Analysis

  • max time kernel
    131s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 07:08

General

  • Target

    22e342f6b5d46bb8cc404019c0ed9e7e6f01f7ab5b1775e57724430daaef5027.exe

  • Size

    1.3MB

  • MD5

    2f132383618cbcd7da6f6e7ef71df6dc

  • SHA1

    6553f2a1c14da4a25f79f3c1a0a8f33e1974de6d

  • SHA256

    22e342f6b5d46bb8cc404019c0ed9e7e6f01f7ab5b1775e57724430daaef5027

  • SHA512

    4a1f1b4fe0aacbd7fd58b7b435dfabeddc55da994f39c26c3d56311ccceffd4fff3d523356b8e093637c9eed34bfd541a90a7559e2f26323dfc925a6145b4df8

  • SSDEEP

    24576:eyzjZQWC3NHdSlejmabSxPOKsbKz8WiwgSqIClTjgYG9h/BVi6vKOojTd3:tPZ2VdSleyabSZbsbKVVqI+kBpSOo

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22e342f6b5d46bb8cc404019c0ed9e7e6f01f7ab5b1775e57724430daaef5027.exe
    "C:\Users\Admin\AppData\Local\Temp\22e342f6b5d46bb8cc404019c0ed9e7e6f01f7ab5b1775e57724430daaef5027.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9534543.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9534543.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2946076.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2946076.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6286342.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6286342.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2772
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1667099.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1667099.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2676
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6991987.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6991987.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2564
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2404
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9534543.exe

    Filesize

    1.2MB

    MD5

    4e968d93a4fc5ac4f5da84c042896c6f

    SHA1

    e589f48e48a424c11a8bbca59511220865d69aa6

    SHA256

    60b5644a2ae9b75aa4a735816f74b306f5be386d07ff5962143e1e45ece325be

    SHA512

    bed66b6e05295df189910198991f01e2f7c5a5c2ab714077e4ec098d4e3eef64e13c72ac1292e84c0277893c97875d3869d10066389bbe3a2d2fd55f545eb135

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9534543.exe

    Filesize

    1.2MB

    MD5

    4e968d93a4fc5ac4f5da84c042896c6f

    SHA1

    e589f48e48a424c11a8bbca59511220865d69aa6

    SHA256

    60b5644a2ae9b75aa4a735816f74b306f5be386d07ff5962143e1e45ece325be

    SHA512

    bed66b6e05295df189910198991f01e2f7c5a5c2ab714077e4ec098d4e3eef64e13c72ac1292e84c0277893c97875d3869d10066389bbe3a2d2fd55f545eb135

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2946076.exe

    Filesize

    1.0MB

    MD5

    71af928c2ac58d6fd4dc3c82afc4c9fc

    SHA1

    b204ba6f560a1ec956c4859fce7684a311429865

    SHA256

    ad7a48367bca0e78c1eeab12b1d760382c83993af6fb48807e4b4beb6a20a862

    SHA512

    0ddf2caf674ece76a2de8bc8f115cba74d9a709acbc499bb25caffb22058166d469a14118895ffaf3c15a24b9ac9e0656d35f1215b3ec3d6ab0589bc3c8fa413

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2946076.exe

    Filesize

    1.0MB

    MD5

    71af928c2ac58d6fd4dc3c82afc4c9fc

    SHA1

    b204ba6f560a1ec956c4859fce7684a311429865

    SHA256

    ad7a48367bca0e78c1eeab12b1d760382c83993af6fb48807e4b4beb6a20a862

    SHA512

    0ddf2caf674ece76a2de8bc8f115cba74d9a709acbc499bb25caffb22058166d469a14118895ffaf3c15a24b9ac9e0656d35f1215b3ec3d6ab0589bc3c8fa413

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6286342.exe

    Filesize

    884KB

    MD5

    c5f2a84da0737735b6d906781196e24b

    SHA1

    15f685e1748c9656699856edbea2e146d6342b45

    SHA256

    a9e0bb15718648d57daec317251531e655a7158c6b4aac25eb2364865c9d4c08

    SHA512

    0466e2f6d35fe761778515e563ef3d08b882e26afc0638e67ceaf3a2a892bf131cf4d2ed3c09e9b33561769575eb176dad3a5164a5aefafee9526344549bdaf5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6286342.exe

    Filesize

    884KB

    MD5

    c5f2a84da0737735b6d906781196e24b

    SHA1

    15f685e1748c9656699856edbea2e146d6342b45

    SHA256

    a9e0bb15718648d57daec317251531e655a7158c6b4aac25eb2364865c9d4c08

    SHA512

    0466e2f6d35fe761778515e563ef3d08b882e26afc0638e67ceaf3a2a892bf131cf4d2ed3c09e9b33561769575eb176dad3a5164a5aefafee9526344549bdaf5

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1667099.exe

    Filesize

    493KB

    MD5

    4d2f99de53f444e6052b68b5f402e408

    SHA1

    90bda61d85cb9906890ddfb3d666f517327a1e23

    SHA256

    ac6921438705bcbf511e6d91b2add24890492071ccfd54e18724c22f954b623c

    SHA512

    ab4668833534627f81b8d731221106ee18c4f997769b677e11ee691dd1a982d16a4689210e1538389ab89560ab9e413ad1c7659ba5d715aa4c577c4ca470e001

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1667099.exe

    Filesize

    493KB

    MD5

    4d2f99de53f444e6052b68b5f402e408

    SHA1

    90bda61d85cb9906890ddfb3d666f517327a1e23

    SHA256

    ac6921438705bcbf511e6d91b2add24890492071ccfd54e18724c22f954b623c

    SHA512

    ab4668833534627f81b8d731221106ee18c4f997769b677e11ee691dd1a982d16a4689210e1538389ab89560ab9e413ad1c7659ba5d715aa4c577c4ca470e001

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6991987.exe

    Filesize

    860KB

    MD5

    a5134f4e75f0c5641c596d373c1cb7e3

    SHA1

    90dce215a045e49bdf1a5149f2e445ee62f70b65

    SHA256

    38ff14713ed93bcfabbe07d86b0ba87e9ec0fb315f55d3b5a49755c325b7f4d1

    SHA512

    877396ebfa024906a8e89eff8424536115f88e61bc19b12d8fedc7828bbd621058664a103c3e79ee24370583623e1cf3290707da7fee0eb12b11378f616fd1fc

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6991987.exe

    Filesize

    860KB

    MD5

    a5134f4e75f0c5641c596d373c1cb7e3

    SHA1

    90dce215a045e49bdf1a5149f2e445ee62f70b65

    SHA256

    38ff14713ed93bcfabbe07d86b0ba87e9ec0fb315f55d3b5a49755c325b7f4d1

    SHA512

    877396ebfa024906a8e89eff8424536115f88e61bc19b12d8fedc7828bbd621058664a103c3e79ee24370583623e1cf3290707da7fee0eb12b11378f616fd1fc

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6991987.exe

    Filesize

    860KB

    MD5

    a5134f4e75f0c5641c596d373c1cb7e3

    SHA1

    90dce215a045e49bdf1a5149f2e445ee62f70b65

    SHA256

    38ff14713ed93bcfabbe07d86b0ba87e9ec0fb315f55d3b5a49755c325b7f4d1

    SHA512

    877396ebfa024906a8e89eff8424536115f88e61bc19b12d8fedc7828bbd621058664a103c3e79ee24370583623e1cf3290707da7fee0eb12b11378f616fd1fc

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9534543.exe

    Filesize

    1.2MB

    MD5

    4e968d93a4fc5ac4f5da84c042896c6f

    SHA1

    e589f48e48a424c11a8bbca59511220865d69aa6

    SHA256

    60b5644a2ae9b75aa4a735816f74b306f5be386d07ff5962143e1e45ece325be

    SHA512

    bed66b6e05295df189910198991f01e2f7c5a5c2ab714077e4ec098d4e3eef64e13c72ac1292e84c0277893c97875d3869d10066389bbe3a2d2fd55f545eb135

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9534543.exe

    Filesize

    1.2MB

    MD5

    4e968d93a4fc5ac4f5da84c042896c6f

    SHA1

    e589f48e48a424c11a8bbca59511220865d69aa6

    SHA256

    60b5644a2ae9b75aa4a735816f74b306f5be386d07ff5962143e1e45ece325be

    SHA512

    bed66b6e05295df189910198991f01e2f7c5a5c2ab714077e4ec098d4e3eef64e13c72ac1292e84c0277893c97875d3869d10066389bbe3a2d2fd55f545eb135

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2946076.exe

    Filesize

    1.0MB

    MD5

    71af928c2ac58d6fd4dc3c82afc4c9fc

    SHA1

    b204ba6f560a1ec956c4859fce7684a311429865

    SHA256

    ad7a48367bca0e78c1eeab12b1d760382c83993af6fb48807e4b4beb6a20a862

    SHA512

    0ddf2caf674ece76a2de8bc8f115cba74d9a709acbc499bb25caffb22058166d469a14118895ffaf3c15a24b9ac9e0656d35f1215b3ec3d6ab0589bc3c8fa413

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2946076.exe

    Filesize

    1.0MB

    MD5

    71af928c2ac58d6fd4dc3c82afc4c9fc

    SHA1

    b204ba6f560a1ec956c4859fce7684a311429865

    SHA256

    ad7a48367bca0e78c1eeab12b1d760382c83993af6fb48807e4b4beb6a20a862

    SHA512

    0ddf2caf674ece76a2de8bc8f115cba74d9a709acbc499bb25caffb22058166d469a14118895ffaf3c15a24b9ac9e0656d35f1215b3ec3d6ab0589bc3c8fa413

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6286342.exe

    Filesize

    884KB

    MD5

    c5f2a84da0737735b6d906781196e24b

    SHA1

    15f685e1748c9656699856edbea2e146d6342b45

    SHA256

    a9e0bb15718648d57daec317251531e655a7158c6b4aac25eb2364865c9d4c08

    SHA512

    0466e2f6d35fe761778515e563ef3d08b882e26afc0638e67ceaf3a2a892bf131cf4d2ed3c09e9b33561769575eb176dad3a5164a5aefafee9526344549bdaf5

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6286342.exe

    Filesize

    884KB

    MD5

    c5f2a84da0737735b6d906781196e24b

    SHA1

    15f685e1748c9656699856edbea2e146d6342b45

    SHA256

    a9e0bb15718648d57daec317251531e655a7158c6b4aac25eb2364865c9d4c08

    SHA512

    0466e2f6d35fe761778515e563ef3d08b882e26afc0638e67ceaf3a2a892bf131cf4d2ed3c09e9b33561769575eb176dad3a5164a5aefafee9526344549bdaf5

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z1667099.exe

    Filesize

    493KB

    MD5

    4d2f99de53f444e6052b68b5f402e408

    SHA1

    90bda61d85cb9906890ddfb3d666f517327a1e23

    SHA256

    ac6921438705bcbf511e6d91b2add24890492071ccfd54e18724c22f954b623c

    SHA512

    ab4668833534627f81b8d731221106ee18c4f997769b677e11ee691dd1a982d16a4689210e1538389ab89560ab9e413ad1c7659ba5d715aa4c577c4ca470e001

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z1667099.exe

    Filesize

    493KB

    MD5

    4d2f99de53f444e6052b68b5f402e408

    SHA1

    90bda61d85cb9906890ddfb3d666f517327a1e23

    SHA256

    ac6921438705bcbf511e6d91b2add24890492071ccfd54e18724c22f954b623c

    SHA512

    ab4668833534627f81b8d731221106ee18c4f997769b677e11ee691dd1a982d16a4689210e1538389ab89560ab9e413ad1c7659ba5d715aa4c577c4ca470e001

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6991987.exe

    Filesize

    860KB

    MD5

    a5134f4e75f0c5641c596d373c1cb7e3

    SHA1

    90dce215a045e49bdf1a5149f2e445ee62f70b65

    SHA256

    38ff14713ed93bcfabbe07d86b0ba87e9ec0fb315f55d3b5a49755c325b7f4d1

    SHA512

    877396ebfa024906a8e89eff8424536115f88e61bc19b12d8fedc7828bbd621058664a103c3e79ee24370583623e1cf3290707da7fee0eb12b11378f616fd1fc

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6991987.exe

    Filesize

    860KB

    MD5

    a5134f4e75f0c5641c596d373c1cb7e3

    SHA1

    90dce215a045e49bdf1a5149f2e445ee62f70b65

    SHA256

    38ff14713ed93bcfabbe07d86b0ba87e9ec0fb315f55d3b5a49755c325b7f4d1

    SHA512

    877396ebfa024906a8e89eff8424536115f88e61bc19b12d8fedc7828bbd621058664a103c3e79ee24370583623e1cf3290707da7fee0eb12b11378f616fd1fc

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6991987.exe

    Filesize

    860KB

    MD5

    a5134f4e75f0c5641c596d373c1cb7e3

    SHA1

    90dce215a045e49bdf1a5149f2e445ee62f70b65

    SHA256

    38ff14713ed93bcfabbe07d86b0ba87e9ec0fb315f55d3b5a49755c325b7f4d1

    SHA512

    877396ebfa024906a8e89eff8424536115f88e61bc19b12d8fedc7828bbd621058664a103c3e79ee24370583623e1cf3290707da7fee0eb12b11378f616fd1fc

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6991987.exe

    Filesize

    860KB

    MD5

    a5134f4e75f0c5641c596d373c1cb7e3

    SHA1

    90dce215a045e49bdf1a5149f2e445ee62f70b65

    SHA256

    38ff14713ed93bcfabbe07d86b0ba87e9ec0fb315f55d3b5a49755c325b7f4d1

    SHA512

    877396ebfa024906a8e89eff8424536115f88e61bc19b12d8fedc7828bbd621058664a103c3e79ee24370583623e1cf3290707da7fee0eb12b11378f616fd1fc

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6991987.exe

    Filesize

    860KB

    MD5

    a5134f4e75f0c5641c596d373c1cb7e3

    SHA1

    90dce215a045e49bdf1a5149f2e445ee62f70b65

    SHA256

    38ff14713ed93bcfabbe07d86b0ba87e9ec0fb315f55d3b5a49755c325b7f4d1

    SHA512

    877396ebfa024906a8e89eff8424536115f88e61bc19b12d8fedc7828bbd621058664a103c3e79ee24370583623e1cf3290707da7fee0eb12b11378f616fd1fc

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6991987.exe

    Filesize

    860KB

    MD5

    a5134f4e75f0c5641c596d373c1cb7e3

    SHA1

    90dce215a045e49bdf1a5149f2e445ee62f70b65

    SHA256

    38ff14713ed93bcfabbe07d86b0ba87e9ec0fb315f55d3b5a49755c325b7f4d1

    SHA512

    877396ebfa024906a8e89eff8424536115f88e61bc19b12d8fedc7828bbd621058664a103c3e79ee24370583623e1cf3290707da7fee0eb12b11378f616fd1fc

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6991987.exe

    Filesize

    860KB

    MD5

    a5134f4e75f0c5641c596d373c1cb7e3

    SHA1

    90dce215a045e49bdf1a5149f2e445ee62f70b65

    SHA256

    38ff14713ed93bcfabbe07d86b0ba87e9ec0fb315f55d3b5a49755c325b7f4d1

    SHA512

    877396ebfa024906a8e89eff8424536115f88e61bc19b12d8fedc7828bbd621058664a103c3e79ee24370583623e1cf3290707da7fee0eb12b11378f616fd1fc

  • memory/2404-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2404-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2404-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2404-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2404-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2404-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2404-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2404-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB