Analysis

  • max time kernel
    121s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 07:04

General

  • Target

    b30c95efd6b63d2cdc56288d791a5524ca1357f592eb3eac7c15bfddb4faa48c.exe

  • Size

    1.3MB

  • MD5

    e1d10911981303b7d1b6721df097bc20

  • SHA1

    a837e768678e9ea1c7e32df39ac739f84b3952cb

  • SHA256

    b30c95efd6b63d2cdc56288d791a5524ca1357f592eb3eac7c15bfddb4faa48c

  • SHA512

    34f1b572c49043508b87c3ace2b3d727a3ff949d8fd5b821ada1f014fefeb66db3449c25a9f9abf1674de120c8968c4cd4c3705cdd829aea88da4eb658016eae

  • SSDEEP

    24576:bykD31x3b2f/tgoJeDL6QQiins63INiWR9n9BikjKBVffO:Oux3bgyoJeH6l3s62iWjLik+BVff

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b30c95efd6b63d2cdc56288d791a5524ca1357f592eb3eac7c15bfddb4faa48c.exe
    "C:\Users\Admin\AppData\Local\Temp\b30c95efd6b63d2cdc56288d791a5524ca1357f592eb3eac7c15bfddb4faa48c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8708553.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8708553.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7559536.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7559536.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1580
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5537570.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5537570.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2756
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4558041.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4558041.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2692
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2494505.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2494505.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2720
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2568
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2584
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 280
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2548

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8708553.exe

      Filesize

      1.2MB

      MD5

      a7ecf8714af4c4abdc9df60897ba9219

      SHA1

      836129e9747a6ca3b83f2133c35722809166bf26

      SHA256

      c5fd38e53131b11e9f2ecdf0e5ca7a35bf502003d42715eeccb33d191d41ee48

      SHA512

      7d7500f3d956c18ca32b33d9c47cccdb27d1d9f35a3da3b0688d93f6628cc8957d2fb730a8f69c7610f85ae97c400d7c0263aaca3ddded09d48ed2e13542a2bd

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8708553.exe

      Filesize

      1.2MB

      MD5

      a7ecf8714af4c4abdc9df60897ba9219

      SHA1

      836129e9747a6ca3b83f2133c35722809166bf26

      SHA256

      c5fd38e53131b11e9f2ecdf0e5ca7a35bf502003d42715eeccb33d191d41ee48

      SHA512

      7d7500f3d956c18ca32b33d9c47cccdb27d1d9f35a3da3b0688d93f6628cc8957d2fb730a8f69c7610f85ae97c400d7c0263aaca3ddded09d48ed2e13542a2bd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7559536.exe

      Filesize

      1.0MB

      MD5

      a308b51ae9b370963f0b2f2db3250680

      SHA1

      7c2012a016c46204ca6d241acf6fb40db8738443

      SHA256

      b665dbd04bfb247b9177a0d7af74a7412abf5366105ca2abc23277ab3e379ffe

      SHA512

      fc7c0723a06e2b0f9be3a2dc7fa05d7b4295aeaa9f46f7bc263f540569ddf405b002203d338046971a45db19e6e5bbf9d31e54cc974c404c85353591854126b7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7559536.exe

      Filesize

      1.0MB

      MD5

      a308b51ae9b370963f0b2f2db3250680

      SHA1

      7c2012a016c46204ca6d241acf6fb40db8738443

      SHA256

      b665dbd04bfb247b9177a0d7af74a7412abf5366105ca2abc23277ab3e379ffe

      SHA512

      fc7c0723a06e2b0f9be3a2dc7fa05d7b4295aeaa9f46f7bc263f540569ddf405b002203d338046971a45db19e6e5bbf9d31e54cc974c404c85353591854126b7

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5537570.exe

      Filesize

      891KB

      MD5

      daa1a3572ff1ac160583330936d67777

      SHA1

      baab047ee72b486df58906c64c6942232aaaa10a

      SHA256

      6f655fba2ec7b055275ed083b27e5bfc2eca71bf036fc017ae970f7338d1d3cf

      SHA512

      5257a07b8fb8e49e96f4789ea2ddd07b50ac0d423544f1397f5e0f35a84a5a57473bfd81ab12a207a7946a28eb3aadee7bcb31ba8b6c0c374c427740fa59cb88

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5537570.exe

      Filesize

      891KB

      MD5

      daa1a3572ff1ac160583330936d67777

      SHA1

      baab047ee72b486df58906c64c6942232aaaa10a

      SHA256

      6f655fba2ec7b055275ed083b27e5bfc2eca71bf036fc017ae970f7338d1d3cf

      SHA512

      5257a07b8fb8e49e96f4789ea2ddd07b50ac0d423544f1397f5e0f35a84a5a57473bfd81ab12a207a7946a28eb3aadee7bcb31ba8b6c0c374c427740fa59cb88

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4558041.exe

      Filesize

      501KB

      MD5

      3566a66a4336ed4cf1d7d87fdbeddcbe

      SHA1

      1920b7f9b57030502f39b4a021ac6eeebcecece8

      SHA256

      cdc8368e81455594acc6bde3c4155668bf86cbf0b054016c6c2933980293c33a

      SHA512

      059f93aade985d4a1a5700edd5fd86078cf078b43a8d38dd3dce6f4c967d866116ba955d59b14a06f42769f13891eb7de1ebbf340414f82b2b89f9372123168a

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4558041.exe

      Filesize

      501KB

      MD5

      3566a66a4336ed4cf1d7d87fdbeddcbe

      SHA1

      1920b7f9b57030502f39b4a021ac6eeebcecece8

      SHA256

      cdc8368e81455594acc6bde3c4155668bf86cbf0b054016c6c2933980293c33a

      SHA512

      059f93aade985d4a1a5700edd5fd86078cf078b43a8d38dd3dce6f4c967d866116ba955d59b14a06f42769f13891eb7de1ebbf340414f82b2b89f9372123168a

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2494505.exe

      Filesize

      860KB

      MD5

      e055ff7cf1e30ace24b5c107bf5c3e12

      SHA1

      22b96e2ab7bfeb5080b0e9434cb738969928c0be

      SHA256

      4d55f6e1610561502d36efa91057213d55279739627724e964bb5ebbb298b3c8

      SHA512

      3bf130bc989ef5d3cefdfed2cfb445fb2d61f24b7047683768f6434e888cd2b9d9e8439e1808a094fde43d7b8480849d5dd2d4397d783f5658b4c5eb0545c852

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2494505.exe

      Filesize

      860KB

      MD5

      e055ff7cf1e30ace24b5c107bf5c3e12

      SHA1

      22b96e2ab7bfeb5080b0e9434cb738969928c0be

      SHA256

      4d55f6e1610561502d36efa91057213d55279739627724e964bb5ebbb298b3c8

      SHA512

      3bf130bc989ef5d3cefdfed2cfb445fb2d61f24b7047683768f6434e888cd2b9d9e8439e1808a094fde43d7b8480849d5dd2d4397d783f5658b4c5eb0545c852

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2494505.exe

      Filesize

      860KB

      MD5

      e055ff7cf1e30ace24b5c107bf5c3e12

      SHA1

      22b96e2ab7bfeb5080b0e9434cb738969928c0be

      SHA256

      4d55f6e1610561502d36efa91057213d55279739627724e964bb5ebbb298b3c8

      SHA512

      3bf130bc989ef5d3cefdfed2cfb445fb2d61f24b7047683768f6434e888cd2b9d9e8439e1808a094fde43d7b8480849d5dd2d4397d783f5658b4c5eb0545c852

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8708553.exe

      Filesize

      1.2MB

      MD5

      a7ecf8714af4c4abdc9df60897ba9219

      SHA1

      836129e9747a6ca3b83f2133c35722809166bf26

      SHA256

      c5fd38e53131b11e9f2ecdf0e5ca7a35bf502003d42715eeccb33d191d41ee48

      SHA512

      7d7500f3d956c18ca32b33d9c47cccdb27d1d9f35a3da3b0688d93f6628cc8957d2fb730a8f69c7610f85ae97c400d7c0263aaca3ddded09d48ed2e13542a2bd

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8708553.exe

      Filesize

      1.2MB

      MD5

      a7ecf8714af4c4abdc9df60897ba9219

      SHA1

      836129e9747a6ca3b83f2133c35722809166bf26

      SHA256

      c5fd38e53131b11e9f2ecdf0e5ca7a35bf502003d42715eeccb33d191d41ee48

      SHA512

      7d7500f3d956c18ca32b33d9c47cccdb27d1d9f35a3da3b0688d93f6628cc8957d2fb730a8f69c7610f85ae97c400d7c0263aaca3ddded09d48ed2e13542a2bd

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7559536.exe

      Filesize

      1.0MB

      MD5

      a308b51ae9b370963f0b2f2db3250680

      SHA1

      7c2012a016c46204ca6d241acf6fb40db8738443

      SHA256

      b665dbd04bfb247b9177a0d7af74a7412abf5366105ca2abc23277ab3e379ffe

      SHA512

      fc7c0723a06e2b0f9be3a2dc7fa05d7b4295aeaa9f46f7bc263f540569ddf405b002203d338046971a45db19e6e5bbf9d31e54cc974c404c85353591854126b7

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7559536.exe

      Filesize

      1.0MB

      MD5

      a308b51ae9b370963f0b2f2db3250680

      SHA1

      7c2012a016c46204ca6d241acf6fb40db8738443

      SHA256

      b665dbd04bfb247b9177a0d7af74a7412abf5366105ca2abc23277ab3e379ffe

      SHA512

      fc7c0723a06e2b0f9be3a2dc7fa05d7b4295aeaa9f46f7bc263f540569ddf405b002203d338046971a45db19e6e5bbf9d31e54cc974c404c85353591854126b7

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5537570.exe

      Filesize

      891KB

      MD5

      daa1a3572ff1ac160583330936d67777

      SHA1

      baab047ee72b486df58906c64c6942232aaaa10a

      SHA256

      6f655fba2ec7b055275ed083b27e5bfc2eca71bf036fc017ae970f7338d1d3cf

      SHA512

      5257a07b8fb8e49e96f4789ea2ddd07b50ac0d423544f1397f5e0f35a84a5a57473bfd81ab12a207a7946a28eb3aadee7bcb31ba8b6c0c374c427740fa59cb88

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5537570.exe

      Filesize

      891KB

      MD5

      daa1a3572ff1ac160583330936d67777

      SHA1

      baab047ee72b486df58906c64c6942232aaaa10a

      SHA256

      6f655fba2ec7b055275ed083b27e5bfc2eca71bf036fc017ae970f7338d1d3cf

      SHA512

      5257a07b8fb8e49e96f4789ea2ddd07b50ac0d423544f1397f5e0f35a84a5a57473bfd81ab12a207a7946a28eb3aadee7bcb31ba8b6c0c374c427740fa59cb88

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z4558041.exe

      Filesize

      501KB

      MD5

      3566a66a4336ed4cf1d7d87fdbeddcbe

      SHA1

      1920b7f9b57030502f39b4a021ac6eeebcecece8

      SHA256

      cdc8368e81455594acc6bde3c4155668bf86cbf0b054016c6c2933980293c33a

      SHA512

      059f93aade985d4a1a5700edd5fd86078cf078b43a8d38dd3dce6f4c967d866116ba955d59b14a06f42769f13891eb7de1ebbf340414f82b2b89f9372123168a

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z4558041.exe

      Filesize

      501KB

      MD5

      3566a66a4336ed4cf1d7d87fdbeddcbe

      SHA1

      1920b7f9b57030502f39b4a021ac6eeebcecece8

      SHA256

      cdc8368e81455594acc6bde3c4155668bf86cbf0b054016c6c2933980293c33a

      SHA512

      059f93aade985d4a1a5700edd5fd86078cf078b43a8d38dd3dce6f4c967d866116ba955d59b14a06f42769f13891eb7de1ebbf340414f82b2b89f9372123168a

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2494505.exe

      Filesize

      860KB

      MD5

      e055ff7cf1e30ace24b5c107bf5c3e12

      SHA1

      22b96e2ab7bfeb5080b0e9434cb738969928c0be

      SHA256

      4d55f6e1610561502d36efa91057213d55279739627724e964bb5ebbb298b3c8

      SHA512

      3bf130bc989ef5d3cefdfed2cfb445fb2d61f24b7047683768f6434e888cd2b9d9e8439e1808a094fde43d7b8480849d5dd2d4397d783f5658b4c5eb0545c852

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2494505.exe

      Filesize

      860KB

      MD5

      e055ff7cf1e30ace24b5c107bf5c3e12

      SHA1

      22b96e2ab7bfeb5080b0e9434cb738969928c0be

      SHA256

      4d55f6e1610561502d36efa91057213d55279739627724e964bb5ebbb298b3c8

      SHA512

      3bf130bc989ef5d3cefdfed2cfb445fb2d61f24b7047683768f6434e888cd2b9d9e8439e1808a094fde43d7b8480849d5dd2d4397d783f5658b4c5eb0545c852

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2494505.exe

      Filesize

      860KB

      MD5

      e055ff7cf1e30ace24b5c107bf5c3e12

      SHA1

      22b96e2ab7bfeb5080b0e9434cb738969928c0be

      SHA256

      4d55f6e1610561502d36efa91057213d55279739627724e964bb5ebbb298b3c8

      SHA512

      3bf130bc989ef5d3cefdfed2cfb445fb2d61f24b7047683768f6434e888cd2b9d9e8439e1808a094fde43d7b8480849d5dd2d4397d783f5658b4c5eb0545c852

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2494505.exe

      Filesize

      860KB

      MD5

      e055ff7cf1e30ace24b5c107bf5c3e12

      SHA1

      22b96e2ab7bfeb5080b0e9434cb738969928c0be

      SHA256

      4d55f6e1610561502d36efa91057213d55279739627724e964bb5ebbb298b3c8

      SHA512

      3bf130bc989ef5d3cefdfed2cfb445fb2d61f24b7047683768f6434e888cd2b9d9e8439e1808a094fde43d7b8480849d5dd2d4397d783f5658b4c5eb0545c852

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2494505.exe

      Filesize

      860KB

      MD5

      e055ff7cf1e30ace24b5c107bf5c3e12

      SHA1

      22b96e2ab7bfeb5080b0e9434cb738969928c0be

      SHA256

      4d55f6e1610561502d36efa91057213d55279739627724e964bb5ebbb298b3c8

      SHA512

      3bf130bc989ef5d3cefdfed2cfb445fb2d61f24b7047683768f6434e888cd2b9d9e8439e1808a094fde43d7b8480849d5dd2d4397d783f5658b4c5eb0545c852

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2494505.exe

      Filesize

      860KB

      MD5

      e055ff7cf1e30ace24b5c107bf5c3e12

      SHA1

      22b96e2ab7bfeb5080b0e9434cb738969928c0be

      SHA256

      4d55f6e1610561502d36efa91057213d55279739627724e964bb5ebbb298b3c8

      SHA512

      3bf130bc989ef5d3cefdfed2cfb445fb2d61f24b7047683768f6434e888cd2b9d9e8439e1808a094fde43d7b8480849d5dd2d4397d783f5658b4c5eb0545c852

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2494505.exe

      Filesize

      860KB

      MD5

      e055ff7cf1e30ace24b5c107bf5c3e12

      SHA1

      22b96e2ab7bfeb5080b0e9434cb738969928c0be

      SHA256

      4d55f6e1610561502d36efa91057213d55279739627724e964bb5ebbb298b3c8

      SHA512

      3bf130bc989ef5d3cefdfed2cfb445fb2d61f24b7047683768f6434e888cd2b9d9e8439e1808a094fde43d7b8480849d5dd2d4397d783f5658b4c5eb0545c852

    • memory/2584-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2584-58-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2584-60-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2584-62-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2584-56-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2584-55-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2584-54-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2584-53-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB