Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 09:13

General

  • Target

    addb2b5d86bb593534df3bfe5b5eebfb172b797ad2bf86fc5b1dbecfaa4c3a7b.exe

  • Size

    1.3MB

  • MD5

    85a90bbf8c4498f6b6e8155c00cc1cdb

  • SHA1

    6da94e24761dbe288516a6c701232703b34ca477

  • SHA256

    addb2b5d86bb593534df3bfe5b5eebfb172b797ad2bf86fc5b1dbecfaa4c3a7b

  • SHA512

    f2573ccaddecd258d636ccdfd2be6b57c687cb40a829680bb6d183a854c77ad4001b8d354d090d96f5705bb64583dbe4bf9424ceec4726a015002c319919aa43

  • SSDEEP

    24576:eybS9ej9JR8BCYsZWJBY8aWVtnO8Lldi/LQLbStMb/1SR64qKsm2WRlLYtRx0:tbSmDR8B5sZsi4nO8KntCSR64/H9wR

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\addb2b5d86bb593534df3bfe5b5eebfb172b797ad2bf86fc5b1dbecfaa4c3a7b.exe
    "C:\Users\Admin\AppData\Local\Temp\addb2b5d86bb593534df3bfe5b5eebfb172b797ad2bf86fc5b1dbecfaa4c3a7b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0616722.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0616722.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2784005.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2784005.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2384
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5631318.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5631318.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2736
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2485652.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2485652.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2644
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0713940.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0713940.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2508
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2836
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2540
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 280
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2504

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0616722.exe

      Filesize

      1.2MB

      MD5

      a6903bf937de8eff8ce4ef52692c82cc

      SHA1

      b643783ef4683bf3847769db2aa13fbdff1e7b92

      SHA256

      c96dedf865300f6b85b3641fe85700852db32d08dec4370bf27002aa2f002204

      SHA512

      f10c4962d25d34222920807e33b0caf00b4e1e2c9b1feafe4222a034448b9944ffc9e23605429b8321c0da58e6647114bb67e0570028604bd99b7c467ba9f5f4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0616722.exe

      Filesize

      1.2MB

      MD5

      a6903bf937de8eff8ce4ef52692c82cc

      SHA1

      b643783ef4683bf3847769db2aa13fbdff1e7b92

      SHA256

      c96dedf865300f6b85b3641fe85700852db32d08dec4370bf27002aa2f002204

      SHA512

      f10c4962d25d34222920807e33b0caf00b4e1e2c9b1feafe4222a034448b9944ffc9e23605429b8321c0da58e6647114bb67e0570028604bd99b7c467ba9f5f4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2784005.exe

      Filesize

      1.0MB

      MD5

      be8316fcc9b35c0f9f999a43c3607aa4

      SHA1

      d0e131182954df4e5bb06f5ee16f1bf399566405

      SHA256

      677524a0e50d41fd106bdda9ff9d3c03ee2e8e67ab9c02f289832b19424625cb

      SHA512

      eedaf2abfd2d96474a7125f86c94c5d37e2dae457708ecbb9825e4006e48eb336581375230c09bca997473c5c2a9046da09bc39777973ac850e8c901d54a9b9a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2784005.exe

      Filesize

      1.0MB

      MD5

      be8316fcc9b35c0f9f999a43c3607aa4

      SHA1

      d0e131182954df4e5bb06f5ee16f1bf399566405

      SHA256

      677524a0e50d41fd106bdda9ff9d3c03ee2e8e67ab9c02f289832b19424625cb

      SHA512

      eedaf2abfd2d96474a7125f86c94c5d37e2dae457708ecbb9825e4006e48eb336581375230c09bca997473c5c2a9046da09bc39777973ac850e8c901d54a9b9a

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5631318.exe

      Filesize

      885KB

      MD5

      c76ff5274f0790c0fe31ab121ebf2da8

      SHA1

      3112b48104c4e7ab44325ba78cb3bec31db43346

      SHA256

      a787445d1b4b00328ee14e5452c65c503724f5506be9e69d210a24ab077e883a

      SHA512

      7bbd4c1c5522b6bbe08ca38c7d85e9eb361c8c92dba4fd32416716c6fbd49effcdbe4726c9b62356e0519e3052b971698a7234c885a9cf853d2f3c6686937ed8

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5631318.exe

      Filesize

      885KB

      MD5

      c76ff5274f0790c0fe31ab121ebf2da8

      SHA1

      3112b48104c4e7ab44325ba78cb3bec31db43346

      SHA256

      a787445d1b4b00328ee14e5452c65c503724f5506be9e69d210a24ab077e883a

      SHA512

      7bbd4c1c5522b6bbe08ca38c7d85e9eb361c8c92dba4fd32416716c6fbd49effcdbe4726c9b62356e0519e3052b971698a7234c885a9cf853d2f3c6686937ed8

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2485652.exe

      Filesize

      494KB

      MD5

      db6ae9fa3b01b46d839adb4c08b80510

      SHA1

      fe9ef34ceca4e7dad3e4e65a57061df869015f19

      SHA256

      fffddfe59fc75a6d185dc79c82c6963fbe2a637ae8d33ac6ca414248f5c13394

      SHA512

      7e3334c85b1ade4d203e1b3b030c741f19cf70dff707ddb9eaa6770c4de13e7c27713e69d0fe4437c34d6d99a512ff1c7dcb22635a34be096e69e317c62dfd5c

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2485652.exe

      Filesize

      494KB

      MD5

      db6ae9fa3b01b46d839adb4c08b80510

      SHA1

      fe9ef34ceca4e7dad3e4e65a57061df869015f19

      SHA256

      fffddfe59fc75a6d185dc79c82c6963fbe2a637ae8d33ac6ca414248f5c13394

      SHA512

      7e3334c85b1ade4d203e1b3b030c741f19cf70dff707ddb9eaa6770c4de13e7c27713e69d0fe4437c34d6d99a512ff1c7dcb22635a34be096e69e317c62dfd5c

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0713940.exe

      Filesize

      860KB

      MD5

      de30430355a4c4ddf98b0f255552e8dd

      SHA1

      3b98ae1450b79e2f9ef6f225834cc87156692eba

      SHA256

      d741f3bd3aa8fc1bd19bafdc0a1004495ee864d338d824d31ad6b703f7f6344b

      SHA512

      0111b0f94717b909810c714a7072d52f0f713eb4b8c36b7a503330f9bfeccfd9792b7ca4d131c5d96b2b896c79bcda2f7a02972e8a16cc71870c40b8ee01bdb0

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0713940.exe

      Filesize

      860KB

      MD5

      de30430355a4c4ddf98b0f255552e8dd

      SHA1

      3b98ae1450b79e2f9ef6f225834cc87156692eba

      SHA256

      d741f3bd3aa8fc1bd19bafdc0a1004495ee864d338d824d31ad6b703f7f6344b

      SHA512

      0111b0f94717b909810c714a7072d52f0f713eb4b8c36b7a503330f9bfeccfd9792b7ca4d131c5d96b2b896c79bcda2f7a02972e8a16cc71870c40b8ee01bdb0

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0713940.exe

      Filesize

      860KB

      MD5

      de30430355a4c4ddf98b0f255552e8dd

      SHA1

      3b98ae1450b79e2f9ef6f225834cc87156692eba

      SHA256

      d741f3bd3aa8fc1bd19bafdc0a1004495ee864d338d824d31ad6b703f7f6344b

      SHA512

      0111b0f94717b909810c714a7072d52f0f713eb4b8c36b7a503330f9bfeccfd9792b7ca4d131c5d96b2b896c79bcda2f7a02972e8a16cc71870c40b8ee01bdb0

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0616722.exe

      Filesize

      1.2MB

      MD5

      a6903bf937de8eff8ce4ef52692c82cc

      SHA1

      b643783ef4683bf3847769db2aa13fbdff1e7b92

      SHA256

      c96dedf865300f6b85b3641fe85700852db32d08dec4370bf27002aa2f002204

      SHA512

      f10c4962d25d34222920807e33b0caf00b4e1e2c9b1feafe4222a034448b9944ffc9e23605429b8321c0da58e6647114bb67e0570028604bd99b7c467ba9f5f4

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0616722.exe

      Filesize

      1.2MB

      MD5

      a6903bf937de8eff8ce4ef52692c82cc

      SHA1

      b643783ef4683bf3847769db2aa13fbdff1e7b92

      SHA256

      c96dedf865300f6b85b3641fe85700852db32d08dec4370bf27002aa2f002204

      SHA512

      f10c4962d25d34222920807e33b0caf00b4e1e2c9b1feafe4222a034448b9944ffc9e23605429b8321c0da58e6647114bb67e0570028604bd99b7c467ba9f5f4

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2784005.exe

      Filesize

      1.0MB

      MD5

      be8316fcc9b35c0f9f999a43c3607aa4

      SHA1

      d0e131182954df4e5bb06f5ee16f1bf399566405

      SHA256

      677524a0e50d41fd106bdda9ff9d3c03ee2e8e67ab9c02f289832b19424625cb

      SHA512

      eedaf2abfd2d96474a7125f86c94c5d37e2dae457708ecbb9825e4006e48eb336581375230c09bca997473c5c2a9046da09bc39777973ac850e8c901d54a9b9a

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2784005.exe

      Filesize

      1.0MB

      MD5

      be8316fcc9b35c0f9f999a43c3607aa4

      SHA1

      d0e131182954df4e5bb06f5ee16f1bf399566405

      SHA256

      677524a0e50d41fd106bdda9ff9d3c03ee2e8e67ab9c02f289832b19424625cb

      SHA512

      eedaf2abfd2d96474a7125f86c94c5d37e2dae457708ecbb9825e4006e48eb336581375230c09bca997473c5c2a9046da09bc39777973ac850e8c901d54a9b9a

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5631318.exe

      Filesize

      885KB

      MD5

      c76ff5274f0790c0fe31ab121ebf2da8

      SHA1

      3112b48104c4e7ab44325ba78cb3bec31db43346

      SHA256

      a787445d1b4b00328ee14e5452c65c503724f5506be9e69d210a24ab077e883a

      SHA512

      7bbd4c1c5522b6bbe08ca38c7d85e9eb361c8c92dba4fd32416716c6fbd49effcdbe4726c9b62356e0519e3052b971698a7234c885a9cf853d2f3c6686937ed8

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5631318.exe

      Filesize

      885KB

      MD5

      c76ff5274f0790c0fe31ab121ebf2da8

      SHA1

      3112b48104c4e7ab44325ba78cb3bec31db43346

      SHA256

      a787445d1b4b00328ee14e5452c65c503724f5506be9e69d210a24ab077e883a

      SHA512

      7bbd4c1c5522b6bbe08ca38c7d85e9eb361c8c92dba4fd32416716c6fbd49effcdbe4726c9b62356e0519e3052b971698a7234c885a9cf853d2f3c6686937ed8

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2485652.exe

      Filesize

      494KB

      MD5

      db6ae9fa3b01b46d839adb4c08b80510

      SHA1

      fe9ef34ceca4e7dad3e4e65a57061df869015f19

      SHA256

      fffddfe59fc75a6d185dc79c82c6963fbe2a637ae8d33ac6ca414248f5c13394

      SHA512

      7e3334c85b1ade4d203e1b3b030c741f19cf70dff707ddb9eaa6770c4de13e7c27713e69d0fe4437c34d6d99a512ff1c7dcb22635a34be096e69e317c62dfd5c

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2485652.exe

      Filesize

      494KB

      MD5

      db6ae9fa3b01b46d839adb4c08b80510

      SHA1

      fe9ef34ceca4e7dad3e4e65a57061df869015f19

      SHA256

      fffddfe59fc75a6d185dc79c82c6963fbe2a637ae8d33ac6ca414248f5c13394

      SHA512

      7e3334c85b1ade4d203e1b3b030c741f19cf70dff707ddb9eaa6770c4de13e7c27713e69d0fe4437c34d6d99a512ff1c7dcb22635a34be096e69e317c62dfd5c

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0713940.exe

      Filesize

      860KB

      MD5

      de30430355a4c4ddf98b0f255552e8dd

      SHA1

      3b98ae1450b79e2f9ef6f225834cc87156692eba

      SHA256

      d741f3bd3aa8fc1bd19bafdc0a1004495ee864d338d824d31ad6b703f7f6344b

      SHA512

      0111b0f94717b909810c714a7072d52f0f713eb4b8c36b7a503330f9bfeccfd9792b7ca4d131c5d96b2b896c79bcda2f7a02972e8a16cc71870c40b8ee01bdb0

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0713940.exe

      Filesize

      860KB

      MD5

      de30430355a4c4ddf98b0f255552e8dd

      SHA1

      3b98ae1450b79e2f9ef6f225834cc87156692eba

      SHA256

      d741f3bd3aa8fc1bd19bafdc0a1004495ee864d338d824d31ad6b703f7f6344b

      SHA512

      0111b0f94717b909810c714a7072d52f0f713eb4b8c36b7a503330f9bfeccfd9792b7ca4d131c5d96b2b896c79bcda2f7a02972e8a16cc71870c40b8ee01bdb0

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0713940.exe

      Filesize

      860KB

      MD5

      de30430355a4c4ddf98b0f255552e8dd

      SHA1

      3b98ae1450b79e2f9ef6f225834cc87156692eba

      SHA256

      d741f3bd3aa8fc1bd19bafdc0a1004495ee864d338d824d31ad6b703f7f6344b

      SHA512

      0111b0f94717b909810c714a7072d52f0f713eb4b8c36b7a503330f9bfeccfd9792b7ca4d131c5d96b2b896c79bcda2f7a02972e8a16cc71870c40b8ee01bdb0

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0713940.exe

      Filesize

      860KB

      MD5

      de30430355a4c4ddf98b0f255552e8dd

      SHA1

      3b98ae1450b79e2f9ef6f225834cc87156692eba

      SHA256

      d741f3bd3aa8fc1bd19bafdc0a1004495ee864d338d824d31ad6b703f7f6344b

      SHA512

      0111b0f94717b909810c714a7072d52f0f713eb4b8c36b7a503330f9bfeccfd9792b7ca4d131c5d96b2b896c79bcda2f7a02972e8a16cc71870c40b8ee01bdb0

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0713940.exe

      Filesize

      860KB

      MD5

      de30430355a4c4ddf98b0f255552e8dd

      SHA1

      3b98ae1450b79e2f9ef6f225834cc87156692eba

      SHA256

      d741f3bd3aa8fc1bd19bafdc0a1004495ee864d338d824d31ad6b703f7f6344b

      SHA512

      0111b0f94717b909810c714a7072d52f0f713eb4b8c36b7a503330f9bfeccfd9792b7ca4d131c5d96b2b896c79bcda2f7a02972e8a16cc71870c40b8ee01bdb0

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0713940.exe

      Filesize

      860KB

      MD5

      de30430355a4c4ddf98b0f255552e8dd

      SHA1

      3b98ae1450b79e2f9ef6f225834cc87156692eba

      SHA256

      d741f3bd3aa8fc1bd19bafdc0a1004495ee864d338d824d31ad6b703f7f6344b

      SHA512

      0111b0f94717b909810c714a7072d52f0f713eb4b8c36b7a503330f9bfeccfd9792b7ca4d131c5d96b2b896c79bcda2f7a02972e8a16cc71870c40b8ee01bdb0

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0713940.exe

      Filesize

      860KB

      MD5

      de30430355a4c4ddf98b0f255552e8dd

      SHA1

      3b98ae1450b79e2f9ef6f225834cc87156692eba

      SHA256

      d741f3bd3aa8fc1bd19bafdc0a1004495ee864d338d824d31ad6b703f7f6344b

      SHA512

      0111b0f94717b909810c714a7072d52f0f713eb4b8c36b7a503330f9bfeccfd9792b7ca4d131c5d96b2b896c79bcda2f7a02972e8a16cc71870c40b8ee01bdb0

    • memory/2540-61-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2540-62-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2540-64-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2540-66-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2540-57-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2540-59-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2540-55-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2540-53-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB