Analysis

  • max time kernel
    121s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 07:54

General

  • Target

    0a2360bf27369ce13fcfb223ee765ca8eb09a33262cda4a2d84c04ad5ae20263.exe

  • Size

    1.3MB

  • MD5

    3cb0854a76c7ca760d453aefbcceb6fe

  • SHA1

    8fcf3b3dcf6acc417bcce5aef8d18f7843acd4b6

  • SHA256

    0a2360bf27369ce13fcfb223ee765ca8eb09a33262cda4a2d84c04ad5ae20263

  • SHA512

    300938af999edce3f4c69c9599b8249b66f8ac620375b47fcaf863739c80cd966293e1ce3776b9470d4a65f5c16c004adc90a577d0aa5d6efb4b328db03ca865

  • SSDEEP

    24576:8yuiiqy86U6PWjmb0/0CKkearNg55Pm3u+EvmNlC7B+nr4U6OWAWfalgV:rqnPt0/0u/3u+puAr/wjf

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a2360bf27369ce13fcfb223ee765ca8eb09a33262cda4a2d84c04ad5ae20263.exe
    "C:\Users\Admin\AppData\Local\Temp\0a2360bf27369ce13fcfb223ee765ca8eb09a33262cda4a2d84c04ad5ae20263.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8640339.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8640339.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0954764.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0954764.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2404
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7525724.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7525724.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2640
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9739561.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9739561.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2716
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5651491.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5651491.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2752
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2892
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8640339.exe
    Filesize

    1.2MB

    MD5

    4754f1a18494182c411082d3a2ce3159

    SHA1

    1b45a2cd48befc5ba6a9e3ac8acd8e7e3614bf00

    SHA256

    aba55d6c04cdf27c0b6717b4ac31e2f6daca8d5cc2f360b4b93044b6a8ffde23

    SHA512

    90cd38168268b145ab227360c3aab9881fe2e3f03b05cb68745e467b99427f5093a5250b5cd843411e530307d07a18c4e68c47a41010bf4a72e58de02db2051c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8640339.exe
    Filesize

    1.2MB

    MD5

    4754f1a18494182c411082d3a2ce3159

    SHA1

    1b45a2cd48befc5ba6a9e3ac8acd8e7e3614bf00

    SHA256

    aba55d6c04cdf27c0b6717b4ac31e2f6daca8d5cc2f360b4b93044b6a8ffde23

    SHA512

    90cd38168268b145ab227360c3aab9881fe2e3f03b05cb68745e467b99427f5093a5250b5cd843411e530307d07a18c4e68c47a41010bf4a72e58de02db2051c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0954764.exe
    Filesize

    1.0MB

    MD5

    377cce5f674dafb998be5e6f087d0a2c

    SHA1

    68d4f6049590c5357fde76e93e0a3c7aee62dfdc

    SHA256

    09b532ec54855c3216bfeb0eef45179b3445502a4bfa5117660c077eb88b8d3b

    SHA512

    55b94877a2598e87d96bc7ce6f12b7cd11407c40be583b80334152cff4724142602ae86002eaeac66124e98fe67bcce0332bb663fd9da3a986341ca13b103fa7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0954764.exe
    Filesize

    1.0MB

    MD5

    377cce5f674dafb998be5e6f087d0a2c

    SHA1

    68d4f6049590c5357fde76e93e0a3c7aee62dfdc

    SHA256

    09b532ec54855c3216bfeb0eef45179b3445502a4bfa5117660c077eb88b8d3b

    SHA512

    55b94877a2598e87d96bc7ce6f12b7cd11407c40be583b80334152cff4724142602ae86002eaeac66124e98fe67bcce0332bb663fd9da3a986341ca13b103fa7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7525724.exe
    Filesize

    883KB

    MD5

    7a11f4a98e6d15e68353a31f5038f641

    SHA1

    44b69e539ee86369c3f359bf779d18563fbc6e5c

    SHA256

    fb4949c87681a91ab3d743b5cd57a565d6a00412891e32ada609fb11b48fe14e

    SHA512

    cad2cee0947ff039386fd3d1e2b9eeac3a08533ae045bfd93867efe75c09aab06f9fdac8c31c02433f7040ef3c2d29e8ccd79e0f2c71718e2003926bdcace07c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7525724.exe
    Filesize

    883KB

    MD5

    7a11f4a98e6d15e68353a31f5038f641

    SHA1

    44b69e539ee86369c3f359bf779d18563fbc6e5c

    SHA256

    fb4949c87681a91ab3d743b5cd57a565d6a00412891e32ada609fb11b48fe14e

    SHA512

    cad2cee0947ff039386fd3d1e2b9eeac3a08533ae045bfd93867efe75c09aab06f9fdac8c31c02433f7040ef3c2d29e8ccd79e0f2c71718e2003926bdcace07c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9739561.exe
    Filesize

    492KB

    MD5

    08f96c7ad826c352ca7ff92db730569b

    SHA1

    82cd678d4b1078b1ba06a5f144b6f21b3fb0ec34

    SHA256

    d3fbbf225f3fb8aeadf736978a5060e932fdfd39e4cb24298e22d04c4aa2c13a

    SHA512

    998741be6656fd830a8ac2c5b48398a0d89b1677ac9598ddf4d0186d5f1e67e8580fe44a3f3c595bc95b014e2cee469345d2e58ff2f79972132aa66c0ef34555

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9739561.exe
    Filesize

    492KB

    MD5

    08f96c7ad826c352ca7ff92db730569b

    SHA1

    82cd678d4b1078b1ba06a5f144b6f21b3fb0ec34

    SHA256

    d3fbbf225f3fb8aeadf736978a5060e932fdfd39e4cb24298e22d04c4aa2c13a

    SHA512

    998741be6656fd830a8ac2c5b48398a0d89b1677ac9598ddf4d0186d5f1e67e8580fe44a3f3c595bc95b014e2cee469345d2e58ff2f79972132aa66c0ef34555

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5651491.exe
    Filesize

    860KB

    MD5

    a659f28ed73051a054d4ff0c2be85f33

    SHA1

    4319b05e40468e8c904f3c2e26974e0ea1dfdc98

    SHA256

    0bf6cee86bc8f8c9c870c0c166f5c75403db9265c6c4ba907b113414445cf865

    SHA512

    919cf70f42f39759cb254a65d96f36460a034cb3ad45b7d52f7cdfc5c526b65942251af77d406c7d61dcf3cfb65911e003a3cd618e192395805a8806b0cf06f4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5651491.exe
    Filesize

    860KB

    MD5

    a659f28ed73051a054d4ff0c2be85f33

    SHA1

    4319b05e40468e8c904f3c2e26974e0ea1dfdc98

    SHA256

    0bf6cee86bc8f8c9c870c0c166f5c75403db9265c6c4ba907b113414445cf865

    SHA512

    919cf70f42f39759cb254a65d96f36460a034cb3ad45b7d52f7cdfc5c526b65942251af77d406c7d61dcf3cfb65911e003a3cd618e192395805a8806b0cf06f4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5651491.exe
    Filesize

    860KB

    MD5

    a659f28ed73051a054d4ff0c2be85f33

    SHA1

    4319b05e40468e8c904f3c2e26974e0ea1dfdc98

    SHA256

    0bf6cee86bc8f8c9c870c0c166f5c75403db9265c6c4ba907b113414445cf865

    SHA512

    919cf70f42f39759cb254a65d96f36460a034cb3ad45b7d52f7cdfc5c526b65942251af77d406c7d61dcf3cfb65911e003a3cd618e192395805a8806b0cf06f4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8640339.exe
    Filesize

    1.2MB

    MD5

    4754f1a18494182c411082d3a2ce3159

    SHA1

    1b45a2cd48befc5ba6a9e3ac8acd8e7e3614bf00

    SHA256

    aba55d6c04cdf27c0b6717b4ac31e2f6daca8d5cc2f360b4b93044b6a8ffde23

    SHA512

    90cd38168268b145ab227360c3aab9881fe2e3f03b05cb68745e467b99427f5093a5250b5cd843411e530307d07a18c4e68c47a41010bf4a72e58de02db2051c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8640339.exe
    Filesize

    1.2MB

    MD5

    4754f1a18494182c411082d3a2ce3159

    SHA1

    1b45a2cd48befc5ba6a9e3ac8acd8e7e3614bf00

    SHA256

    aba55d6c04cdf27c0b6717b4ac31e2f6daca8d5cc2f360b4b93044b6a8ffde23

    SHA512

    90cd38168268b145ab227360c3aab9881fe2e3f03b05cb68745e467b99427f5093a5250b5cd843411e530307d07a18c4e68c47a41010bf4a72e58de02db2051c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z0954764.exe
    Filesize

    1.0MB

    MD5

    377cce5f674dafb998be5e6f087d0a2c

    SHA1

    68d4f6049590c5357fde76e93e0a3c7aee62dfdc

    SHA256

    09b532ec54855c3216bfeb0eef45179b3445502a4bfa5117660c077eb88b8d3b

    SHA512

    55b94877a2598e87d96bc7ce6f12b7cd11407c40be583b80334152cff4724142602ae86002eaeac66124e98fe67bcce0332bb663fd9da3a986341ca13b103fa7

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z0954764.exe
    Filesize

    1.0MB

    MD5

    377cce5f674dafb998be5e6f087d0a2c

    SHA1

    68d4f6049590c5357fde76e93e0a3c7aee62dfdc

    SHA256

    09b532ec54855c3216bfeb0eef45179b3445502a4bfa5117660c077eb88b8d3b

    SHA512

    55b94877a2598e87d96bc7ce6f12b7cd11407c40be583b80334152cff4724142602ae86002eaeac66124e98fe67bcce0332bb663fd9da3a986341ca13b103fa7

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7525724.exe
    Filesize

    883KB

    MD5

    7a11f4a98e6d15e68353a31f5038f641

    SHA1

    44b69e539ee86369c3f359bf779d18563fbc6e5c

    SHA256

    fb4949c87681a91ab3d743b5cd57a565d6a00412891e32ada609fb11b48fe14e

    SHA512

    cad2cee0947ff039386fd3d1e2b9eeac3a08533ae045bfd93867efe75c09aab06f9fdac8c31c02433f7040ef3c2d29e8ccd79e0f2c71718e2003926bdcace07c

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7525724.exe
    Filesize

    883KB

    MD5

    7a11f4a98e6d15e68353a31f5038f641

    SHA1

    44b69e539ee86369c3f359bf779d18563fbc6e5c

    SHA256

    fb4949c87681a91ab3d743b5cd57a565d6a00412891e32ada609fb11b48fe14e

    SHA512

    cad2cee0947ff039386fd3d1e2b9eeac3a08533ae045bfd93867efe75c09aab06f9fdac8c31c02433f7040ef3c2d29e8ccd79e0f2c71718e2003926bdcace07c

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9739561.exe
    Filesize

    492KB

    MD5

    08f96c7ad826c352ca7ff92db730569b

    SHA1

    82cd678d4b1078b1ba06a5f144b6f21b3fb0ec34

    SHA256

    d3fbbf225f3fb8aeadf736978a5060e932fdfd39e4cb24298e22d04c4aa2c13a

    SHA512

    998741be6656fd830a8ac2c5b48398a0d89b1677ac9598ddf4d0186d5f1e67e8580fe44a3f3c595bc95b014e2cee469345d2e58ff2f79972132aa66c0ef34555

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9739561.exe
    Filesize

    492KB

    MD5

    08f96c7ad826c352ca7ff92db730569b

    SHA1

    82cd678d4b1078b1ba06a5f144b6f21b3fb0ec34

    SHA256

    d3fbbf225f3fb8aeadf736978a5060e932fdfd39e4cb24298e22d04c4aa2c13a

    SHA512

    998741be6656fd830a8ac2c5b48398a0d89b1677ac9598ddf4d0186d5f1e67e8580fe44a3f3c595bc95b014e2cee469345d2e58ff2f79972132aa66c0ef34555

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5651491.exe
    Filesize

    860KB

    MD5

    a659f28ed73051a054d4ff0c2be85f33

    SHA1

    4319b05e40468e8c904f3c2e26974e0ea1dfdc98

    SHA256

    0bf6cee86bc8f8c9c870c0c166f5c75403db9265c6c4ba907b113414445cf865

    SHA512

    919cf70f42f39759cb254a65d96f36460a034cb3ad45b7d52f7cdfc5c526b65942251af77d406c7d61dcf3cfb65911e003a3cd618e192395805a8806b0cf06f4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5651491.exe
    Filesize

    860KB

    MD5

    a659f28ed73051a054d4ff0c2be85f33

    SHA1

    4319b05e40468e8c904f3c2e26974e0ea1dfdc98

    SHA256

    0bf6cee86bc8f8c9c870c0c166f5c75403db9265c6c4ba907b113414445cf865

    SHA512

    919cf70f42f39759cb254a65d96f36460a034cb3ad45b7d52f7cdfc5c526b65942251af77d406c7d61dcf3cfb65911e003a3cd618e192395805a8806b0cf06f4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5651491.exe
    Filesize

    860KB

    MD5

    a659f28ed73051a054d4ff0c2be85f33

    SHA1

    4319b05e40468e8c904f3c2e26974e0ea1dfdc98

    SHA256

    0bf6cee86bc8f8c9c870c0c166f5c75403db9265c6c4ba907b113414445cf865

    SHA512

    919cf70f42f39759cb254a65d96f36460a034cb3ad45b7d52f7cdfc5c526b65942251af77d406c7d61dcf3cfb65911e003a3cd618e192395805a8806b0cf06f4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5651491.exe
    Filesize

    860KB

    MD5

    a659f28ed73051a054d4ff0c2be85f33

    SHA1

    4319b05e40468e8c904f3c2e26974e0ea1dfdc98

    SHA256

    0bf6cee86bc8f8c9c870c0c166f5c75403db9265c6c4ba907b113414445cf865

    SHA512

    919cf70f42f39759cb254a65d96f36460a034cb3ad45b7d52f7cdfc5c526b65942251af77d406c7d61dcf3cfb65911e003a3cd618e192395805a8806b0cf06f4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5651491.exe
    Filesize

    860KB

    MD5

    a659f28ed73051a054d4ff0c2be85f33

    SHA1

    4319b05e40468e8c904f3c2e26974e0ea1dfdc98

    SHA256

    0bf6cee86bc8f8c9c870c0c166f5c75403db9265c6c4ba907b113414445cf865

    SHA512

    919cf70f42f39759cb254a65d96f36460a034cb3ad45b7d52f7cdfc5c526b65942251af77d406c7d61dcf3cfb65911e003a3cd618e192395805a8806b0cf06f4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5651491.exe
    Filesize

    860KB

    MD5

    a659f28ed73051a054d4ff0c2be85f33

    SHA1

    4319b05e40468e8c904f3c2e26974e0ea1dfdc98

    SHA256

    0bf6cee86bc8f8c9c870c0c166f5c75403db9265c6c4ba907b113414445cf865

    SHA512

    919cf70f42f39759cb254a65d96f36460a034cb3ad45b7d52f7cdfc5c526b65942251af77d406c7d61dcf3cfb65911e003a3cd618e192395805a8806b0cf06f4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5651491.exe
    Filesize

    860KB

    MD5

    a659f28ed73051a054d4ff0c2be85f33

    SHA1

    4319b05e40468e8c904f3c2e26974e0ea1dfdc98

    SHA256

    0bf6cee86bc8f8c9c870c0c166f5c75403db9265c6c4ba907b113414445cf865

    SHA512

    919cf70f42f39759cb254a65d96f36460a034cb3ad45b7d52f7cdfc5c526b65942251af77d406c7d61dcf3cfb65911e003a3cd618e192395805a8806b0cf06f4

  • memory/2892-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2892-58-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2892-60-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2892-62-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2892-56-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2892-55-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2892-54-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2892-53-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB