Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 09:03 UTC

General

  • Target

    222d08c1858e93075afc35d3007a2a69c7a2062fb9dc5c32d30ae4a9b2768b99.exe

  • Size

    1.3MB

  • MD5

    9520eaad6a14292d8ed882ca275edfb3

  • SHA1

    9434690c5cd10450de783da26224ea31234d9e84

  • SHA256

    222d08c1858e93075afc35d3007a2a69c7a2062fb9dc5c32d30ae4a9b2768b99

  • SHA512

    0b52d44d959aebf301d822a9c0a9a82d7093cea3371fdc9a9c1b50678cf2c12186603e4903b7fe050f9751e4966c17ca34e7776902f3841930083f99c7e5a1ae

  • SSDEEP

    24576:RycfoxT3zzB7kwFwFjDvQfl0fq5FuQUFCCjsGeHpmBq8o/PsjKxo1uHmuFzl:Ecwx7zzBrmFLy5AQUFnsGOMtoHPxo1Zw

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\222d08c1858e93075afc35d3007a2a69c7a2062fb9dc5c32d30ae4a9b2768b99.exe
    "C:\Users\Admin\AppData\Local\Temp\222d08c1858e93075afc35d3007a2a69c7a2062fb9dc5c32d30ae4a9b2768b99.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8360140.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8360140.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7159806.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7159806.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2412
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1570334.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1570334.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1812
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8540317.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8540317.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2824
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1557473.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1557473.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2624
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2672
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8360140.exe

    Filesize

    1.2MB

    MD5

    325c07eab9e36495e6c4f81d2b48b8c3

    SHA1

    79c3c4379388759ed3506d7504f4a5af04578eeb

    SHA256

    74cac8ba8dadc3e60f64d051e15e7230420439d389d7b7e7897a98cf4af56c3d

    SHA512

    bf5eadf05890bace0a1dc7f2c2311e08fc34d00eedb26f3b5d12f72a11e4cd770509c879daa1fdc851732d23cdb935a20503e2d647abb6aff3a8d1ea90dac3f3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8360140.exe

    Filesize

    1.2MB

    MD5

    325c07eab9e36495e6c4f81d2b48b8c3

    SHA1

    79c3c4379388759ed3506d7504f4a5af04578eeb

    SHA256

    74cac8ba8dadc3e60f64d051e15e7230420439d389d7b7e7897a98cf4af56c3d

    SHA512

    bf5eadf05890bace0a1dc7f2c2311e08fc34d00eedb26f3b5d12f72a11e4cd770509c879daa1fdc851732d23cdb935a20503e2d647abb6aff3a8d1ea90dac3f3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7159806.exe

    Filesize

    1.0MB

    MD5

    46c3ce3825d3b59b5071fbed4e15b1f5

    SHA1

    f942b099072ba9e25274a4e5e1f865933ee4a877

    SHA256

    faaebffc9c159daeee9b572422d30c468aaacdccfe1a32bff67bae32d570889d

    SHA512

    8bbab1b7319470550de31706ac7b81e3186aa09f72fbac45449a12f21cf0f3a3ceb5540d2912f9e0e7e2ad87b9faf7e2a228fb5272e62118676d9f2633727598

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7159806.exe

    Filesize

    1.0MB

    MD5

    46c3ce3825d3b59b5071fbed4e15b1f5

    SHA1

    f942b099072ba9e25274a4e5e1f865933ee4a877

    SHA256

    faaebffc9c159daeee9b572422d30c468aaacdccfe1a32bff67bae32d570889d

    SHA512

    8bbab1b7319470550de31706ac7b81e3186aa09f72fbac45449a12f21cf0f3a3ceb5540d2912f9e0e7e2ad87b9faf7e2a228fb5272e62118676d9f2633727598

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1570334.exe

    Filesize

    884KB

    MD5

    f89e92032e174c58e9abe11799576edc

    SHA1

    065bf7b86f30fa7a02ba7dbb08452440ac3ab776

    SHA256

    abf41a024299ceec5a4d72f837a3566c196b5b30d7ab4b68b4c98f4bbc0bac47

    SHA512

    ec85a6dd87430e6e8cae713f8a09decc5089ad8701ef6910c171b0698e96620343c395a7c304a70081eb5963b4f35aa9c1f74506b75f73de0e869fec6875e191

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1570334.exe

    Filesize

    884KB

    MD5

    f89e92032e174c58e9abe11799576edc

    SHA1

    065bf7b86f30fa7a02ba7dbb08452440ac3ab776

    SHA256

    abf41a024299ceec5a4d72f837a3566c196b5b30d7ab4b68b4c98f4bbc0bac47

    SHA512

    ec85a6dd87430e6e8cae713f8a09decc5089ad8701ef6910c171b0698e96620343c395a7c304a70081eb5963b4f35aa9c1f74506b75f73de0e869fec6875e191

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8540317.exe

    Filesize

    493KB

    MD5

    356574a56804d0bc803f8e1468b08bde

    SHA1

    00847527b8ae283375443a2eb414add1760ae6dc

    SHA256

    531d7944fd269603c14e86d58216a79e2fda51f709a16159ec05bf264b670c62

    SHA512

    f279931e0498ea9b5ca83e7490b3da650a12d549f10770e6b85cc739c7b3a1abc0ef614243c9f4d6027ca99a6703cf7f60fd784c59c9efe9acd3b4f7c78116ef

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8540317.exe

    Filesize

    493KB

    MD5

    356574a56804d0bc803f8e1468b08bde

    SHA1

    00847527b8ae283375443a2eb414add1760ae6dc

    SHA256

    531d7944fd269603c14e86d58216a79e2fda51f709a16159ec05bf264b670c62

    SHA512

    f279931e0498ea9b5ca83e7490b3da650a12d549f10770e6b85cc739c7b3a1abc0ef614243c9f4d6027ca99a6703cf7f60fd784c59c9efe9acd3b4f7c78116ef

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1557473.exe

    Filesize

    860KB

    MD5

    bbb02b1c7ffdb40fe7b7285d5535196f

    SHA1

    e9f903f1f710bcb03edc9ce0114e0fb7cfa7c46f

    SHA256

    91b393d0f31500062f06a296fe550958f6b1091f4b1eb81c1cccd6d823f132ec

    SHA512

    24d819615f486a3d4c1a3728fdf831e1f93046bb1e952ab56deba760b0dc05dbf76df1d7eef7b7df1d31ce9800449164cab97fd571c351244c69c74df39bc507

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1557473.exe

    Filesize

    860KB

    MD5

    bbb02b1c7ffdb40fe7b7285d5535196f

    SHA1

    e9f903f1f710bcb03edc9ce0114e0fb7cfa7c46f

    SHA256

    91b393d0f31500062f06a296fe550958f6b1091f4b1eb81c1cccd6d823f132ec

    SHA512

    24d819615f486a3d4c1a3728fdf831e1f93046bb1e952ab56deba760b0dc05dbf76df1d7eef7b7df1d31ce9800449164cab97fd571c351244c69c74df39bc507

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1557473.exe

    Filesize

    860KB

    MD5

    bbb02b1c7ffdb40fe7b7285d5535196f

    SHA1

    e9f903f1f710bcb03edc9ce0114e0fb7cfa7c46f

    SHA256

    91b393d0f31500062f06a296fe550958f6b1091f4b1eb81c1cccd6d823f132ec

    SHA512

    24d819615f486a3d4c1a3728fdf831e1f93046bb1e952ab56deba760b0dc05dbf76df1d7eef7b7df1d31ce9800449164cab97fd571c351244c69c74df39bc507

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8360140.exe

    Filesize

    1.2MB

    MD5

    325c07eab9e36495e6c4f81d2b48b8c3

    SHA1

    79c3c4379388759ed3506d7504f4a5af04578eeb

    SHA256

    74cac8ba8dadc3e60f64d051e15e7230420439d389d7b7e7897a98cf4af56c3d

    SHA512

    bf5eadf05890bace0a1dc7f2c2311e08fc34d00eedb26f3b5d12f72a11e4cd770509c879daa1fdc851732d23cdb935a20503e2d647abb6aff3a8d1ea90dac3f3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8360140.exe

    Filesize

    1.2MB

    MD5

    325c07eab9e36495e6c4f81d2b48b8c3

    SHA1

    79c3c4379388759ed3506d7504f4a5af04578eeb

    SHA256

    74cac8ba8dadc3e60f64d051e15e7230420439d389d7b7e7897a98cf4af56c3d

    SHA512

    bf5eadf05890bace0a1dc7f2c2311e08fc34d00eedb26f3b5d12f72a11e4cd770509c879daa1fdc851732d23cdb935a20503e2d647abb6aff3a8d1ea90dac3f3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7159806.exe

    Filesize

    1.0MB

    MD5

    46c3ce3825d3b59b5071fbed4e15b1f5

    SHA1

    f942b099072ba9e25274a4e5e1f865933ee4a877

    SHA256

    faaebffc9c159daeee9b572422d30c468aaacdccfe1a32bff67bae32d570889d

    SHA512

    8bbab1b7319470550de31706ac7b81e3186aa09f72fbac45449a12f21cf0f3a3ceb5540d2912f9e0e7e2ad87b9faf7e2a228fb5272e62118676d9f2633727598

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7159806.exe

    Filesize

    1.0MB

    MD5

    46c3ce3825d3b59b5071fbed4e15b1f5

    SHA1

    f942b099072ba9e25274a4e5e1f865933ee4a877

    SHA256

    faaebffc9c159daeee9b572422d30c468aaacdccfe1a32bff67bae32d570889d

    SHA512

    8bbab1b7319470550de31706ac7b81e3186aa09f72fbac45449a12f21cf0f3a3ceb5540d2912f9e0e7e2ad87b9faf7e2a228fb5272e62118676d9f2633727598

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1570334.exe

    Filesize

    884KB

    MD5

    f89e92032e174c58e9abe11799576edc

    SHA1

    065bf7b86f30fa7a02ba7dbb08452440ac3ab776

    SHA256

    abf41a024299ceec5a4d72f837a3566c196b5b30d7ab4b68b4c98f4bbc0bac47

    SHA512

    ec85a6dd87430e6e8cae713f8a09decc5089ad8701ef6910c171b0698e96620343c395a7c304a70081eb5963b4f35aa9c1f74506b75f73de0e869fec6875e191

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1570334.exe

    Filesize

    884KB

    MD5

    f89e92032e174c58e9abe11799576edc

    SHA1

    065bf7b86f30fa7a02ba7dbb08452440ac3ab776

    SHA256

    abf41a024299ceec5a4d72f837a3566c196b5b30d7ab4b68b4c98f4bbc0bac47

    SHA512

    ec85a6dd87430e6e8cae713f8a09decc5089ad8701ef6910c171b0698e96620343c395a7c304a70081eb5963b4f35aa9c1f74506b75f73de0e869fec6875e191

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8540317.exe

    Filesize

    493KB

    MD5

    356574a56804d0bc803f8e1468b08bde

    SHA1

    00847527b8ae283375443a2eb414add1760ae6dc

    SHA256

    531d7944fd269603c14e86d58216a79e2fda51f709a16159ec05bf264b670c62

    SHA512

    f279931e0498ea9b5ca83e7490b3da650a12d549f10770e6b85cc739c7b3a1abc0ef614243c9f4d6027ca99a6703cf7f60fd784c59c9efe9acd3b4f7c78116ef

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8540317.exe

    Filesize

    493KB

    MD5

    356574a56804d0bc803f8e1468b08bde

    SHA1

    00847527b8ae283375443a2eb414add1760ae6dc

    SHA256

    531d7944fd269603c14e86d58216a79e2fda51f709a16159ec05bf264b670c62

    SHA512

    f279931e0498ea9b5ca83e7490b3da650a12d549f10770e6b85cc739c7b3a1abc0ef614243c9f4d6027ca99a6703cf7f60fd784c59c9efe9acd3b4f7c78116ef

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1557473.exe

    Filesize

    860KB

    MD5

    bbb02b1c7ffdb40fe7b7285d5535196f

    SHA1

    e9f903f1f710bcb03edc9ce0114e0fb7cfa7c46f

    SHA256

    91b393d0f31500062f06a296fe550958f6b1091f4b1eb81c1cccd6d823f132ec

    SHA512

    24d819615f486a3d4c1a3728fdf831e1f93046bb1e952ab56deba760b0dc05dbf76df1d7eef7b7df1d31ce9800449164cab97fd571c351244c69c74df39bc507

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1557473.exe

    Filesize

    860KB

    MD5

    bbb02b1c7ffdb40fe7b7285d5535196f

    SHA1

    e9f903f1f710bcb03edc9ce0114e0fb7cfa7c46f

    SHA256

    91b393d0f31500062f06a296fe550958f6b1091f4b1eb81c1cccd6d823f132ec

    SHA512

    24d819615f486a3d4c1a3728fdf831e1f93046bb1e952ab56deba760b0dc05dbf76df1d7eef7b7df1d31ce9800449164cab97fd571c351244c69c74df39bc507

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1557473.exe

    Filesize

    860KB

    MD5

    bbb02b1c7ffdb40fe7b7285d5535196f

    SHA1

    e9f903f1f710bcb03edc9ce0114e0fb7cfa7c46f

    SHA256

    91b393d0f31500062f06a296fe550958f6b1091f4b1eb81c1cccd6d823f132ec

    SHA512

    24d819615f486a3d4c1a3728fdf831e1f93046bb1e952ab56deba760b0dc05dbf76df1d7eef7b7df1d31ce9800449164cab97fd571c351244c69c74df39bc507

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1557473.exe

    Filesize

    860KB

    MD5

    bbb02b1c7ffdb40fe7b7285d5535196f

    SHA1

    e9f903f1f710bcb03edc9ce0114e0fb7cfa7c46f

    SHA256

    91b393d0f31500062f06a296fe550958f6b1091f4b1eb81c1cccd6d823f132ec

    SHA512

    24d819615f486a3d4c1a3728fdf831e1f93046bb1e952ab56deba760b0dc05dbf76df1d7eef7b7df1d31ce9800449164cab97fd571c351244c69c74df39bc507

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1557473.exe

    Filesize

    860KB

    MD5

    bbb02b1c7ffdb40fe7b7285d5535196f

    SHA1

    e9f903f1f710bcb03edc9ce0114e0fb7cfa7c46f

    SHA256

    91b393d0f31500062f06a296fe550958f6b1091f4b1eb81c1cccd6d823f132ec

    SHA512

    24d819615f486a3d4c1a3728fdf831e1f93046bb1e952ab56deba760b0dc05dbf76df1d7eef7b7df1d31ce9800449164cab97fd571c351244c69c74df39bc507

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1557473.exe

    Filesize

    860KB

    MD5

    bbb02b1c7ffdb40fe7b7285d5535196f

    SHA1

    e9f903f1f710bcb03edc9ce0114e0fb7cfa7c46f

    SHA256

    91b393d0f31500062f06a296fe550958f6b1091f4b1eb81c1cccd6d823f132ec

    SHA512

    24d819615f486a3d4c1a3728fdf831e1f93046bb1e952ab56deba760b0dc05dbf76df1d7eef7b7df1d31ce9800449164cab97fd571c351244c69c74df39bc507

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1557473.exe

    Filesize

    860KB

    MD5

    bbb02b1c7ffdb40fe7b7285d5535196f

    SHA1

    e9f903f1f710bcb03edc9ce0114e0fb7cfa7c46f

    SHA256

    91b393d0f31500062f06a296fe550958f6b1091f4b1eb81c1cccd6d823f132ec

    SHA512

    24d819615f486a3d4c1a3728fdf831e1f93046bb1e952ab56deba760b0dc05dbf76df1d7eef7b7df1d31ce9800449164cab97fd571c351244c69c74df39bc507

  • memory/2672-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2672-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2672-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2672-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2672-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2672-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2672-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2672-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.