Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 07:09

General

  • Target

    0d1ac6db4fbeaee785d2f2525ab4b263020c722587fb9fbd8aa676cfe914eb80.exe

  • Size

    1.3MB

  • MD5

    7cb3084f34994fb1f80880e79c3f4ae8

  • SHA1

    531f8beb70b4081eb29551185a93cc5226636f41

  • SHA256

    0d1ac6db4fbeaee785d2f2525ab4b263020c722587fb9fbd8aa676cfe914eb80

  • SHA512

    5ac1b0aab4295e97b55e0cf97cfb4a0b689dae68fa10a84663984c6c7fca2e2b053ea859157365629299ccce5ebd6d93305cba30d098ff5e8acdac1f6a8cf74b

  • SSDEEP

    24576:ayjEX5WjMqb3KwhnEPLPxCWGS9GYRD0sizVmIAXerRDrCJKXSHdmRyFm15ttEPgO:hqdqzNEzcYuAI2erRDrUq0wl5t

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d1ac6db4fbeaee785d2f2525ab4b263020c722587fb9fbd8aa676cfe914eb80.exe
    "C:\Users\Admin\AppData\Local\Temp\0d1ac6db4fbeaee785d2f2525ab4b263020c722587fb9fbd8aa676cfe914eb80.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3399450.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3399450.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6762638.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6762638.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3036
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8050328.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8050328.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2756
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8960010.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8960010.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2612
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3701552.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3701552.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2340
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2624
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3399450.exe

    Filesize

    1.2MB

    MD5

    a8fd71e33b06a73ff7ee7b7d75178b59

    SHA1

    3d5ca2a0fb1c2ec47ba750c6a406834bcb4ba606

    SHA256

    be120c791884ff0139922c444667af57378bc965aa613d5f4a1c9fad66d240c4

    SHA512

    478fa60ae908a3eb8a6fea7a6408213babbd4b3274b1c49a7335ce4419555154431956be608e264cd5f96e1d063f60202fdf26248e4612822f4e07648467398c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3399450.exe

    Filesize

    1.2MB

    MD5

    a8fd71e33b06a73ff7ee7b7d75178b59

    SHA1

    3d5ca2a0fb1c2ec47ba750c6a406834bcb4ba606

    SHA256

    be120c791884ff0139922c444667af57378bc965aa613d5f4a1c9fad66d240c4

    SHA512

    478fa60ae908a3eb8a6fea7a6408213babbd4b3274b1c49a7335ce4419555154431956be608e264cd5f96e1d063f60202fdf26248e4612822f4e07648467398c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6762638.exe

    Filesize

    1.0MB

    MD5

    2713c6b356865b2261a205ee4621e734

    SHA1

    ee70fe6f224ffa64bcca7bfa031d5f63a748f75d

    SHA256

    fb8fa7b21033783966c56290bbe72d0fd490e9748bba19fba79e19eadeb5c7ba

    SHA512

    21fae22e847c0f9ea7c23f77f99dd44e4f75131d36b1fe1331872006e93b94ce93ff8becd75e4ae81d92d1c2188ff884641b072b0d8a57a4b10a6aa12a89f461

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6762638.exe

    Filesize

    1.0MB

    MD5

    2713c6b356865b2261a205ee4621e734

    SHA1

    ee70fe6f224ffa64bcca7bfa031d5f63a748f75d

    SHA256

    fb8fa7b21033783966c56290bbe72d0fd490e9748bba19fba79e19eadeb5c7ba

    SHA512

    21fae22e847c0f9ea7c23f77f99dd44e4f75131d36b1fe1331872006e93b94ce93ff8becd75e4ae81d92d1c2188ff884641b072b0d8a57a4b10a6aa12a89f461

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8050328.exe

    Filesize

    882KB

    MD5

    8dd121ad43b1ea3dc1627a3f2dd93b29

    SHA1

    c35bbe170a76c9fc0035def0d8e5105ebb4ece4e

    SHA256

    7a2bbf6e48ad7e148ef576451e216f57b052fcc23af3a97b1cbcff60aa04d5ca

    SHA512

    9f882da9726e892f0e91957f09bdb71db60bb11a222493d494c211f3adea1d7cde2365a429e220edcb4e53ac732fd42674ff7b98f3291e922cfc343c9f6792e8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8050328.exe

    Filesize

    882KB

    MD5

    8dd121ad43b1ea3dc1627a3f2dd93b29

    SHA1

    c35bbe170a76c9fc0035def0d8e5105ebb4ece4e

    SHA256

    7a2bbf6e48ad7e148ef576451e216f57b052fcc23af3a97b1cbcff60aa04d5ca

    SHA512

    9f882da9726e892f0e91957f09bdb71db60bb11a222493d494c211f3adea1d7cde2365a429e220edcb4e53ac732fd42674ff7b98f3291e922cfc343c9f6792e8

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8960010.exe

    Filesize

    491KB

    MD5

    b75c5f65e3259d323d03a6d7ec7d54ba

    SHA1

    1503ba0ffa5315f1b32a12e5838ff165f2673c1d

    SHA256

    5c1dd31ca5b33f9519fd57db3c2712599696200b15a9d8d8b1d6fd285523834a

    SHA512

    8994728694d57005747afa53199f921f33e7301f11c511d865f045bc77e188e5dfe390e6d4adc37c49f0aca1f964aa14f7a22da3fe8f51a03ddc835beecd4e8d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8960010.exe

    Filesize

    491KB

    MD5

    b75c5f65e3259d323d03a6d7ec7d54ba

    SHA1

    1503ba0ffa5315f1b32a12e5838ff165f2673c1d

    SHA256

    5c1dd31ca5b33f9519fd57db3c2712599696200b15a9d8d8b1d6fd285523834a

    SHA512

    8994728694d57005747afa53199f921f33e7301f11c511d865f045bc77e188e5dfe390e6d4adc37c49f0aca1f964aa14f7a22da3fe8f51a03ddc835beecd4e8d

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3701552.exe

    Filesize

    860KB

    MD5

    350f0212867aba9d17e831e5d0359197

    SHA1

    6b2de11c2268327eef2a0a3c9d705543d8fb3147

    SHA256

    56fc1a3cb18b6d7546e21d1fb637b7656c73296d9e0547391275b9d420cc8dd4

    SHA512

    ab9d0dd9f4eda2351033bcfef27a6b2e26a68f2534543175422708fdd1a9e418bf16f5e84c02d0d9de45f0e12cda4deb98cfbc7b1cef229ea411a2867e76f930

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3701552.exe

    Filesize

    860KB

    MD5

    350f0212867aba9d17e831e5d0359197

    SHA1

    6b2de11c2268327eef2a0a3c9d705543d8fb3147

    SHA256

    56fc1a3cb18b6d7546e21d1fb637b7656c73296d9e0547391275b9d420cc8dd4

    SHA512

    ab9d0dd9f4eda2351033bcfef27a6b2e26a68f2534543175422708fdd1a9e418bf16f5e84c02d0d9de45f0e12cda4deb98cfbc7b1cef229ea411a2867e76f930

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3701552.exe

    Filesize

    860KB

    MD5

    350f0212867aba9d17e831e5d0359197

    SHA1

    6b2de11c2268327eef2a0a3c9d705543d8fb3147

    SHA256

    56fc1a3cb18b6d7546e21d1fb637b7656c73296d9e0547391275b9d420cc8dd4

    SHA512

    ab9d0dd9f4eda2351033bcfef27a6b2e26a68f2534543175422708fdd1a9e418bf16f5e84c02d0d9de45f0e12cda4deb98cfbc7b1cef229ea411a2867e76f930

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3399450.exe

    Filesize

    1.2MB

    MD5

    a8fd71e33b06a73ff7ee7b7d75178b59

    SHA1

    3d5ca2a0fb1c2ec47ba750c6a406834bcb4ba606

    SHA256

    be120c791884ff0139922c444667af57378bc965aa613d5f4a1c9fad66d240c4

    SHA512

    478fa60ae908a3eb8a6fea7a6408213babbd4b3274b1c49a7335ce4419555154431956be608e264cd5f96e1d063f60202fdf26248e4612822f4e07648467398c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3399450.exe

    Filesize

    1.2MB

    MD5

    a8fd71e33b06a73ff7ee7b7d75178b59

    SHA1

    3d5ca2a0fb1c2ec47ba750c6a406834bcb4ba606

    SHA256

    be120c791884ff0139922c444667af57378bc965aa613d5f4a1c9fad66d240c4

    SHA512

    478fa60ae908a3eb8a6fea7a6408213babbd4b3274b1c49a7335ce4419555154431956be608e264cd5f96e1d063f60202fdf26248e4612822f4e07648467398c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6762638.exe

    Filesize

    1.0MB

    MD5

    2713c6b356865b2261a205ee4621e734

    SHA1

    ee70fe6f224ffa64bcca7bfa031d5f63a748f75d

    SHA256

    fb8fa7b21033783966c56290bbe72d0fd490e9748bba19fba79e19eadeb5c7ba

    SHA512

    21fae22e847c0f9ea7c23f77f99dd44e4f75131d36b1fe1331872006e93b94ce93ff8becd75e4ae81d92d1c2188ff884641b072b0d8a57a4b10a6aa12a89f461

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6762638.exe

    Filesize

    1.0MB

    MD5

    2713c6b356865b2261a205ee4621e734

    SHA1

    ee70fe6f224ffa64bcca7bfa031d5f63a748f75d

    SHA256

    fb8fa7b21033783966c56290bbe72d0fd490e9748bba19fba79e19eadeb5c7ba

    SHA512

    21fae22e847c0f9ea7c23f77f99dd44e4f75131d36b1fe1331872006e93b94ce93ff8becd75e4ae81d92d1c2188ff884641b072b0d8a57a4b10a6aa12a89f461

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8050328.exe

    Filesize

    882KB

    MD5

    8dd121ad43b1ea3dc1627a3f2dd93b29

    SHA1

    c35bbe170a76c9fc0035def0d8e5105ebb4ece4e

    SHA256

    7a2bbf6e48ad7e148ef576451e216f57b052fcc23af3a97b1cbcff60aa04d5ca

    SHA512

    9f882da9726e892f0e91957f09bdb71db60bb11a222493d494c211f3adea1d7cde2365a429e220edcb4e53ac732fd42674ff7b98f3291e922cfc343c9f6792e8

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8050328.exe

    Filesize

    882KB

    MD5

    8dd121ad43b1ea3dc1627a3f2dd93b29

    SHA1

    c35bbe170a76c9fc0035def0d8e5105ebb4ece4e

    SHA256

    7a2bbf6e48ad7e148ef576451e216f57b052fcc23af3a97b1cbcff60aa04d5ca

    SHA512

    9f882da9726e892f0e91957f09bdb71db60bb11a222493d494c211f3adea1d7cde2365a429e220edcb4e53ac732fd42674ff7b98f3291e922cfc343c9f6792e8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8960010.exe

    Filesize

    491KB

    MD5

    b75c5f65e3259d323d03a6d7ec7d54ba

    SHA1

    1503ba0ffa5315f1b32a12e5838ff165f2673c1d

    SHA256

    5c1dd31ca5b33f9519fd57db3c2712599696200b15a9d8d8b1d6fd285523834a

    SHA512

    8994728694d57005747afa53199f921f33e7301f11c511d865f045bc77e188e5dfe390e6d4adc37c49f0aca1f964aa14f7a22da3fe8f51a03ddc835beecd4e8d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8960010.exe

    Filesize

    491KB

    MD5

    b75c5f65e3259d323d03a6d7ec7d54ba

    SHA1

    1503ba0ffa5315f1b32a12e5838ff165f2673c1d

    SHA256

    5c1dd31ca5b33f9519fd57db3c2712599696200b15a9d8d8b1d6fd285523834a

    SHA512

    8994728694d57005747afa53199f921f33e7301f11c511d865f045bc77e188e5dfe390e6d4adc37c49f0aca1f964aa14f7a22da3fe8f51a03ddc835beecd4e8d

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3701552.exe

    Filesize

    860KB

    MD5

    350f0212867aba9d17e831e5d0359197

    SHA1

    6b2de11c2268327eef2a0a3c9d705543d8fb3147

    SHA256

    56fc1a3cb18b6d7546e21d1fb637b7656c73296d9e0547391275b9d420cc8dd4

    SHA512

    ab9d0dd9f4eda2351033bcfef27a6b2e26a68f2534543175422708fdd1a9e418bf16f5e84c02d0d9de45f0e12cda4deb98cfbc7b1cef229ea411a2867e76f930

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3701552.exe

    Filesize

    860KB

    MD5

    350f0212867aba9d17e831e5d0359197

    SHA1

    6b2de11c2268327eef2a0a3c9d705543d8fb3147

    SHA256

    56fc1a3cb18b6d7546e21d1fb637b7656c73296d9e0547391275b9d420cc8dd4

    SHA512

    ab9d0dd9f4eda2351033bcfef27a6b2e26a68f2534543175422708fdd1a9e418bf16f5e84c02d0d9de45f0e12cda4deb98cfbc7b1cef229ea411a2867e76f930

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3701552.exe

    Filesize

    860KB

    MD5

    350f0212867aba9d17e831e5d0359197

    SHA1

    6b2de11c2268327eef2a0a3c9d705543d8fb3147

    SHA256

    56fc1a3cb18b6d7546e21d1fb637b7656c73296d9e0547391275b9d420cc8dd4

    SHA512

    ab9d0dd9f4eda2351033bcfef27a6b2e26a68f2534543175422708fdd1a9e418bf16f5e84c02d0d9de45f0e12cda4deb98cfbc7b1cef229ea411a2867e76f930

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3701552.exe

    Filesize

    860KB

    MD5

    350f0212867aba9d17e831e5d0359197

    SHA1

    6b2de11c2268327eef2a0a3c9d705543d8fb3147

    SHA256

    56fc1a3cb18b6d7546e21d1fb637b7656c73296d9e0547391275b9d420cc8dd4

    SHA512

    ab9d0dd9f4eda2351033bcfef27a6b2e26a68f2534543175422708fdd1a9e418bf16f5e84c02d0d9de45f0e12cda4deb98cfbc7b1cef229ea411a2867e76f930

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3701552.exe

    Filesize

    860KB

    MD5

    350f0212867aba9d17e831e5d0359197

    SHA1

    6b2de11c2268327eef2a0a3c9d705543d8fb3147

    SHA256

    56fc1a3cb18b6d7546e21d1fb637b7656c73296d9e0547391275b9d420cc8dd4

    SHA512

    ab9d0dd9f4eda2351033bcfef27a6b2e26a68f2534543175422708fdd1a9e418bf16f5e84c02d0d9de45f0e12cda4deb98cfbc7b1cef229ea411a2867e76f930

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3701552.exe

    Filesize

    860KB

    MD5

    350f0212867aba9d17e831e5d0359197

    SHA1

    6b2de11c2268327eef2a0a3c9d705543d8fb3147

    SHA256

    56fc1a3cb18b6d7546e21d1fb637b7656c73296d9e0547391275b9d420cc8dd4

    SHA512

    ab9d0dd9f4eda2351033bcfef27a6b2e26a68f2534543175422708fdd1a9e418bf16f5e84c02d0d9de45f0e12cda4deb98cfbc7b1cef229ea411a2867e76f930

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3701552.exe

    Filesize

    860KB

    MD5

    350f0212867aba9d17e831e5d0359197

    SHA1

    6b2de11c2268327eef2a0a3c9d705543d8fb3147

    SHA256

    56fc1a3cb18b6d7546e21d1fb637b7656c73296d9e0547391275b9d420cc8dd4

    SHA512

    ab9d0dd9f4eda2351033bcfef27a6b2e26a68f2534543175422708fdd1a9e418bf16f5e84c02d0d9de45f0e12cda4deb98cfbc7b1cef229ea411a2867e76f930

  • memory/2624-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2624-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2624-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2624-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2624-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2624-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2624-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2624-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB