Analysis

  • max time kernel
    119s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 08:08

General

  • Target

    a1df62763a05a83533555416896291d06b1dbc519a1f9ba0a3f6e94469fd521c.exe

  • Size

    1.3MB

  • MD5

    0f8712767463cefeef6de3d5f4ad6dc2

  • SHA1

    1f277a1216134e92ca94d6f4219e6766271e63e8

  • SHA256

    a1df62763a05a83533555416896291d06b1dbc519a1f9ba0a3f6e94469fd521c

  • SHA512

    5a3c3bda1db65f3909dedd2d6a98429c2e6d3b1c3ddaa4be0fd40806ccc5783fccaf877b9bcaddb0e8159a1f243df8a2a313cc7a82f298d05d1d2c501bf0de73

  • SSDEEP

    24576:Myfmv2Zik2RPk0oBy6SfJaL+Tz9H+ibEq5BiRgYtU7zpdTm2CnPjEqv2T/:7IL1joBy6Na/9+hyBhYtUHpdi2CnLEm2

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1df62763a05a83533555416896291d06b1dbc519a1f9ba0a3f6e94469fd521c.exe
    "C:\Users\Admin\AppData\Local\Temp\a1df62763a05a83533555416896291d06b1dbc519a1f9ba0a3f6e94469fd521c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8831602.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8831602.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7782324.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7782324.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2120
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0564339.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0564339.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2656
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2172346.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2172346.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2620
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0151018.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0151018.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2296
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2484
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8831602.exe
    Filesize

    1.2MB

    MD5

    1d4d60f8c45702b2800608e7448dc1fd

    SHA1

    935ad0d82c6713a74dc91c874a5378dd9eec2958

    SHA256

    42e2ef9154798ec7c428b8f59c3475c718c3486aae1b2dd1a4e946851c49d4c2

    SHA512

    2cc861a0d92286f10f2494ce170efb05d4071275c3d6c8f604daa00d2bdec5ba6f8acc75d9beb1476bcc7c48318e520557ada1dcdee2b62ad4d6beb07da37f66

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8831602.exe
    Filesize

    1.2MB

    MD5

    1d4d60f8c45702b2800608e7448dc1fd

    SHA1

    935ad0d82c6713a74dc91c874a5378dd9eec2958

    SHA256

    42e2ef9154798ec7c428b8f59c3475c718c3486aae1b2dd1a4e946851c49d4c2

    SHA512

    2cc861a0d92286f10f2494ce170efb05d4071275c3d6c8f604daa00d2bdec5ba6f8acc75d9beb1476bcc7c48318e520557ada1dcdee2b62ad4d6beb07da37f66

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7782324.exe
    Filesize

    1.0MB

    MD5

    689068789ef917719aba53e4c9cf7587

    SHA1

    f0d985dc7260696c5529f973bb1014f9429455ab

    SHA256

    34b0561dc70baa089c225c06cda8658d3f1020f673410db58856f85b3d17dc75

    SHA512

    5e6c5ceae169d5fb4a5aaea77a1ae496fb6da0ee1d8dc1b2e936627bfb7a4fdd937e4784b968cc0ce97ea8423276eaca91facef8024115196f94dc927f6d1f3a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7782324.exe
    Filesize

    1.0MB

    MD5

    689068789ef917719aba53e4c9cf7587

    SHA1

    f0d985dc7260696c5529f973bb1014f9429455ab

    SHA256

    34b0561dc70baa089c225c06cda8658d3f1020f673410db58856f85b3d17dc75

    SHA512

    5e6c5ceae169d5fb4a5aaea77a1ae496fb6da0ee1d8dc1b2e936627bfb7a4fdd937e4784b968cc0ce97ea8423276eaca91facef8024115196f94dc927f6d1f3a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0564339.exe
    Filesize

    882KB

    MD5

    7b732df386f591feca1b2360dd23e728

    SHA1

    60c08482d0cd6a5eb6b390678987814798400f10

    SHA256

    511b52cf9374c0becec560e14a0200015826932a83f02050eee72c398a3728c3

    SHA512

    da94cf43cbc97ce8904872f9c2084c108b7a5a8cf36c5630d9bdf1083ebc5b37d2573b0d4e0a3540694ff7b38ee2ff54726f232317acbceeed5dda1981fd3209

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0564339.exe
    Filesize

    882KB

    MD5

    7b732df386f591feca1b2360dd23e728

    SHA1

    60c08482d0cd6a5eb6b390678987814798400f10

    SHA256

    511b52cf9374c0becec560e14a0200015826932a83f02050eee72c398a3728c3

    SHA512

    da94cf43cbc97ce8904872f9c2084c108b7a5a8cf36c5630d9bdf1083ebc5b37d2573b0d4e0a3540694ff7b38ee2ff54726f232317acbceeed5dda1981fd3209

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2172346.exe
    Filesize

    491KB

    MD5

    d9216ea0a5dd7873573a86bee96498b6

    SHA1

    5e97eab2b38adeab54e832514af522f980aea540

    SHA256

    4017af2cf43fdf3e00ca1e3d536caf8ce6b9564bd23dd1fe668e48ff8f8bf909

    SHA512

    d95c0c7f4c5238f829a10678351b8b9a4906aa14f925890661737441b7ef11d276986eeda3a446a98d0e70e4d60eb1997c950dcb26e488e328ff27b4d3253e89

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2172346.exe
    Filesize

    491KB

    MD5

    d9216ea0a5dd7873573a86bee96498b6

    SHA1

    5e97eab2b38adeab54e832514af522f980aea540

    SHA256

    4017af2cf43fdf3e00ca1e3d536caf8ce6b9564bd23dd1fe668e48ff8f8bf909

    SHA512

    d95c0c7f4c5238f829a10678351b8b9a4906aa14f925890661737441b7ef11d276986eeda3a446a98d0e70e4d60eb1997c950dcb26e488e328ff27b4d3253e89

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0151018.exe
    Filesize

    860KB

    MD5

    6c6967b2d2dafd04fe6bf56e7c1c1d35

    SHA1

    24b644dd28e111bad61fbb7ffd31ba030b33cdeb

    SHA256

    4351287799c9336c16fda56149ccbce1fb0ac5d94d06f6face930372666f47e8

    SHA512

    4de4f1d5ac85b51de6943a37eb474c784717a0e5b806a1d2b88ecdbf4b1977e2bf09789cdf00d2be16b33529d28322aeb77cd97ab12d6e7bf212dc7111571ec7

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0151018.exe
    Filesize

    860KB

    MD5

    6c6967b2d2dafd04fe6bf56e7c1c1d35

    SHA1

    24b644dd28e111bad61fbb7ffd31ba030b33cdeb

    SHA256

    4351287799c9336c16fda56149ccbce1fb0ac5d94d06f6face930372666f47e8

    SHA512

    4de4f1d5ac85b51de6943a37eb474c784717a0e5b806a1d2b88ecdbf4b1977e2bf09789cdf00d2be16b33529d28322aeb77cd97ab12d6e7bf212dc7111571ec7

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0151018.exe
    Filesize

    860KB

    MD5

    6c6967b2d2dafd04fe6bf56e7c1c1d35

    SHA1

    24b644dd28e111bad61fbb7ffd31ba030b33cdeb

    SHA256

    4351287799c9336c16fda56149ccbce1fb0ac5d94d06f6face930372666f47e8

    SHA512

    4de4f1d5ac85b51de6943a37eb474c784717a0e5b806a1d2b88ecdbf4b1977e2bf09789cdf00d2be16b33529d28322aeb77cd97ab12d6e7bf212dc7111571ec7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8831602.exe
    Filesize

    1.2MB

    MD5

    1d4d60f8c45702b2800608e7448dc1fd

    SHA1

    935ad0d82c6713a74dc91c874a5378dd9eec2958

    SHA256

    42e2ef9154798ec7c428b8f59c3475c718c3486aae1b2dd1a4e946851c49d4c2

    SHA512

    2cc861a0d92286f10f2494ce170efb05d4071275c3d6c8f604daa00d2bdec5ba6f8acc75d9beb1476bcc7c48318e520557ada1dcdee2b62ad4d6beb07da37f66

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8831602.exe
    Filesize

    1.2MB

    MD5

    1d4d60f8c45702b2800608e7448dc1fd

    SHA1

    935ad0d82c6713a74dc91c874a5378dd9eec2958

    SHA256

    42e2ef9154798ec7c428b8f59c3475c718c3486aae1b2dd1a4e946851c49d4c2

    SHA512

    2cc861a0d92286f10f2494ce170efb05d4071275c3d6c8f604daa00d2bdec5ba6f8acc75d9beb1476bcc7c48318e520557ada1dcdee2b62ad4d6beb07da37f66

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7782324.exe
    Filesize

    1.0MB

    MD5

    689068789ef917719aba53e4c9cf7587

    SHA1

    f0d985dc7260696c5529f973bb1014f9429455ab

    SHA256

    34b0561dc70baa089c225c06cda8658d3f1020f673410db58856f85b3d17dc75

    SHA512

    5e6c5ceae169d5fb4a5aaea77a1ae496fb6da0ee1d8dc1b2e936627bfb7a4fdd937e4784b968cc0ce97ea8423276eaca91facef8024115196f94dc927f6d1f3a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7782324.exe
    Filesize

    1.0MB

    MD5

    689068789ef917719aba53e4c9cf7587

    SHA1

    f0d985dc7260696c5529f973bb1014f9429455ab

    SHA256

    34b0561dc70baa089c225c06cda8658d3f1020f673410db58856f85b3d17dc75

    SHA512

    5e6c5ceae169d5fb4a5aaea77a1ae496fb6da0ee1d8dc1b2e936627bfb7a4fdd937e4784b968cc0ce97ea8423276eaca91facef8024115196f94dc927f6d1f3a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0564339.exe
    Filesize

    882KB

    MD5

    7b732df386f591feca1b2360dd23e728

    SHA1

    60c08482d0cd6a5eb6b390678987814798400f10

    SHA256

    511b52cf9374c0becec560e14a0200015826932a83f02050eee72c398a3728c3

    SHA512

    da94cf43cbc97ce8904872f9c2084c108b7a5a8cf36c5630d9bdf1083ebc5b37d2573b0d4e0a3540694ff7b38ee2ff54726f232317acbceeed5dda1981fd3209

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0564339.exe
    Filesize

    882KB

    MD5

    7b732df386f591feca1b2360dd23e728

    SHA1

    60c08482d0cd6a5eb6b390678987814798400f10

    SHA256

    511b52cf9374c0becec560e14a0200015826932a83f02050eee72c398a3728c3

    SHA512

    da94cf43cbc97ce8904872f9c2084c108b7a5a8cf36c5630d9bdf1083ebc5b37d2573b0d4e0a3540694ff7b38ee2ff54726f232317acbceeed5dda1981fd3209

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2172346.exe
    Filesize

    491KB

    MD5

    d9216ea0a5dd7873573a86bee96498b6

    SHA1

    5e97eab2b38adeab54e832514af522f980aea540

    SHA256

    4017af2cf43fdf3e00ca1e3d536caf8ce6b9564bd23dd1fe668e48ff8f8bf909

    SHA512

    d95c0c7f4c5238f829a10678351b8b9a4906aa14f925890661737441b7ef11d276986eeda3a446a98d0e70e4d60eb1997c950dcb26e488e328ff27b4d3253e89

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2172346.exe
    Filesize

    491KB

    MD5

    d9216ea0a5dd7873573a86bee96498b6

    SHA1

    5e97eab2b38adeab54e832514af522f980aea540

    SHA256

    4017af2cf43fdf3e00ca1e3d536caf8ce6b9564bd23dd1fe668e48ff8f8bf909

    SHA512

    d95c0c7f4c5238f829a10678351b8b9a4906aa14f925890661737441b7ef11d276986eeda3a446a98d0e70e4d60eb1997c950dcb26e488e328ff27b4d3253e89

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0151018.exe
    Filesize

    860KB

    MD5

    6c6967b2d2dafd04fe6bf56e7c1c1d35

    SHA1

    24b644dd28e111bad61fbb7ffd31ba030b33cdeb

    SHA256

    4351287799c9336c16fda56149ccbce1fb0ac5d94d06f6face930372666f47e8

    SHA512

    4de4f1d5ac85b51de6943a37eb474c784717a0e5b806a1d2b88ecdbf4b1977e2bf09789cdf00d2be16b33529d28322aeb77cd97ab12d6e7bf212dc7111571ec7

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0151018.exe
    Filesize

    860KB

    MD5

    6c6967b2d2dafd04fe6bf56e7c1c1d35

    SHA1

    24b644dd28e111bad61fbb7ffd31ba030b33cdeb

    SHA256

    4351287799c9336c16fda56149ccbce1fb0ac5d94d06f6face930372666f47e8

    SHA512

    4de4f1d5ac85b51de6943a37eb474c784717a0e5b806a1d2b88ecdbf4b1977e2bf09789cdf00d2be16b33529d28322aeb77cd97ab12d6e7bf212dc7111571ec7

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0151018.exe
    Filesize

    860KB

    MD5

    6c6967b2d2dafd04fe6bf56e7c1c1d35

    SHA1

    24b644dd28e111bad61fbb7ffd31ba030b33cdeb

    SHA256

    4351287799c9336c16fda56149ccbce1fb0ac5d94d06f6face930372666f47e8

    SHA512

    4de4f1d5ac85b51de6943a37eb474c784717a0e5b806a1d2b88ecdbf4b1977e2bf09789cdf00d2be16b33529d28322aeb77cd97ab12d6e7bf212dc7111571ec7

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0151018.exe
    Filesize

    860KB

    MD5

    6c6967b2d2dafd04fe6bf56e7c1c1d35

    SHA1

    24b644dd28e111bad61fbb7ffd31ba030b33cdeb

    SHA256

    4351287799c9336c16fda56149ccbce1fb0ac5d94d06f6face930372666f47e8

    SHA512

    4de4f1d5ac85b51de6943a37eb474c784717a0e5b806a1d2b88ecdbf4b1977e2bf09789cdf00d2be16b33529d28322aeb77cd97ab12d6e7bf212dc7111571ec7

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0151018.exe
    Filesize

    860KB

    MD5

    6c6967b2d2dafd04fe6bf56e7c1c1d35

    SHA1

    24b644dd28e111bad61fbb7ffd31ba030b33cdeb

    SHA256

    4351287799c9336c16fda56149ccbce1fb0ac5d94d06f6face930372666f47e8

    SHA512

    4de4f1d5ac85b51de6943a37eb474c784717a0e5b806a1d2b88ecdbf4b1977e2bf09789cdf00d2be16b33529d28322aeb77cd97ab12d6e7bf212dc7111571ec7

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0151018.exe
    Filesize

    860KB

    MD5

    6c6967b2d2dafd04fe6bf56e7c1c1d35

    SHA1

    24b644dd28e111bad61fbb7ffd31ba030b33cdeb

    SHA256

    4351287799c9336c16fda56149ccbce1fb0ac5d94d06f6face930372666f47e8

    SHA512

    4de4f1d5ac85b51de6943a37eb474c784717a0e5b806a1d2b88ecdbf4b1977e2bf09789cdf00d2be16b33529d28322aeb77cd97ab12d6e7bf212dc7111571ec7

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0151018.exe
    Filesize

    860KB

    MD5

    6c6967b2d2dafd04fe6bf56e7c1c1d35

    SHA1

    24b644dd28e111bad61fbb7ffd31ba030b33cdeb

    SHA256

    4351287799c9336c16fda56149ccbce1fb0ac5d94d06f6face930372666f47e8

    SHA512

    4de4f1d5ac85b51de6943a37eb474c784717a0e5b806a1d2b88ecdbf4b1977e2bf09789cdf00d2be16b33529d28322aeb77cd97ab12d6e7bf212dc7111571ec7

  • memory/2484-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2484-58-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2484-62-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2484-60-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2484-56-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2484-55-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2484-54-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2484-53-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB