Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 06:57

General

  • Target

    a6dfe45b0323f8e48d3549b9086028b76744b783f609ae6902ebbd7c06726e97.exe

  • Size

    1.3MB

  • MD5

    8a2c349dde632cbf07f78b9af319ca42

  • SHA1

    1df46cd3ea8880adfb8c1ecf41c716e549719d1b

  • SHA256

    a6dfe45b0323f8e48d3549b9086028b76744b783f609ae6902ebbd7c06726e97

  • SHA512

    0aad364d841ac05ab7f0e04e17f321ed1435e56d84b35f40aa2f73ea68eb4436df7ff1666f50e614de36a9ce2abb798299f32b6d3c9129fb6ee07e15b4bfd2f9

  • SSDEEP

    24576:NyZYFEFI5bMjjyhPAS7QatmmFTkNFfdO/Bfplz7kHx5:oZ0WItXmwQArTkNFk/Bfvz

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6dfe45b0323f8e48d3549b9086028b76744b783f609ae6902ebbd7c06726e97.exe
    "C:\Users\Admin\AppData\Local\Temp\a6dfe45b0323f8e48d3549b9086028b76744b783f609ae6902ebbd7c06726e97.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9795548.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9795548.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9648676.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9648676.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2800240.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2800240.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2696
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1734636.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1734636.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2660
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7618734.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7618734.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2916
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2656
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9795548.exe

    Filesize

    1.2MB

    MD5

    0f1f0cd277c4b6e90d58454a4e769bbc

    SHA1

    37cd31fbc7443517bfd981bcfe21089196ea5575

    SHA256

    8a5c43b8d33722f152d3c3b8809383d36de969905d3fd8b6562aecfbd722a94f

    SHA512

    242338e6cb174bb923643e44fc8e64d019d41b419bf04b7770dc533e4e4b190a4d900e0aa3018af28e15a321ee98e0da091e008b91ca7df710552c090c02b83b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9795548.exe

    Filesize

    1.2MB

    MD5

    0f1f0cd277c4b6e90d58454a4e769bbc

    SHA1

    37cd31fbc7443517bfd981bcfe21089196ea5575

    SHA256

    8a5c43b8d33722f152d3c3b8809383d36de969905d3fd8b6562aecfbd722a94f

    SHA512

    242338e6cb174bb923643e44fc8e64d019d41b419bf04b7770dc533e4e4b190a4d900e0aa3018af28e15a321ee98e0da091e008b91ca7df710552c090c02b83b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9648676.exe

    Filesize

    1.0MB

    MD5

    3f5719cd4b7bf296b9050983967b1a36

    SHA1

    db2b5d25597e84fcd413c84b64b5c93efca180a9

    SHA256

    60777dcd86de090b583138f0906474e74aa5f761f348c37e8f24715afe7ec045

    SHA512

    b136e070ec645f3a8c60bf7de2878ed1920fcd42fece62bb61e2b202453a62a1477484398dad50e347ec7ef283d9c2cd196e5fa869092b9d6e3d9d3d9f42b053

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9648676.exe

    Filesize

    1.0MB

    MD5

    3f5719cd4b7bf296b9050983967b1a36

    SHA1

    db2b5d25597e84fcd413c84b64b5c93efca180a9

    SHA256

    60777dcd86de090b583138f0906474e74aa5f761f348c37e8f24715afe7ec045

    SHA512

    b136e070ec645f3a8c60bf7de2878ed1920fcd42fece62bb61e2b202453a62a1477484398dad50e347ec7ef283d9c2cd196e5fa869092b9d6e3d9d3d9f42b053

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2800240.exe

    Filesize

    880KB

    MD5

    e3d4c4e12659eee7c62f459c9daff525

    SHA1

    f0f3b9daf3fbfc835fb5a782f25d697cfdca067a

    SHA256

    5e657fcad90d0f2b20b5357f638eeb153651f419af30960cf0123b77d4846b7d

    SHA512

    10a50669fa1252c01c4d04f07b3679ba6d4491ef29a61a53320afc9c8f9380c9057301fec97617630d58ceea7fac56f2e4786f8147ed7a3d2ca3b90a8c66a28c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2800240.exe

    Filesize

    880KB

    MD5

    e3d4c4e12659eee7c62f459c9daff525

    SHA1

    f0f3b9daf3fbfc835fb5a782f25d697cfdca067a

    SHA256

    5e657fcad90d0f2b20b5357f638eeb153651f419af30960cf0123b77d4846b7d

    SHA512

    10a50669fa1252c01c4d04f07b3679ba6d4491ef29a61a53320afc9c8f9380c9057301fec97617630d58ceea7fac56f2e4786f8147ed7a3d2ca3b90a8c66a28c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1734636.exe

    Filesize

    490KB

    MD5

    a4ae6b7158f63c747ab338b9844c728f

    SHA1

    847259b96f0a7764b3b4a4fc4f0e781b8ac8705f

    SHA256

    6561464a031c21017446bff40aa74b5205d053658dc1ba5fb1d945651f499de6

    SHA512

    7596aec5eba866a184fa3915d68a18064fc1eb64b89a0d20ae87050b36c440a61337e8626e5f5b02c7c60bf6b604c001f91ada62694487d75809c59fa4c32246

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1734636.exe

    Filesize

    490KB

    MD5

    a4ae6b7158f63c747ab338b9844c728f

    SHA1

    847259b96f0a7764b3b4a4fc4f0e781b8ac8705f

    SHA256

    6561464a031c21017446bff40aa74b5205d053658dc1ba5fb1d945651f499de6

    SHA512

    7596aec5eba866a184fa3915d68a18064fc1eb64b89a0d20ae87050b36c440a61337e8626e5f5b02c7c60bf6b604c001f91ada62694487d75809c59fa4c32246

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7618734.exe

    Filesize

    860KB

    MD5

    6831f7d57741067e4b0082d7fc4f8e0b

    SHA1

    f72de97cc79f37ae2ca762ef9429f2bb7d8996eb

    SHA256

    ca019474a96dcc3ce3b90298e85b464a86752ff73d94c323621dbd651c7932a6

    SHA512

    d3db9056f4de613eab49eab087d36120e5d03a50da7e7451794241efe1d2a43f9c567ef7b36b178029544b75148feb16e1dabe20fc7daebd6fd5a9713676b014

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7618734.exe

    Filesize

    860KB

    MD5

    6831f7d57741067e4b0082d7fc4f8e0b

    SHA1

    f72de97cc79f37ae2ca762ef9429f2bb7d8996eb

    SHA256

    ca019474a96dcc3ce3b90298e85b464a86752ff73d94c323621dbd651c7932a6

    SHA512

    d3db9056f4de613eab49eab087d36120e5d03a50da7e7451794241efe1d2a43f9c567ef7b36b178029544b75148feb16e1dabe20fc7daebd6fd5a9713676b014

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7618734.exe

    Filesize

    860KB

    MD5

    6831f7d57741067e4b0082d7fc4f8e0b

    SHA1

    f72de97cc79f37ae2ca762ef9429f2bb7d8996eb

    SHA256

    ca019474a96dcc3ce3b90298e85b464a86752ff73d94c323621dbd651c7932a6

    SHA512

    d3db9056f4de613eab49eab087d36120e5d03a50da7e7451794241efe1d2a43f9c567ef7b36b178029544b75148feb16e1dabe20fc7daebd6fd5a9713676b014

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9795548.exe

    Filesize

    1.2MB

    MD5

    0f1f0cd277c4b6e90d58454a4e769bbc

    SHA1

    37cd31fbc7443517bfd981bcfe21089196ea5575

    SHA256

    8a5c43b8d33722f152d3c3b8809383d36de969905d3fd8b6562aecfbd722a94f

    SHA512

    242338e6cb174bb923643e44fc8e64d019d41b419bf04b7770dc533e4e4b190a4d900e0aa3018af28e15a321ee98e0da091e008b91ca7df710552c090c02b83b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9795548.exe

    Filesize

    1.2MB

    MD5

    0f1f0cd277c4b6e90d58454a4e769bbc

    SHA1

    37cd31fbc7443517bfd981bcfe21089196ea5575

    SHA256

    8a5c43b8d33722f152d3c3b8809383d36de969905d3fd8b6562aecfbd722a94f

    SHA512

    242338e6cb174bb923643e44fc8e64d019d41b419bf04b7770dc533e4e4b190a4d900e0aa3018af28e15a321ee98e0da091e008b91ca7df710552c090c02b83b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9648676.exe

    Filesize

    1.0MB

    MD5

    3f5719cd4b7bf296b9050983967b1a36

    SHA1

    db2b5d25597e84fcd413c84b64b5c93efca180a9

    SHA256

    60777dcd86de090b583138f0906474e74aa5f761f348c37e8f24715afe7ec045

    SHA512

    b136e070ec645f3a8c60bf7de2878ed1920fcd42fece62bb61e2b202453a62a1477484398dad50e347ec7ef283d9c2cd196e5fa869092b9d6e3d9d3d9f42b053

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9648676.exe

    Filesize

    1.0MB

    MD5

    3f5719cd4b7bf296b9050983967b1a36

    SHA1

    db2b5d25597e84fcd413c84b64b5c93efca180a9

    SHA256

    60777dcd86de090b583138f0906474e74aa5f761f348c37e8f24715afe7ec045

    SHA512

    b136e070ec645f3a8c60bf7de2878ed1920fcd42fece62bb61e2b202453a62a1477484398dad50e347ec7ef283d9c2cd196e5fa869092b9d6e3d9d3d9f42b053

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2800240.exe

    Filesize

    880KB

    MD5

    e3d4c4e12659eee7c62f459c9daff525

    SHA1

    f0f3b9daf3fbfc835fb5a782f25d697cfdca067a

    SHA256

    5e657fcad90d0f2b20b5357f638eeb153651f419af30960cf0123b77d4846b7d

    SHA512

    10a50669fa1252c01c4d04f07b3679ba6d4491ef29a61a53320afc9c8f9380c9057301fec97617630d58ceea7fac56f2e4786f8147ed7a3d2ca3b90a8c66a28c

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2800240.exe

    Filesize

    880KB

    MD5

    e3d4c4e12659eee7c62f459c9daff525

    SHA1

    f0f3b9daf3fbfc835fb5a782f25d697cfdca067a

    SHA256

    5e657fcad90d0f2b20b5357f638eeb153651f419af30960cf0123b77d4846b7d

    SHA512

    10a50669fa1252c01c4d04f07b3679ba6d4491ef29a61a53320afc9c8f9380c9057301fec97617630d58ceea7fac56f2e4786f8147ed7a3d2ca3b90a8c66a28c

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z1734636.exe

    Filesize

    490KB

    MD5

    a4ae6b7158f63c747ab338b9844c728f

    SHA1

    847259b96f0a7764b3b4a4fc4f0e781b8ac8705f

    SHA256

    6561464a031c21017446bff40aa74b5205d053658dc1ba5fb1d945651f499de6

    SHA512

    7596aec5eba866a184fa3915d68a18064fc1eb64b89a0d20ae87050b36c440a61337e8626e5f5b02c7c60bf6b604c001f91ada62694487d75809c59fa4c32246

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z1734636.exe

    Filesize

    490KB

    MD5

    a4ae6b7158f63c747ab338b9844c728f

    SHA1

    847259b96f0a7764b3b4a4fc4f0e781b8ac8705f

    SHA256

    6561464a031c21017446bff40aa74b5205d053658dc1ba5fb1d945651f499de6

    SHA512

    7596aec5eba866a184fa3915d68a18064fc1eb64b89a0d20ae87050b36c440a61337e8626e5f5b02c7c60bf6b604c001f91ada62694487d75809c59fa4c32246

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7618734.exe

    Filesize

    860KB

    MD5

    6831f7d57741067e4b0082d7fc4f8e0b

    SHA1

    f72de97cc79f37ae2ca762ef9429f2bb7d8996eb

    SHA256

    ca019474a96dcc3ce3b90298e85b464a86752ff73d94c323621dbd651c7932a6

    SHA512

    d3db9056f4de613eab49eab087d36120e5d03a50da7e7451794241efe1d2a43f9c567ef7b36b178029544b75148feb16e1dabe20fc7daebd6fd5a9713676b014

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7618734.exe

    Filesize

    860KB

    MD5

    6831f7d57741067e4b0082d7fc4f8e0b

    SHA1

    f72de97cc79f37ae2ca762ef9429f2bb7d8996eb

    SHA256

    ca019474a96dcc3ce3b90298e85b464a86752ff73d94c323621dbd651c7932a6

    SHA512

    d3db9056f4de613eab49eab087d36120e5d03a50da7e7451794241efe1d2a43f9c567ef7b36b178029544b75148feb16e1dabe20fc7daebd6fd5a9713676b014

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7618734.exe

    Filesize

    860KB

    MD5

    6831f7d57741067e4b0082d7fc4f8e0b

    SHA1

    f72de97cc79f37ae2ca762ef9429f2bb7d8996eb

    SHA256

    ca019474a96dcc3ce3b90298e85b464a86752ff73d94c323621dbd651c7932a6

    SHA512

    d3db9056f4de613eab49eab087d36120e5d03a50da7e7451794241efe1d2a43f9c567ef7b36b178029544b75148feb16e1dabe20fc7daebd6fd5a9713676b014

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7618734.exe

    Filesize

    860KB

    MD5

    6831f7d57741067e4b0082d7fc4f8e0b

    SHA1

    f72de97cc79f37ae2ca762ef9429f2bb7d8996eb

    SHA256

    ca019474a96dcc3ce3b90298e85b464a86752ff73d94c323621dbd651c7932a6

    SHA512

    d3db9056f4de613eab49eab087d36120e5d03a50da7e7451794241efe1d2a43f9c567ef7b36b178029544b75148feb16e1dabe20fc7daebd6fd5a9713676b014

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7618734.exe

    Filesize

    860KB

    MD5

    6831f7d57741067e4b0082d7fc4f8e0b

    SHA1

    f72de97cc79f37ae2ca762ef9429f2bb7d8996eb

    SHA256

    ca019474a96dcc3ce3b90298e85b464a86752ff73d94c323621dbd651c7932a6

    SHA512

    d3db9056f4de613eab49eab087d36120e5d03a50da7e7451794241efe1d2a43f9c567ef7b36b178029544b75148feb16e1dabe20fc7daebd6fd5a9713676b014

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7618734.exe

    Filesize

    860KB

    MD5

    6831f7d57741067e4b0082d7fc4f8e0b

    SHA1

    f72de97cc79f37ae2ca762ef9429f2bb7d8996eb

    SHA256

    ca019474a96dcc3ce3b90298e85b464a86752ff73d94c323621dbd651c7932a6

    SHA512

    d3db9056f4de613eab49eab087d36120e5d03a50da7e7451794241efe1d2a43f9c567ef7b36b178029544b75148feb16e1dabe20fc7daebd6fd5a9713676b014

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7618734.exe

    Filesize

    860KB

    MD5

    6831f7d57741067e4b0082d7fc4f8e0b

    SHA1

    f72de97cc79f37ae2ca762ef9429f2bb7d8996eb

    SHA256

    ca019474a96dcc3ce3b90298e85b464a86752ff73d94c323621dbd651c7932a6

    SHA512

    d3db9056f4de613eab49eab087d36120e5d03a50da7e7451794241efe1d2a43f9c567ef7b36b178029544b75148feb16e1dabe20fc7daebd6fd5a9713676b014

  • memory/2656-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2656-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2656-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2656-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2656-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2656-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2656-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2656-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB