB

    MD5

    8326167839f72916e86b87015fbece74

    SHA1

    99ea86e63980a69751a3fd2b2a88cca4493b2210

    SHA256

    b3414655d0fd3c83755079adde0cfad6baf6c012f989466fae961801fca92a96

    SHA512

    edb27ed0aae009707313b9f6b2a90b167b982fd09db32d2de2f9013039fbde79594b78b58240ef7797d1b74f1cfeab7717e836010420763bdbff68685649a45c

  • memory/2448-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2448-58-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2448-60-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2448-62-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2448-56-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2448-55-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2448-54-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2448-53-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB