Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 06:55

General

  • Target

    af7bf95cea03dc9300228b678fcd178c8a0a84bc9d761149cfcb254d8606dd01.exe

  • Size

    1.3MB

  • MD5

    8650fbb431bbb8fd9722647c9d99b3fd

  • SHA1

    3764ab87d15242cffa1b2a041b5c3f2d97680470

  • SHA256

    af7bf95cea03dc9300228b678fcd178c8a0a84bc9d761149cfcb254d8606dd01

  • SHA512

    6d060ebc27843644ae53e9cc6d85e171fc36b173d778eb2828f5fd6f5b77346241c3592dc8a396ce5a0c32e79f35215be604176d1a6615f93f024cde8d505a60

  • SSDEEP

    24576:5yF7EPaNTTkxvS0HwX7Mmmxgm9cC8TCsaIDWnc37Rb8Ilcva5Ag9rtmbb:sFwPaoS+wLzmCmK731Imcva7vmb

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af7bf95cea03dc9300228b678fcd178c8a0a84bc9d761149cfcb254d8606dd01.exe
    "C:\Users\Admin\AppData\Local\Temp\af7bf95cea03dc9300228b678fcd178c8a0a84bc9d761149cfcb254d8606dd01.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0303155.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0303155.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6688640.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6688640.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2208
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8491160.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8491160.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2340
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8058700.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8058700.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2628
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5471207.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5471207.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2640
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2688
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2696
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 280
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2544

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    2
    T1112

    Impair Defenses

    1
    T1562

    Disable or Modify Tools

    1
    T1562.001

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0303155.exe
      Filesize

      1.2MB

      MD5

      a6e47e90dc096145769ba8399fb1ed52

      SHA1

      5edfdabc9f7368c4e7873ba245b6d44ea42ced35

      SHA256

      c93842a85f5258f5e4d986f8d3ced2245376092a1014ef6c3611c9309a781f5b

      SHA512

      0c08a2b18d9c33ecb42900302d5eabc68076ceb55a0c8529ccf54c7e7b745e57220ca8c57283b8759a039c8397505c2234fa7ce201003c49e76a198909b02a6b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0303155.exe
      Filesize

      1.2MB

      MD5

      a6e47e90dc096145769ba8399fb1ed52

      SHA1

      5edfdabc9f7368c4e7873ba245b6d44ea42ced35

      SHA256

      c93842a85f5258f5e4d986f8d3ced2245376092a1014ef6c3611c9309a781f5b

      SHA512

      0c08a2b18d9c33ecb42900302d5eabc68076ceb55a0c8529ccf54c7e7b745e57220ca8c57283b8759a039c8397505c2234fa7ce201003c49e76a198909b02a6b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6688640.exe
      Filesize

      1.0MB

      MD5

      1257ada7a79873797e5e251a353d937b

      SHA1

      802c16c2b54c4c2467ebd53ed123cb3416e32cf1

      SHA256

      667d3ad7e83daddfbdbbcd4c1d5c5ce5c320f12a60a12abd101210ab210f4274

      SHA512

      02fda47e7e339354db8f4d61d8f971cc82b803fde6e92e3e10dbf7cdd69012f38e8244b9fd873b85eab54dd31dda6cacaaa35ed8d1fb0e306621d8b3e1950728

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6688640.exe
      Filesize

      1.0MB

      MD5

      1257ada7a79873797e5e251a353d937b

      SHA1

      802c16c2b54c4c2467ebd53ed123cb3416e32cf1

      SHA256

      667d3ad7e83daddfbdbbcd4c1d5c5ce5c320f12a60a12abd101210ab210f4274

      SHA512

      02fda47e7e339354db8f4d61d8f971cc82b803fde6e92e3e10dbf7cdd69012f38e8244b9fd873b85eab54dd31dda6cacaaa35ed8d1fb0e306621d8b3e1950728

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8491160.exe
      Filesize

      884KB

      MD5

      7298ee11c7aaea421a3512925837f60e

      SHA1

      550213603782ce2df42c768476482e63f5b9410a

      SHA256

      74b44460ad4242eb934def0ceb256a280a78d1d6978f85a9bfec26ee0860688f

      SHA512

      7881c229a8c9b366a00c65c41ada16f2017728623071c7f085d36054a83aa8812d5050bb6386a70153e1e4b757d088bcaa0363d8cebe4daa715b634e8b9472ef

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8491160.exe
      Filesize

      884KB

      MD5

      7298ee11c7aaea421a3512925837f60e

      SHA1

      550213603782ce2df42c768476482e63f5b9410a

      SHA256

      74b44460ad4242eb934def0ceb256a280a78d1d6978f85a9bfec26ee0860688f

      SHA512

      7881c229a8c9b366a00c65c41ada16f2017728623071c7f085d36054a83aa8812d5050bb6386a70153e1e4b757d088bcaa0363d8cebe4daa715b634e8b9472ef

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8058700.exe
      Filesize

      493KB

      MD5

      d0ec410d91a940ea048d6e7cf966b867

      SHA1

      9caab8bb552f21c20ae4063bdda584722fbbdbac

      SHA256

      aa94cf37206c5b27db7c1bf06e88e52b72a3853cfa5de99c050132052a840977

      SHA512

      6aa9dcc89b20914afcae63b72a4bf532163af5818e8b834ef6ad5ff17c3ccad724f13a0a50925a0d07a231628698a45157e5d41af3f5196e461dc89e1d7486d1

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8058700.exe
      Filesize

      493KB

      MD5

      d0ec410d91a940ea048d6e7cf966b867

      SHA1

      9caab8bb552f21c20ae4063bdda584722fbbdbac

      SHA256

      aa94cf37206c5b27db7c1bf06e88e52b72a3853cfa5de99c050132052a840977

      SHA512

      6aa9dcc89b20914afcae63b72a4bf532163af5818e8b834ef6ad5ff17c3ccad724f13a0a50925a0d07a231628698a45157e5d41af3f5196e461dc89e1d7486d1

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5471207.exe
      Filesize

      860KB

      MD5

      8b5342b55da36612e0ff9071e8e02c0d

      SHA1

      9318152e8c0a4eda188c97500ade7d8bbc8f19f8

      SHA256

      c36be42bf88b2dfd7835dd8e8b2a2b1217a035959d123cd00b97b1c14b2c4cba

      SHA512

      738af5b4eb475e78a4b564f214cf743822cfde3309ecdff78a71bffebe560b4da3c91f66645e6a6072e3ad09d5db23a744ef368fbd4c03d8c983371fea678c67

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5471207.exe
      Filesize

      860KB

      MD5

      8b5342b55da36612e0ff9071e8e02c0d

      SHA1

      9318152e8c0a4eda188c97500ade7d8bbc8f19f8

      SHA256

      c36be42bf88b2dfd7835dd8e8b2a2b1217a035959d123cd00b97b1c14b2c4cba

      SHA512

      738af5b4eb475e78a4b564f214cf743822cfde3309ecdff78a71bffebe560b4da3c91f66645e6a6072e3ad09d5db23a744ef368fbd4c03d8c983371fea678c67

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5471207.exe
      Filesize

      860KB

      MD5

      8b5342b55da36612e0ff9071e8e02c0d

      SHA1

      9318152e8c0a4eda188c97500ade7d8bbc8f19f8

      SHA256

      c36be42bf88b2dfd7835dd8e8b2a2b1217a035959d123cd00b97b1c14b2c4cba

      SHA512

      738af5b4eb475e78a4b564f214cf743822cfde3309ecdff78a71bffebe560b4da3c91f66645e6a6072e3ad09d5db23a744ef368fbd4c03d8c983371fea678c67

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0303155.exe
      Filesize

      1.2MB

      MD5

      a6e47e90dc096145769ba8399fb1ed52

      SHA1

      5edfdabc9f7368c4e7873ba245b6d44ea42ced35

      SHA256

      c93842a85f5258f5e4d986f8d3ced2245376092a1014ef6c3611c9309a781f5b

      SHA512

      0c08a2b18d9c33ecb42900302d5eabc68076ceb55a0c8529ccf54c7e7b745e57220ca8c57283b8759a039c8397505c2234fa7ce201003c49e76a198909b02a6b

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0303155.exe
      Filesize

      1.2MB

      MD5

      a6e47e90dc096145769ba8399fb1ed52

      SHA1

      5edfdabc9f7368c4e7873ba245b6d44ea42ced35

      SHA256

      c93842a85f5258f5e4d986f8d3ced2245376092a1014ef6c3611c9309a781f5b

      SHA512

      0c08a2b18d9c33ecb42900302d5eabc68076ceb55a0c8529ccf54c7e7b745e57220ca8c57283b8759a039c8397505c2234fa7ce201003c49e76a198909b02a6b

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6688640.exe
      Filesize

      1.0MB

      MD5

      1257ada7a79873797e5e251a353d937b

      SHA1

      802c16c2b54c4c2467ebd53ed123cb3416e32cf1

      SHA256

      667d3ad7e83daddfbdbbcd4c1d5c5ce5c320f12a60a12abd101210ab210f4274

      SHA512

      02fda47e7e339354db8f4d61d8f971cc82b803fde6e92e3e10dbf7cdd69012f38e8244b9fd873b85eab54dd31dda6cacaaa35ed8d1fb0e306621d8b3e1950728

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6688640.exe
      Filesize

      1.0MB

      MD5

      1257ada7a79873797e5e251a353d937b

      SHA1

      802c16c2b54c4c2467ebd53ed123cb3416e32cf1

      SHA256

      667d3ad7e83daddfbdbbcd4c1d5c5ce5c320f12a60a12abd101210ab210f4274

      SHA512

      02fda47e7e339354db8f4d61d8f971cc82b803fde6e92e3e10dbf7cdd69012f38e8244b9fd873b85eab54dd31dda6cacaaa35ed8d1fb0e306621d8b3e1950728

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8491160.exe
      Filesize

      884KB

      MD5

      7298ee11c7aaea421a3512925837f60e

      SHA1

      550213603782ce2df42c768476482e63f5b9410a

      SHA256

      74b44460ad4242eb934def0ceb256a280a78d1d6978f85a9bfec26ee0860688f

      SHA512

      7881c229a8c9b366a00c65c41ada16f2017728623071c7f085d36054a83aa8812d5050bb6386a70153e1e4b757d088bcaa0363d8cebe4daa715b634e8b9472ef

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8491160.exe
      Filesize

      884KB

      MD5

      7298ee11c7aaea421a3512925837f60e

      SHA1

      550213603782ce2df42c768476482e63f5b9410a

      SHA256

      74b44460ad4242eb934def0ceb256a280a78d1d6978f85a9bfec26ee0860688f

      SHA512

      7881c229a8c9b366a00c65c41ada16f2017728623071c7f085d36054a83aa8812d5050bb6386a70153e1e4b757d088bcaa0363d8cebe4daa715b634e8b9472ef

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8058700.exe
      Filesize

      493KB

      MD5

      d0ec410d91a940ea048d6e7cf966b867

      SHA1

      9caab8bb552f21c20ae4063bdda584722fbbdbac

      SHA256

      aa94cf37206c5b27db7c1bf06e88e52b72a3853cfa5de99c050132052a840977

      SHA512

      6aa9dcc89b20914afcae63b72a4bf532163af5818e8b834ef6ad5ff17c3ccad724f13a0a50925a0d07a231628698a45157e5d41af3f5196e461dc89e1d7486d1

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8058700.exe
      Filesize

      493KB

      MD5

      d0ec410d91a940ea048d6e7cf966b867

      SHA1

      9caab8bb552f21c20ae4063bdda584722fbbdbac

      SHA256

      aa94cf37206c5b27db7c1bf06e88e52b72a3853cfa5de99c050132052a840977

      SHA512

      6aa9dcc89b20914afcae63b72a4bf532163af5818e8b834ef6ad5ff17c3ccad724f13a0a50925a0d07a231628698a45157e5d41af3f5196e461dc89e1d7486d1

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5471207.exe
      Filesize

      860KB

      MD5

      8b5342b55da36612e0ff9071e8e02c0d

      SHA1

      9318152e8c0a4eda188c97500ade7d8bbc8f19f8

      SHA256

      c36be42bf88b2dfd7835dd8e8b2a2b1217a035959d123cd00b97b1c14b2c4cba

      SHA512

      738af5b4eb475e78a4b564f214cf743822cfde3309ecdff78a71bffebe560b4da3c91f66645e6a6072e3ad09d5db23a744ef368fbd4c03d8c983371fea678c67

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5471207.exe
      Filesize

      860KB

      MD5

      8b5342b55da36612e0ff9071e8e02c0d

      SHA1

      9318152e8c0a4eda188c97500ade7d8bbc8f19f8

      SHA256

      c36be42bf88b2dfd7835dd8e8b2a2b1217a035959d123cd00b97b1c14b2c4cba

      SHA512

      738af5b4eb475e78a4b564f214cf743822cfde3309ecdff78a71bffebe560b4da3c91f66645e6a6072e3ad09d5db23a744ef368fbd4c03d8c983371fea678c67

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5471207.exe
      Filesize

      860KB

      MD5

      8b5342b55da36612e0ff9071e8e02c0d

      SHA1

      9318152e8c0a4eda188c97500ade7d8bbc8f19f8

      SHA256

      c36be42bf88b2dfd7835dd8e8b2a2b1217a035959d123cd00b97b1c14b2c4cba

      SHA512

      738af5b4eb475e78a4b564f214cf743822cfde3309ecdff78a71bffebe560b4da3c91f66645e6a6072e3ad09d5db23a744ef368fbd4c03d8c983371fea678c67

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5471207.exe
      Filesize

      860KB

      MD5

      8b5342b55da36612e0ff9071e8e02c0d

      SHA1

      9318152e8c0a4eda188c97500ade7d8bbc8f19f8

      SHA256

      c36be42bf88b2dfd7835dd8e8b2a2b1217a035959d123cd00b97b1c14b2c4cba

      SHA512

      738af5b4eb475e78a4b564f214cf743822cfde3309ecdff78a71bffebe560b4da3c91f66645e6a6072e3ad09d5db23a744ef368fbd4c03d8c983371fea678c67

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5471207.exe
      Filesize

      860KB

      MD5

      8b5342b55da36612e0ff9071e8e02c0d

      SHA1

      9318152e8c0a4eda188c97500ade7d8bbc8f19f8

      SHA256

      c36be42bf88b2dfd7835dd8e8b2a2b1217a035959d123cd00b97b1c14b2c4cba

      SHA512

      738af5b4eb475e78a4b564f214cf743822cfde3309ecdff78a71bffebe560b4da3c91f66645e6a6072e3ad09d5db23a744ef368fbd4c03d8c983371fea678c67

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5471207.exe
      Filesize

      860KB

      MD5

      8b5342b55da36612e0ff9071e8e02c0d

      SHA1

      9318152e8c0a4eda188c97500ade7d8bbc8f19f8

      SHA256

      c36be42bf88b2dfd7835dd8e8b2a2b1217a035959d123cd00b97b1c14b2c4cba

      SHA512

      738af5b4eb475e78a4b564f214cf743822cfde3309ecdff78a71bffebe560b4da3c91f66645e6a6072e3ad09d5db23a744ef368fbd4c03d8c983371fea678c67

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5471207.exe
      Filesize

      860KB

      MD5

      8b5342b55da36612e0ff9071e8e02c0d

      SHA1

      9318152e8c0a4eda188c97500ade7d8bbc8f19f8

      SHA256

      c36be42bf88b2dfd7835dd8e8b2a2b1217a035959d123cd00b97b1c14b2c4cba

      SHA512

      738af5b4eb475e78a4b564f214cf743822cfde3309ecdff78a71bffebe560b4da3c91f66645e6a6072e3ad09d5db23a744ef368fbd4c03d8c983371fea678c67

    • memory/2696-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
      Filesize

      4KB

    • memory/2696-58-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2696-60-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2696-62-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2696-55-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2696-56-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2696-54-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2696-53-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB