Analysis

  • max time kernel
    120s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 07:49

General

  • Target

    717a3cde52488592b29b764ade5fc41a3081b7648b5e9d501431941214c73fdb.exe

  • Size

    1.3MB

  • MD5

    653f9ffae3cf2ea02b2de34c686ac157

  • SHA1

    080eac3a8e59f35bd52a025238681829a93cfcd4

  • SHA256

    717a3cde52488592b29b764ade5fc41a3081b7648b5e9d501431941214c73fdb

  • SHA512

    719793fad867379e856f4a76066aa44faf981232d628e3fc53a9d573b0dfbe430c658b3d05ae88ea678ee768428e07158600b69090a5bf7211a6482c1f00367d

  • SSDEEP

    24576:wy3Le2SPS1ylH0WWvDZWlhrs3VKEjG9NmKQDEc2:36/lH0WWvDZQgk9mK

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\717a3cde52488592b29b764ade5fc41a3081b7648b5e9d501431941214c73fdb.exe
    "C:\Users\Admin\AppData\Local\Temp\717a3cde52488592b29b764ade5fc41a3081b7648b5e9d501431941214c73fdb.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8111210.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8111210.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1431987.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1431987.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2324
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1993277.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1993277.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2472
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0341032.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0341032.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2832
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1545444.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1545444.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2768
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2964
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8111210.exe

    Filesize

    1.2MB

    MD5

    5409fa07e7778733259de6010423c777

    SHA1

    19e5d2c5c9e79bf2c809ab3e0ff7642c15b1a5ea

    SHA256

    5bf1e5ff833ad61c385526a3c4eb923b63e43f4f20fe4759a470857c4c312e64

    SHA512

    a21479f6c82edf858f7b78961d90e23f9a325ff428b87817c1196805bc5619383ea013e00dde426815bd69fc598bd8f6a817b17f71134eb2bc2358d59f2ca282

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8111210.exe

    Filesize

    1.2MB

    MD5

    5409fa07e7778733259de6010423c777

    SHA1

    19e5d2c5c9e79bf2c809ab3e0ff7642c15b1a5ea

    SHA256

    5bf1e5ff833ad61c385526a3c4eb923b63e43f4f20fe4759a470857c4c312e64

    SHA512

    a21479f6c82edf858f7b78961d90e23f9a325ff428b87817c1196805bc5619383ea013e00dde426815bd69fc598bd8f6a817b17f71134eb2bc2358d59f2ca282

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1431987.exe

    Filesize

    1.0MB

    MD5

    4885876a82b99eb00ff6d96fa741888d

    SHA1

    f44cfd1499f53760be856d570b8154a66e394a5d

    SHA256

    ca804a74e4f50e2e1155e461947730c5f4b91f3ad366940e2558b53bb9ab74a2

    SHA512

    4f26ff6c1a6dfda5699382491fdb304b985207a08e8e43dd76697207d591429754e7c7cd407bd4fee5fcf581d125b36199aac56287971be8d2069d4af1f13fc9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1431987.exe

    Filesize

    1.0MB

    MD5

    4885876a82b99eb00ff6d96fa741888d

    SHA1

    f44cfd1499f53760be856d570b8154a66e394a5d

    SHA256

    ca804a74e4f50e2e1155e461947730c5f4b91f3ad366940e2558b53bb9ab74a2

    SHA512

    4f26ff6c1a6dfda5699382491fdb304b985207a08e8e43dd76697207d591429754e7c7cd407bd4fee5fcf581d125b36199aac56287971be8d2069d4af1f13fc9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1993277.exe

    Filesize

    882KB

    MD5

    27754d90ece66e3f6511d2da4ffeb8c9

    SHA1

    ae6208132a70d7ac06e05284875e356b48fe280c

    SHA256

    26fc72f9c10fc6549e7c40d497c469c21da383cf9eb7934ff10917db021e0226

    SHA512

    0c194f371b544e6b9dd88c98379585901bf0f855066b30ecc8df5a50b6b20354c752ca889f2df4cdb59051630861208cb825fbcb3438e55e92d8bbf62f5559d1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1993277.exe

    Filesize

    882KB

    MD5

    27754d90ece66e3f6511d2da4ffeb8c9

    SHA1

    ae6208132a70d7ac06e05284875e356b48fe280c

    SHA256

    26fc72f9c10fc6549e7c40d497c469c21da383cf9eb7934ff10917db021e0226

    SHA512

    0c194f371b544e6b9dd88c98379585901bf0f855066b30ecc8df5a50b6b20354c752ca889f2df4cdb59051630861208cb825fbcb3438e55e92d8bbf62f5559d1

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0341032.exe

    Filesize

    492KB

    MD5

    c82991488ec7d3d65a65f414c5dc8997

    SHA1

    d8b94253156d3f933b73c1ad51a8a8b723e561a8

    SHA256

    1414a0151dcf17912bfa4288c83c347dbdd7e1d690580aa7088f3bd391c9c001

    SHA512

    ee038b910abeab19b7209b09758b0bf697b47e84ae154d8f8e8e9581aff52554b239ff2ebf8664551e5000bb27d96a0751891636dab4686c90c96bdfe264be76

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0341032.exe

    Filesize

    492KB

    MD5

    c82991488ec7d3d65a65f414c5dc8997

    SHA1

    d8b94253156d3f933b73c1ad51a8a8b723e561a8

    SHA256

    1414a0151dcf17912bfa4288c83c347dbdd7e1d690580aa7088f3bd391c9c001

    SHA512

    ee038b910abeab19b7209b09758b0bf697b47e84ae154d8f8e8e9581aff52554b239ff2ebf8664551e5000bb27d96a0751891636dab4686c90c96bdfe264be76

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1545444.exe

    Filesize

    860KB

    MD5

    6d7c5b12c3ad1c5290e8367ad54a2d29

    SHA1

    d7ce0513ea3b6905e11eda3232a18c40bb8a1e85

    SHA256

    a225b663da6737ff4da232c2a2a22196d630add4cbac010c2607430092814b96

    SHA512

    62f6f20f071bb0f4bf011757262f10e5a4b243e3f3d79bf14414238301d149951014f431bd6488487c4af69903198b9e183d15222ca5c0bedfbdbaa095d5a5b8

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1545444.exe

    Filesize

    860KB

    MD5

    6d7c5b12c3ad1c5290e8367ad54a2d29

    SHA1

    d7ce0513ea3b6905e11eda3232a18c40bb8a1e85

    SHA256

    a225b663da6737ff4da232c2a2a22196d630add4cbac010c2607430092814b96

    SHA512

    62f6f20f071bb0f4bf011757262f10e5a4b243e3f3d79bf14414238301d149951014f431bd6488487c4af69903198b9e183d15222ca5c0bedfbdbaa095d5a5b8

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1545444.exe

    Filesize

    860KB

    MD5

    6d7c5b12c3ad1c5290e8367ad54a2d29

    SHA1

    d7ce0513ea3b6905e11eda3232a18c40bb8a1e85

    SHA256

    a225b663da6737ff4da232c2a2a22196d630add4cbac010c2607430092814b96

    SHA512

    62f6f20f071bb0f4bf011757262f10e5a4b243e3f3d79bf14414238301d149951014f431bd6488487c4af69903198b9e183d15222ca5c0bedfbdbaa095d5a5b8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8111210.exe

    Filesize

    1.2MB

    MD5

    5409fa07e7778733259de6010423c777

    SHA1

    19e5d2c5c9e79bf2c809ab3e0ff7642c15b1a5ea

    SHA256

    5bf1e5ff833ad61c385526a3c4eb923b63e43f4f20fe4759a470857c4c312e64

    SHA512

    a21479f6c82edf858f7b78961d90e23f9a325ff428b87817c1196805bc5619383ea013e00dde426815bd69fc598bd8f6a817b17f71134eb2bc2358d59f2ca282

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8111210.exe

    Filesize

    1.2MB

    MD5

    5409fa07e7778733259de6010423c777

    SHA1

    19e5d2c5c9e79bf2c809ab3e0ff7642c15b1a5ea

    SHA256

    5bf1e5ff833ad61c385526a3c4eb923b63e43f4f20fe4759a470857c4c312e64

    SHA512

    a21479f6c82edf858f7b78961d90e23f9a325ff428b87817c1196805bc5619383ea013e00dde426815bd69fc598bd8f6a817b17f71134eb2bc2358d59f2ca282

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1431987.exe

    Filesize

    1.0MB

    MD5

    4885876a82b99eb00ff6d96fa741888d

    SHA1

    f44cfd1499f53760be856d570b8154a66e394a5d

    SHA256

    ca804a74e4f50e2e1155e461947730c5f4b91f3ad366940e2558b53bb9ab74a2

    SHA512

    4f26ff6c1a6dfda5699382491fdb304b985207a08e8e43dd76697207d591429754e7c7cd407bd4fee5fcf581d125b36199aac56287971be8d2069d4af1f13fc9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1431987.exe

    Filesize

    1.0MB

    MD5

    4885876a82b99eb00ff6d96fa741888d

    SHA1

    f44cfd1499f53760be856d570b8154a66e394a5d

    SHA256

    ca804a74e4f50e2e1155e461947730c5f4b91f3ad366940e2558b53bb9ab74a2

    SHA512

    4f26ff6c1a6dfda5699382491fdb304b985207a08e8e43dd76697207d591429754e7c7cd407bd4fee5fcf581d125b36199aac56287971be8d2069d4af1f13fc9

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1993277.exe

    Filesize

    882KB

    MD5

    27754d90ece66e3f6511d2da4ffeb8c9

    SHA1

    ae6208132a70d7ac06e05284875e356b48fe280c

    SHA256

    26fc72f9c10fc6549e7c40d497c469c21da383cf9eb7934ff10917db021e0226

    SHA512

    0c194f371b544e6b9dd88c98379585901bf0f855066b30ecc8df5a50b6b20354c752ca889f2df4cdb59051630861208cb825fbcb3438e55e92d8bbf62f5559d1

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1993277.exe

    Filesize

    882KB

    MD5

    27754d90ece66e3f6511d2da4ffeb8c9

    SHA1

    ae6208132a70d7ac06e05284875e356b48fe280c

    SHA256

    26fc72f9c10fc6549e7c40d497c469c21da383cf9eb7934ff10917db021e0226

    SHA512

    0c194f371b544e6b9dd88c98379585901bf0f855066b30ecc8df5a50b6b20354c752ca889f2df4cdb59051630861208cb825fbcb3438e55e92d8bbf62f5559d1

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z0341032.exe

    Filesize

    492KB

    MD5

    c82991488ec7d3d65a65f414c5dc8997

    SHA1

    d8b94253156d3f933b73c1ad51a8a8b723e561a8

    SHA256

    1414a0151dcf17912bfa4288c83c347dbdd7e1d690580aa7088f3bd391c9c001

    SHA512

    ee038b910abeab19b7209b09758b0bf697b47e84ae154d8f8e8e9581aff52554b239ff2ebf8664551e5000bb27d96a0751891636dab4686c90c96bdfe264be76

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z0341032.exe

    Filesize

    492KB

    MD5

    c82991488ec7d3d65a65f414c5dc8997

    SHA1

    d8b94253156d3f933b73c1ad51a8a8b723e561a8

    SHA256

    1414a0151dcf17912bfa4288c83c347dbdd7e1d690580aa7088f3bd391c9c001

    SHA512

    ee038b910abeab19b7209b09758b0bf697b47e84ae154d8f8e8e9581aff52554b239ff2ebf8664551e5000bb27d96a0751891636dab4686c90c96bdfe264be76

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1545444.exe

    Filesize

    860KB

    MD5

    6d7c5b12c3ad1c5290e8367ad54a2d29

    SHA1

    d7ce0513ea3b6905e11eda3232a18c40bb8a1e85

    SHA256

    a225b663da6737ff4da232c2a2a22196d630add4cbac010c2607430092814b96

    SHA512

    62f6f20f071bb0f4bf011757262f10e5a4b243e3f3d79bf14414238301d149951014f431bd6488487c4af69903198b9e183d15222ca5c0bedfbdbaa095d5a5b8

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1545444.exe

    Filesize

    860KB

    MD5

    6d7c5b12c3ad1c5290e8367ad54a2d29

    SHA1

    d7ce0513ea3b6905e11eda3232a18c40bb8a1e85

    SHA256

    a225b663da6737ff4da232c2a2a22196d630add4cbac010c2607430092814b96

    SHA512

    62f6f20f071bb0f4bf011757262f10e5a4b243e3f3d79bf14414238301d149951014f431bd6488487c4af69903198b9e183d15222ca5c0bedfbdbaa095d5a5b8

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1545444.exe

    Filesize

    860KB

    MD5

    6d7c5b12c3ad1c5290e8367ad54a2d29

    SHA1

    d7ce0513ea3b6905e11eda3232a18c40bb8a1e85

    SHA256

    a225b663da6737ff4da232c2a2a22196d630add4cbac010c2607430092814b96

    SHA512

    62f6f20f071bb0f4bf011757262f10e5a4b243e3f3d79bf14414238301d149951014f431bd6488487c4af69903198b9e183d15222ca5c0bedfbdbaa095d5a5b8

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1545444.exe

    Filesize

    860KB

    MD5

    6d7c5b12c3ad1c5290e8367ad54a2d29

    SHA1

    d7ce0513ea3b6905e11eda3232a18c40bb8a1e85

    SHA256

    a225b663da6737ff4da232c2a2a22196d630add4cbac010c2607430092814b96

    SHA512

    62f6f20f071bb0f4bf011757262f10e5a4b243e3f3d79bf14414238301d149951014f431bd6488487c4af69903198b9e183d15222ca5c0bedfbdbaa095d5a5b8

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1545444.exe

    Filesize

    860KB

    MD5

    6d7c5b12c3ad1c5290e8367ad54a2d29

    SHA1

    d7ce0513ea3b6905e11eda3232a18c40bb8a1e85

    SHA256

    a225b663da6737ff4da232c2a2a22196d630add4cbac010c2607430092814b96

    SHA512

    62f6f20f071bb0f4bf011757262f10e5a4b243e3f3d79bf14414238301d149951014f431bd6488487c4af69903198b9e183d15222ca5c0bedfbdbaa095d5a5b8

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1545444.exe

    Filesize

    860KB

    MD5

    6d7c5b12c3ad1c5290e8367ad54a2d29

    SHA1

    d7ce0513ea3b6905e11eda3232a18c40bb8a1e85

    SHA256

    a225b663da6737ff4da232c2a2a22196d630add4cbac010c2607430092814b96

    SHA512

    62f6f20f071bb0f4bf011757262f10e5a4b243e3f3d79bf14414238301d149951014f431bd6488487c4af69903198b9e183d15222ca5c0bedfbdbaa095d5a5b8

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1545444.exe

    Filesize

    860KB

    MD5

    6d7c5b12c3ad1c5290e8367ad54a2d29

    SHA1

    d7ce0513ea3b6905e11eda3232a18c40bb8a1e85

    SHA256

    a225b663da6737ff4da232c2a2a22196d630add4cbac010c2607430092814b96

    SHA512

    62f6f20f071bb0f4bf011757262f10e5a4b243e3f3d79bf14414238301d149951014f431bd6488487c4af69903198b9e183d15222ca5c0bedfbdbaa095d5a5b8

  • memory/2964-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2964-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2964-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2964-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2964-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2964-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2964-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2964-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB