Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 07:46

General

  • Target

    188962209b38e87eacedb25c9d09c3b86d348f856b9dc36bce3cd3f3ba419c36.exe

  • Size

    1.3MB

  • MD5

    bc0e3701a44a3e7d6f315807181bbdd7

  • SHA1

    b1f4382b48fb372ffeb7da618d75e5062c5c69da

  • SHA256

    188962209b38e87eacedb25c9d09c3b86d348f856b9dc36bce3cd3f3ba419c36

  • SHA512

    701ca71ab37959b92934f907a48da2cadd233b9be9363776c84e6eb63ad8a0ddabc9bd0d246460aa86d29c1082328c095f55766b70e2f5bbd971514f3cd2fa15

  • SSDEEP

    24576:Iye2FiAMmHUTXffCh0oOM4GqgJA9x25wHqFY6zQgY9fzEZ5:Pe+iT7TXffgBhJACF7zb8gZ

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\188962209b38e87eacedb25c9d09c3b86d348f856b9dc36bce3cd3f3ba419c36.exe
    "C:\Users\Admin\AppData\Local\Temp\188962209b38e87eacedb25c9d09c3b86d348f856b9dc36bce3cd3f3ba419c36.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4299355.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4299355.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6766541.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6766541.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2404
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0986197.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0986197.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2836
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9927855.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9927855.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2668
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8326301.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8326301.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2696
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2704
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4299355.exe

    Filesize

    1.2MB

    MD5

    7c8ff77ec19d33fa97e2c5cdbd5231ed

    SHA1

    074606885628ed5ffecfb94a607020ce19723aae

    SHA256

    010e364a1d14f2100cdfe2fc322cc4bf8dd2c0d5ca3f758959622d5a281513ea

    SHA512

    18fe3d7bc03214677291649674bb3c39c6b30e81eac3270cd91763fdadea0119db1d7e311ede24d363fe9156fd7d7571e983cdf45225b662f2af1e1226be681a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4299355.exe

    Filesize

    1.2MB

    MD5

    7c8ff77ec19d33fa97e2c5cdbd5231ed

    SHA1

    074606885628ed5ffecfb94a607020ce19723aae

    SHA256

    010e364a1d14f2100cdfe2fc322cc4bf8dd2c0d5ca3f758959622d5a281513ea

    SHA512

    18fe3d7bc03214677291649674bb3c39c6b30e81eac3270cd91763fdadea0119db1d7e311ede24d363fe9156fd7d7571e983cdf45225b662f2af1e1226be681a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6766541.exe

    Filesize

    1.0MB

    MD5

    3e83d937fea678f575ae1dedb31a3c8b

    SHA1

    78a7889ce26332fc944ea6e4e7a7428b704a8729

    SHA256

    0a012fd28260b6815dd27c9d73418b929e61fe9417cbfcbad9bbec73d2cd4485

    SHA512

    68f29610e1eaa2b791c81b0ce067ed6b7a47255488c37a34c3f72d5dbfbf83510b78a3fd280bb221df66418313dbe1a921894d734d610e0f15d480d787324ac6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6766541.exe

    Filesize

    1.0MB

    MD5

    3e83d937fea678f575ae1dedb31a3c8b

    SHA1

    78a7889ce26332fc944ea6e4e7a7428b704a8729

    SHA256

    0a012fd28260b6815dd27c9d73418b929e61fe9417cbfcbad9bbec73d2cd4485

    SHA512

    68f29610e1eaa2b791c81b0ce067ed6b7a47255488c37a34c3f72d5dbfbf83510b78a3fd280bb221df66418313dbe1a921894d734d610e0f15d480d787324ac6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0986197.exe

    Filesize

    883KB

    MD5

    3d3969d946456795a928926440d9d20f

    SHA1

    889dae3e09243e411a23f977d8b3d6ab443272c4

    SHA256

    4e816c229376183db7916275f6dd95cad0ada3b561bfe65447c8f45a24148256

    SHA512

    2884d25d0cea046b2410bc44d112c3e1416aaefe7de999962b38168a13bac502f838a4d1a2745de461a7c4ae55f92d04d9179f6aaab8962d8c9c452298c15637

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0986197.exe

    Filesize

    883KB

    MD5

    3d3969d946456795a928926440d9d20f

    SHA1

    889dae3e09243e411a23f977d8b3d6ab443272c4

    SHA256

    4e816c229376183db7916275f6dd95cad0ada3b561bfe65447c8f45a24148256

    SHA512

    2884d25d0cea046b2410bc44d112c3e1416aaefe7de999962b38168a13bac502f838a4d1a2745de461a7c4ae55f92d04d9179f6aaab8962d8c9c452298c15637

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9927855.exe

    Filesize

    492KB

    MD5

    3070368ee67a80076d6afbf1ae9aab15

    SHA1

    cec31762aa818a380fab2c047511aa0323bb4625

    SHA256

    90ea252c820022584c7602fe467f102c7af4520ebb09267d90b47d1da0061b90

    SHA512

    84ac34b3766f468eca9245c663e9144fa9835cc6c0fc0b9ac145531dc73366656048058e82767d88fe0b4bed37b86613fcc64d3dba256281b37ceca21fa137ba

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9927855.exe

    Filesize

    492KB

    MD5

    3070368ee67a80076d6afbf1ae9aab15

    SHA1

    cec31762aa818a380fab2c047511aa0323bb4625

    SHA256

    90ea252c820022584c7602fe467f102c7af4520ebb09267d90b47d1da0061b90

    SHA512

    84ac34b3766f468eca9245c663e9144fa9835cc6c0fc0b9ac145531dc73366656048058e82767d88fe0b4bed37b86613fcc64d3dba256281b37ceca21fa137ba

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8326301.exe

    Filesize

    860KB

    MD5

    caea2fc30e79c39b16e63adc2f41810c

    SHA1

    83014753d6d0adedd29a5387ecffb7dcbf39dfb0

    SHA256

    91b58d0bc2c117db99294d5edcecfa8b8eabea3bc3c6918ad71b0d6e71361efe

    SHA512

    de54be146e04944382bf99129fd86dccf177c8226018841f030ef9d97fc89b33e4fa8308916a0d40ba0c6653a51d5de00f52e968e09df54e435ee97cdb6b01de

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8326301.exe

    Filesize

    860KB

    MD5

    caea2fc30e79c39b16e63adc2f41810c

    SHA1

    83014753d6d0adedd29a5387ecffb7dcbf39dfb0

    SHA256

    91b58d0bc2c117db99294d5edcecfa8b8eabea3bc3c6918ad71b0d6e71361efe

    SHA512

    de54be146e04944382bf99129fd86dccf177c8226018841f030ef9d97fc89b33e4fa8308916a0d40ba0c6653a51d5de00f52e968e09df54e435ee97cdb6b01de

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8326301.exe

    Filesize

    860KB

    MD5

    caea2fc30e79c39b16e63adc2f41810c

    SHA1

    83014753d6d0adedd29a5387ecffb7dcbf39dfb0

    SHA256

    91b58d0bc2c117db99294d5edcecfa8b8eabea3bc3c6918ad71b0d6e71361efe

    SHA512

    de54be146e04944382bf99129fd86dccf177c8226018841f030ef9d97fc89b33e4fa8308916a0d40ba0c6653a51d5de00f52e968e09df54e435ee97cdb6b01de

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4299355.exe

    Filesize

    1.2MB

    MD5

    7c8ff77ec19d33fa97e2c5cdbd5231ed

    SHA1

    074606885628ed5ffecfb94a607020ce19723aae

    SHA256

    010e364a1d14f2100cdfe2fc322cc4bf8dd2c0d5ca3f758959622d5a281513ea

    SHA512

    18fe3d7bc03214677291649674bb3c39c6b30e81eac3270cd91763fdadea0119db1d7e311ede24d363fe9156fd7d7571e983cdf45225b662f2af1e1226be681a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4299355.exe

    Filesize

    1.2MB

    MD5

    7c8ff77ec19d33fa97e2c5cdbd5231ed

    SHA1

    074606885628ed5ffecfb94a607020ce19723aae

    SHA256

    010e364a1d14f2100cdfe2fc322cc4bf8dd2c0d5ca3f758959622d5a281513ea

    SHA512

    18fe3d7bc03214677291649674bb3c39c6b30e81eac3270cd91763fdadea0119db1d7e311ede24d363fe9156fd7d7571e983cdf45225b662f2af1e1226be681a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6766541.exe

    Filesize

    1.0MB

    MD5

    3e83d937fea678f575ae1dedb31a3c8b

    SHA1

    78a7889ce26332fc944ea6e4e7a7428b704a8729

    SHA256

    0a012fd28260b6815dd27c9d73418b929e61fe9417cbfcbad9bbec73d2cd4485

    SHA512

    68f29610e1eaa2b791c81b0ce067ed6b7a47255488c37a34c3f72d5dbfbf83510b78a3fd280bb221df66418313dbe1a921894d734d610e0f15d480d787324ac6

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6766541.exe

    Filesize

    1.0MB

    MD5

    3e83d937fea678f575ae1dedb31a3c8b

    SHA1

    78a7889ce26332fc944ea6e4e7a7428b704a8729

    SHA256

    0a012fd28260b6815dd27c9d73418b929e61fe9417cbfcbad9bbec73d2cd4485

    SHA512

    68f29610e1eaa2b791c81b0ce067ed6b7a47255488c37a34c3f72d5dbfbf83510b78a3fd280bb221df66418313dbe1a921894d734d610e0f15d480d787324ac6

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0986197.exe

    Filesize

    883KB

    MD5

    3d3969d946456795a928926440d9d20f

    SHA1

    889dae3e09243e411a23f977d8b3d6ab443272c4

    SHA256

    4e816c229376183db7916275f6dd95cad0ada3b561bfe65447c8f45a24148256

    SHA512

    2884d25d0cea046b2410bc44d112c3e1416aaefe7de999962b38168a13bac502f838a4d1a2745de461a7c4ae55f92d04d9179f6aaab8962d8c9c452298c15637

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0986197.exe

    Filesize

    883KB

    MD5

    3d3969d946456795a928926440d9d20f

    SHA1

    889dae3e09243e411a23f977d8b3d6ab443272c4

    SHA256

    4e816c229376183db7916275f6dd95cad0ada3b561bfe65447c8f45a24148256

    SHA512

    2884d25d0cea046b2410bc44d112c3e1416aaefe7de999962b38168a13bac502f838a4d1a2745de461a7c4ae55f92d04d9179f6aaab8962d8c9c452298c15637

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9927855.exe

    Filesize

    492KB

    MD5

    3070368ee67a80076d6afbf1ae9aab15

    SHA1

    cec31762aa818a380fab2c047511aa0323bb4625

    SHA256

    90ea252c820022584c7602fe467f102c7af4520ebb09267d90b47d1da0061b90

    SHA512

    84ac34b3766f468eca9245c663e9144fa9835cc6c0fc0b9ac145531dc73366656048058e82767d88fe0b4bed37b86613fcc64d3dba256281b37ceca21fa137ba

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9927855.exe

    Filesize

    492KB

    MD5

    3070368ee67a80076d6afbf1ae9aab15

    SHA1

    cec31762aa818a380fab2c047511aa0323bb4625

    SHA256

    90ea252c820022584c7602fe467f102c7af4520ebb09267d90b47d1da0061b90

    SHA512

    84ac34b3766f468eca9245c663e9144fa9835cc6c0fc0b9ac145531dc73366656048058e82767d88fe0b4bed37b86613fcc64d3dba256281b37ceca21fa137ba

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8326301.exe

    Filesize

    860KB

    MD5

    caea2fc30e79c39b16e63adc2f41810c

    SHA1

    83014753d6d0adedd29a5387ecffb7dcbf39dfb0

    SHA256

    91b58d0bc2c117db99294d5edcecfa8b8eabea3bc3c6918ad71b0d6e71361efe

    SHA512

    de54be146e04944382bf99129fd86dccf177c8226018841f030ef9d97fc89b33e4fa8308916a0d40ba0c6653a51d5de00f52e968e09df54e435ee97cdb6b01de

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8326301.exe

    Filesize

    860KB

    MD5

    caea2fc30e79c39b16e63adc2f41810c

    SHA1

    83014753d6d0adedd29a5387ecffb7dcbf39dfb0

    SHA256

    91b58d0bc2c117db99294d5edcecfa8b8eabea3bc3c6918ad71b0d6e71361efe

    SHA512

    de54be146e04944382bf99129fd86dccf177c8226018841f030ef9d97fc89b33e4fa8308916a0d40ba0c6653a51d5de00f52e968e09df54e435ee97cdb6b01de

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8326301.exe

    Filesize

    860KB

    MD5

    caea2fc30e79c39b16e63adc2f41810c

    SHA1

    83014753d6d0adedd29a5387ecffb7dcbf39dfb0

    SHA256

    91b58d0bc2c117db99294d5edcecfa8b8eabea3bc3c6918ad71b0d6e71361efe

    SHA512

    de54be146e04944382bf99129fd86dccf177c8226018841f030ef9d97fc89b33e4fa8308916a0d40ba0c6653a51d5de00f52e968e09df54e435ee97cdb6b01de

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8326301.exe

    Filesize

    860KB

    MD5

    caea2fc30e79c39b16e63adc2f41810c

    SHA1

    83014753d6d0adedd29a5387ecffb7dcbf39dfb0

    SHA256

    91b58d0bc2c117db99294d5edcecfa8b8eabea3bc3c6918ad71b0d6e71361efe

    SHA512

    de54be146e04944382bf99129fd86dccf177c8226018841f030ef9d97fc89b33e4fa8308916a0d40ba0c6653a51d5de00f52e968e09df54e435ee97cdb6b01de

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8326301.exe

    Filesize

    860KB

    MD5

    caea2fc30e79c39b16e63adc2f41810c

    SHA1

    83014753d6d0adedd29a5387ecffb7dcbf39dfb0

    SHA256

    91b58d0bc2c117db99294d5edcecfa8b8eabea3bc3c6918ad71b0d6e71361efe

    SHA512

    de54be146e04944382bf99129fd86dccf177c8226018841f030ef9d97fc89b33e4fa8308916a0d40ba0c6653a51d5de00f52e968e09df54e435ee97cdb6b01de

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8326301.exe

    Filesize

    860KB

    MD5

    caea2fc30e79c39b16e63adc2f41810c

    SHA1

    83014753d6d0adedd29a5387ecffb7dcbf39dfb0

    SHA256

    91b58d0bc2c117db99294d5edcecfa8b8eabea3bc3c6918ad71b0d6e71361efe

    SHA512

    de54be146e04944382bf99129fd86dccf177c8226018841f030ef9d97fc89b33e4fa8308916a0d40ba0c6653a51d5de00f52e968e09df54e435ee97cdb6b01de

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8326301.exe

    Filesize

    860KB

    MD5

    caea2fc30e79c39b16e63adc2f41810c

    SHA1

    83014753d6d0adedd29a5387ecffb7dcbf39dfb0

    SHA256

    91b58d0bc2c117db99294d5edcecfa8b8eabea3bc3c6918ad71b0d6e71361efe

    SHA512

    de54be146e04944382bf99129fd86dccf177c8226018841f030ef9d97fc89b33e4fa8308916a0d40ba0c6653a51d5de00f52e968e09df54e435ee97cdb6b01de

  • memory/2704-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2704-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2704-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2704-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2704-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2704-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2704-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2704-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB