Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 07:42

General

  • Target

    1353a5a9f1482d0a879c477ccd34c0883604222ce57db39f42a47a5f8cdca1b2.exe

  • Size

    1.3MB

  • MD5

    9acdd87879b14754ff03d1423ae4a8a3

  • SHA1

    5c52b4800a1c87dd508e9335f061423291b2e6dc

  • SHA256

    1353a5a9f1482d0a879c477ccd34c0883604222ce57db39f42a47a5f8cdca1b2

  • SHA512

    63031fa82911bc2a0e6f562593d2779368a19d7de85aa5887447bae7fb93d862cdfe57d0070f765e3a718e2c8d7e62eec5e8f1550dcbdd91415c0e54e201105e

  • SSDEEP

    24576:Zy1D8I3gs5twcYUg3deDNLcsoXdyKS0jj6gQn7VuO5l27jdPNfQjhaMoNS:MF8IQsLuUg3ucJBS0jhowOyPjfQjLe

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1353a5a9f1482d0a879c477ccd34c0883604222ce57db39f42a47a5f8cdca1b2.exe
    "C:\Users\Admin\AppData\Local\Temp\1353a5a9f1482d0a879c477ccd34c0883604222ce57db39f42a47a5f8cdca1b2.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9382975.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9382975.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2410633.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2410633.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2968
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4873084.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4873084.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7894527.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7894527.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2688
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5922184.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5922184.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2544
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2564
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9382975.exe

    Filesize

    1.2MB

    MD5

    09111afc836d9fc2d9b8e51562b9d750

    SHA1

    6da5847143669beefe7bbcfc3ca6eb84b527653d

    SHA256

    aed1fde4e8509142138cebf0443148e1d8da51a043efa996655d1fe999ef764d

    SHA512

    01a8211b789bf0b86e601cd3b7674c502b873f48de87819d1a7d41a7f788198841aa8367cd541ddfa34c89510321ee9acee24fbd3f0977f9792b9f63874c6799

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9382975.exe

    Filesize

    1.2MB

    MD5

    09111afc836d9fc2d9b8e51562b9d750

    SHA1

    6da5847143669beefe7bbcfc3ca6eb84b527653d

    SHA256

    aed1fde4e8509142138cebf0443148e1d8da51a043efa996655d1fe999ef764d

    SHA512

    01a8211b789bf0b86e601cd3b7674c502b873f48de87819d1a7d41a7f788198841aa8367cd541ddfa34c89510321ee9acee24fbd3f0977f9792b9f63874c6799

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2410633.exe

    Filesize

    1.0MB

    MD5

    ddcddad5c5fac5e769f8428e37d24efe

    SHA1

    3d3f18b36ea4830d07d2c3d628c8a1ca18306d23

    SHA256

    bedd90fcb88b2fbee2fd157262af6ade8924cdfa7ddaaacb1155c5848b006449

    SHA512

    79384b555a16cfb6dc2c8ba5610b6460db28ca6b69c8e234d5a8897c842cd449d4c138aec1870d1fd192568eddae0da1c377f62773405574be30537631e20c3d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2410633.exe

    Filesize

    1.0MB

    MD5

    ddcddad5c5fac5e769f8428e37d24efe

    SHA1

    3d3f18b36ea4830d07d2c3d628c8a1ca18306d23

    SHA256

    bedd90fcb88b2fbee2fd157262af6ade8924cdfa7ddaaacb1155c5848b006449

    SHA512

    79384b555a16cfb6dc2c8ba5610b6460db28ca6b69c8e234d5a8897c842cd449d4c138aec1870d1fd192568eddae0da1c377f62773405574be30537631e20c3d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4873084.exe

