Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 08:57

General

  • Target

    8d60591c385ed51703e6908ceb71f92fa76763fcfe2af06964782dc9e4aceccc.exe

  • Size

    1.3MB

  • MD5

    9ae538aa3330764e25d5ccf7d2b2d1cd

  • SHA1

    829825d5e88cdb28bd3cda8705565d6fb4d52247

  • SHA256

    8d60591c385ed51703e6908ceb71f92fa76763fcfe2af06964782dc9e4aceccc

  • SHA512

    93762dd2b10175b089eefb1992f553ef8031a45288fc39f1a351959dabbaec6252bba849475d9cbcd13708e4aee9f517249ab34d0b97d789fc22cb23105b7762

  • SSDEEP

    24576:ayZ+p9Q+NLr4KpMN4yJrYiaz9tj8rcOVgJoBcYIbaDyRJIyG+9w:hZ+p9LNL/pehJUxz9VmB7aa+y

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d60591c385ed51703e6908ceb71f92fa76763fcfe2af06964782dc9e4aceccc.exe
    "C:\Users\Admin\AppData\Local\Temp\8d60591c385ed51703e6908ceb71f92fa76763fcfe2af06964782dc9e4aceccc.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8167697.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8167697.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6469178.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6469178.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2342013.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2342013.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2656
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4538502.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4538502.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2976
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9943163.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9943163.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2944
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:472
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2944 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8167697.exe

    Filesize

    1.2MB

    MD5

    014050757d2833636e3f39115a8cb706

    SHA1

    ae734167ca84bb49fa30778cb1fc189f8e49cf58

    SHA256

    f9c981d31cb5a049a61b22aae5d3bef180e03a6763ac51de2ddb30c26ea77a94

    SHA512

    e7a11aa94d6a761dfd3f5429f2a461bff2778acb16ebc23c56ec64c13c6419b39207d7f1043d8125035b8873e8cbe3958900983ad6e711eac26ef4d32845474e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8167697.exe

    Filesize

    1.2MB

    MD5

    014050757d2833636e3f39115a8cb706

    SHA1

    ae734167ca84bb49fa30778cb1fc189f8e49cf58

    SHA256

    f9c981d31cb5a049a61b22aae5d3bef180e03a6763ac51de2ddb30c26ea77a94

    SHA512

    e7a11aa94d6a761dfd3f5429f2a461bff2778acb16ebc23c56ec64c13c6419b39207d7f1043d8125035b8873e8cbe3958900983ad6e711eac26ef4d32845474e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6469178.exe

    Filesize

    1.0MB

    MD5

    7d25e48eded8ba98c870cc60232cfa7e

    SHA1

    1e078bc174101c960038d54b27e373229409bb04

    SHA256

    5c51daab2219f0bb628f63c6a7c3998ca2c444b006dd22b8584aaf1029acddff

    SHA512

    df93732aa5a5737cad6b6f26210d4dd018c03e241f101f8329d7382f8bbbce9fef0a3b39c76b37540885fd66294e8b85a4675d09e3ca344d763927a4972e9c8e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6469178.exe

    Filesize

    1.0MB

    MD5

    7d25e48eded8ba98c870cc60232cfa7e

    SHA1

    1e078bc174101c960038d54b27e373229409bb04

    SHA256

    5c51daab2219f0bb628f63c6a7c3998ca2c444b006dd22b8584aaf1029acddff

    SHA512

    df93732aa5a5737cad6b6f26210d4dd018c03e241f101f8329d7382f8bbbce9fef0a3b39c76b37540885fd66294e8b85a4675d09e3ca344d763927a4972e9c8e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2342013.exe

    Filesize

    885KB

    MD5

    c092db198108c33239bbef666c9e9867

    SHA1

    081674fb3c00f9868f65055806cbf198bdc27937

    SHA256

    edf783dd0caedc6741faf6351c033bb34c74cd7ce11eddc2a695a8a490ce6a95

    SHA512

    16ceb9bce8017e4090a6cc4743ca6e70ed511a45821d6086ab1de42190a851ca8d17882b26b6da766451cc942d022a4bdeadd63cb870dcdd4343a939a1c5a417

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2342013.exe

    Filesize

    885KB

    MD5

    c092db198108c33239bbef666c9e9867

    SHA1

    081674fb3c00f9868f65055806cbf198bdc27937

    SHA256

    edf783dd0caedc6741faf6351c033bb34c74cd7ce11eddc2a695a8a490ce6a95

    SHA512

    16ceb9bce8017e4090a6cc4743ca6e70ed511a45821d6086ab1de42190a851ca8d17882b26b6da766451cc942d022a4bdeadd63cb870dcdd4343a939a1c5a417

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4538502.exe

    Filesize

    494KB

    MD5

    dcf94719334846d3b479e281ef9b542e

    SHA1

    fdd93de1967f7323a44fd2df823b7a9848cf4bce

    SHA256

    98d97e4c41d82f37238914c3e1e0263122c3a17b7c7543b9d1bc9f63fbf5e78a

    SHA512

    8ea73ecee87b6ef9e44dafd9a5c54ab3a4c63f3c3ba92a72ca616e97e96afa8c9f5682221b24818f9bf7f2d3246bb656feb1a87ea33271a58bc8d17b7e6f568a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4538502.exe

    Filesize

    494KB

    MD5

    dcf94719334846d3b479e281ef9b542e

    SHA1

    fdd93de1967f7323a44fd2df823b7a9848cf4bce

    SHA256

    98d97e4c41d82f37238914c3e1e0263122c3a17b7c7543b9d1bc9f63fbf5e78a

    SHA512

    8ea73ecee87b6ef9e44dafd9a5c54ab3a4c63f3c3ba92a72ca616e97e96afa8c9f5682221b24818f9bf7f2d3246bb656feb1a87ea33271a58bc8d17b7e6f568a

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9943163.exe

    Filesize

    860KB

    MD5

    b26a852e3bdaf2b130f5f000334e0472

    SHA1

    5c3baa76b6d83d072c65dfe70df794910b3cce03

    SHA256

    6b9a4fef015274b90209052859c3b23eecd17a5e5211de3768b338bc377b3239

    SHA512

    8fccbb53fc26d3de9190c4fe3faf219b34f6c3547084230dfad3d29427403ca93e86292ecc94681038ba236ac3f9966402a83674c9b121d6da09168a87ad6585

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9943163.exe

    Filesize

    860KB

    MD5

    b26a852e3bdaf2b130f5f000334e0472

    SHA1

    5c3baa76b6d83d072c65dfe70df794910b3cce03

    SHA256

    6b9a4fef015274b90209052859c3b23eecd17a5e5211de3768b338bc377b3239

    SHA512

    8fccbb53fc26d3de9190c4fe3faf219b34f6c3547084230dfad3d29427403ca93e86292ecc94681038ba236ac3f9966402a83674c9b121d6da09168a87ad6585

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9943163.exe

    Filesize

    860KB

    MD5

    b26a852e3bdaf2b130f5f000334e0472

    SHA1

    5c3baa76b6d83d072c65dfe70df794910b3cce03

    SHA256

    6b9a4fef015274b90209052859c3b23eecd17a5e5211de3768b338bc377b3239

    SHA512

    8fccbb53fc26d3de9190c4fe3faf219b34f6c3547084230dfad3d29427403ca93e86292ecc94681038ba236ac3f9966402a83674c9b121d6da09168a87ad6585

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8167697.exe

    Filesize

    1.2MB

    MD5

    014050757d2833636e3f39115a8cb706

    SHA1

    ae734167ca84bb49fa30778cb1fc189f8e49cf58

    SHA256

    f9c981d31cb5a049a61b22aae5d3bef180e03a6763ac51de2ddb30c26ea77a94

    SHA512

    e7a11aa94d6a761dfd3f5429f2a461bff2778acb16ebc23c56ec64c13c6419b39207d7f1043d8125035b8873e8cbe3958900983ad6e711eac26ef4d32845474e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8167697.exe

    Filesize

    1.2MB

    MD5

    014050757d2833636e3f39115a8cb706

    SHA1

    ae734167ca84bb49fa30778cb1fc189f8e49cf58

    SHA256

    f9c981d31cb5a049a61b22aae5d3bef180e03a6763ac51de2ddb30c26ea77a94

    SHA512

    e7a11aa94d6a761dfd3f5429f2a461bff2778acb16ebc23c56ec64c13c6419b39207d7f1043d8125035b8873e8cbe3958900983ad6e711eac26ef4d32845474e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6469178.exe

    Filesize

    1.0MB

    MD5

    7d25e48eded8ba98c870cc60232cfa7e

    SHA1

    1e078bc174101c960038d54b27e373229409bb04

    SHA256

    5c51daab2219f0bb628f63c6a7c3998ca2c444b006dd22b8584aaf1029acddff

    SHA512

    df93732aa5a5737cad6b6f26210d4dd018c03e241f101f8329d7382f8bbbce9fef0a3b39c76b37540885fd66294e8b85a4675d09e3ca344d763927a4972e9c8e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6469178.exe

    Filesize

    1.0MB

    MD5

    7d25e48eded8ba98c870cc60232cfa7e

    SHA1

    1e078bc174101c960038d54b27e373229409bb04

    SHA256

    5c51daab2219f0bb628f63c6a7c3998ca2c444b006dd22b8584aaf1029acddff

    SHA512

    df93732aa5a5737cad6b6f26210d4dd018c03e241f101f8329d7382f8bbbce9fef0a3b39c76b37540885fd66294e8b85a4675d09e3ca344d763927a4972e9c8e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2342013.exe

    Filesize

    885KB

    MD5

    c092db198108c33239bbef666c9e9867

    SHA1

    081674fb3c00f9868f65055806cbf198bdc27937

    SHA256

    edf783dd0caedc6741faf6351c033bb34c74cd7ce11eddc2a695a8a490ce6a95

    SHA512

    16ceb9bce8017e4090a6cc4743ca6e70ed511a45821d6086ab1de42190a851ca8d17882b26b6da766451cc942d022a4bdeadd63cb870dcdd4343a939a1c5a417

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2342013.exe

    Filesize

    885KB

    MD5

    c092db198108c33239bbef666c9e9867

    SHA1

    081674fb3c00f9868f65055806cbf198bdc27937

    SHA256

    edf783dd0caedc6741faf6351c033bb34c74cd7ce11eddc2a695a8a490ce6a95

    SHA512

    16ceb9bce8017e4090a6cc4743ca6e70ed511a45821d6086ab1de42190a851ca8d17882b26b6da766451cc942d022a4bdeadd63cb870dcdd4343a939a1c5a417

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z4538502.exe

    Filesize

    494KB

    MD5

    dcf94719334846d3b479e281ef9b542e

    SHA1

    fdd93de1967f7323a44fd2df823b7a9848cf4bce

    SHA256

    98d97e4c41d82f37238914c3e1e0263122c3a17b7c7543b9d1bc9f63fbf5e78a

    SHA512

    8ea73ecee87b6ef9e44dafd9a5c54ab3a4c63f3c3ba92a72ca616e97e96afa8c9f5682221b24818f9bf7f2d3246bb656feb1a87ea33271a58bc8d17b7e6f568a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z4538502.exe

    Filesize

    494KB

    MD5

    dcf94719334846d3b479e281ef9b542e

    SHA1

    fdd93de1967f7323a44fd2df823b7a9848cf4bce

    SHA256

    98d97e4c41d82f37238914c3e1e0263122c3a17b7c7543b9d1bc9f63fbf5e78a

    SHA512

    8ea73ecee87b6ef9e44dafd9a5c54ab3a4c63f3c3ba92a72ca616e97e96afa8c9f5682221b24818f9bf7f2d3246bb656feb1a87ea33271a58bc8d17b7e6f568a

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9943163.exe

    Filesize

    860KB

    MD5

    b26a852e3bdaf2b130f5f000334e0472

    SHA1

    5c3baa76b6d83d072c65dfe70df794910b3cce03

    SHA256

    6b9a4fef015274b90209052859c3b23eecd17a5e5211de3768b338bc377b3239

    SHA512

    8fccbb53fc26d3de9190c4fe3faf219b34f6c3547084230dfad3d29427403ca93e86292ecc94681038ba236ac3f9966402a83674c9b121d6da09168a87ad6585

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9943163.exe

    Filesize

    860KB

    MD5

    b26a852e3bdaf2b130f5f000334e0472

    SHA1

    5c3baa76b6d83d072c65dfe70df794910b3cce03

    SHA256

    6b9a4fef015274b90209052859c3b23eecd17a5e5211de3768b338bc377b3239

    SHA512

    8fccbb53fc26d3de9190c4fe3faf219b34f6c3547084230dfad3d29427403ca93e86292ecc94681038ba236ac3f9966402a83674c9b121d6da09168a87ad6585

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9943163.exe

    Filesize

    860KB

    MD5

    b26a852e3bdaf2b130f5f000334e0472

    SHA1

    5c3baa76b6d83d072c65dfe70df794910b3cce03

    SHA256

    6b9a4fef015274b90209052859c3b23eecd17a5e5211de3768b338bc377b3239

    SHA512

    8fccbb53fc26d3de9190c4fe3faf219b34f6c3547084230dfad3d29427403ca93e86292ecc94681038ba236ac3f9966402a83674c9b121d6da09168a87ad6585

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9943163.exe

    Filesize

    860KB

    MD5

    b26a852e3bdaf2b130f5f000334e0472

    SHA1

    5c3baa76b6d83d072c65dfe70df794910b3cce03

    SHA256

    6b9a4fef015274b90209052859c3b23eecd17a5e5211de3768b338bc377b3239

    SHA512

    8fccbb53fc26d3de9190c4fe3faf219b34f6c3547084230dfad3d29427403ca93e86292ecc94681038ba236ac3f9966402a83674c9b121d6da09168a87ad6585

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9943163.exe

    Filesize

    860KB

    MD5

    b26a852e3bdaf2b130f5f000334e0472

    SHA1

    5c3baa76b6d83d072c65dfe70df794910b3cce03

    SHA256

    6b9a4fef015274b90209052859c3b23eecd17a5e5211de3768b338bc377b3239

    SHA512

    8fccbb53fc26d3de9190c4fe3faf219b34f6c3547084230dfad3d29427403ca93e86292ecc94681038ba236ac3f9966402a83674c9b121d6da09168a87ad6585

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9943163.exe

    Filesize

    860KB

    MD5

    b26a852e3bdaf2b130f5f000334e0472

    SHA1

    5c3baa76b6d83d072c65dfe70df794910b3cce03

    SHA256

    6b9a4fef015274b90209052859c3b23eecd17a5e5211de3768b338bc377b3239

    SHA512

    8fccbb53fc26d3de9190c4fe3faf219b34f6c3547084230dfad3d29427403ca93e86292ecc94681038ba236ac3f9966402a83674c9b121d6da09168a87ad6585

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9943163.exe

    Filesize

    860KB

    MD5

    b26a852e3bdaf2b130f5f000334e0472

    SHA1

    5c3baa76b6d83d072c65dfe70df794910b3cce03

    SHA256

    6b9a4fef015274b90209052859c3b23eecd17a5e5211de3768b338bc377b3239

    SHA512

    8fccbb53fc26d3de9190c4fe3faf219b34f6c3547084230dfad3d29427403ca93e86292ecc94681038ba236ac3f9966402a83674c9b121d6da09168a87ad6585

  • memory/472-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/472-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/472-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/472-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/472-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/472-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/472-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/472-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB