Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 06:34 UTC

General

  • Target

    6b6086b4e3b3e7af21a651494d833aa67ccbd89a26e3ead33b3075df594c15a0.exe

  • Size

    1.0MB

  • MD5

    ff41d03ebbb66bdfeba5ec810834f3be

  • SHA1

    8222bfda7ae648829cdaa2574f7c404151980119

  • SHA256

    6b6086b4e3b3e7af21a651494d833aa67ccbd89a26e3ead33b3075df594c15a0

  • SHA512

    fb333d91db38e6f054093f6b4926dedab78ea1cefab7dd32cc1d73a76898b480d77b8c879f310bd3cf3b4875ee202ae7e554157b978ee23c1ba3064046257c1d

  • SSDEEP

    24576:hye04i7dL0C1nprViGLig0X9uNq63c4ohz:UfnuCPiL92qf4o

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b6086b4e3b3e7af21a651494d833aa67ccbd89a26e3ead33b3075df594c15a0.exe
    "C:\Users\Admin\AppData\Local\Temp\6b6086b4e3b3e7af21a651494d833aa67ccbd89a26e3ead33b3075df594c15a0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9959126.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9959126.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5624829.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5624829.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6788489.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6788489.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2744
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4109516.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4109516.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2640
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2720169.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2720169.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2320
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2632
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 276
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9959126.exe

    Filesize

    982KB

    MD5

    40f750f24f7bf89f701c68b417a938e4

    SHA1

    0c2a12a4995eb84989271ecd07b5d9c4767933ff

    SHA256

    193d2473eccade1eb50d5d21f1deaeee4b1b9106a79706b688ee7673ae01853e

    SHA512

    fbf13e9db610d58c8a7f7bff8cd8fe4f0e7f7a89231a8ce398b08b9347e79f5760c8902c4c69e4f5554e35cd35afe6320940be2e839f8083965544678d0d8612

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9959126.exe

    Filesize

    982KB

    MD5

    40f750f24f7bf89f701c68b417a938e4

    SHA1

    0c2a12a4995eb84989271ecd07b5d9c4767933ff

    SHA256

    193d2473eccade1eb50d5d21f1deaeee4b1b9106a79706b688ee7673ae01853e

    SHA512

    fbf13e9db610d58c8a7f7bff8cd8fe4f0e7f7a89231a8ce398b08b9347e79f5760c8902c4c69e4f5554e35cd35afe6320940be2e839f8083965544678d0d8612

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5624829.exe

    Filesize

    799KB

    MD5

    4dade1387cf49a22213ba98ef43f2275

    SHA1

    6e47e03da096739913da80038f3dae9513548ab7

    SHA256

    a12780c5d25d195bcbc07150e41f63b6e48850e7b3c3629fbbdf1f1487abada6

    SHA512

    ccec67afb5a0fbff3ae3b94901c80671be53f2ddf8cf21dcd4bc98d21ac7348a039b4378e4ca9f62450d6c9574a3f74ec9d070f9b64a9c1aba6e7f74b274cf3d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5624829.exe

    Filesize

    799KB

    MD5

    4dade1387cf49a22213ba98ef43f2275

    SHA1

    6e47e03da096739913da80038f3dae9513548ab7

    SHA256

    a12780c5d25d195bcbc07150e41f63b6e48850e7b3c3629fbbdf1f1487abada6

    SHA512

    ccec67afb5a0fbff3ae3b94901c80671be53f2ddf8cf21dcd4bc98d21ac7348a039b4378e4ca9f62450d6c9574a3f74ec9d070f9b64a9c1aba6e7f74b274cf3d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6788489.exe

    Filesize

    616KB

    MD5

    228e102c17fc89e9a8b6999247ce2f47

    SHA1

    fd1c3fb45c9e7d9189410bdd6dcfa088807c77f1

    SHA256

    2d351a9f34adc29a984028c5e809bc67f2ebae81c0590a946aa4229516ab2272

    SHA512

    c4ea12e594a9020d46e510cb24a36c39059dcce306c033739a75a9f3a76a38dbaa23d37216a56278438519499dc3352675a4dfec0bf5a6428d23d2a4060027e4

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6788489.exe

    Filesize

    616KB

    MD5

    228e102c17fc89e9a8b6999247ce2f47

    SHA1

    fd1c3fb45c9e7d9189410bdd6dcfa088807c77f1

    SHA256

    2d351a9f34adc29a984028c5e809bc67f2ebae81c0590a946aa4229516ab2272

    SHA512

    c4ea12e594a9020d46e510cb24a36c39059dcce306c033739a75a9f3a76a38dbaa23d37216a56278438519499dc3352675a4dfec0bf5a6428d23d2a4060027e4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4109516.exe

    Filesize

    346KB

    MD5

    c8b9a8eccf5032871d4240f8c9441e2c

    SHA1

    cfbaef3b51c5269af5f2541afbeaea9d1aec3ccb

    SHA256

    5335a003d121b67a03416ed15abb0c258643afdf04fe0d5c23823bd7f493b72e

    SHA512

    655116e521e7f535166ba7bf617ccce8dfb441767779d8390288c67256bc343400b1555c7aebc8ecb9dce6d90f6da3d7a4fc156dfaf80c8c6e4423c76bc0f01f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4109516.exe

    Filesize

    346KB

    MD5

    c8b9a8eccf5032871d4240f8c9441e2c

    SHA1

    cfbaef3b51c5269af5f2541afbeaea9d1aec3ccb

    SHA256

    5335a003d121b67a03416ed15abb0c258643afdf04fe0d5c23823bd7f493b72e

    SHA512

    655116e521e7f535166ba7bf617ccce8dfb441767779d8390288c67256bc343400b1555c7aebc8ecb9dce6d90f6da3d7a4fc156dfaf80c8c6e4423c76bc0f01f

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2720169.exe

    Filesize

    227KB

    MD5

    500ce1b80940b4932340a76b9c727775

    SHA1

    02337490e143c02ff32a8dd1833ee3a5b37c30ca

    SHA256

    49431636380c564955908f7472ddbdf46d7152f9b12d4ad08f83031668d85402

    SHA512

    9dbf022372c7fce6d05701e5f411f204789f8c63aa1e9302c19403caf56f83bfe43005cf12c032ca7fbfca0e1178264306db43579e786a227cde1e7f3291ae3b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2720169.exe

    Filesize

    227KB

    MD5

    500ce1b80940b4932340a76b9c727775

    SHA1

    02337490e143c02ff32a8dd1833ee3a5b37c30ca

    SHA256

    49431636380c564955908f7472ddbdf46d7152f9b12d4ad08f83031668d85402

    SHA512

    9dbf022372c7fce6d05701e5f411f204789f8c63aa1e9302c19403caf56f83bfe43005cf12c032ca7fbfca0e1178264306db43579e786a227cde1e7f3291ae3b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2720169.exe

    Filesize

    227KB

    MD5

    500ce1b80940b4932340a76b9c727775

    SHA1

    02337490e143c02ff32a8dd1833ee3a5b37c30ca

    SHA256

    49431636380c564955908f7472ddbdf46d7152f9b12d4ad08f83031668d85402

    SHA512

    9dbf022372c7fce6d05701e5f411f204789f8c63aa1e9302c19403caf56f83bfe43005cf12c032ca7fbfca0e1178264306db43579e786a227cde1e7f3291ae3b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9959126.exe

    Filesize

    982KB

    MD5

    40f750f24f7bf89f701c68b417a938e4

    SHA1

    0c2a12a4995eb84989271ecd07b5d9c4767933ff

    SHA256

    193d2473eccade1eb50d5d21f1deaeee4b1b9106a79706b688ee7673ae01853e

    SHA512

    fbf13e9db610d58c8a7f7bff8cd8fe4f0e7f7a89231a8ce398b08b9347e79f5760c8902c4c69e4f5554e35cd35afe6320940be2e839f8083965544678d0d8612

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9959126.exe

    Filesize

    982KB

    MD5

    40f750f24f7bf89f701c68b417a938e4

    SHA1

    0c2a12a4995eb84989271ecd07b5d9c4767933ff

    SHA256

    193d2473eccade1eb50d5d21f1deaeee4b1b9106a79706b688ee7673ae01853e

    SHA512

    fbf13e9db610d58c8a7f7bff8cd8fe4f0e7f7a89231a8ce398b08b9347e79f5760c8902c4c69e4f5554e35cd35afe6320940be2e839f8083965544678d0d8612

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5624829.exe

    Filesize

    799KB

    MD5

    4dade1387cf49a22213ba98ef43f2275

    SHA1

    6e47e03da096739913da80038f3dae9513548ab7

    SHA256

    a12780c5d25d195bcbc07150e41f63b6e48850e7b3c3629fbbdf1f1487abada6

    SHA512

    ccec67afb5a0fbff3ae3b94901c80671be53f2ddf8cf21dcd4bc98d21ac7348a039b4378e4ca9f62450d6c9574a3f74ec9d070f9b64a9c1aba6e7f74b274cf3d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5624829.exe

    Filesize

    799KB

    MD5

    4dade1387cf49a22213ba98ef43f2275

    SHA1

    6e47e03da096739913da80038f3dae9513548ab7

    SHA256

    a12780c5d25d195bcbc07150e41f63b6e48850e7b3c3629fbbdf1f1487abada6

    SHA512

    ccec67afb5a0fbff3ae3b94901c80671be53f2ddf8cf21dcd4bc98d21ac7348a039b4378e4ca9f62450d6c9574a3f74ec9d070f9b64a9c1aba6e7f74b274cf3d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6788489.exe

    Filesize

    616KB

    MD5

    228e102c17fc89e9a8b6999247ce2f47

    SHA1

    fd1c3fb45c9e7d9189410bdd6dcfa088807c77f1

    SHA256

    2d351a9f34adc29a984028c5e809bc67f2ebae81c0590a946aa4229516ab2272

    SHA512

    c4ea12e594a9020d46e510cb24a36c39059dcce306c033739a75a9f3a76a38dbaa23d37216a56278438519499dc3352675a4dfec0bf5a6428d23d2a4060027e4

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6788489.exe

    Filesize

    616KB

    MD5

    228e102c17fc89e9a8b6999247ce2f47

    SHA1

    fd1c3fb45c9e7d9189410bdd6dcfa088807c77f1

    SHA256

    2d351a9f34adc29a984028c5e809bc67f2ebae81c0590a946aa4229516ab2272

    SHA512

    c4ea12e594a9020d46e510cb24a36c39059dcce306c033739a75a9f3a76a38dbaa23d37216a56278438519499dc3352675a4dfec0bf5a6428d23d2a4060027e4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z4109516.exe

    Filesize

    346KB

    MD5

    c8b9a8eccf5032871d4240f8c9441e2c

    SHA1

    cfbaef3b51c5269af5f2541afbeaea9d1aec3ccb

    SHA256

    5335a003d121b67a03416ed15abb0c258643afdf04fe0d5c23823bd7f493b72e

    SHA512

    655116e521e7f535166ba7bf617ccce8dfb441767779d8390288c67256bc343400b1555c7aebc8ecb9dce6d90f6da3d7a4fc156dfaf80c8c6e4423c76bc0f01f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z4109516.exe

    Filesize

    346KB

    MD5

    c8b9a8eccf5032871d4240f8c9441e2c

    SHA1

    cfbaef3b51c5269af5f2541afbeaea9d1aec3ccb

    SHA256

    5335a003d121b67a03416ed15abb0c258643afdf04fe0d5c23823bd7f493b72e

    SHA512

    655116e521e7f535166ba7bf617ccce8dfb441767779d8390288c67256bc343400b1555c7aebc8ecb9dce6d90f6da3d7a4fc156dfaf80c8c6e4423c76bc0f01f

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2720169.exe

    Filesize

    227KB

    MD5

    500ce1b80940b4932340a76b9c727775

    SHA1

    02337490e143c02ff32a8dd1833ee3a5b37c30ca

    SHA256

    49431636380c564955908f7472ddbdf46d7152f9b12d4ad08f83031668d85402

    SHA512

    9dbf022372c7fce6d05701e5f411f204789f8c63aa1e9302c19403caf56f83bfe43005cf12c032ca7fbfca0e1178264306db43579e786a227cde1e7f3291ae3b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2720169.exe

    Filesize

    227KB

    MD5

    500ce1b80940b4932340a76b9c727775

    SHA1

    02337490e143c02ff32a8dd1833ee3a5b37c30ca

    SHA256

    49431636380c564955908f7472ddbdf46d7152f9b12d4ad08f83031668d85402

    SHA512

    9dbf022372c7fce6d05701e5f411f204789f8c63aa1e9302c19403caf56f83bfe43005cf12c032ca7fbfca0e1178264306db43579e786a227cde1e7f3291ae3b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2720169.exe

    Filesize

    227KB

    MD5

    500ce1b80940b4932340a76b9c727775

    SHA1

    02337490e143c02ff32a8dd1833ee3a5b37c30ca

    SHA256

    49431636380c564955908f7472ddbdf46d7152f9b12d4ad08f83031668d85402

    SHA512

    9dbf022372c7fce6d05701e5f411f204789f8c63aa1e9302c19403caf56f83bfe43005cf12c032ca7fbfca0e1178264306db43579e786a227cde1e7f3291ae3b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2720169.exe

    Filesize

    227KB

    MD5

    500ce1b80940b4932340a76b9c727775

    SHA1

    02337490e143c02ff32a8dd1833ee3a5b37c30ca

    SHA256

    49431636380c564955908f7472ddbdf46d7152f9b12d4ad08f83031668d85402

    SHA512

    9dbf022372c7fce6d05701e5f411f204789f8c63aa1e9302c19403caf56f83bfe43005cf12c032ca7fbfca0e1178264306db43579e786a227cde1e7f3291ae3b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2720169.exe

    Filesize

    227KB

    MD5

    500ce1b80940b4932340a76b9c727775

    SHA1

    02337490e143c02ff32a8dd1833ee3a5b37c30ca

    SHA256

    49431636380c564955908f7472ddbdf46d7152f9b12d4ad08f83031668d85402

    SHA512

    9dbf022372c7fce6d05701e5f411f204789f8c63aa1e9302c19403caf56f83bfe43005cf12c032ca7fbfca0e1178264306db43579e786a227cde1e7f3291ae3b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2720169.exe

    Filesize

    227KB

    MD5

    500ce1b80940b4932340a76b9c727775

    SHA1

    02337490e143c02ff32a8dd1833ee3a5b37c30ca

    SHA256

    49431636380c564955908f7472ddbdf46d7152f9b12d4ad08f83031668d85402

    SHA512

    9dbf022372c7fce6d05701e5f411f204789f8c63aa1e9302c19403caf56f83bfe43005cf12c032ca7fbfca0e1178264306db43579e786a227cde1e7f3291ae3b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2720169.exe

    Filesize

    227KB

    MD5

    500ce1b80940b4932340a76b9c727775

    SHA1

    02337490e143c02ff32a8dd1833ee3a5b37c30ca

    SHA256

    49431636380c564955908f7472ddbdf46d7152f9b12d4ad08f83031668d85402

    SHA512

    9dbf022372c7fce6d05701e5f411f204789f8c63aa1e9302c19403caf56f83bfe43005cf12c032ca7fbfca0e1178264306db43579e786a227cde1e7f3291ae3b

  • memory/2632-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2632-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2632-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2632-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2632-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2632-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2632-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2632-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.