    Filesize

    883KB

    MD5

    bf6c16022abdcc9010e131f5b5526b58

    SHA1

    0a51bf60079a3c0fe8ec87382705b35ed59d260f

    SHA256

    589a9103aadd0415ff1c2b914ee8d571ed0a2b1225341f9b7539b1f1a10db1b2

    SHA512

    98efccd8b3b3b082f2d57b5e09623a57fc512b241f03c02f3ed67961108cdfc98efed520d4f9015f3c9c391a5d9eafbd19ea0a372c75dbb2cfae6452a4497628

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4873084.exe

    Filesize

    883KB

    MD5

    bf6c16022abdcc9010e131f5b5526b58

    SHA1

    0a51bf60079a3c0fe8ec87382705b35ed59d260f

    SHA256

    589a9103aadd0415ff1c2b914ee8d571ed0a2b1225341f9b7539b1f1a10db1b2

    SHA512

    98efccd8b3b3b082f2d57b5e09623a57fc512b241f03c02f3ed67961108cdfc98efed520d4f9015f3c9c391a5d9eafbd19ea0a372c75dbb2cfae6452a4497628

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7894527.exe

    Filesize

    494KB

    MD5

    3c3ca83be5978736b849f2944485f028

    SHA1

    ba515b2dd27ce41e495144de85fe751c80db7157

    SHA256

    eee0a7f1414ce720be5dfe80d6b4214961a3c038ec910a2e9ace88259718c7d8

    SHA512

    49a376d117b1a40cf8de7f89377137e370b0d143813ce2b1803f1594312b0e2511f2d5ff954d2f3c071378fa756f063f191c1e4250d5614ea0df7edcb8e5a8ec

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7894527.exe

    Filesize

    494KB

    MD5

    3c3ca83be5978736b849f2944485f028

    SHA1

    ba515b2dd27ce41e495144de85fe751c80db7157

    SHA256

    eee0a7f1414ce720be5dfe80d6b4214961a3c038ec910a2e9ace88259718c7d8

    SHA512

    49a376d117b1a40cf8de7f89377137e370b0d143813ce2b1803f1594312b0e2511f2d5ff954d2f3c071378fa756f063f191c1e4250d5614ea0df7edcb8e5a8ec

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5922184.exe

    Filesize

    860KB

    MD5

    166cd5322558358c4e9f514428196d86

    SHA1

    9defc245cfb05896b6896f4c2123438a9cea7ba7

    SHA256

    b7604ea86967285be627eef1e17d713a8472775e33134fd56c237b221b8fda98

    SHA512

    7b21045f30d68f4a38b96eb5831682ec05992cc444105153ee0abc4c5562113cb262410a40b684d9858f0b1cc85b2def5276aef83121341dc341ca15a1cb3c55

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5922184.exe

    Filesize

    860KB

    MD5

    166cd5322558358c4e9f514428196d86

    SHA1

    9defc245cfb05896b6896f4c2123438a9cea7ba7

    SHA256

    b7604ea86967285be627eef1e17d713a8472775e33134fd56c237b221b8fda98

    SHA512

    7b21045f30d68f4a38b96eb5831682ec05992cc444105153ee0abc4c5562113cb262410a40b684d9858f0b1cc85b2def5276aef83121341dc341ca15a1cb3c55

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5922184.exe

    Filesize

    860KB

    MD5

    166cd5322558358c4e9f514428196d86

    SHA1

    9defc245cfb05896b6896f4c2123438a9cea7ba7

    SHA256

    b7604ea86967285be627eef1e17d713a8472775e33134fd56c237b221b8fda98

    SHA512

    7b21045f30d68f4a38b96eb5831682ec05992cc444105153ee0abc4c5562113cb262410a40b684d9858f0b1cc85b2def5276aef83121341dc341ca15a1cb3c55

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9382975.exe

    Filesize

    1.2MB

    MD5

    09111afc836d9fc2d9b8e51562b9d750

    SHA1

    6da5847143669beefe7bbcfc3ca6eb84b527653d

    SHA256

    aed1fde4e8509142138cebf0443148e1d8da51a043efa996655d1fe999ef764d

    SHA512

    01a8211b789bf0b86e601cd3b7674c502b873f48de87819d1a7d41a7f788198841aa8367cd541ddfa34c89510321ee9acee24fbd3f0977f9792b9f63874c6799

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9382975.exe

    Filesize

    1.2MB

    MD5

    09111afc836d9fc2d9b8e51562b9d750

    SHA1

    6da5847143669beefe7bbcfc3ca6eb84b527653d

    SHA256

    aed1fde4e8509142138cebf0443148e1d8da51a043efa996655d1fe999ef764d

    SHA512

    01a8211b789bf0b86e601cd3b7674c502b873f48de87819d1a7d41a7f788198841aa8367cd541ddfa34c89510321ee9acee24fbd3f0977f9792b9f63874c6799

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2410633.exe

    Filesize

    1.0MB

    MD5

    ddcddad5c5fac5e769f8428e37d24efe

    SHA1

    3d3f18b36ea4830d07d2c3d628c8a1ca18306d23

    SHA256

    bedd90fcb88b2fbee2fd157262af6ade8924cdfa7ddaaacb1155c5848b006449

    SHA512

    79384b555a16cfb6dc2c8ba5610b6460db28ca6b69c8e234d5a8897c842cd449d4c138aec1870d1fd192568eddae0da1c377f62773405574be30537631e20c3d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2410633.exe

    Filesize

    1.0MB

    MD5

    ddcddad5c5fac5e769f8428e37d24efe

    SHA1

    3d3f18b36ea4830d07d2c3d628c8a1ca18306d23

    SHA256

    bedd90fcb88b2fbee2fd157262af6ade8924cdfa7ddaaacb1155c5848b006449

    SHA512

    79384b555a16cfb6dc2c8ba5610b6460db28ca6b69c8e234d5a8897c842cd449d4c138aec1870d1fd192568eddae0da1c377f62773405574be30537631e20c3d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4873084.exe

    Filesize

    883KB

    MD5

    bf6c16022abdcc9010e131f5b5526b58

    SHA1

    0a51bf60079a3c0fe8ec87382705b35ed59d260f

    SHA256

    589a9103aadd0415ff1c2b914ee8d571ed0a2b1225341f9b7539b1f1a10db1b2

    SHA512

    98efccd8b3b3b082f2d57b5e09623a57fc512b241f03c02f3ed67961108cdfc98efed520d4f9015f3c9c391a5d9eafbd19ea0a372c75dbb2cfae6452a4497628

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4873084.exe

    Filesize

    883KB

    MD5

    bf6c16022abdcc9010e131f5b5526b58

    SHA1

    0a51bf60079a3c0fe8ec87382705b35ed59d260f

    SHA256

    589a9103aadd0415ff1c2b914ee8d571ed0a2b1225341f9b7539b1f1a10db1b2

    SHA512

    98efccd8b3b3b082f2d57b5e09623a57fc512b241f03c02f3ed67961108cdfc98efed520d4f9015f3c9c391a5d9eafbd19ea0a372c75dbb2cfae6452a4497628

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7894527.exe

    Filesize

    494KB

    MD5

    3c3ca83be5978736b849f2944485f028

    SHA1

    ba515b2dd27ce41e495144de85fe751c80db7157

    SHA256

    eee0a7f1414ce720be5dfe80d6b4214961a3c038ec910a2e9ace88259718c7d8

    SHA512

    49a376d117b1a40cf8de7f89377137e370b0d143813ce2b1803f1594312b0e2511f2d5ff954d2f3c071378fa756f063f191c1e4250d5614ea0df7edcb8e5a8ec

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7894527.exe

    Filesize

    494KB

    MD5

    3c3ca83be5978736b849f2944485f028

    SHA1

    ba515b2dd27ce41e495144de85fe751c80db7157

    SHA256

    eee0a7f1414ce720be5dfe80d6b4214961a3c038ec910a2e9ace88259718c7d8

    SHA512

    49a376d117b1a40cf8de7f89377137e370b0d143813ce2b1803f1594312b0e2511f2d5ff954d2f3c071378fa756f063f191c1e4250d5614ea0df7edcb8e5a8ec

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5922184.exe

    Filesize

    860KB

    MD5

    166cd5322558358c4e9f514428196d86

    SHA1

    9defc245cfb05896b6896f4c2123438a9cea7ba7

    SHA256

    b7604ea86967285be627eef1e17d713a8472775e33134fd56c237b221b8fda98

    SHA512

    7b21045f30d68f4a38b96eb5831682ec05992cc444105153ee0abc4c5562113cb262410a40b684d9858f0b1cc85b2def5276aef83121341dc341ca15a1cb3c55

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5922184.exe

    Filesize

    860KB

    MD5

    166cd5322558358c4e9f514428196d86

    SHA1

    9defc245cfb05896b6896f4c2123438a9cea7ba7

    SHA256

    b7604ea86967285be627eef1e17d713a8472775e33134fd56c237b221b8fda98

    SHA512

    7b21045f30d68f4a38b96eb5831682ec05992cc444105153ee0abc4c5562113cb262410a40b684d9858f0b1cc85b2def5276aef83121341dc341ca15a1cb3c55

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5922184.exe

    Filesize

    860KB

    MD5

    166cd5322558358c4e9f514428196d86

    SHA1

    9defc245cfb05896b6896f4c2123438a9cea7ba7

    SHA256

    b7604ea86967285be627eef1e17d713a8472775e33134fd56c237b221b8fda98

    SHA512

    7b21045f30d68f4a38b96eb5831682ec05992cc444105153ee0abc4c5562113cb262410a40b684d9858f0b1cc85b2def5276aef83121341dc341ca15a1cb3c55

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5922184.exe

    Filesize

    860KB

    MD5

    166cd5322558358c4e9f514428196d86

    SHA1

    9defc245cfb05896b6896f4c2123438a9cea7ba7

    SHA256

    b7604ea86967285be627eef1e17d713a8472775e33134fd56c237b221b8fda98

    SHA512

    7b21045f30d68f4a38b96eb5831682ec05992cc444105153ee0abc4c5562113cb262410a40b684d9858f0b1cc85b2def5276aef83121341dc341ca15a1cb3c55

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5922184.exe

    Filesize

    860KB

    MD5

    166cd5322558358c4e9f514428196d86

    SHA1

    9defc245cfb05896b6896f4c2123438a9cea7ba7

    SHA256

    b7604ea86967285be627eef1e17d713a8472775e33134fd56c237b221b8fda98

    SHA512

    7b21045f30d68f4a38b96eb5831682ec05992cc444105153ee0abc4c5562113cb262410a40b684d9858f0b1cc85b2def5276aef83121341dc341ca15a1cb3c55

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5922184.exe

    Filesize

    860KB

    MD5

    166cd5322558358c4e9f514428196d86

    SHA1

    9defc245cfb05896b6896f4c2123438a9cea7ba7

    SHA256

    b7604ea86967285be627eef1e17d713a8472775e33134fd56c237b221b8fda98

    SHA512

    7b21045f30d68f4a38b96eb5831682ec05992cc444105153ee0abc4c5562113cb262410a40b684d9858f0b1cc85b2def5276aef83121341dc341ca15a1cb3c55

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5922184.exe

    Filesize

    860KB

    MD5

    166cd5322558358c4e9f514428196d86

    SHA1

    9defc245cfb05896b6896f4c2123438a9cea7ba7

    SHA256

    b7604ea86967285be627eef1e17d713a8472775e33134fd56c237b221b8fda98

    SHA512

    7b21045f30d68f4a38b96eb5831682ec05992cc444105153ee0abc4c5562113cb262410a40b684d9858f0b1cc85b2def5276aef83121341dc341ca15a1cb3c55

  • memory/2564-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2564-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2564-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2564-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2564-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2564-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2564-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2564-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB