Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 08:57

General

  • Target

    2654bb8b651dea9e6cc7946811c68bd262692d0a7b2e5465d2a196e9aad2d02b.exe

  • Size

    1.3MB

  • MD5

    c4172cc237728e2703b33b5cfed6b5c7

  • SHA1

    2d14683b8f70853bad3200a5e84d16aa9cba737b

  • SHA256

    2654bb8b651dea9e6cc7946811c68bd262692d0a7b2e5465d2a196e9aad2d02b

  • SHA512

    cd4728b4afbf9b100941826838958a3a783b3de5223076b2aaba513a1e0a07f822d513288b82288cb20ec16d1a56e5c36770500f1499a138d7db0d6a993103b1

  • SSDEEP

    24576:QyvJlCDimv5VdSe9SzIVT4fPNZ09Hik41hTDQDDx/5Boh:XvnoSesEVT4fPS7cCDd

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2654bb8b651dea9e6cc7946811c68bd262692d0a7b2e5465d2a196e9aad2d02b.exe
    "C:\Users\Admin\AppData\Local\Temp\2654bb8b651dea9e6cc7946811c68bd262692d0a7b2e5465d2a196e9aad2d02b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0774833.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0774833.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3803241.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3803241.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3537505.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3537505.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2744
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7826470.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7826470.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1672
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4848851.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4848851.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2696
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2572
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0774833.exe

    Filesize

    1.2MB

    MD5

    d435d078664b991e89b75163377e4083

    SHA1

    8f1b412d75930b2324ced28190a5132c1c90932a

    SHA256

    726243ca504e06c9afadcfc46264e949a62007dd7b1c23fd0641defe7d661e24

    SHA512

    f1e89e5bc82e63b63b8634871feb7b2e416af8edde0964b97ddddc2d65f9a8d311d2a252501e97fc0c2109e86e0da9b8671f2dcf5fd5b13c95897c744927d72f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0774833.exe

    Filesize

    1.2MB

    MD5

    d435d078664b991e89b75163377e4083

    SHA1

    8f1b412d75930b2324ced28190a5132c1c90932a

    SHA256

    726243ca504e06c9afadcfc46264e949a62007dd7b1c23fd0641defe7d661e24

    SHA512

    f1e89e5bc82e63b63b8634871feb7b2e416af8edde0964b97ddddc2d65f9a8d311d2a252501e97fc0c2109e86e0da9b8671f2dcf5fd5b13c95897c744927d72f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3803241.exe

    Filesize

    1.0MB

    MD5

    b13f9b0656f938f80d724345225965e7

    SHA1

    92aa3bcd85d2acbdb417f6399116ec761a45a4fd

    SHA256

    362d3e2ae6828690ce63e97c4432fa4f088c177bec923caae016c8c6df72ed3e

    SHA512

    fa77ae79f3ba1b8c34836e246509be7f8a52d3ea355c599a24d16a13e89b774d96faafd4e8f4e27fccc390838a9ebd8c2c7598249b3ac8354fdb5dc17f6b86dc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3803241.exe

    Filesize

    1.0MB

    MD5

    b13f9b0656f938f80d724345225965e7

    SHA1

    92aa3bcd85d2acbdb417f6399116ec761a45a4fd

    SHA256

    362d3e2ae6828690ce63e97c4432fa4f088c177bec923caae016c8c6df72ed3e

    SHA512

    fa77ae79f3ba1b8c34836e246509be7f8a52d3ea355c599a24d16a13e89b774d96faafd4e8f4e27fccc390838a9ebd8c2c7598249b3ac8354fdb5dc17f6b86dc

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3537505.exe

    Filesize

    882KB

    MD5

    66d6a24b50b3e41d51a0680187283d24

    SHA1

    e280aae63f9937a5da69f0cb273d147f1b67c7ba

    SHA256

    6fbe0cd7aef50f9eb4315eb1aaf412c744d94598be3830fc74e65803ff39da20

    SHA512

    d565d81e909461fcbc036113d0f4112da7511d1b014d3022ec4e92799b2c956f2a96201371aee84fa6c2f961a0d26efeb5d3aa1fc7e6f0090fd3bdcf849a238d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3537505.exe

    Filesize

    882KB

    MD5

    66d6a24b50b3e41d51a0680187283d24

    SHA1

    e280aae63f9937a5da69f0cb273d147f1b67c7ba

    SHA256

    6fbe0cd7aef50f9eb4315eb1aaf412c744d94598be3830fc74e65803ff39da20

    SHA512

    d565d81e909461fcbc036113d0f4112da7511d1b014d3022ec4e92799b2c956f2a96201371aee84fa6c2f961a0d26efeb5d3aa1fc7e6f0090fd3bdcf849a238d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7826470.exe

    Filesize

    492KB

    MD5

    21ae68984d09a845c59e9f7d9645f137

    SHA1

    01783f01e26d2c5f99d9a195d3778cccd5b56061

    SHA256

    ca797efa0c823a53d2e24f555e9283ba47916f941400873cf4059d3aa149872c

    SHA512

    1de1931957b564af6ec5a09afa78f2e0a4ea4eeae8fc1e1a47ced30b6d9291bacd967604b97e9865fe89b77e70cd7c3b470af8bcb2cbdabcce55b6431b7c6348

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7826470.exe

    Filesize

    492KB

    MD5

    21ae68984d09a845c59e9f7d9645f137

    SHA1

    01783f01e26d2c5f99d9a195d3778cccd5b56061

    SHA256

    ca797efa0c823a53d2e24f555e9283ba47916f941400873cf4059d3aa149872c

    SHA512

    1de1931957b564af6ec5a09afa78f2e0a4ea4eeae8fc1e1a47ced30b6d9291bacd967604b97e9865fe89b77e70cd7c3b470af8bcb2cbdabcce55b6431b7c6348

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4848851.exe

    Filesize

    860KB

    MD5

    bcf0e7d7997a27fc5df69bdb532eab59

    SHA1

    d6d59a3be690013ca87965c506291aab87b5e931

    SHA256

    e365c2fedcc98847a52ee229b30b444f9b492e95a2861e8bb8bfeee4d5720f59

    SHA512

    99e60337ccbe30e29c56192dacfd4b33f4b7e0a54d0c546d2ff2c11c5f320c5f3b61f18d9dc1242938150cd1b590dee8ea3acd6620e2b485c2c61966bdbd95ed

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4848851.exe

    Filesize

    860KB

    MD5

    bcf0e7d7997a27fc5df69bdb532eab59

    SHA1

    d6d59a3be690013ca87965c506291aab87b5e931

    SHA256

    e365c2fedcc98847a52ee229b30b444f9b492e95a2861e8bb8bfeee4d5720f59

    SHA512

    99e60337ccbe30e29c56192dacfd4b33f4b7e0a54d0c546d2ff2c11c5f320c5f3b61f18d9dc1242938150cd1b590dee8ea3acd6620e2b485c2c61966bdbd95ed

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4848851.exe

    Filesize

    860KB

    MD5

    bcf0e7d7997a27fc5df69bdb532eab59

    SHA1

    d6d59a3be690013ca87965c506291aab87b5e931

    SHA256

    e365c2fedcc98847a52ee229b30b444f9b492e95a2861e8bb8bfeee4d5720f59

    SHA512

    99e60337ccbe30e29c56192dacfd4b33f4b7e0a54d0c546d2ff2c11c5f320c5f3b61f18d9dc1242938150cd1b590dee8ea3acd6620e2b485c2c61966bdbd95ed

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0774833.exe

    Filesize

    1.2MB

    MD5

    d435d078664b991e89b75163377e4083

    SHA1

    8f1b412d75930b2324ced28190a5132c1c90932a

    SHA256

    726243ca504e06c9afadcfc46264e949a62007dd7b1c23fd0641defe7d661e24

    SHA512

    f1e89e5bc82e63b63b8634871feb7b2e416af8edde0964b97ddddc2d65f9a8d311d2a252501e97fc0c2109e86e0da9b8671f2dcf5fd5b13c95897c744927d72f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0774833.exe

    Filesize

    1.2MB

    MD5

    d435d078664b991e89b75163377e4083

    SHA1

    8f1b412d75930b2324ced28190a5132c1c90932a

    SHA256

    726243ca504e06c9afadcfc46264e949a62007dd7b1c23fd0641defe7d661e24

    SHA512

    f1e89e5bc82e63b63b8634871feb7b2e416af8edde0964b97ddddc2d65f9a8d311d2a252501e97fc0c2109e86e0da9b8671f2dcf5fd5b13c95897c744927d72f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3803241.exe

    Filesize

    1.0MB

    MD5

    b13f9b0656f938f80d724345225965e7

    SHA1

    92aa3bcd85d2acbdb417f6399116ec761a45a4fd

    SHA256

    362d3e2ae6828690ce63e97c4432fa4f088c177bec923caae016c8c6df72ed3e

    SHA512

    fa77ae79f3ba1b8c34836e246509be7f8a52d3ea355c599a24d16a13e89b774d96faafd4e8f4e27fccc390838a9ebd8c2c7598249b3ac8354fdb5dc17f6b86dc

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3803241.exe

    Filesize

    1.0MB

    MD5

    b13f9b0656f938f80d724345225965e7

    SHA1

    92aa3bcd85d2acbdb417f6399116ec761a45a4fd

    SHA256

    362d3e2ae6828690ce63e97c4432fa4f088c177bec923caae016c8c6df72ed3e

    SHA512

    fa77ae79f3ba1b8c34836e246509be7f8a52d3ea355c599a24d16a13e89b774d96faafd4e8f4e27fccc390838a9ebd8c2c7598249b3ac8354fdb5dc17f6b86dc

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z3537505.exe

    Filesize

    882KB

    MD5

    66d6a24b50b3e41d51a0680187283d24

    SHA1

    e280aae63f9937a5da69f0cb273d147f1b67c7ba

    SHA256

    6fbe0cd7aef50f9eb4315eb1aaf412c744d94598be3830fc74e65803ff39da20

    SHA512

    d565d81e909461fcbc036113d0f4112da7511d1b014d3022ec4e92799b2c956f2a96201371aee84fa6c2f961a0d26efeb5d3aa1fc7e6f0090fd3bdcf849a238d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z3537505.exe

    Filesize

    882KB

    MD5

    66d6a24b50b3e41d51a0680187283d24

    SHA1

    e280aae63f9937a5da69f0cb273d147f1b67c7ba

    SHA256

    6fbe0cd7aef50f9eb4315eb1aaf412c744d94598be3830fc74e65803ff39da20

    SHA512

    d565d81e909461fcbc036113d0f4112da7511d1b014d3022ec4e92799b2c956f2a96201371aee84fa6c2f961a0d26efeb5d3aa1fc7e6f0090fd3bdcf849a238d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7826470.exe

    Filesize

    492KB

    MD5

    21ae68984d09a845c59e9f7d9645f137

    SHA1

    01783f01e26d2c5f99d9a195d3778cccd5b56061

    SHA256

    ca797efa0c823a53d2e24f555e9283ba47916f941400873cf4059d3aa149872c

    SHA512

    1de1931957b564af6ec5a09afa78f2e0a4ea4eeae8fc1e1a47ced30b6d9291bacd967604b97e9865fe89b77e70cd7c3b470af8bcb2cbdabcce55b6431b7c6348

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7826470.exe

    Filesize

    492KB

    MD5

    21ae68984d09a845c59e9f7d9645f137

    SHA1

    01783f01e26d2c5f99d9a195d3778cccd5b56061

    SHA256

    ca797efa0c823a53d2e24f555e9283ba47916f941400873cf4059d3aa149872c

    SHA512

    1de1931957b564af6ec5a09afa78f2e0a4ea4eeae8fc1e1a47ced30b6d9291bacd967604b97e9865fe89b77e70cd7c3b470af8bcb2cbdabcce55b6431b7c6348

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4848851.exe

    Filesize

    860KB

    MD5

    bcf0e7d7997a27fc5df69bdb532eab59

    SHA1

    d6d59a3be690013ca87965c506291aab87b5e931

    SHA256

    e365c2fedcc98847a52ee229b30b444f9b492e95a2861e8bb8bfeee4d5720f59

    SHA512

    99e60337ccbe30e29c56192dacfd4b33f4b7e0a54d0c546d2ff2c11c5f320c5f3b61f18d9dc1242938150cd1b590dee8ea3acd6620e2b485c2c61966bdbd95ed

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4848851.exe

    Filesize

    860KB

    MD5

    bcf0e7d7997a27fc5df69bdb532eab59

    SHA1

    d6d59a3be690013ca87965c506291aab87b5e931

    SHA256

    e365c2fedcc98847a52ee229b30b444f9b492e95a2861e8bb8bfeee4d5720f59

    SHA512

    99e60337ccbe30e29c56192dacfd4b33f4b7e0a54d0c546d2ff2c11c5f320c5f3b61f18d9dc1242938150cd1b590dee8ea3acd6620e2b485c2c61966bdbd95ed

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4848851.exe

    Filesize

    860KB

    MD5

    bcf0e7d7997a27fc5df69bdb532eab59

    SHA1

    d6d59a3be690013ca87965c506291aab87b5e931

    SHA256

    e365c2fedcc98847a52ee229b30b444f9b492e95a2861e8bb8bfeee4d5720f59

    SHA512

    99e60337ccbe30e29c56192dacfd4b33f4b7e0a54d0c546d2ff2c11c5f320c5f3b61f18d9dc1242938150cd1b590dee8ea3acd6620e2b485c2c61966bdbd95ed

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4848851.exe

    Filesize

    860KB

    MD5

    bcf0e7d7997a27fc5df69bdb532eab59

    SHA1

    d6d59a3be690013ca87965c506291aab87b5e931

    SHA256

    e365c2fedcc98847a52ee229b30b444f9b492e95a2861e8bb8bfeee4d5720f59

    SHA512

    99e60337ccbe30e29c56192dacfd4b33f4b7e0a54d0c546d2ff2c11c5f320c5f3b61f18d9dc1242938150cd1b590dee8ea3acd6620e2b485c2c61966bdbd95ed

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4848851.exe

    Filesize

    860KB

    MD5

    bcf0e7d7997a27fc5df69bdb532eab59

    SHA1

    d6d59a3be690013ca87965c506291aab87b5e931

    SHA256

    e365c2fedcc98847a52ee229b30b444f9b492e95a2861e8bb8bfeee4d5720f59

    SHA512

    99e60337ccbe30e29c56192dacfd4b33f4b7e0a54d0c546d2ff2c11c5f320c5f3b61f18d9dc1242938150cd1b590dee8ea3acd6620e2b485c2c61966bdbd95ed

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4848851.exe

    Filesize

    860KB

    MD5

    bcf0e7d7997a27fc5df69bdb532eab59

    SHA1

    d6d59a3be690013ca87965c506291aab87b5e931

    SHA256

    e365c2fedcc98847a52ee229b30b444f9b492e95a2861e8bb8bfeee4d5720f59

    SHA512

    99e60337ccbe30e29c56192dacfd4b33f4b7e0a54d0c546d2ff2c11c5f320c5f3b61f18d9dc1242938150cd1b590dee8ea3acd6620e2b485c2c61966bdbd95ed

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4848851.exe

    Filesize

    860KB

    MD5

    bcf0e7d7997a27fc5df69bdb532eab59

    SHA1

    d6d59a3be690013ca87965c506291aab87b5e931

    SHA256

    e365c2fedcc98847a52ee229b30b444f9b492e95a2861e8bb8bfeee4d5720f59

    SHA512

    99e60337ccbe30e29c56192dacfd4b33f4b7e0a54d0c546d2ff2c11c5f320c5f3b61f18d9dc1242938150cd1b590dee8ea3acd6620e2b485c2c61966bdbd95ed

  • memory/2572-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2572-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2572-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2572-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2572-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2572-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2572-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2572-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB