Analysis

  • max time kernel
    155s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 06:55

General

  • Target

    e5dfd1803ad1d6b8a4575950264620c15681a88e18fc17bb0164a284d2ee7ce3.exe

  • Size

    1.3MB

  • MD5

    2395508e36fc4e464e4d58eb4f47fee7

  • SHA1

    5f262052c8770a555399d3e7bbe920469ad75850

  • SHA256

    e5dfd1803ad1d6b8a4575950264620c15681a88e18fc17bb0164a284d2ee7ce3

  • SHA512

    2302488a1a3059a59b54c957189e45abea4207ce2e803259ca675c4b7b3650d9a5b2eda10b712d5ca248ff1195d8069fc34528fb67007230012fdacfa3ace943

  • SSDEEP

    24576:QyZgMP6up5iM/nMZRNhsAJaGSS5Mamg007bjccrm/L:X7PZp5TMZ3hlaUMjg0Mcc4

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5dfd1803ad1d6b8a4575950264620c15681a88e18fc17bb0164a284d2ee7ce3.exe
    "C:\Users\Admin\AppData\Local\Temp\e5dfd1803ad1d6b8a4575950264620c15681a88e18fc17bb0164a284d2ee7ce3.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0551495.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0551495.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8870206.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8870206.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1328523.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1328523.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2596
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6206326.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6206326.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2476
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4773269.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4773269.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3068
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2652
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0551495.exe

    Filesize

    1.2MB

    MD5

    6b0b850cd4ce6b9ef55e303ad06aa117

    SHA1

    e739faa14b228ba0e270b037b10929bc49151687

    SHA256

    f9cd85ae1d8572397d63a56e319662ab76df4b6bd125ae472770d23a2655db5e

    SHA512

    2a4b38aae3e0107a49afd556f36d97c8ffc6ba8bb7ec9985d19e7b13eae4b48624026931a8a33642d90cbdeed23e4a25864d5fb50faeca8f3786cd6a1f8d997e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0551495.exe

    Filesize

    1.2MB

    MD5

    6b0b850cd4ce6b9ef55e303ad06aa117

    SHA1

    e739faa14b228ba0e270b037b10929bc49151687

    SHA256

    f9cd85ae1d8572397d63a56e319662ab76df4b6bd125ae472770d23a2655db5e

    SHA512

    2a4b38aae3e0107a49afd556f36d97c8ffc6ba8bb7ec9985d19e7b13eae4b48624026931a8a33642d90cbdeed23e4a25864d5fb50faeca8f3786cd6a1f8d997e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8870206.exe

    Filesize

    1.0MB

    MD5

    a04f45284ca5609255ff6619b2776137

    SHA1

    9346257f54996cd7ff0da829fa74fab7715e8713

    SHA256

    175fb341f3928cf3c54c758a17594e3753713b56bd0accc07ecdb9def67a0419

    SHA512

    f24cc4e11911a4f871f3d5473d09725e8795083ab9dceaf164ac3f5160f199affb774bd9fbf7fcc1cd201197b17774a95ed7ec774534642b7fc3ba12f1b723b3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8870206.exe

    Filesize

    1.0MB

    MD5

    a04f45284ca5609255ff6619b2776137

    SHA1

    9346257f54996cd7ff0da829fa74fab7715e8713

    SHA256

    175fb341f3928cf3c54c758a17594e3753713b56bd0accc07ecdb9def67a0419

    SHA512

    f24cc4e11911a4f871f3d5473d09725e8795083ab9dceaf164ac3f5160f199affb774bd9fbf7fcc1cd201197b17774a95ed7ec774534642b7fc3ba12f1b723b3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1328523.exe

    Filesize

    890KB

    MD5

    4e18ea40229e5eb9ab70bb4960d29035

    SHA1

    5a8150357460a2b4067edf433e44ad166f7fa081

    SHA256

    1fba28e9e4da21c793cddf2d771a625c2fa58a1df7af37ed3f5b0335106a8fe7

    SHA512

    dd08f52ba3a7f64c2802a43c510055472b07fa424528541fc3a153798208472f3d737174a1c4ce974ac9962f4ab053cd05f76d639622846a115db16e186a1069

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1328523.exe

    Filesize

    890KB

    MD5

    4e18ea40229e5eb9ab70bb4960d29035

    SHA1

    5a8150357460a2b4067edf433e44ad166f7fa081

    SHA256

    1fba28e9e4da21c793cddf2d771a625c2fa58a1df7af37ed3f5b0335106a8fe7

    SHA512

    dd08f52ba3a7f64c2802a43c510055472b07fa424528541fc3a153798208472f3d737174a1c4ce974ac9962f4ab053cd05f76d639622846a115db16e186a1069

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6206326.exe

    Filesize

    499KB

    MD5

    e8431c15b58c1420dc463746dc54df97

    SHA1

    63c1b205adf6e798406b472f6b448d8c8cd8268d

    SHA256

    0072f89adf519c37ee6a2fd565952eb0a420a4805630c1342b41e3de688fa68a

    SHA512

    df48e1312d425091d00238ae57934d8cfe71486fd88268bbc8ac4762ca47302edababf030d6d8e4d871f1ad3b9d7327f6cc3a9cd0e2dcececf00447fa924d7b4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6206326.exe

    Filesize

    499KB

    MD5

    e8431c15b58c1420dc463746dc54df97

    SHA1

    63c1b205adf6e798406b472f6b448d8c8cd8268d

    SHA256

    0072f89adf519c37ee6a2fd565952eb0a420a4805630c1342b41e3de688fa68a

    SHA512

    df48e1312d425091d00238ae57934d8cfe71486fd88268bbc8ac4762ca47302edababf030d6d8e4d871f1ad3b9d7327f6cc3a9cd0e2dcececf00447fa924d7b4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4773269.exe

    Filesize

    860KB

    MD5

    b66ef1a60f5aaf99339b03d48c601071

    SHA1

    f00ac5051721f7faea4542fe715df2ca625b9df5

    SHA256

    ca1f9561b0be79265180363e1a6cf3368e84ccc3de30d80bdbb9583d6cd58152

    SHA512

    96c3bc6d69cc1a79e2ddc2c0dd849bcfd9cd865ac005fdf750258353035e49360f5090586b0b0c5261816cb9106e57b654f0f20309be5c800b1322f979118576

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4773269.exe

    Filesize

    860KB

    MD5

    b66ef1a60f5aaf99339b03d48c601071

    SHA1

    f00ac5051721f7faea4542fe715df2ca625b9df5

    SHA256

    ca1f9561b0be79265180363e1a6cf3368e84ccc3de30d80bdbb9583d6cd58152

    SHA512

    96c3bc6d69cc1a79e2ddc2c0dd849bcfd9cd865ac005fdf750258353035e49360f5090586b0b0c5261816cb9106e57b654f0f20309be5c800b1322f979118576

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4773269.exe

    Filesize

    860KB

    MD5

    b66ef1a60f5aaf99339b03d48c601071

    SHA1

    f00ac5051721f7faea4542fe715df2ca625b9df5

    SHA256

    ca1f9561b0be79265180363e1a6cf3368e84ccc3de30d80bdbb9583d6cd58152

    SHA512

    96c3bc6d69cc1a79e2ddc2c0dd849bcfd9cd865ac005fdf750258353035e49360f5090586b0b0c5261816cb9106e57b654f0f20309be5c800b1322f979118576

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0551495.exe

    Filesize

    1.2MB

    MD5

    6b0b850cd4ce6b9ef55e303ad06aa117

    SHA1

    e739faa14b228ba0e270b037b10929bc49151687

    SHA256

    f9cd85ae1d8572397d63a56e319662ab76df4b6bd125ae472770d23a2655db5e

    SHA512

    2a4b38aae3e0107a49afd556f36d97c8ffc6ba8bb7ec9985d19e7b13eae4b48624026931a8a33642d90cbdeed23e4a25864d5fb50faeca8f3786cd6a1f8d997e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0551495.exe

    Filesize

    1.2MB

    MD5

    6b0b850cd4ce6b9ef55e303ad06aa117

    SHA1

    e739faa14b228ba0e270b037b10929bc49151687

    SHA256

    f9cd85ae1d8572397d63a56e319662ab76df4b6bd125ae472770d23a2655db5e

    SHA512

    2a4b38aae3e0107a49afd556f36d97c8ffc6ba8bb7ec9985d19e7b13eae4b48624026931a8a33642d90cbdeed23e4a25864d5fb50faeca8f3786cd6a1f8d997e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8870206.exe

    Filesize

    1.0MB

    MD5

    a04f45284ca5609255ff6619b2776137

    SHA1

    9346257f54996cd7ff0da829fa74fab7715e8713

    SHA256

    175fb341f3928cf3c54c758a17594e3753713b56bd0accc07ecdb9def67a0419

    SHA512

    f24cc4e11911a4f871f3d5473d09725e8795083ab9dceaf164ac3f5160f199affb774bd9fbf7fcc1cd201197b17774a95ed7ec774534642b7fc3ba12f1b723b3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8870206.exe

    Filesize

    1.0MB

    MD5

    a04f45284ca5609255ff6619b2776137

    SHA1

    9346257f54996cd7ff0da829fa74fab7715e8713

    SHA256

    175fb341f3928cf3c54c758a17594e3753713b56bd0accc07ecdb9def67a0419

    SHA512

    f24cc4e11911a4f871f3d5473d09725e8795083ab9dceaf164ac3f5160f199affb774bd9fbf7fcc1cd201197b17774a95ed7ec774534642b7fc3ba12f1b723b3

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1328523.exe

    Filesize

    890KB

    MD5

    4e18ea40229e5eb9ab70bb4960d29035

    SHA1

    5a8150357460a2b4067edf433e44ad166f7fa081

    SHA256

    1fba28e9e4da21c793cddf2d771a625c2fa58a1df7af37ed3f5b0335106a8fe7

    SHA512

    dd08f52ba3a7f64c2802a43c510055472b07fa424528541fc3a153798208472f3d737174a1c4ce974ac9962f4ab053cd05f76d639622846a115db16e186a1069

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1328523.exe

    Filesize

    890KB

    MD5

    4e18ea40229e5eb9ab70bb4960d29035

    SHA1

    5a8150357460a2b4067edf433e44ad166f7fa081

    SHA256

    1fba28e9e4da21c793cddf2d771a625c2fa58a1df7af37ed3f5b0335106a8fe7

    SHA512

    dd08f52ba3a7f64c2802a43c510055472b07fa424528541fc3a153798208472f3d737174a1c4ce974ac9962f4ab053cd05f76d639622846a115db16e186a1069

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6206326.exe

    Filesize

    499KB

    MD5

    e8431c15b58c1420dc463746dc54df97

    SHA1

    63c1b205adf6e798406b472f6b448d8c8cd8268d

    SHA256

    0072f89adf519c37ee6a2fd565952eb0a420a4805630c1342b41e3de688fa68a

    SHA512

    df48e1312d425091d00238ae57934d8cfe71486fd88268bbc8ac4762ca47302edababf030d6d8e4d871f1ad3b9d7327f6cc3a9cd0e2dcececf00447fa924d7b4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6206326.exe

    Filesize

    499KB

    MD5

    e8431c15b58c1420dc463746dc54df97

    SHA1

    63c1b205adf6e798406b472f6b448d8c8cd8268d

    SHA256

    0072f89adf519c37ee6a2fd565952eb0a420a4805630c1342b41e3de688fa68a

    SHA512

    df48e1312d425091d00238ae57934d8cfe71486fd88268bbc8ac4762ca47302edababf030d6d8e4d871f1ad3b9d7327f6cc3a9cd0e2dcececf00447fa924d7b4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4773269.exe

    Filesize

    860KB

    MD5

    b66ef1a60f5aaf99339b03d48c601071

    SHA1

    f00ac5051721f7faea4542fe715df2ca625b9df5

    SHA256

    ca1f9561b0be79265180363e1a6cf3368e84ccc3de30d80bdbb9583d6cd58152

    SHA512

    96c3bc6d69cc1a79e2ddc2c0dd849bcfd9cd865ac005fdf750258353035e49360f5090586b0b0c5261816cb9106e57b654f0f20309be5c800b1322f979118576

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4773269.exe

    Filesize

    860KB

    MD5

    b66ef1a60f5aaf99339b03d48c601071

    SHA1

    f00ac5051721f7faea4542fe715df2ca625b9df5

    SHA256

    ca1f9561b0be79265180363e1a6cf3368e84ccc3de30d80bdbb9583d6cd58152

    SHA512

    96c3bc6d69cc1a79e2ddc2c0dd849bcfd9cd865ac005fdf750258353035e49360f5090586b0b0c5261816cb9106e57b654f0f20309be5c800b1322f979118576

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4773269.exe

    Filesize

    860KB

    MD5

    b66ef1a60f5aaf99339b03d48c601071

    SHA1

    f00ac5051721f7faea4542fe715df2ca625b9df5

    SHA256

    ca1f9561b0be79265180363e1a6cf3368e84ccc3de30d80bdbb9583d6cd58152

    SHA512

    96c3bc6d69cc1a79e2ddc2c0dd849bcfd9cd865ac005fdf750258353035e49360f5090586b0b0c5261816cb9106e57b654f0f20309be5c800b1322f979118576

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4773269.exe

    Filesize

    860KB

    MD5

    b66ef1a60f5aaf99339b03d48c601071

    SHA1

    f00ac5051721f7faea4542fe715df2ca625b9df5

    SHA256

    ca1f9561b0be79265180363e1a6cf3368e84ccc3de30d80bdbb9583d6cd58152

    SHA512

    96c3bc6d69cc1a79e2ddc2c0dd849bcfd9cd865ac005fdf750258353035e49360f5090586b0b0c5261816cb9106e57b654f0f20309be5c800b1322f979118576

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4773269.exe

    Filesize

    860KB

    MD5

    b66ef1a60f5aaf99339b03d48c601071

    SHA1

    f00ac5051721f7faea4542fe715df2ca625b9df5

    SHA256

    ca1f9561b0be79265180363e1a6cf3368e84ccc3de30d80bdbb9583d6cd58152

    SHA512

    96c3bc6d69cc1a79e2ddc2c0dd849bcfd9cd865ac005fdf750258353035e49360f5090586b0b0c5261816cb9106e57b654f0f20309be5c800b1322f979118576

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4773269.exe

    Filesize

    860KB

    MD5

    b66ef1a60f5aaf99339b03d48c601071

    SHA1

    f00ac5051721f7faea4542fe715df2ca625b9df5

    SHA256

    ca1f9561b0be79265180363e1a6cf3368e84ccc3de30d80bdbb9583d6cd58152

    SHA512

    96c3bc6d69cc1a79e2ddc2c0dd849bcfd9cd865ac005fdf750258353035e49360f5090586b0b0c5261816cb9106e57b654f0f20309be5c800b1322f979118576

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4773269.exe

    Filesize

    860KB

    MD5

    b66ef1a60f5aaf99339b03d48c601071

    SHA1

    f00ac5051721f7faea4542fe715df2ca625b9df5

    SHA256

    ca1f9561b0be79265180363e1a6cf3368e84ccc3de30d80bdbb9583d6cd58152

    SHA512

    96c3bc6d69cc1a79e2ddc2c0dd849bcfd9cd865ac005fdf750258353035e49360f5090586b0b0c5261816cb9106e57b654f0f20309be5c800b1322f979118576

  • memory/2652-59-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2652-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2652-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2652-64-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2652-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2652-57-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2652-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2652-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB