Analysis

  • max time kernel
    119s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 09:17

General

  • Target

    e19d14cd959ce02e0c0f84f955f5f47c4e4aad7001388cda6c37b3503a72f6b8.exe

  • Size

    1.3MB

  • MD5

    39539051e3ce6a6e3689195f9fde6a72

  • SHA1

    6e6c6570c5b2eae3d2df3ddc1585564bc1fccd67

  • SHA256

    e19d14cd959ce02e0c0f84f955f5f47c4e4aad7001388cda6c37b3503a72f6b8

  • SHA512

    aa269844399515ecb2db813d8d31968a673668bb004e66ec9efd5f99343e7a2ac84204eb9bb2ae9d2208e5090aa4429b0af43d96488dcfc95b5b440b5fc59af3

  • SSDEEP

    24576:+yaBtvQzE5Na2nXL9WlDv6UVRYrNEercGQU47O/KOy+VsgQOhT0:NaBtEEtXL9W42RYBXoU8OSSVsPs

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e19d14cd959ce02e0c0f84f955f5f47c4e4aad7001388cda6c37b3503a72f6b8.exe
    "C:\Users\Admin\AppData\Local\Temp\e19d14cd959ce02e0c0f84f955f5f47c4e4aad7001388cda6c37b3503a72f6b8.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4870533.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4870533.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2885324.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2885324.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1209033.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1209033.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2792
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2893663.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2893663.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2552
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0793912.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0793912.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2524
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2320
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:1852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4870533.exe

    Filesize

    1.2MB

    MD5

    4a12f3d255e8cbd48a23e7ed4cc49482

    SHA1

    64b5b9711d827fca0d29cdaa7a86836a08771f94

    SHA256

    2b83b4653508450525f2305853833e8556184f75230615b0df511836fb8bafbf

    SHA512

    9301b3767e490bac5b8ca9fb21c7e93528172ceec88afb32cb989119e0c821cbfd08475ae0f7b50686df6d17c0305656a707ec4bcbfa322b25b2deead315cf89

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4870533.exe

    Filesize

    1.2MB

    MD5

    4a12f3d255e8cbd48a23e7ed4cc49482

    SHA1

    64b5b9711d827fca0d29cdaa7a86836a08771f94

    SHA256

    2b83b4653508450525f2305853833e8556184f75230615b0df511836fb8bafbf

    SHA512

    9301b3767e490bac5b8ca9fb21c7e93528172ceec88afb32cb989119e0c821cbfd08475ae0f7b50686df6d17c0305656a707ec4bcbfa322b25b2deead315cf89

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2885324.exe

    Filesize

    1.0MB

    MD5

    8b20791e0b254f869c170216c1806c9a

    SHA1

    7e5a653d2a7ed6362c603b333a98263beb2fb11d

    SHA256

    4c1960b09d7922326857bec49db79c4a9227d315c1762223d7be896a6e16d479

    SHA512

    fdd1692a50f0496ee5f97aa8760aaa5374893c8f5b0219e66fa7ac1ac3c9cc3e4f7531c7df1046b127447e61336afb515e0b6164417951977f7025310f7c2707

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2885324.exe

    Filesize

    1.0MB

    MD5

    8b20791e0b254f869c170216c1806c9a

    SHA1

    7e5a653d2a7ed6362c603b333a98263beb2fb11d

    SHA256

    4c1960b09d7922326857bec49db79c4a9227d315c1762223d7be896a6e16d479

    SHA512

    fdd1692a50f0496ee5f97aa8760aaa5374893c8f5b0219e66fa7ac1ac3c9cc3e4f7531c7df1046b127447e61336afb515e0b6164417951977f7025310f7c2707

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1209033.exe

    Filesize

    887KB

    MD5

    0a1fca2f27b5958e6e6991f5a74e92ed

    SHA1

    844e1298111e9a1a418e612a90e852e5a36989a4

    SHA256

    49839f1e0ad3a6f607c50b477cf9ba5241fce689b2c8b0ab1799f203d6c5622e

    SHA512

    ffbdbf1f013bb3b89c15774ee34dd33f62ef04f627bad17569e188bc01c0c8fdaa111f794ecb64ba62865dd59a3eebb2287c028026217beaa1aa5efc51a5761a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1209033.exe

    Filesize

    887KB

    MD5

    0a1fca2f27b5958e6e6991f5a74e92ed

    SHA1

    844e1298111e9a1a418e612a90e852e5a36989a4

    SHA256

    49839f1e0ad3a6f607c50b477cf9ba5241fce689b2c8b0ab1799f203d6c5622e

    SHA512

    ffbdbf1f013bb3b89c15774ee34dd33f62ef04f627bad17569e188bc01c0c8fdaa111f794ecb64ba62865dd59a3eebb2287c028026217beaa1aa5efc51a5761a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2893663.exe

    Filesize

    495KB

    MD5

    458f2c798e22abd08247aa86edf17042

    SHA1

    372310ede5dfce51178ada95e9eaf2772c00851f

    SHA256

    040fd2a34e2521914fb60c9603ae04059e1657504f5c47b37cc9c6934672729f

    SHA512

    42e1189f00a8487914fd3649b422f769d6057e6fcf1ca122a5c03a36c583298652aa40926d29ca977bfabc2f2bd6d351d406621757b3e2daed836c8cf9bee5a9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2893663.exe

    Filesize

    495KB

    MD5

    458f2c798e22abd08247aa86edf17042

    SHA1

    372310ede5dfce51178ada95e9eaf2772c00851f

    SHA256

    040fd2a34e2521914fb60c9603ae04059e1657504f5c47b37cc9c6934672729f

    SHA512

    42e1189f00a8487914fd3649b422f769d6057e6fcf1ca122a5c03a36c583298652aa40926d29ca977bfabc2f2bd6d351d406621757b3e2daed836c8cf9bee5a9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0793912.exe

    Filesize

    860KB

    MD5

    567afe2dd95f14b6f39258250ae13724

    SHA1

    a426612c5bdfc13ce089fd16648e1f217344f3a8

    SHA256

    b3db3bb79df6b39d106a998beb0e269055df8848245d1f2b00ab997c264fe674

    SHA512

    b85a29a7ab3e937ed3c9f66a7cd710596c93ead8fc87e4f753e36014f6df62bdad8a18cff05a3833daa24fcfe867210684528eaa4f8ddc9462a5870bd589e6bb

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0793912.exe

    Filesize

    860KB

    MD5

    567afe2dd95f14b6f39258250ae13724

    SHA1

    a426612c5bdfc13ce089fd16648e1f217344f3a8

    SHA256

    b3db3bb79df6b39d106a998beb0e269055df8848245d1f2b00ab997c264fe674

    SHA512

    b85a29a7ab3e937ed3c9f66a7cd710596c93ead8fc87e4f753e36014f6df62bdad8a18cff05a3833daa24fcfe867210684528eaa4f8ddc9462a5870bd589e6bb

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0793912.exe

    Filesize

    860KB

    MD5

    567afe2dd95f14b6f39258250ae13724

    SHA1

    a426612c5bdfc13ce089fd16648e1f217344f3a8

    SHA256

    b3db3bb79df6b39d106a998beb0e269055df8848245d1f2b00ab997c264fe674

    SHA512

    b85a29a7ab3e937ed3c9f66a7cd710596c93ead8fc87e4f753e36014f6df62bdad8a18cff05a3833daa24fcfe867210684528eaa4f8ddc9462a5870bd589e6bb

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4870533.exe

    Filesize

    1.2MB

    MD5

    4a12f3d255e8cbd48a23e7ed4cc49482

    SHA1

    64b5b9711d827fca0d29cdaa7a86836a08771f94

    SHA256

    2b83b4653508450525f2305853833e8556184f75230615b0df511836fb8bafbf

    SHA512

    9301b3767e490bac5b8ca9fb21c7e93528172ceec88afb32cb989119e0c821cbfd08475ae0f7b50686df6d17c0305656a707ec4bcbfa322b25b2deead315cf89

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4870533.exe

    Filesize

    1.2MB

    MD5

    4a12f3d255e8cbd48a23e7ed4cc49482

    SHA1

    64b5b9711d827fca0d29cdaa7a86836a08771f94

    SHA256

    2b83b4653508450525f2305853833e8556184f75230615b0df511836fb8bafbf

    SHA512

    9301b3767e490bac5b8ca9fb21c7e93528172ceec88afb32cb989119e0c821cbfd08475ae0f7b50686df6d17c0305656a707ec4bcbfa322b25b2deead315cf89

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2885324.exe

    Filesize

    1.0MB

    MD5

    8b20791e0b254f869c170216c1806c9a

    SHA1

    7e5a653d2a7ed6362c603b333a98263beb2fb11d

    SHA256

    4c1960b09d7922326857bec49db79c4a9227d315c1762223d7be896a6e16d479

    SHA512

    fdd1692a50f0496ee5f97aa8760aaa5374893c8f5b0219e66fa7ac1ac3c9cc3e4f7531c7df1046b127447e61336afb515e0b6164417951977f7025310f7c2707

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2885324.exe

    Filesize

    1.0MB

    MD5

    8b20791e0b254f869c170216c1806c9a

    SHA1

    7e5a653d2a7ed6362c603b333a98263beb2fb11d

    SHA256

    4c1960b09d7922326857bec49db79c4a9227d315c1762223d7be896a6e16d479

    SHA512

    fdd1692a50f0496ee5f97aa8760aaa5374893c8f5b0219e66fa7ac1ac3c9cc3e4f7531c7df1046b127447e61336afb515e0b6164417951977f7025310f7c2707

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1209033.exe

    Filesize

    887KB

    MD5

    0a1fca2f27b5958e6e6991f5a74e92ed

    SHA1

    844e1298111e9a1a418e612a90e852e5a36989a4

    SHA256

    49839f1e0ad3a6f607c50b477cf9ba5241fce689b2c8b0ab1799f203d6c5622e

    SHA512

    ffbdbf1f013bb3b89c15774ee34dd33f62ef04f627bad17569e188bc01c0c8fdaa111f794ecb64ba62865dd59a3eebb2287c028026217beaa1aa5efc51a5761a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1209033.exe

    Filesize

    887KB

    MD5

    0a1fca2f27b5958e6e6991f5a74e92ed

    SHA1

    844e1298111e9a1a418e612a90e852e5a36989a4

    SHA256

    49839f1e0ad3a6f607c50b477cf9ba5241fce689b2c8b0ab1799f203d6c5622e

    SHA512

    ffbdbf1f013bb3b89c15774ee34dd33f62ef04f627bad17569e188bc01c0c8fdaa111f794ecb64ba62865dd59a3eebb2287c028026217beaa1aa5efc51a5761a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2893663.exe

    Filesize

    495KB

    MD5

    458f2c798e22abd08247aa86edf17042

    SHA1

    372310ede5dfce51178ada95e9eaf2772c00851f

    SHA256

    040fd2a34e2521914fb60c9603ae04059e1657504f5c47b37cc9c6934672729f

    SHA512

    42e1189f00a8487914fd3649b422f769d6057e6fcf1ca122a5c03a36c583298652aa40926d29ca977bfabc2f2bd6d351d406621757b3e2daed836c8cf9bee5a9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2893663.exe

    Filesize

    495KB

    MD5

    458f2c798e22abd08247aa86edf17042

    SHA1

    372310ede5dfce51178ada95e9eaf2772c00851f

    SHA256

    040fd2a34e2521914fb60c9603ae04059e1657504f5c47b37cc9c6934672729f

    SHA512

    42e1189f00a8487914fd3649b422f769d6057e6fcf1ca122a5c03a36c583298652aa40926d29ca977bfabc2f2bd6d351d406621757b3e2daed836c8cf9bee5a9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0793912.exe

    Filesize

    860KB

    MD5

    567afe2dd95f14b6f39258250ae13724

    SHA1

    a426612c5bdfc13ce089fd16648e1f217344f3a8

    SHA256

    b3db3bb79df6b39d106a998beb0e269055df8848245d1f2b00ab997c264fe674

    SHA512

    b85a29a7ab3e937ed3c9f66a7cd710596c93ead8fc87e4f753e36014f6df62bdad8a18cff05a3833daa24fcfe867210684528eaa4f8ddc9462a5870bd589e6bb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0793912.exe

    Filesize

    860KB

    MD5

    567afe2dd95f14b6f39258250ae13724

    SHA1

    a426612c5bdfc13ce089fd16648e1f217344f3a8

    SHA256

    b3db3bb79df6b39d106a998beb0e269055df8848245d1f2b00ab997c264fe674

    SHA512

    b85a29a7ab3e937ed3c9f66a7cd710596c93ead8fc87e4f753e36014f6df62bdad8a18cff05a3833daa24fcfe867210684528eaa4f8ddc9462a5870bd589e6bb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0793912.exe

    Filesize

    860KB

    MD5

    567afe2dd95f14b6f39258250ae13724

    SHA1

    a426612c5bdfc13ce089fd16648e1f217344f3a8

    SHA256

    b3db3bb79df6b39d106a998beb0e269055df8848245d1f2b00ab997c264fe674

    SHA512

    b85a29a7ab3e937ed3c9f66a7cd710596c93ead8fc87e4f753e36014f6df62bdad8a18cff05a3833daa24fcfe867210684528eaa4f8ddc9462a5870bd589e6bb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0793912.exe

    Filesize

    860KB

    MD5

    567afe2dd95f14b6f39258250ae13724

    SHA1

    a426612c5bdfc13ce089fd16648e1f217344f3a8

    SHA256

    b3db3bb79df6b39d106a998beb0e269055df8848245d1f2b00ab997c264fe674

    SHA512

    b85a29a7ab3e937ed3c9f66a7cd710596c93ead8fc87e4f753e36014f6df62bdad8a18cff05a3833daa24fcfe867210684528eaa4f8ddc9462a5870bd589e6bb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0793912.exe

    Filesize

    860KB

    MD5

    567afe2dd95f14b6f39258250ae13724

    SHA1

    a426612c5bdfc13ce089fd16648e1f217344f3a8

    SHA256

    b3db3bb79df6b39d106a998beb0e269055df8848245d1f2b00ab997c264fe674

    SHA512

    b85a29a7ab3e937ed3c9f66a7cd710596c93ead8fc87e4f753e36014f6df62bdad8a18cff05a3833daa24fcfe867210684528eaa4f8ddc9462a5870bd589e6bb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0793912.exe

    Filesize

    860KB

    MD5

    567afe2dd95f14b6f39258250ae13724

    SHA1

    a426612c5bdfc13ce089fd16648e1f217344f3a8

    SHA256

    b3db3bb79df6b39d106a998beb0e269055df8848245d1f2b00ab997c264fe674

    SHA512

    b85a29a7ab3e937ed3c9f66a7cd710596c93ead8fc87e4f753e36014f6df62bdad8a18cff05a3833daa24fcfe867210684528eaa4f8ddc9462a5870bd589e6bb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0793912.exe

    Filesize

    860KB

    MD5

    567afe2dd95f14b6f39258250ae13724

    SHA1

    a426612c5bdfc13ce089fd16648e1f217344f3a8

    SHA256

    b3db3bb79df6b39d106a998beb0e269055df8848245d1f2b00ab997c264fe674

    SHA512

    b85a29a7ab3e937ed3c9f66a7cd710596c93ead8fc87e4f753e36014f6df62bdad8a18cff05a3833daa24fcfe867210684528eaa4f8ddc9462a5870bd589e6bb

  • memory/2320-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2320-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2320-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2320-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2320-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2320-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2320-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2320-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB