Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 06:58

General

  • Target

    f506a83685bb87c1fbb0afb5aad9b0f359edfa24a3128e0705be15e62b6c1907.exe

  • Size

    1.3MB

  • MD5

    6066a5520bb75443eee8c1aab00e3d22

  • SHA1

    75714d7e8bfacf59d63f5a1fa124e17f1533df79

  • SHA256

    f506a83685bb87c1fbb0afb5aad9b0f359edfa24a3128e0705be15e62b6c1907

  • SHA512

    d7bea42d272a30d40a969b7dffe96c524c62d538f15e4165e9862dc471f9d27fb0c6e099f279dc8c36386ba7afc514e0e8de343c8b980c7ae878ad7aa10a3622

  • SSDEEP

    24576:MyrIP8N6aRPnW4HTVNAxoCLFzfhsgvmD/lYAztq4XUNLKdpZdCXeqzYBf2LPeFW:7rIfGPW4HTVN1CLFNsgv524L8pr+0c

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f506a83685bb87c1fbb0afb5aad9b0f359edfa24a3128e0705be15e62b6c1907.exe
    "C:\Users\Admin\AppData\Local\Temp\f506a83685bb87c1fbb0afb5aad9b0f359edfa24a3128e0705be15e62b6c1907.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0624881.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0624881.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7904702.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7904702.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2352
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8259707.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8259707.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2840450.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2840450.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2752
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9406297.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9406297.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2808
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2540
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2524

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0624881.exe

          Filesize

          1.2MB

          MD5

          5cfe0b101025b6f96acea0acfac337b4

          SHA1

          3b28fc0c1847759641b103efe35aa1040830d33e

          SHA256

          4da6cfb5b4e7a59f7b352d9cff6d2b727a4beda2a4a140ca6369ff9d53e9e660

          SHA512

          5073ef5dc0f01a4715c383341e8fa2d02ec907201729598c8d4efaad4adaae2b92197907240a34f06212aa66640cfcea2ee7e1a2740a5a9b11f14c870d667472

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0624881.exe

          Filesize

          1.2MB

          MD5

          5cfe0b101025b6f96acea0acfac337b4

          SHA1

          3b28fc0c1847759641b103efe35aa1040830d33e

          SHA256

          4da6cfb5b4e7a59f7b352d9cff6d2b727a4beda2a4a140ca6369ff9d53e9e660

          SHA512

          5073ef5dc0f01a4715c383341e8fa2d02ec907201729598c8d4efaad4adaae2b92197907240a34f06212aa66640cfcea2ee7e1a2740a5a9b11f14c870d667472

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7904702.exe

          Filesize

          1.0MB

          MD5

          0dd13aaea0726e7f59b852237fa6fa18

          SHA1

          f5f4cb839842383fd58ba75ed8b4ce51530d2172

          SHA256

          257e14a6b9e3a19b4621c720b702d6dbe781689530b990dc9f78e4ea6731c341

          SHA512

          395b3b5fd86c191df5a2dc5b4bbd10d4e10b8cb641310474b4f26f6115ea26f0ec094a1013e21eb0c7f1ec2cb20d7a94f1da2e623290c1bd59437cd9692264ac

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7904702.exe

          Filesize

          1.0MB

          MD5

          0dd13aaea0726e7f59b852237fa6fa18

          SHA1

          f5f4cb839842383fd58ba75ed8b4ce51530d2172

          SHA256

          257e14a6b9e3a19b4621c720b702d6dbe781689530b990dc9f78e4ea6731c341

          SHA512

          395b3b5fd86c191df5a2dc5b4bbd10d4e10b8cb641310474b4f26f6115ea26f0ec094a1013e21eb0c7f1ec2cb20d7a94f1da2e623290c1bd59437cd9692264ac

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8259707.exe

          Filesize

          885KB

          MD5

          8ff7ce45757f6f632a860a682215a08f

          SHA1

          a0367eb0f5972a4c6963bc7aaa223901ed0d1472

          SHA256

          8fbfbda9482b9b723dbe8255f65c365f1539bbea3ed26f7644bab7f84ddcdc69

          SHA512

          b0cdba8cd29317d236bfea8f30654751a77baa017171c18021f54d18aa21efa6b78c17b1cf606b490f14bf07d1c6eeb69a1f4a2173a16e85262ec64760737851

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8259707.exe

          Filesize

          885KB

          MD5

          8ff7ce45757f6f632a860a682215a08f

          SHA1

          a0367eb0f5972a4c6963bc7aaa223901ed0d1472

          SHA256

          8fbfbda9482b9b723dbe8255f65c365f1539bbea3ed26f7644bab7f84ddcdc69

          SHA512

          b0cdba8cd29317d236bfea8f30654751a77baa017171c18021f54d18aa21efa6b78c17b1cf606b490f14bf07d1c6eeb69a1f4a2173a16e85262ec64760737851

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2840450.exe

          Filesize

          494KB

          MD5

          b620f1fc222376bf413be10c6841139b

          SHA1

          b066ef51da98d091ed610c4edac38bba0acb4c9d

          SHA256

          ce378774391a2fca50d7d2e4fd833c84b581a71865e2979b38dcf053a3eced43

          SHA512

          99cb2988c166d3635c2366b496d969c0f9822e25fc2a18bda86aa1c7af7855f299790d34d852f8fb8d73dc37ea5b16a06fcb32db8059a852356b72a245ca6b6b

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2840450.exe

          Filesize

          494KB

          MD5

          b620f1fc222376bf413be10c6841139b

          SHA1

          b066ef51da98d091ed610c4edac38bba0acb4c9d

          SHA256

          ce378774391a2fca50d7d2e4fd833c84b581a71865e2979b38dcf053a3eced43

          SHA512

          99cb2988c166d3635c2366b496d969c0f9822e25fc2a18bda86aa1c7af7855f299790d34d852f8fb8d73dc37ea5b16a06fcb32db8059a852356b72a245ca6b6b

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9406297.exe

          Filesize

          860KB

          MD5

          760553b3cb22e0b219f5f7b203be694f

          SHA1

          223a1e7e5e61eab37016be8ae2ddd73e8807aa9c

          SHA256

          3224a60f883e512fdd6affac2bf8ca744a7792e6ac8470776a8c51e0861abd7c

          SHA512

          bd0aa74d7c7b9d6faf020b88a7ae1c007b524f7122f762e28effc4c0ac50b713f4610b9fb4d305fc5e37943860d7a71dc8e62b31c4431f23e103ba3a95e5e9aa

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9406297.exe

          Filesize

          860KB

          MD5

          760553b3cb22e0b219f5f7b203be694f

          SHA1

          223a1e7e5e61eab37016be8ae2ddd73e8807aa9c

          SHA256

          3224a60f883e512fdd6affac2bf8ca744a7792e6ac8470776a8c51e0861abd7c

          SHA512

          bd0aa74d7c7b9d6faf020b88a7ae1c007b524f7122f762e28effc4c0ac50b713f4610b9fb4d305fc5e37943860d7a71dc8e62b31c4431f23e103ba3a95e5e9aa

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9406297.exe

          Filesize

          860KB

          MD5

          760553b3cb22e0b219f5f7b203be694f

          SHA1

          223a1e7e5e61eab37016be8ae2ddd73e8807aa9c

          SHA256

          3224a60f883e512fdd6affac2bf8ca744a7792e6ac8470776a8c51e0861abd7c

          SHA512

          bd0aa74d7c7b9d6faf020b88a7ae1c007b524f7122f762e28effc4c0ac50b713f4610b9fb4d305fc5e37943860d7a71dc8e62b31c4431f23e103ba3a95e5e9aa

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0624881.exe

          Filesize

          1.2MB

          MD5

          5cfe0b101025b6f96acea0acfac337b4

          SHA1

          3b28fc0c1847759641b103efe35aa1040830d33e

          SHA256

          4da6cfb5b4e7a59f7b352d9cff6d2b727a4beda2a4a140ca6369ff9d53e9e660

          SHA512

          5073ef5dc0f01a4715c383341e8fa2d02ec907201729598c8d4efaad4adaae2b92197907240a34f06212aa66640cfcea2ee7e1a2740a5a9b11f14c870d667472

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0624881.exe

          Filesize

          1.2MB

          MD5

          5cfe0b101025b6f96acea0acfac337b4

          SHA1

          3b28fc0c1847759641b103efe35aa1040830d33e

          SHA256

          4da6cfb5b4e7a59f7b352d9cff6d2b727a4beda2a4a140ca6369ff9d53e9e660

          SHA512

          5073ef5dc0f01a4715c383341e8fa2d02ec907201729598c8d4efaad4adaae2b92197907240a34f06212aa66640cfcea2ee7e1a2740a5a9b11f14c870d667472

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7904702.exe

          Filesize

          1.0MB

          MD5

          0dd13aaea0726e7f59b852237fa6fa18

          SHA1

          f5f4cb839842383fd58ba75ed8b4ce51530d2172

          SHA256

          257e14a6b9e3a19b4621c720b702d6dbe781689530b990dc9f78e4ea6731c341

          SHA512

          395b3b5fd86c191df5a2dc5b4bbd10d4e10b8cb641310474b4f26f6115ea26f0ec094a1013e21eb0c7f1ec2cb20d7a94f1da2e623290c1bd59437cd9692264ac

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7904702.exe

          Filesize

          1.0MB

          MD5

          0dd13aaea0726e7f59b852237fa6fa18

          SHA1

          f5f4cb839842383fd58ba75ed8b4ce51530d2172

          SHA256

          257e14a6b9e3a19b4621c720b702d6dbe781689530b990dc9f78e4ea6731c341

          SHA512

          395b3b5fd86c191df5a2dc5b4bbd10d4e10b8cb641310474b4f26f6115ea26f0ec094a1013e21eb0c7f1ec2cb20d7a94f1da2e623290c1bd59437cd9692264ac

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8259707.exe

          Filesize

          885KB

          MD5

          8ff7ce45757f6f632a860a682215a08f

          SHA1

          a0367eb0f5972a4c6963bc7aaa223901ed0d1472

          SHA256

          8fbfbda9482b9b723dbe8255f65c365f1539bbea3ed26f7644bab7f84ddcdc69

          SHA512

          b0cdba8cd29317d236bfea8f30654751a77baa017171c18021f54d18aa21efa6b78c17b1cf606b490f14bf07d1c6eeb69a1f4a2173a16e85262ec64760737851

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8259707.exe

          Filesize

          885KB

          MD5

          8ff7ce45757f6f632a860a682215a08f

          SHA1

          a0367eb0f5972a4c6963bc7aaa223901ed0d1472

          SHA256

          8fbfbda9482b9b723dbe8255f65c365f1539bbea3ed26f7644bab7f84ddcdc69

          SHA512

          b0cdba8cd29317d236bfea8f30654751a77baa017171c18021f54d18aa21efa6b78c17b1cf606b490f14bf07d1c6eeb69a1f4a2173a16e85262ec64760737851

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2840450.exe

          Filesize

          494KB

          MD5

          b620f1fc222376bf413be10c6841139b

          SHA1

          b066ef51da98d091ed610c4edac38bba0acb4c9d

          SHA256

          ce378774391a2fca50d7d2e4fd833c84b581a71865e2979b38dcf053a3eced43

          SHA512

          99cb2988c166d3635c2366b496d969c0f9822e25fc2a18bda86aa1c7af7855f299790d34d852f8fb8d73dc37ea5b16a06fcb32db8059a852356b72a245ca6b6b

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2840450.exe

          Filesize

          494KB

          MD5

          b620f1fc222376bf413be10c6841139b

          SHA1

          b066ef51da98d091ed610c4edac38bba0acb4c9d

          SHA256

          ce378774391a2fca50d7d2e4fd833c84b581a71865e2979b38dcf053a3eced43

          SHA512

          99cb2988c166d3635c2366b496d969c0f9822e25fc2a18bda86aa1c7af7855f299790d34d852f8fb8d73dc37ea5b16a06fcb32db8059a852356b72a245ca6b6b

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9406297.exe

          Filesize

          860KB

          MD5

          760553b3cb22e0b219f5f7b203be694f

          SHA1

          223a1e7e5e61eab37016be8ae2ddd73e8807aa9c

          SHA256

          3224a60f883e512fdd6affac2bf8ca744a7792e6ac8470776a8c51e0861abd7c

          SHA512

          bd0aa74d7c7b9d6faf020b88a7ae1c007b524f7122f762e28effc4c0ac50b713f4610b9fb4d305fc5e37943860d7a71dc8e62b31c4431f23e103ba3a95e5e9aa

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9406297.exe

          Filesize

          860KB

          MD5

          760553b3cb22e0b219f5f7b203be694f

          SHA1

          223a1e7e5e61eab37016be8ae2ddd73e8807aa9c

          SHA256

          3224a60f883e512fdd6affac2bf8ca744a7792e6ac8470776a8c51e0861abd7c

          SHA512

          bd0aa74d7c7b9d6faf020b88a7ae1c007b524f7122f762e28effc4c0ac50b713f4610b9fb4d305fc5e37943860d7a71dc8e62b31c4431f23e103ba3a95e5e9aa

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9406297.exe

          Filesize

          860KB

          MD5

          760553b3cb22e0b219f5f7b203be694f

          SHA1

          223a1e7e5e61eab37016be8ae2ddd73e8807aa9c

          SHA256

          3224a60f883e512fdd6affac2bf8ca744a7792e6ac8470776a8c51e0861abd7c

          SHA512

          bd0aa74d7c7b9d6faf020b88a7ae1c007b524f7122f762e28effc4c0ac50b713f4610b9fb4d305fc5e37943860d7a71dc8e62b31c4431f23e103ba3a95e5e9aa

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9406297.exe

          Filesize

          860KB

          MD5

          760553b3cb22e0b219f5f7b203be694f

          SHA1

          223a1e7e5e61eab37016be8ae2ddd73e8807aa9c

          SHA256

          3224a60f883e512fdd6affac2bf8ca744a7792e6ac8470776a8c51e0861abd7c

          SHA512

          bd0aa74d7c7b9d6faf020b88a7ae1c007b524f7122f762e28effc4c0ac50b713f4610b9fb4d305fc5e37943860d7a71dc8e62b31c4431f23e103ba3a95e5e9aa

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9406297.exe

          Filesize

          860KB

          MD5

          760553b3cb22e0b219f5f7b203be694f

          SHA1

          223a1e7e5e61eab37016be8ae2ddd73e8807aa9c

          SHA256

          3224a60f883e512fdd6affac2bf8ca744a7792e6ac8470776a8c51e0861abd7c

          SHA512

          bd0aa74d7c7b9d6faf020b88a7ae1c007b524f7122f762e28effc4c0ac50b713f4610b9fb4d305fc5e37943860d7a71dc8e62b31c4431f23e103ba3a95e5e9aa

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9406297.exe

          Filesize

          860KB

          MD5

          760553b3cb22e0b219f5f7b203be694f

          SHA1

          223a1e7e5e61eab37016be8ae2ddd73e8807aa9c

          SHA256

          3224a60f883e512fdd6affac2bf8ca744a7792e6ac8470776a8c51e0861abd7c

          SHA512

          bd0aa74d7c7b9d6faf020b88a7ae1c007b524f7122f762e28effc4c0ac50b713f4610b9fb4d305fc5e37943860d7a71dc8e62b31c4431f23e103ba3a95e5e9aa

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9406297.exe

          Filesize

          860KB

          MD5

          760553b3cb22e0b219f5f7b203be694f

          SHA1

          223a1e7e5e61eab37016be8ae2ddd73e8807aa9c

          SHA256

          3224a60f883e512fdd6affac2bf8ca744a7792e6ac8470776a8c51e0861abd7c

          SHA512

          bd0aa74d7c7b9d6faf020b88a7ae1c007b524f7122f762e28effc4c0ac50b713f4610b9fb4d305fc5e37943860d7a71dc8e62b31c4431f23e103ba3a95e5e9aa

        • memory/2540-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2540-58-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2540-62-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2540-60-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2540-56-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2540-55-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2540-54-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2540-53-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB