Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 09:15

General

  • Target

    f0f8c2202f81e797bfe447178862943edc225ee2faa7354572107ebe5943fc19.exe

  • Size

    1.3MB

  • MD5

    52fddab9c803ca3acf6de8194b2b2658

  • SHA1

    9d9242731a4bc28b9ca0a20f19b62b0cda75b751

  • SHA256

    f0f8c2202f81e797bfe447178862943edc225ee2faa7354572107ebe5943fc19

  • SHA512

    13ae8116ce7f39f86e95cc7e939bbf55cc22f72ba2d2c41780e1805a2054735937d033293b84a3cfd5284fabaf59776ccffc760d4a3405e7756c0243b959e7ba

  • SSDEEP

    24576:UyUsbM4fptxqqOLSRhZYYN8/HladALQcOFVuCWRa2D71zA1l1qRZ:jUMjBtwOPX8/caLonW0w71zkl1M

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0f8c2202f81e797bfe447178862943edc225ee2faa7354572107ebe5943fc19.exe
    "C:\Users\Admin\AppData\Local\Temp\f0f8c2202f81e797bfe447178862943edc225ee2faa7354572107ebe5943fc19.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8591617.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8591617.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3695245.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3695245.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8679036.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8679036.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2720
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1044192.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1044192.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2816
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9826409.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9826409.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2552
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2588
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8591617.exe

    Filesize

    1.2MB

    MD5

    428a4e4c824dec6605867bfab85be61b

    SHA1

    e5d0c31b3dd5c96fbcec4f0b74f1fd45f398fc7c

    SHA256

    9e77e04f193d65b949d8981f580bd6d595f81f30c760ab20a62fb82238700f22

    SHA512

    29650c811bc87797da81457463564d62a9cfc41cf08d22efcc59fcfbbfa4805afe75fb0471382332c3bc0cebec280483197b7e4b0cc19be32f726fb7fdfc0213

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8591617.exe

    Filesize

    1.2MB

    MD5

    428a4e4c824dec6605867bfab85be61b

    SHA1

    e5d0c31b3dd5c96fbcec4f0b74f1fd45f398fc7c

    SHA256

    9e77e04f193d65b949d8981f580bd6d595f81f30c760ab20a62fb82238700f22

    SHA512

    29650c811bc87797da81457463564d62a9cfc41cf08d22efcc59fcfbbfa4805afe75fb0471382332c3bc0cebec280483197b7e4b0cc19be32f726fb7fdfc0213

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3695245.exe

    Filesize

    1.0MB

    MD5

    0e963a22f57b8d4eb571e781a9f10072

    SHA1

    153ded5934bdad6f727f7b6ed9c362e2bcace936

    SHA256

    b2128a6bb45e52243eacb9bf609eec243a61aa49bfcafba5756a469fd896778b

    SHA512

    3b3402f677555d63a9cda8270fc5a4eaa82f4b34afe5dba12f233374788b1581dfe26b560be37a81edcbfab7f3c04ba703a08ad58cda57324dcfc4d265209cf0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3695245.exe

    Filesize

    1.0MB

    MD5

    0e963a22f57b8d4eb571e781a9f10072

    SHA1

    153ded5934bdad6f727f7b6ed9c362e2bcace936

    SHA256

    b2128a6bb45e52243eacb9bf609eec243a61aa49bfcafba5756a469fd896778b

    SHA512

    3b3402f677555d63a9cda8270fc5a4eaa82f4b34afe5dba12f233374788b1581dfe26b560be37a81edcbfab7f3c04ba703a08ad58cda57324dcfc4d265209cf0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8679036.exe

    Filesize

    882KB

    MD5

    f4ca55748ef8a6ac87ca3528eb7b9045

    SHA1

    4683944b453698cb0ce2f5652d20fad64d4e4a85

    SHA256

    b0ec1ebc2db7e82f740c42f0bbc66aafa066cd2abe92ab94cef581ab6fa1bb3d

    SHA512

    9521b5cb8bed01fa09bb86acfcf7ec05226739f569204f7c6b1fefaae9e983c2f34c9064663cecd25c2ef30dd633b4cafad1884b12210a293e717d0082f64bcb

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8679036.exe

    Filesize

    882KB

    MD5

    f4ca55748ef8a6ac87ca3528eb7b9045

    SHA1

    4683944b453698cb0ce2f5652d20fad64d4e4a85

    SHA256

    b0ec1ebc2db7e82f740c42f0bbc66aafa066cd2abe92ab94cef581ab6fa1bb3d

    SHA512

    9521b5cb8bed01fa09bb86acfcf7ec05226739f569204f7c6b1fefaae9e983c2f34c9064663cecd25c2ef30dd633b4cafad1884b12210a293e717d0082f64bcb

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1044192.exe

    Filesize

    491KB

    MD5

    0f39000e9517d898d92c3619964dc956

    SHA1

    91ec1a43198a58920e0209f3fe30ce54dadd01a5

    SHA256

    1af1566a26a2d63a8bbf09b494639d4ee135d6be14fa883189d14423f8130692

    SHA512

    0f687b7d8e6df9c1d30631cb33b92594d806cc71b8bae054da17d4d0d83b40f6a58da80c2663f865d17a9464129799f11934e3e1ac650995eee86ad418e224eb

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1044192.exe

    Filesize

    491KB

    MD5

    0f39000e9517d898d92c3619964dc956

    SHA1

    91ec1a43198a58920e0209f3fe30ce54dadd01a5

    SHA256

    1af1566a26a2d63a8bbf09b494639d4ee135d6be14fa883189d14423f8130692

    SHA512

    0f687b7d8e6df9c1d30631cb33b92594d806cc71b8bae054da17d4d0d83b40f6a58da80c2663f865d17a9464129799f11934e3e1ac650995eee86ad418e224eb

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9826409.exe

    Filesize

    860KB

    MD5

    92341af6e44a1ba2188c6d7e1fae2030

    SHA1

    a56af9bbaf16c206a498ff559c9e08c9e135f253

    SHA256

    3f5cb71458bb852fc022dfb0eacd0fe73688a7718aaaaa2253f9917d7dbe34f4

    SHA512

    23b6af929809b5c99348f27d34bb3da757564e26b7e8121bce4d8902aa9cf9adc1ecc8a1188bdcb8cec4b372b472527d174b8a27bfd2f684d53060002e40ce97

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9826409.exe

    Filesize

    860KB

    MD5

    92341af6e44a1ba2188c6d7e1fae2030

    SHA1

    a56af9bbaf16c206a498ff559c9e08c9e135f253

    SHA256

    3f5cb71458bb852fc022dfb0eacd0fe73688a7718aaaaa2253f9917d7dbe34f4

    SHA512

    23b6af929809b5c99348f27d34bb3da757564e26b7e8121bce4d8902aa9cf9adc1ecc8a1188bdcb8cec4b372b472527d174b8a27bfd2f684d53060002e40ce97

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9826409.exe

    Filesize

    860KB

    MD5

    92341af6e44a1ba2188c6d7e1fae2030

    SHA1

    a56af9bbaf16c206a498ff559c9e08c9e135f253

    SHA256

    3f5cb71458bb852fc022dfb0eacd0fe73688a7718aaaaa2253f9917d7dbe34f4

    SHA512

    23b6af929809b5c99348f27d34bb3da757564e26b7e8121bce4d8902aa9cf9adc1ecc8a1188bdcb8cec4b372b472527d174b8a27bfd2f684d53060002e40ce97

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8591617.exe

    Filesize

    1.2MB

    MD5

    428a4e4c824dec6605867bfab85be61b

    SHA1

    e5d0c31b3dd5c96fbcec4f0b74f1fd45f398fc7c

    SHA256

    9e77e04f193d65b949d8981f580bd6d595f81f30c760ab20a62fb82238700f22

    SHA512

    29650c811bc87797da81457463564d62a9cfc41cf08d22efcc59fcfbbfa4805afe75fb0471382332c3bc0cebec280483197b7e4b0cc19be32f726fb7fdfc0213

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8591617.exe

    Filesize

    1.2MB

    MD5

    428a4e4c824dec6605867bfab85be61b

    SHA1

    e5d0c31b3dd5c96fbcec4f0b74f1fd45f398fc7c

    SHA256

    9e77e04f193d65b949d8981f580bd6d595f81f30c760ab20a62fb82238700f22

    SHA512

    29650c811bc87797da81457463564d62a9cfc41cf08d22efcc59fcfbbfa4805afe75fb0471382332c3bc0cebec280483197b7e4b0cc19be32f726fb7fdfc0213

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3695245.exe

    Filesize

    1.0MB

    MD5

    0e963a22f57b8d4eb571e781a9f10072

    SHA1

    153ded5934bdad6f727f7b6ed9c362e2bcace936

    SHA256

    b2128a6bb45e52243eacb9bf609eec243a61aa49bfcafba5756a469fd896778b

    SHA512

    3b3402f677555d63a9cda8270fc5a4eaa82f4b34afe5dba12f233374788b1581dfe26b560be37a81edcbfab7f3c04ba703a08ad58cda57324dcfc4d265209cf0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3695245.exe

    Filesize

    1.0MB

    MD5

    0e963a22f57b8d4eb571e781a9f10072

    SHA1

    153ded5934bdad6f727f7b6ed9c362e2bcace936

    SHA256

    b2128a6bb45e52243eacb9bf609eec243a61aa49bfcafba5756a469fd896778b

    SHA512

    3b3402f677555d63a9cda8270fc5a4eaa82f4b34afe5dba12f233374788b1581dfe26b560be37a81edcbfab7f3c04ba703a08ad58cda57324dcfc4d265209cf0

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8679036.exe

    Filesize

    882KB

    MD5

    f4ca55748ef8a6ac87ca3528eb7b9045

    SHA1

    4683944b453698cb0ce2f5652d20fad64d4e4a85

    SHA256

    b0ec1ebc2db7e82f740c42f0bbc66aafa066cd2abe92ab94cef581ab6fa1bb3d

    SHA512

    9521b5cb8bed01fa09bb86acfcf7ec05226739f569204f7c6b1fefaae9e983c2f34c9064663cecd25c2ef30dd633b4cafad1884b12210a293e717d0082f64bcb

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8679036.exe

    Filesize

    882KB

    MD5

    f4ca55748ef8a6ac87ca3528eb7b9045

    SHA1

    4683944b453698cb0ce2f5652d20fad64d4e4a85

    SHA256

    b0ec1ebc2db7e82f740c42f0bbc66aafa066cd2abe92ab94cef581ab6fa1bb3d

    SHA512

    9521b5cb8bed01fa09bb86acfcf7ec05226739f569204f7c6b1fefaae9e983c2f34c9064663cecd25c2ef30dd633b4cafad1884b12210a293e717d0082f64bcb

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z1044192.exe

    Filesize

    491KB

    MD5

    0f39000e9517d898d92c3619964dc956

    SHA1

    91ec1a43198a58920e0209f3fe30ce54dadd01a5

    SHA256

    1af1566a26a2d63a8bbf09b494639d4ee135d6be14fa883189d14423f8130692

    SHA512

    0f687b7d8e6df9c1d30631cb33b92594d806cc71b8bae054da17d4d0d83b40f6a58da80c2663f865d17a9464129799f11934e3e1ac650995eee86ad418e224eb

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z1044192.exe

    Filesize

    491KB

    MD5

    0f39000e9517d898d92c3619964dc956

    SHA1

    91ec1a43198a58920e0209f3fe30ce54dadd01a5

    SHA256

    1af1566a26a2d63a8bbf09b494639d4ee135d6be14fa883189d14423f8130692

    SHA512

    0f687b7d8e6df9c1d30631cb33b92594d806cc71b8bae054da17d4d0d83b40f6a58da80c2663f865d17a9464129799f11934e3e1ac650995eee86ad418e224eb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9826409.exe

    Filesize

    860KB

    MD5

    92341af6e44a1ba2188c6d7e1fae2030

    SHA1

    a56af9bbaf16c206a498ff559c9e08c9e135f253

    SHA256

    3f5cb71458bb852fc022dfb0eacd0fe73688a7718aaaaa2253f9917d7dbe34f4

    SHA512

    23b6af929809b5c99348f27d34bb3da757564e26b7e8121bce4d8902aa9cf9adc1ecc8a1188bdcb8cec4b372b472527d174b8a27bfd2f684d53060002e40ce97

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9826409.exe

    Filesize

    860KB

    MD5

    92341af6e44a1ba2188c6d7e1fae2030

    SHA1

    a56af9bbaf16c206a498ff559c9e08c9e135f253

    SHA256

    3f5cb71458bb852fc022dfb0eacd0fe73688a7718aaaaa2253f9917d7dbe34f4

    SHA512

    23b6af929809b5c99348f27d34bb3da757564e26b7e8121bce4d8902aa9cf9adc1ecc8a1188bdcb8cec4b372b472527d174b8a27bfd2f684d53060002e40ce97

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9826409.exe

    Filesize

    860KB

    MD5

    92341af6e44a1ba2188c6d7e1fae2030

    SHA1

    a56af9bbaf16c206a498ff559c9e08c9e135f253

    SHA256

    3f5cb71458bb852fc022dfb0eacd0fe73688a7718aaaaa2253f9917d7dbe34f4

    SHA512

    23b6af929809b5c99348f27d34bb3da757564e26b7e8121bce4d8902aa9cf9adc1ecc8a1188bdcb8cec4b372b472527d174b8a27bfd2f684d53060002e40ce97

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9826409.exe

    Filesize

    860KB

    MD5

    92341af6e44a1ba2188c6d7e1fae2030

    SHA1

    a56af9bbaf16c206a498ff559c9e08c9e135f253

    SHA256

    3f5cb71458bb852fc022dfb0eacd0fe73688a7718aaaaa2253f9917d7dbe34f4

    SHA512

    23b6af929809b5c99348f27d34bb3da757564e26b7e8121bce4d8902aa9cf9adc1ecc8a1188bdcb8cec4b372b472527d174b8a27bfd2f684d53060002e40ce97

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9826409.exe

    Filesize

    860KB

    MD5

    92341af6e44a1ba2188c6d7e1fae2030

    SHA1

    a56af9bbaf16c206a498ff559c9e08c9e135f253

    SHA256

    3f5cb71458bb852fc022dfb0eacd0fe73688a7718aaaaa2253f9917d7dbe34f4

    SHA512

    23b6af929809b5c99348f27d34bb3da757564e26b7e8121bce4d8902aa9cf9adc1ecc8a1188bdcb8cec4b372b472527d174b8a27bfd2f684d53060002e40ce97

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9826409.exe

    Filesize

    860KB

    MD5

    92341af6e44a1ba2188c6d7e1fae2030

    SHA1

    a56af9bbaf16c206a498ff559c9e08c9e135f253

    SHA256

    3f5cb71458bb852fc022dfb0eacd0fe73688a7718aaaaa2253f9917d7dbe34f4

    SHA512

    23b6af929809b5c99348f27d34bb3da757564e26b7e8121bce4d8902aa9cf9adc1ecc8a1188bdcb8cec4b372b472527d174b8a27bfd2f684d53060002e40ce97

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9826409.exe

    Filesize

    860KB

    MD5

    92341af6e44a1ba2188c6d7e1fae2030

    SHA1

    a56af9bbaf16c206a498ff559c9e08c9e135f253

    SHA256

    3f5cb71458bb852fc022dfb0eacd0fe73688a7718aaaaa2253f9917d7dbe34f4

    SHA512

    23b6af929809b5c99348f27d34bb3da757564e26b7e8121bce4d8902aa9cf9adc1ecc8a1188bdcb8cec4b372b472527d174b8a27bfd2f684d53060002e40ce97

  • memory/2588-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2588-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2588-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2588-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2588-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2588-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2588-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2588-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB