Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 07:03

General

  • Target

    df8b2d83eb4ce7b28f261c1b6b1b74a0169b6be73331785878ef87c871effb13.exe

  • Size

    1.3MB

  • MD5

    3b1e08ca3abc86f5b1962ca72968d002

  • SHA1

    db0933346ad534d05439cd4e8a1899610ff74580

  • SHA256

    df8b2d83eb4ce7b28f261c1b6b1b74a0169b6be73331785878ef87c871effb13

  • SHA512

    ba5a7d922dd3db2f40c2b8140132a3af6a99e810165d0cae4f51649327a64ac41b54ad65e4e775343dacd323ad4a7fec27632ebf4a64af4a4d46de2fa76845ed

  • SSDEEP

    24576:pyOlP6zqYXVVL57GSOLw7KoSVCkj+YKpKiBf3l0jayAMEkV6S6iZu2fotxccHXd:cSP6zqYTWs7KoSVHa53f7yAR9S5YX

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df8b2d83eb4ce7b28f261c1b6b1b74a0169b6be73331785878ef87c871effb13.exe
    "C:\Users\Admin\AppData\Local\Temp\df8b2d83eb4ce7b28f261c1b6b1b74a0169b6be73331785878ef87c871effb13.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3101259.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3101259.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8103802.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8103802.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1156
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4196563.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4196563.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2716
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7434337.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7434337.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1968
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8332596.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8332596.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2784
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2644
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2516

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3101259.exe

          Filesize

          1.2MB

          MD5

          d64eda032be0fb3f17a745dd42d1dd21

          SHA1

          74e80524e0fd50e4b483009ee5f0978c0e0cf51e

          SHA256

          3e3f99a723c40d423f9ac6486bb4a41a122d871fa014bda9f53dee7d0ea4e6f0

          SHA512

          cee96676cde8f0511eeaef540df3f941f3159c49646e18b3c2da32bc92491435decc01c27098a049b30b69b735cb7472a19fe737f8b89b086316e5413263fe4e

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3101259.exe

          Filesize

          1.2MB

          MD5

          d64eda032be0fb3f17a745dd42d1dd21

          SHA1

          74e80524e0fd50e4b483009ee5f0978c0e0cf51e

          SHA256

          3e3f99a723c40d423f9ac6486bb4a41a122d871fa014bda9f53dee7d0ea4e6f0

          SHA512

          cee96676cde8f0511eeaef540df3f941f3159c49646e18b3c2da32bc92491435decc01c27098a049b30b69b735cb7472a19fe737f8b89b086316e5413263fe4e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8103802.exe

          Filesize

          1.0MB

          MD5

          bd83cfc80dc18cb500d12b86284220ff

          SHA1

          32bf140635754e1d50a4715b470e4fdf7077e969

          SHA256

          e3c1261ea1475cfdc4cf09e424e7fa0d1f228a88ed7824071d7474a78d8f827a

          SHA512

          821d88a612673350497696ac67384c7dbb038232a1edb080c4577ee86d37d5e3d30c3b356922068a6543acb627e99f896812301e4bd45ecb0802b89f587f28d9

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8103802.exe

          Filesize

          1.0MB

          MD5

          bd83cfc80dc18cb500d12b86284220ff

          SHA1

          32bf140635754e1d50a4715b470e4fdf7077e969

          SHA256

          e3c1261ea1475cfdc4cf09e424e7fa0d1f228a88ed7824071d7474a78d8f827a

          SHA512

          821d88a612673350497696ac67384c7dbb038232a1edb080c4577ee86d37d5e3d30c3b356922068a6543acb627e99f896812301e4bd45ecb0802b89f587f28d9

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4196563.exe

          Filesize

          885KB

          MD5

          26aaef30ef7031e2457b9f6fb3a2a247

          SHA1

          61bd2e3c664ad209982b47cb21ec9d6afd1d442c

          SHA256

          55c88f544e63584353a1537e7030dbe1cac47f271a0ccf299bb727024577df51

          SHA512

          4d61cc6e545146aee1615f625067eb31b2845c03839eaef80b950860444c5f159656f9acada4c33df6afd49c7a707e6757bd853c300b9a6f2d1ac59bba46b967

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4196563.exe

          Filesize

          885KB

          MD5

          26aaef30ef7031e2457b9f6fb3a2a247

          SHA1

          61bd2e3c664ad209982b47cb21ec9d6afd1d442c

          SHA256

          55c88f544e63584353a1537e7030dbe1cac47f271a0ccf299bb727024577df51

          SHA512

          4d61cc6e545146aee1615f625067eb31b2845c03839eaef80b950860444c5f159656f9acada4c33df6afd49c7a707e6757bd853c300b9a6f2d1ac59bba46b967

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7434337.exe

          Filesize

          494KB

          MD5

          390850e2bb799fb17e98461af8392880

          SHA1

          b5008086e4f92a2ed390a9a4adbae86f4801eb60

          SHA256

          f0cfca7afdcf89fc4aa0ce5c270836bb0e33ef62542175073197870db69df3bb

          SHA512

          683486530c87cbd127dd9d881332f60b424377738ee31ffb3857d46415c13a085cb933f4ad15b2eb43acc029c904408ce129f9a55c10d1278d8ae14a5ee942ae

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7434337.exe

          Filesize

          494KB

          MD5

          390850e2bb799fb17e98461af8392880

          SHA1

          b5008086e4f92a2ed390a9a4adbae86f4801eb60

          SHA256

          f0cfca7afdcf89fc4aa0ce5c270836bb0e33ef62542175073197870db69df3bb

          SHA512

          683486530c87cbd127dd9d881332f60b424377738ee31ffb3857d46415c13a085cb933f4ad15b2eb43acc029c904408ce129f9a55c10d1278d8ae14a5ee942ae

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8332596.exe

          Filesize

          860KB

          MD5

          bfa1a6d67c55376e84bb1123645e3145

          SHA1

          a266ed0d43517032d79a73507b1a5a1fe186ef52

          SHA256

          df3cb2445115e0fcce0b15496e53be06fb5e8d5a8ff2f7325f967ea5b39c1248

          SHA512

          6a417ccdefe39730e7c0d2fe78d2de77bc0da9a7a195671c5749c24aa0e242d35f8cb87c058a28e5eab7f3deadc464b394189835a3c83ab34124616adc25f86d

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8332596.exe

          Filesize

          860KB

          MD5

          bfa1a6d67c55376e84bb1123645e3145

          SHA1

          a266ed0d43517032d79a73507b1a5a1fe186ef52

          SHA256

          df3cb2445115e0fcce0b15496e53be06fb5e8d5a8ff2f7325f967ea5b39c1248

          SHA512

          6a417ccdefe39730e7c0d2fe78d2de77bc0da9a7a195671c5749c24aa0e242d35f8cb87c058a28e5eab7f3deadc464b394189835a3c83ab34124616adc25f86d

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8332596.exe

          Filesize

          860KB

          MD5

          bfa1a6d67c55376e84bb1123645e3145

          SHA1

          a266ed0d43517032d79a73507b1a5a1fe186ef52

          SHA256

          df3cb2445115e0fcce0b15496e53be06fb5e8d5a8ff2f7325f967ea5b39c1248

          SHA512

          6a417ccdefe39730e7c0d2fe78d2de77bc0da9a7a195671c5749c24aa0e242d35f8cb87c058a28e5eab7f3deadc464b394189835a3c83ab34124616adc25f86d

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3101259.exe

          Filesize

          1.2MB

          MD5

          d64eda032be0fb3f17a745dd42d1dd21

          SHA1

          74e80524e0fd50e4b483009ee5f0978c0e0cf51e

          SHA256

          3e3f99a723c40d423f9ac6486bb4a41a122d871fa014bda9f53dee7d0ea4e6f0

          SHA512

          cee96676cde8f0511eeaef540df3f941f3159c49646e18b3c2da32bc92491435decc01c27098a049b30b69b735cb7472a19fe737f8b89b086316e5413263fe4e

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3101259.exe

          Filesize

          1.2MB

          MD5

          d64eda032be0fb3f17a745dd42d1dd21

          SHA1

          74e80524e0fd50e4b483009ee5f0978c0e0cf51e

          SHA256

          3e3f99a723c40d423f9ac6486bb4a41a122d871fa014bda9f53dee7d0ea4e6f0

          SHA512

          cee96676cde8f0511eeaef540df3f941f3159c49646e18b3c2da32bc92491435decc01c27098a049b30b69b735cb7472a19fe737f8b89b086316e5413263fe4e

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8103802.exe

          Filesize

          1.0MB

          MD5

          bd83cfc80dc18cb500d12b86284220ff

          SHA1

          32bf140635754e1d50a4715b470e4fdf7077e969

          SHA256

          e3c1261ea1475cfdc4cf09e424e7fa0d1f228a88ed7824071d7474a78d8f827a

          SHA512

          821d88a612673350497696ac67384c7dbb038232a1edb080c4577ee86d37d5e3d30c3b356922068a6543acb627e99f896812301e4bd45ecb0802b89f587f28d9

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8103802.exe

          Filesize

          1.0MB

          MD5

          bd83cfc80dc18cb500d12b86284220ff

          SHA1

          32bf140635754e1d50a4715b470e4fdf7077e969

          SHA256

          e3c1261ea1475cfdc4cf09e424e7fa0d1f228a88ed7824071d7474a78d8f827a

          SHA512

          821d88a612673350497696ac67384c7dbb038232a1edb080c4577ee86d37d5e3d30c3b356922068a6543acb627e99f896812301e4bd45ecb0802b89f587f28d9

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4196563.exe

          Filesize

          885KB

          MD5

          26aaef30ef7031e2457b9f6fb3a2a247

          SHA1

          61bd2e3c664ad209982b47cb21ec9d6afd1d442c

          SHA256

          55c88f544e63584353a1537e7030dbe1cac47f271a0ccf299bb727024577df51

          SHA512

          4d61cc6e545146aee1615f625067eb31b2845c03839eaef80b950860444c5f159656f9acada4c33df6afd49c7a707e6757bd853c300b9a6f2d1ac59bba46b967

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4196563.exe

          Filesize

          885KB

          MD5

          26aaef30ef7031e2457b9f6fb3a2a247

          SHA1

          61bd2e3c664ad209982b47cb21ec9d6afd1d442c

          SHA256

          55c88f544e63584353a1537e7030dbe1cac47f271a0ccf299bb727024577df51

          SHA512

          4d61cc6e545146aee1615f625067eb31b2845c03839eaef80b950860444c5f159656f9acada4c33df6afd49c7a707e6757bd853c300b9a6f2d1ac59bba46b967

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7434337.exe

          Filesize

          494KB

          MD5

          390850e2bb799fb17e98461af8392880

          SHA1

          b5008086e4f92a2ed390a9a4adbae86f4801eb60

          SHA256

          f0cfca7afdcf89fc4aa0ce5c270836bb0e33ef62542175073197870db69df3bb

          SHA512

          683486530c87cbd127dd9d881332f60b424377738ee31ffb3857d46415c13a085cb933f4ad15b2eb43acc029c904408ce129f9a55c10d1278d8ae14a5ee942ae

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7434337.exe

          Filesize

          494KB

          MD5

          390850e2bb799fb17e98461af8392880

          SHA1

          b5008086e4f92a2ed390a9a4adbae86f4801eb60

          SHA256

          f0cfca7afdcf89fc4aa0ce5c270836bb0e33ef62542175073197870db69df3bb

          SHA512

          683486530c87cbd127dd9d881332f60b424377738ee31ffb3857d46415c13a085cb933f4ad15b2eb43acc029c904408ce129f9a55c10d1278d8ae14a5ee942ae

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8332596.exe

          Filesize

          860KB

          MD5

          bfa1a6d67c55376e84bb1123645e3145

          SHA1

          a266ed0d43517032d79a73507b1a5a1fe186ef52

          SHA256

          df3cb2445115e0fcce0b15496e53be06fb5e8d5a8ff2f7325f967ea5b39c1248

          SHA512

          6a417ccdefe39730e7c0d2fe78d2de77bc0da9a7a195671c5749c24aa0e242d35f8cb87c058a28e5eab7f3deadc464b394189835a3c83ab34124616adc25f86d

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8332596.exe

          Filesize

          860KB

          MD5

          bfa1a6d67c55376e84bb1123645e3145

          SHA1

          a266ed0d43517032d79a73507b1a5a1fe186ef52

          SHA256

          df3cb2445115e0fcce0b15496e53be06fb5e8d5a8ff2f7325f967ea5b39c1248

          SHA512

          6a417ccdefe39730e7c0d2fe78d2de77bc0da9a7a195671c5749c24aa0e242d35f8cb87c058a28e5eab7f3deadc464b394189835a3c83ab34124616adc25f86d

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8332596.exe

          Filesize

          860KB

          MD5

          bfa1a6d67c55376e84bb1123645e3145

          SHA1

          a266ed0d43517032d79a73507b1a5a1fe186ef52

          SHA256

          df3cb2445115e0fcce0b15496e53be06fb5e8d5a8ff2f7325f967ea5b39c1248

          SHA512

          6a417ccdefe39730e7c0d2fe78d2de77bc0da9a7a195671c5749c24aa0e242d35f8cb87c058a28e5eab7f3deadc464b394189835a3c83ab34124616adc25f86d

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8332596.exe

          Filesize

          860KB

          MD5

          bfa1a6d67c55376e84bb1123645e3145

          SHA1

          a266ed0d43517032d79a73507b1a5a1fe186ef52

          SHA256

          df3cb2445115e0fcce0b15496e53be06fb5e8d5a8ff2f7325f967ea5b39c1248

          SHA512

          6a417ccdefe39730e7c0d2fe78d2de77bc0da9a7a195671c5749c24aa0e242d35f8cb87c058a28e5eab7f3deadc464b394189835a3c83ab34124616adc25f86d

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8332596.exe

          Filesize

          860KB

          MD5

          bfa1a6d67c55376e84bb1123645e3145

          SHA1

          a266ed0d43517032d79a73507b1a5a1fe186ef52

          SHA256

          df3cb2445115e0fcce0b15496e53be06fb5e8d5a8ff2f7325f967ea5b39c1248

          SHA512

          6a417ccdefe39730e7c0d2fe78d2de77bc0da9a7a195671c5749c24aa0e242d35f8cb87c058a28e5eab7f3deadc464b394189835a3c83ab34124616adc25f86d

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8332596.exe

          Filesize

          860KB

          MD5

          bfa1a6d67c55376e84bb1123645e3145

          SHA1

          a266ed0d43517032d79a73507b1a5a1fe186ef52

          SHA256

          df3cb2445115e0fcce0b15496e53be06fb5e8d5a8ff2f7325f967ea5b39c1248

          SHA512

          6a417ccdefe39730e7c0d2fe78d2de77bc0da9a7a195671c5749c24aa0e242d35f8cb87c058a28e5eab7f3deadc464b394189835a3c83ab34124616adc25f86d

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8332596.exe

          Filesize

          860KB

          MD5

          bfa1a6d67c55376e84bb1123645e3145

          SHA1

          a266ed0d43517032d79a73507b1a5a1fe186ef52

          SHA256

          df3cb2445115e0fcce0b15496e53be06fb5e8d5a8ff2f7325f967ea5b39c1248

          SHA512

          6a417ccdefe39730e7c0d2fe78d2de77bc0da9a7a195671c5749c24aa0e242d35f8cb87c058a28e5eab7f3deadc464b394189835a3c83ab34124616adc25f86d

        • memory/2644-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2644-58-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2644-62-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2644-60-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2644-56-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2644-55-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2644-54-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2644-53-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB