Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 06:56

General

  • Target

    22ac29f53b2c49b0af864821e46fa98b0590b4c616525360d9dde552efbacd0f.exe

  • Size

    1.3MB

  • MD5

    00ee0c88efb995962014749fb3802749

  • SHA1

    0dab9ff1aad2a0ab52d3c7d89c50dc8f1b2d3ec4

  • SHA256

    22ac29f53b2c49b0af864821e46fa98b0590b4c616525360d9dde552efbacd0f

  • SHA512

    d1221f5decfc03e7f27c410d24a9759d28744c81745aecf1e0022188fec03e42f040390344f9004287027790fb77dab14d00c47f197c63dd50d373bba75c0582

  • SSDEEP

    24576:oyChV4MxgmtzgMHJ9P5vnThJ8dE1A7GRgLrwQ1Q4r5BonzG8vRFL:vLMVzgMp9dT4dDGRgLkQ1QyrKVp

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22ac29f53b2c49b0af864821e46fa98b0590b4c616525360d9dde552efbacd0f.exe
    "C:\Users\Admin\AppData\Local\Temp\22ac29f53b2c49b0af864821e46fa98b0590b4c616525360d9dde552efbacd0f.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7267817.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7267817.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2220124.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2220124.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1084637.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1084637.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2596
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5140034.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5140034.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2716
  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0075553.exe
    C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0075553.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2628
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2884
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 268
      2⤵
      • Loads dropped DLL
      • Program crash
      PID:2736

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7267817.exe
    Filesize

    1.2MB

    MD5

    2d8854771635e96f36624febe4537c08

    SHA1

    2930b5ee4ca7d5b2a7bf038be66566cbcdeb765b

    SHA256

    959a2429a659ab8ee7bb9f8cb978ee51e03cb808d6aa84d419bd7ec501a32e18

    SHA512

    d97a3d7d09cc2c9f08a3e5f858eb6685ccb169075de20544fa6b9c7eebf6898a3b2c21236de854dc5b599b9d9c6193a910c70b73b3062385eff240c679cfc457

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7267817.exe
    Filesize

    1.2MB

    MD5

    2d8854771635e96f36624febe4537c08

    SHA1

    2930b5ee4ca7d5b2a7bf038be66566cbcdeb765b

    SHA256

    959a2429a659ab8ee7bb9f8cb978ee51e03cb808d6aa84d419bd7ec501a32e18

    SHA512

    d97a3d7d09cc2c9f08a3e5f858eb6685ccb169075de20544fa6b9c7eebf6898a3b2c21236de854dc5b599b9d9c6193a910c70b73b3062385eff240c679cfc457

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2220124.exe
    Filesize

    1.0MB

    MD5

    435bd5e139a61f4b9348799423b0cdd1

    SHA1

    c55f368a4f65eba9fbfbdecdbe66a25060357c03

    SHA256

    3da4a94578b8275bcf520c32029d5da62a314f339af249d74b0ccb8f9e0bb2dd

    SHA512

    a12cced4de6a89322b3ab9f71e2e5dfa1663ef29dd49c3ded51fd374d05abd4d319a597eabf006f3d0512bbc411b9d6ce670211b25fce01acd1c567d3996271b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2220124.exe
    Filesize

    1.0MB

    MD5

    435bd5e139a61f4b9348799423b0cdd1

    SHA1

    c55f368a4f65eba9fbfbdecdbe66a25060357c03

    SHA256

    3da4a94578b8275bcf520c32029d5da62a314f339af249d74b0ccb8f9e0bb2dd

    SHA512

    a12cced4de6a89322b3ab9f71e2e5dfa1663ef29dd49c3ded51fd374d05abd4d319a597eabf006f3d0512bbc411b9d6ce670211b25fce01acd1c567d3996271b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1084637.exe
    Filesize

    890KB

    MD5

    9301cb162262c21467e409e34c083b10

    SHA1

    abcf1b431853b7115ae6091b591d5de7a93677ec

    SHA256

    2e1d54b8f901ca82b03038d7e5dd540ac9291ee4e641f4de787e628b930134c1

    SHA512

    8e891e9a6ad6b6375e46beb88ee82fbb681d5ef1299d52c2e0e88f22e53dfe25a4381560a51af169a327b80e56a7c7c7c6fb87efb31bb871ec6781d1f08318c3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1084637.exe
    Filesize

    890KB

    MD5

    9301cb162262c21467e409e34c083b10

    SHA1

    abcf1b431853b7115ae6091b591d5de7a93677ec

    SHA256

    2e1d54b8f901ca82b03038d7e5dd540ac9291ee4e641f4de787e628b930134c1

    SHA512

    8e891e9a6ad6b6375e46beb88ee82fbb681d5ef1299d52c2e0e88f22e53dfe25a4381560a51af169a327b80e56a7c7c7c6fb87efb31bb871ec6781d1f08318c3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5140034.exe
    Filesize

    499KB

    MD5

    3abbfa448b60de10f3fbda079fc1ede1

    SHA1

    9be3b2dc46377c0ce21809fffd2bd5a3b88a0b46

    SHA256

    ab46c18d29907aae620962f7302a257d3a5789cd8f58adc2191e1569ec2b64fc

    SHA512

    604374b8fd993806979ac89d65e2710d542c4eed557623db1bb7eeac5b58c139115186d3f49d0b19cf64b0e03d7e2763d4fd9856197fdc2e76ae8a233ac37751

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5140034.exe
    Filesize

    499KB

    MD5

    3abbfa448b60de10f3fbda079fc1ede1

    SHA1

    9be3b2dc46377c0ce21809fffd2bd5a3b88a0b46

    SHA256

    ab46c18d29907aae620962f7302a257d3a5789cd8f58adc2191e1569ec2b64fc

    SHA512

    604374b8fd993806979ac89d65e2710d542c4eed557623db1bb7eeac5b58c139115186d3f49d0b19cf64b0e03d7e2763d4fd9856197fdc2e76ae8a233ac37751

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0075553.exe
    Filesize

    860KB

    MD5

    9fe4f348592f5abfac13127b76ee54af

    SHA1

    fb3a82f325d56a3e91613d90a253ea11f52c3033

    SHA256

    b07f17bac1312c58426b60c9779a8a6d74c7f4d746021b51438d5967374192dc

    SHA512

    8d65124e66d310129d7c9ac3ab522e0d3df3567317292a486426e22f4edf135f31244983502e91849a408d458de252c3595a5647c19718daf3940a5f91143f59

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0075553.exe
    Filesize

    860KB

    MD5

    9fe4f348592f5abfac13127b76ee54af

    SHA1

    fb3a82f325d56a3e91613d90a253ea11f52c3033

    SHA256

    b07f17bac1312c58426b60c9779a8a6d74c7f4d746021b51438d5967374192dc

    SHA512

    8d65124e66d310129d7c9ac3ab522e0d3df3567317292a486426e22f4edf135f31244983502e91849a408d458de252c3595a5647c19718daf3940a5f91143f59

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0075553.exe
    Filesize

    860KB

    MD5

    9fe4f348592f5abfac13127b76ee54af

    SHA1

    fb3a82f325d56a3e91613d90a253ea11f52c3033

    SHA256

    b07f17bac1312c58426b60c9779a8a6d74c7f4d746021b51438d5967374192dc

    SHA512

    8d65124e66d310129d7c9ac3ab522e0d3df3567317292a486426e22f4edf135f31244983502e91849a408d458de252c3595a5647c19718daf3940a5f91143f59

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7267817.exe
    Filesize

    1.2MB

    MD5

    2d8854771635e96f36624febe4537c08

    SHA1

    2930b5ee4ca7d5b2a7bf038be66566cbcdeb765b

    SHA256

    959a2429a659ab8ee7bb9f8cb978ee51e03cb808d6aa84d419bd7ec501a32e18

    SHA512

    d97a3d7d09cc2c9f08a3e5f858eb6685ccb169075de20544fa6b9c7eebf6898a3b2c21236de854dc5b599b9d9c6193a910c70b73b3062385eff240c679cfc457

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7267817.exe
    Filesize

    1.2MB

    MD5

    2d8854771635e96f36624febe4537c08

    SHA1

    2930b5ee4ca7d5b2a7bf038be66566cbcdeb765b

    SHA256

    959a2429a659ab8ee7bb9f8cb978ee51e03cb808d6aa84d419bd7ec501a32e18

    SHA512

    d97a3d7d09cc2c9f08a3e5f858eb6685ccb169075de20544fa6b9c7eebf6898a3b2c21236de854dc5b599b9d9c6193a910c70b73b3062385eff240c679cfc457

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2220124.exe
    Filesize

    1.0MB

    MD5

    435bd5e139a61f4b9348799423b0cdd1

    SHA1

    c55f368a4f65eba9fbfbdecdbe66a25060357c03

    SHA256

    3da4a94578b8275bcf520c32029d5da62a314f339af249d74b0ccb8f9e0bb2dd

    SHA512

    a12cced4de6a89322b3ab9f71e2e5dfa1663ef29dd49c3ded51fd374d05abd4d319a597eabf006f3d0512bbc411b9d6ce670211b25fce01acd1c567d3996271b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2220124.exe
    Filesize

    1.0MB

    MD5

    435bd5e139a61f4b9348799423b0cdd1

    SHA1

    c55f368a4f65eba9fbfbdecdbe66a25060357c03

    SHA256

    3da4a94578b8275bcf520c32029d5da62a314f339af249d74b0ccb8f9e0bb2dd

    SHA512

    a12cced4de6a89322b3ab9f71e2e5dfa1663ef29dd49c3ded51fd374d05abd4d319a597eabf006f3d0512bbc411b9d6ce670211b25fce01acd1c567d3996271b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1084637.exe
    Filesize

    890KB

    MD5

    9301cb162262c21467e409e34c083b10

    SHA1

    abcf1b431853b7115ae6091b591d5de7a93677ec

    SHA256

    2e1d54b8f901ca82b03038d7e5dd540ac9291ee4e641f4de787e628b930134c1

    SHA512

    8e891e9a6ad6b6375e46beb88ee82fbb681d5ef1299d52c2e0e88f22e53dfe25a4381560a51af169a327b80e56a7c7c7c6fb87efb31bb871ec6781d1f08318c3

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1084637.exe
    Filesize

    890KB

    MD5

    9301cb162262c21467e409e34c083b10

    SHA1

    abcf1b431853b7115ae6091b591d5de7a93677ec

    SHA256

    2e1d54b8f901ca82b03038d7e5dd540ac9291ee4e641f4de787e628b930134c1

    SHA512

    8e891e9a6ad6b6375e46beb88ee82fbb681d5ef1299d52c2e0e88f22e53dfe25a4381560a51af169a327b80e56a7c7c7c6fb87efb31bb871ec6781d1f08318c3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z5140034.exe
    Filesize

    499KB

    MD5

    3abbfa448b60de10f3fbda079fc1ede1

    SHA1

    9be3b2dc46377c0ce21809fffd2bd5a3b88a0b46

    SHA256

    ab46c18d29907aae620962f7302a257d3a5789cd8f58adc2191e1569ec2b64fc

    SHA512

    604374b8fd993806979ac89d65e2710d542c4eed557623db1bb7eeac5b58c139115186d3f49d0b19cf64b0e03d7e2763d4fd9856197fdc2e76ae8a233ac37751

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z5140034.exe
    Filesize

    499KB

    MD5

    3abbfa448b60de10f3fbda079fc1ede1

    SHA1

    9be3b2dc46377c0ce21809fffd2bd5a3b88a0b46

    SHA256

    ab46c18d29907aae620962f7302a257d3a5789cd8f58adc2191e1569ec2b64fc

    SHA512

    604374b8fd993806979ac89d65e2710d542c4eed557623db1bb7eeac5b58c139115186d3f49d0b19cf64b0e03d7e2763d4fd9856197fdc2e76ae8a233ac37751

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0075553.exe
    Filesize

    860KB

    MD5

    9fe4f348592f5abfac13127b76ee54af

    SHA1

    fb3a82f325d56a3e91613d90a253ea11f52c3033

    SHA256

    b07f17bac1312c58426b60c9779a8a6d74c7f4d746021b51438d5967374192dc

    SHA512

    8d65124e66d310129d7c9ac3ab522e0d3df3567317292a486426e22f4edf135f31244983502e91849a408d458de252c3595a5647c19718daf3940a5f91143f59

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0075553.exe
    Filesize

    860KB

    MD5

    9fe4f348592f5abfac13127b76ee54af

    SHA1

    fb3a82f325d56a3e91613d90a253ea11f52c3033

    SHA256

    b07f17bac1312c58426b60c9779a8a6d74c7f4d746021b51438d5967374192dc

    SHA512

    8d65124e66d310129d7c9ac3ab522e0d3df3567317292a486426e22f4edf135f31244983502e91849a408d458de252c3595a5647c19718daf3940a5f91143f59

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0075553.exe
    Filesize

    860KB

    MD5

    9fe4f348592f5abfac13127b76ee54af

    SHA1

    fb3a82f325d56a3e91613d90a253ea11f52c3033

    SHA256

    b07f17bac1312c58426b60c9779a8a6d74c7f4d746021b51438d5967374192dc

    SHA512

    8d65124e66d310129d7c9ac3ab522e0d3df3567317292a486426e22f4edf135f31244983502e91849a408d458de252c3595a5647c19718daf3940a5f91143f59

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0075553.exe
    Filesize

    860KB

    MD5

    9fe4f348592f5abfac13127b76ee54af

    SHA1

    fb3a82f325d56a3e91613d90a253ea11f52c3033

    SHA256

    b07f17bac1312c58426b60c9779a8a6d74c7f4d746021b51438d5967374192dc

    SHA512

    8d65124e66d310129d7c9ac3ab522e0d3df3567317292a486426e22f4edf135f31244983502e91849a408d458de252c3595a5647c19718daf3940a5f91143f59

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0075553.exe
    Filesize

    860KB

    MD5

    9fe4f348592f5abfac13127b76ee54af

    SHA1

    fb3a82f325d56a3e91613d90a253ea11f52c3033

    SHA256

    b07f17bac1312c58426b60c9779a8a6d74c7f4d746021b51438d5967374192dc

    SHA512

    8d65124e66d310129d7c9ac3ab522e0d3df3567317292a486426e22f4edf135f31244983502e91849a408d458de252c3595a5647c19718daf3940a5f91143f59

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0075553.exe
    Filesize

    860KB

    MD5

    9fe4f348592f5abfac13127b76ee54af

    SHA1

    fb3a82f325d56a3e91613d90a253ea11f52c3033

    SHA256

    b07f17bac1312c58426b60c9779a8a6d74c7f4d746021b51438d5967374192dc

    SHA512

    8d65124e66d310129d7c9ac3ab522e0d3df3567317292a486426e22f4edf135f31244983502e91849a408d458de252c3595a5647c19718daf3940a5f91143f59

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0075553.exe
    Filesize

    860KB

    MD5

    9fe4f348592f5abfac13127b76ee54af

    SHA1

    fb3a82f325d56a3e91613d90a253ea11f52c3033

    SHA256

    b07f17bac1312c58426b60c9779a8a6d74c7f4d746021b51438d5967374192dc

    SHA512

    8d65124e66d310129d7c9ac3ab522e0d3df3567317292a486426e22f4edf135f31244983502e91849a408d458de252c3595a5647c19718daf3940a5f91143f59

  • memory/2884-58-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2884-60-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2884-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2884-56-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2884-55-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2884-54-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2884-53-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2884-62-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB