Analysis

  • max time kernel
    123s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 09:08

General

  • Target

    d8904a3b83f1eef031a34123adf36d46debf8f617a087c08ad977f9c7de0e2b2.exe

  • Size

    1.3MB

  • MD5

    5fb426409ff6104d9ad83795ac1bfb0c

  • SHA1

    bc31eb447d115a0fcde56442790aec05b58ecd17

  • SHA256

    d8904a3b83f1eef031a34123adf36d46debf8f617a087c08ad977f9c7de0e2b2

  • SHA512

    6c204e5be492f054965d9edd7053d55f089036d080b97acb9d371b2601dadc6fae23a473b642dfa896b5df4d4b0d848844236755242347d72528d0249621f990

  • SSDEEP

    24576:7yBdlcgYV2dQ6rZBOwTq3SZ5KxXh8RbCmqTClV1oRKAwUv2aJ6SkyOW84YuSICAK:uBD9O6vOwTq3eIR8Nfn1Y5wUu7m8hulB

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8904a3b83f1eef031a34123adf36d46debf8f617a087c08ad977f9c7de0e2b2.exe
    "C:\Users\Admin\AppData\Local\Temp\d8904a3b83f1eef031a34123adf36d46debf8f617a087c08ad977f9c7de0e2b2.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1017339.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1017339.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9388660.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9388660.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7213205.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7213205.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2464
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7246946.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7246946.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2944
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3223916.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3223916.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2628
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2388
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:2532
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                      PID:2580
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      7⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2936
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 296
                      7⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:1028

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1017339.exe

          Filesize

          1.2MB

          MD5

          1aa6b66644d9733bc6d5892014a41daa

          SHA1

          d05ad327d235c07fcd3237baaf33d6bf3ae39836

          SHA256

          7c77310eca53f45a3ce79f0fd8b5cf2ec3e18f92a86b14330d619affb49473ad

          SHA512

          a11fdad90d171895f1b100c857d76069208f67762a3127b9960af8a64082bf0da3914b0f86efa870ecb1bc7972ba65a02633a1422e2091c491875c64da13c76c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1017339.exe

          Filesize

          1.2MB

          MD5

          1aa6b66644d9733bc6d5892014a41daa

          SHA1

          d05ad327d235c07fcd3237baaf33d6bf3ae39836

          SHA256

          7c77310eca53f45a3ce79f0fd8b5cf2ec3e18f92a86b14330d619affb49473ad

          SHA512

          a11fdad90d171895f1b100c857d76069208f67762a3127b9960af8a64082bf0da3914b0f86efa870ecb1bc7972ba65a02633a1422e2091c491875c64da13c76c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9388660.exe

          Filesize

          1.0MB

          MD5

          36e721e5f145db8fe8e03c6ed9e31e0e

          SHA1

          0973854d35ad515f9a2432ddb8336cac1482389e

          SHA256

          27c53a29461a745b91c735b0ed41cc8efd8e0bdda02512f804b63ca334394b1c

          SHA512

          f3d88134dc758a23299cc12a15d88cbbb339cfa728b240b209d571001150c1621562c543490ab8dc019c30390ca4f21d00ec8c847803452833110ee4b0f2a749

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9388660.exe

          Filesize

          1.0MB

          MD5

          36e721e5f145db8fe8e03c6ed9e31e0e

          SHA1

          0973854d35ad515f9a2432ddb8336cac1482389e

          SHA256

          27c53a29461a745b91c735b0ed41cc8efd8e0bdda02512f804b63ca334394b1c

          SHA512

          f3d88134dc758a23299cc12a15d88cbbb339cfa728b240b209d571001150c1621562c543490ab8dc019c30390ca4f21d00ec8c847803452833110ee4b0f2a749

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7213205.exe

          Filesize

          882KB

          MD5

          9682fc9a3bcc36c83e4d97c0ffb4f224

          SHA1

          8cbb104cdba40d319350b9d77ffd2217ea3f9194

          SHA256

          0481925da5c9228a1946b6321184182de9070b56c78d864de3ecb5c4dfe90e7d

          SHA512

          5d3d19e950e1cf8cad8885c4617dfca09bc67d9cfaf820d232dd3077f9f834c8995e0a12d40b0c46bbd31107512018a266458f22c871b3b07b230819ec898df1

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7213205.exe

          Filesize

          882KB

          MD5

          9682fc9a3bcc36c83e4d97c0ffb4f224

          SHA1

          8cbb104cdba40d319350b9d77ffd2217ea3f9194

          SHA256

          0481925da5c9228a1946b6321184182de9070b56c78d864de3ecb5c4dfe90e7d

          SHA512

          5d3d19e950e1cf8cad8885c4617dfca09bc67d9cfaf820d232dd3077f9f834c8995e0a12d40b0c46bbd31107512018a266458f22c871b3b07b230819ec898df1

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7246946.exe

          Filesize

          491KB

          MD5

          6cd9493b598f7dd77e8534c84e5a6d6e

          SHA1

          c1f7e6000e065c559c4aec1ffdecc2ff855667c0

          SHA256

          9ff293b7ffd7a4b259d070135985ad8809ef3889e0c68a3a8f50adbd47ba80c8

          SHA512

          ec66070fc2dbb377b562f6323f60fca9b5f2e0bc1a5db5cbad9671c27ac586e5baa3ad4643cc814912869e93341c9ad1db331dfe9382306503d12b47e20ab3ba

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7246946.exe

          Filesize

          491KB

          MD5

          6cd9493b598f7dd77e8534c84e5a6d6e

          SHA1

          c1f7e6000e065c559c4aec1ffdecc2ff855667c0

          SHA256

          9ff293b7ffd7a4b259d070135985ad8809ef3889e0c68a3a8f50adbd47ba80c8

          SHA512

          ec66070fc2dbb377b562f6323f60fca9b5f2e0bc1a5db5cbad9671c27ac586e5baa3ad4643cc814912869e93341c9ad1db331dfe9382306503d12b47e20ab3ba

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3223916.exe

          Filesize

          860KB

          MD5

          7693fb023e64bf6143d4a5233155dd06

          SHA1

          7525a43df8697b7836b573568e8cde8d7112e71f

          SHA256

          a1b2dd08835f36aad827b5871bc7966f414e49da3530cbf394306ca326001daf

          SHA512

          fc3cd2ee27ec1c29c50651c963c6cbdd500f4990546299271a6b0f4b08f22f55cca427b92c94ac823600190c0677368c628f0e01badd2c134fa2296151dc45db

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3223916.exe

          Filesize

          860KB

          MD5

          7693fb023e64bf6143d4a5233155dd06

          SHA1

          7525a43df8697b7836b573568e8cde8d7112e71f

          SHA256

          a1b2dd08835f36aad827b5871bc7966f414e49da3530cbf394306ca326001daf

          SHA512

          fc3cd2ee27ec1c29c50651c963c6cbdd500f4990546299271a6b0f4b08f22f55cca427b92c94ac823600190c0677368c628f0e01badd2c134fa2296151dc45db

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3223916.exe

          Filesize

          860KB

          MD5

          7693fb023e64bf6143d4a5233155dd06

          SHA1

          7525a43df8697b7836b573568e8cde8d7112e71f

          SHA256

          a1b2dd08835f36aad827b5871bc7966f414e49da3530cbf394306ca326001daf

          SHA512

          fc3cd2ee27ec1c29c50651c963c6cbdd500f4990546299271a6b0f4b08f22f55cca427b92c94ac823600190c0677368c628f0e01badd2c134fa2296151dc45db

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1017339.exe

          Filesize

          1.2MB

          MD5

          1aa6b66644d9733bc6d5892014a41daa

          SHA1

          d05ad327d235c07fcd3237baaf33d6bf3ae39836

          SHA256

          7c77310eca53f45a3ce79f0fd8b5cf2ec3e18f92a86b14330d619affb49473ad

          SHA512

          a11fdad90d171895f1b100c857d76069208f67762a3127b9960af8a64082bf0da3914b0f86efa870ecb1bc7972ba65a02633a1422e2091c491875c64da13c76c

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1017339.exe

          Filesize

          1.2MB

          MD5

          1aa6b66644d9733bc6d5892014a41daa

          SHA1

          d05ad327d235c07fcd3237baaf33d6bf3ae39836

          SHA256

          7c77310eca53f45a3ce79f0fd8b5cf2ec3e18f92a86b14330d619affb49473ad

          SHA512

          a11fdad90d171895f1b100c857d76069208f67762a3127b9960af8a64082bf0da3914b0f86efa870ecb1bc7972ba65a02633a1422e2091c491875c64da13c76c

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9388660.exe

          Filesize

          1.0MB

          MD5

          36e721e5f145db8fe8e03c6ed9e31e0e

          SHA1

          0973854d35ad515f9a2432ddb8336cac1482389e

          SHA256

          27c53a29461a745b91c735b0ed41cc8efd8e0bdda02512f804b63ca334394b1c

          SHA512

          f3d88134dc758a23299cc12a15d88cbbb339cfa728b240b209d571001150c1621562c543490ab8dc019c30390ca4f21d00ec8c847803452833110ee4b0f2a749

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9388660.exe

          Filesize

          1.0MB

          MD5

          36e721e5f145db8fe8e03c6ed9e31e0e

          SHA1

          0973854d35ad515f9a2432ddb8336cac1482389e

          SHA256

          27c53a29461a745b91c735b0ed41cc8efd8e0bdda02512f804b63ca334394b1c

          SHA512

          f3d88134dc758a23299cc12a15d88cbbb339cfa728b240b209d571001150c1621562c543490ab8dc019c30390ca4f21d00ec8c847803452833110ee4b0f2a749

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7213205.exe

          Filesize

          882KB

          MD5

          9682fc9a3bcc36c83e4d97c0ffb4f224

          SHA1

          8cbb104cdba40d319350b9d77ffd2217ea3f9194

          SHA256

          0481925da5c9228a1946b6321184182de9070b56c78d864de3ecb5c4dfe90e7d

          SHA512

          5d3d19e950e1cf8cad8885c4617dfca09bc67d9cfaf820d232dd3077f9f834c8995e0a12d40b0c46bbd31107512018a266458f22c871b3b07b230819ec898df1

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7213205.exe

          Filesize

          882KB

          MD5

          9682fc9a3bcc36c83e4d97c0ffb4f224

          SHA1

          8cbb104cdba40d319350b9d77ffd2217ea3f9194

          SHA256

          0481925da5c9228a1946b6321184182de9070b56c78d864de3ecb5c4dfe90e7d

          SHA512

          5d3d19e950e1cf8cad8885c4617dfca09bc67d9cfaf820d232dd3077f9f834c8995e0a12d40b0c46bbd31107512018a266458f22c871b3b07b230819ec898df1

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7246946.exe

          Filesize

          491KB

          MD5

          6cd9493b598f7dd77e8534c84e5a6d6e

          SHA1

          c1f7e6000e065c559c4aec1ffdecc2ff855667c0

          SHA256

          9ff293b7ffd7a4b259d070135985ad8809ef3889e0c68a3a8f50adbd47ba80c8

          SHA512

          ec66070fc2dbb377b562f6323f60fca9b5f2e0bc1a5db5cbad9671c27ac586e5baa3ad4643cc814912869e93341c9ad1db331dfe9382306503d12b47e20ab3ba

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7246946.exe

          Filesize

          491KB

          MD5

          6cd9493b598f7dd77e8534c84e5a6d6e

          SHA1

          c1f7e6000e065c559c4aec1ffdecc2ff855667c0

          SHA256

          9ff293b7ffd7a4b259d070135985ad8809ef3889e0c68a3a8f50adbd47ba80c8

          SHA512

          ec66070fc2dbb377b562f6323f60fca9b5f2e0bc1a5db5cbad9671c27ac586e5baa3ad4643cc814912869e93341c9ad1db331dfe9382306503d12b47e20ab3ba

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3223916.exe

          Filesize

          860KB

          MD5

          7693fb023e64bf6143d4a5233155dd06

          SHA1

          7525a43df8697b7836b573568e8cde8d7112e71f

          SHA256

          a1b2dd08835f36aad827b5871bc7966f414e49da3530cbf394306ca326001daf

          SHA512

          fc3cd2ee27ec1c29c50651c963c6cbdd500f4990546299271a6b0f4b08f22f55cca427b92c94ac823600190c0677368c628f0e01badd2c134fa2296151dc45db

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3223916.exe

          Filesize

          860KB

          MD5

          7693fb023e64bf6143d4a5233155dd06

          SHA1

          7525a43df8697b7836b573568e8cde8d7112e71f

          SHA256

          a1b2dd08835f36aad827b5871bc7966f414e49da3530cbf394306ca326001daf

          SHA512

          fc3cd2ee27ec1c29c50651c963c6cbdd500f4990546299271a6b0f4b08f22f55cca427b92c94ac823600190c0677368c628f0e01badd2c134fa2296151dc45db

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3223916.exe

          Filesize

          860KB

          MD5

          7693fb023e64bf6143d4a5233155dd06

          SHA1

          7525a43df8697b7836b573568e8cde8d7112e71f

          SHA256

          a1b2dd08835f36aad827b5871bc7966f414e49da3530cbf394306ca326001daf

          SHA512

          fc3cd2ee27ec1c29c50651c963c6cbdd500f4990546299271a6b0f4b08f22f55cca427b92c94ac823600190c0677368c628f0e01badd2c134fa2296151dc45db

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3223916.exe

          Filesize

          860KB

          MD5

          7693fb023e64bf6143d4a5233155dd06

          SHA1

          7525a43df8697b7836b573568e8cde8d7112e71f

          SHA256

          a1b2dd08835f36aad827b5871bc7966f414e49da3530cbf394306ca326001daf

          SHA512

          fc3cd2ee27ec1c29c50651c963c6cbdd500f4990546299271a6b0f4b08f22f55cca427b92c94ac823600190c0677368c628f0e01badd2c134fa2296151dc45db

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3223916.exe

          Filesize

          860KB

          MD5

          7693fb023e64bf6143d4a5233155dd06

          SHA1

          7525a43df8697b7836b573568e8cde8d7112e71f

          SHA256

          a1b2dd08835f36aad827b5871bc7966f414e49da3530cbf394306ca326001daf

          SHA512

          fc3cd2ee27ec1c29c50651c963c6cbdd500f4990546299271a6b0f4b08f22f55cca427b92c94ac823600190c0677368c628f0e01badd2c134fa2296151dc45db

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3223916.exe

          Filesize

          860KB

          MD5

          7693fb023e64bf6143d4a5233155dd06

          SHA1

          7525a43df8697b7836b573568e8cde8d7112e71f

          SHA256

          a1b2dd08835f36aad827b5871bc7966f414e49da3530cbf394306ca326001daf

          SHA512

          fc3cd2ee27ec1c29c50651c963c6cbdd500f4990546299271a6b0f4b08f22f55cca427b92c94ac823600190c0677368c628f0e01badd2c134fa2296151dc45db

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3223916.exe

          Filesize

          860KB

          MD5

          7693fb023e64bf6143d4a5233155dd06

          SHA1

          7525a43df8697b7836b573568e8cde8d7112e71f

          SHA256

          a1b2dd08835f36aad827b5871bc7966f414e49da3530cbf394306ca326001daf

          SHA512

          fc3cd2ee27ec1c29c50651c963c6cbdd500f4990546299271a6b0f4b08f22f55cca427b92c94ac823600190c0677368c628f0e01badd2c134fa2296151dc45db

        • memory/2936-62-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2936-61-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2936-64-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2936-66-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2936-59-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2936-57-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2936-55-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2936-53-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB