Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 08:59 UTC

General

  • Target

    933042b1d18cf2fd6180cb827459e0aeb7f7596c774ae2572801bfe8033c95e5.exe

  • Size

    1.3MB

  • MD5

    808ed81032da2f79c4600e7cf53e5b0e

  • SHA1

    1b054a40fd35c68d8bdab16953b84266e1b13949

  • SHA256

    933042b1d18cf2fd6180cb827459e0aeb7f7596c774ae2572801bfe8033c95e5

  • SHA512

    bf4ac44b64bb42553eefbe1324759fd62ecd0bc201d968cf9334b00484ab501492419bcf5e2a69b89331db62c9de99b3cf5f0dc8b5b29bff6988190894b1820c

  • SSDEEP

    24576:YyBoQ43jY9FhejtVrOBQGByyiVReWMhNEHTCeonNvtz9FOcinIfcEFZ:f253c9FMvrOHKVsWK0zonNVzzOQfh

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\933042b1d18cf2fd6180cb827459e0aeb7f7596c774ae2572801bfe8033c95e5.exe
    "C:\Users\Admin\AppData\Local\Temp\933042b1d18cf2fd6180cb827459e0aeb7f7596c774ae2572801bfe8033c95e5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8846504.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8846504.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8994460.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8994460.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1600
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3490148.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3490148.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2280
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2492156.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2492156.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2100
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6877585.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6877585.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2268
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2672
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2696
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 280
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2604

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8846504.exe

      Filesize

      1.2MB

      MD5

      2177cc93fba38674e80fe9fec44e5324

      SHA1

      782ee08b42d670023038a4aaa3f0f01db824811a

      SHA256

      627e68cc165be5ce9badd58ed5d75dbeb2581b3900a867528c59402489344233

      SHA512

      8a5fcc4aa49e295f2fa48039785c209f64fa01419aea890f472ec64dacff56c236626fc33aacf7079d1ddbea6ede6b34d735f10ed9eb3aceeab6b357718dc09f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8846504.exe

      Filesize

      1.2MB

      MD5

      2177cc93fba38674e80fe9fec44e5324

      SHA1

      782ee08b42d670023038a4aaa3f0f01db824811a

      SHA256

      627e68cc165be5ce9badd58ed5d75dbeb2581b3900a867528c59402489344233

      SHA512

      8a5fcc4aa49e295f2fa48039785c209f64fa01419aea890f472ec64dacff56c236626fc33aacf7079d1ddbea6ede6b34d735f10ed9eb3aceeab6b357718dc09f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8994460.exe

      Filesize

      1.0MB

      MD5

      71bdef6ea272144ea08d66d3401212af

      SHA1

      f005c3098547d8f5876bea104da45461fa7fef4f

      SHA256

      c827498c498f8438c7c0897eef641570e1c220419bfe7fc10c53ebce9ddd49c7

      SHA512

      300ce31854bbc5995e0806ab274cbc2e34798a78c8bcd6e1a818015a7358b4ad40f7d9e24472d130e985de72be56aac6750af563111eeac4c29c3fcb42b6b074

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8994460.exe

      Filesize

      1.0MB

      MD5

      71bdef6ea272144ea08d66d3401212af

      SHA1

      f005c3098547d8f5876bea104da45461fa7fef4f

      SHA256

      c827498c498f8438c7c0897eef641570e1c220419bfe7fc10c53ebce9ddd49c7

      SHA512

      300ce31854bbc5995e0806ab274cbc2e34798a78c8bcd6e1a818015a7358b4ad40f7d9e24472d130e985de72be56aac6750af563111eeac4c29c3fcb42b6b074

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3490148.exe

      Filesize

      885KB

      MD5

      0bfd93c766ad4a87225c65b3287ae49a

      SHA1

      18a6d03870063dd7103d0ba936a1cba964590c74

      SHA256

      6df38546d3f3038888a70b6b8ada89a2f13964b2fc0dfe6664f4ccbb8ac41270

      SHA512

      8747e772a894b6eee94c16b6a56f9931e20c76ddfaaf1d6c56c69b62217c4f05f5628f3ff4fc38b43183495c2f7ae69ca9935737d6b20a3119daf0f9ba79c3b9

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3490148.exe

      Filesize

      885KB

      MD5

      0bfd93c766ad4a87225c65b3287ae49a

      SHA1

      18a6d03870063dd7103d0ba936a1cba964590c74

      SHA256

      6df38546d3f3038888a70b6b8ada89a2f13964b2fc0dfe6664f4ccbb8ac41270

      SHA512

      8747e772a894b6eee94c16b6a56f9931e20c76ddfaaf1d6c56c69b62217c4f05f5628f3ff4fc38b43183495c2f7ae69ca9935737d6b20a3119daf0f9ba79c3b9

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2492156.exe

      Filesize

      493KB

      MD5

      8c32ac6136ace5753eb685762ab954e2

      SHA1

      5a6c4ba6f2cabb7d7d79151443231321a68e950c

      SHA256

      f289fd54d2ab125e15e68374b60770a799d303443a4fa437e71034e245b592bb

      SHA512

      cb3700d50c20723619e653d3e14cf4ddf01ab3b9320652fb8958b0ccfa84322e95d9730ab40c45397e4681784771c9c81fb9841fd5d77ae059c903c630819f71

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2492156.exe

      Filesize

      493KB

      MD5

      8c32ac6136ace5753eb685762ab954e2

      SHA1

      5a6c4ba6f2cabb7d7d79151443231321a68e950c

      SHA256

      f289fd54d2ab125e15e68374b60770a799d303443a4fa437e71034e245b592bb

      SHA512

      cb3700d50c20723619e653d3e14cf4ddf01ab3b9320652fb8958b0ccfa84322e95d9730ab40c45397e4681784771c9c81fb9841fd5d77ae059c903c630819f71

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6877585.exe

      Filesize

      860KB

      MD5

      c68658e9a103011944a9e028bbc0c73a

      SHA1

      f66157e532f3ccf9366312e2d01d4c8f6ac5eeb7

      SHA256

      a5072e86c513259650849b9cf0e500a3c6960f555dec88b397a83d03de052b4e

      SHA512

      586a9dcbc9855884f71d733c10dd7c98b61acaf84d3826b614da1862d59db8da5351d0180b10d56948b7e5a978ad9bcd409c8a31639eff32ec8c0863cabd8d5e

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6877585.exe

      Filesize

      860KB

      MD5

      c68658e9a103011944a9e028bbc0c73a

      SHA1

      f66157e532f3ccf9366312e2d01d4c8f6ac5eeb7

      SHA256

      a5072e86c513259650849b9cf0e500a3c6960f555dec88b397a83d03de052b4e

      SHA512

      586a9dcbc9855884f71d733c10dd7c98b61acaf84d3826b614da1862d59db8da5351d0180b10d56948b7e5a978ad9bcd409c8a31639eff32ec8c0863cabd8d5e

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6877585.exe

      Filesize

      860KB

      MD5

      c68658e9a103011944a9e028bbc0c73a

      SHA1

      f66157e532f3ccf9366312e2d01d4c8f6ac5eeb7

      SHA256

      a5072e86c513259650849b9cf0e500a3c6960f555dec88b397a83d03de052b4e

      SHA512

      586a9dcbc9855884f71d733c10dd7c98b61acaf84d3826b614da1862d59db8da5351d0180b10d56948b7e5a978ad9bcd409c8a31639eff32ec8c0863cabd8d5e

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8846504.exe

      Filesize

      1.2MB

      MD5

      2177cc93fba38674e80fe9fec44e5324

      SHA1

      782ee08b42d670023038a4aaa3f0f01db824811a

      SHA256

      627e68cc165be5ce9badd58ed5d75dbeb2581b3900a867528c59402489344233

      SHA512

      8a5fcc4aa49e295f2fa48039785c209f64fa01419aea890f472ec64dacff56c236626fc33aacf7079d1ddbea6ede6b34d735f10ed9eb3aceeab6b357718dc09f

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8846504.exe

      Filesize

      1.2MB

      MD5

      2177cc93fba38674e80fe9fec44e5324

      SHA1

      782ee08b42d670023038a4aaa3f0f01db824811a

      SHA256

      627e68cc165be5ce9badd58ed5d75dbeb2581b3900a867528c59402489344233

      SHA512

      8a5fcc4aa49e295f2fa48039785c209f64fa01419aea890f472ec64dacff56c236626fc33aacf7079d1ddbea6ede6b34d735f10ed9eb3aceeab6b357718dc09f

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8994460.exe

      Filesize

      1.0MB

      MD5

      71bdef6ea272144ea08d66d3401212af

      SHA1

      f005c3098547d8f5876bea104da45461fa7fef4f

      SHA256

      c827498c498f8438c7c0897eef641570e1c220419bfe7fc10c53ebce9ddd49c7

      SHA512

      300ce31854bbc5995e0806ab274cbc2e34798a78c8bcd6e1a818015a7358b4ad40f7d9e24472d130e985de72be56aac6750af563111eeac4c29c3fcb42b6b074

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8994460.exe

      Filesize

      1.0MB

      MD5

      71bdef6ea272144ea08d66d3401212af

      SHA1

      f005c3098547d8f5876bea104da45461fa7fef4f

      SHA256

      c827498c498f8438c7c0897eef641570e1c220419bfe7fc10c53ebce9ddd49c7

      SHA512

      300ce31854bbc5995e0806ab274cbc2e34798a78c8bcd6e1a818015a7358b4ad40f7d9e24472d130e985de72be56aac6750af563111eeac4c29c3fcb42b6b074

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z3490148.exe

      Filesize

      885KB

      MD5

      0bfd93c766ad4a87225c65b3287ae49a

      SHA1

      18a6d03870063dd7103d0ba936a1cba964590c74

      SHA256

      6df38546d3f3038888a70b6b8ada89a2f13964b2fc0dfe6664f4ccbb8ac41270

      SHA512

      8747e772a894b6eee94c16b6a56f9931e20c76ddfaaf1d6c56c69b62217c4f05f5628f3ff4fc38b43183495c2f7ae69ca9935737d6b20a3119daf0f9ba79c3b9

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z3490148.exe

      Filesize

      885KB

      MD5

      0bfd93c766ad4a87225c65b3287ae49a

      SHA1

      18a6d03870063dd7103d0ba936a1cba964590c74

      SHA256

      6df38546d3f3038888a70b6b8ada89a2f13964b2fc0dfe6664f4ccbb8ac41270

      SHA512

      8747e772a894b6eee94c16b6a56f9931e20c76ddfaaf1d6c56c69b62217c4f05f5628f3ff4fc38b43183495c2f7ae69ca9935737d6b20a3119daf0f9ba79c3b9

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2492156.exe

      Filesize

      493KB

      MD5

      8c32ac6136ace5753eb685762ab954e2

      SHA1

      5a6c4ba6f2cabb7d7d79151443231321a68e950c

      SHA256

      f289fd54d2ab125e15e68374b60770a799d303443a4fa437e71034e245b592bb

      SHA512

      cb3700d50c20723619e653d3e14cf4ddf01ab3b9320652fb8958b0ccfa84322e95d9730ab40c45397e4681784771c9c81fb9841fd5d77ae059c903c630819f71

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2492156.exe

      Filesize

      493KB

      MD5

      8c32ac6136ace5753eb685762ab954e2

      SHA1

      5a6c4ba6f2cabb7d7d79151443231321a68e950c

      SHA256

      f289fd54d2ab125e15e68374b60770a799d303443a4fa437e71034e245b592bb

      SHA512

      cb3700d50c20723619e653d3e14cf4ddf01ab3b9320652fb8958b0ccfa84322e95d9730ab40c45397e4681784771c9c81fb9841fd5d77ae059c903c630819f71

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6877585.exe

      Filesize

      860KB

      MD5

      c68658e9a103011944a9e028bbc0c73a

      SHA1

      f66157e532f3ccf9366312e2d01d4c8f6ac5eeb7

      SHA256

      a5072e86c513259650849b9cf0e500a3c6960f555dec88b397a83d03de052b4e

      SHA512

      586a9dcbc9855884f71d733c10dd7c98b61acaf84d3826b614da1862d59db8da5351d0180b10d56948b7e5a978ad9bcd409c8a31639eff32ec8c0863cabd8d5e

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6877585.exe

      Filesize

      860KB

      MD5

      c68658e9a103011944a9e028bbc0c73a

      SHA1

      f66157e532f3ccf9366312e2d01d4c8f6ac5eeb7

      SHA256

      a5072e86c513259650849b9cf0e500a3c6960f555dec88b397a83d03de052b4e

      SHA512

      586a9dcbc9855884f71d733c10dd7c98b61acaf84d3826b614da1862d59db8da5351d0180b10d56948b7e5a978ad9bcd409c8a31639eff32ec8c0863cabd8d5e

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6877585.exe

      Filesize

      860KB

      MD5

      c68658e9a103011944a9e028bbc0c73a

      SHA1

      f66157e532f3ccf9366312e2d01d4c8f6ac5eeb7

      SHA256

      a5072e86c513259650849b9cf0e500a3c6960f555dec88b397a83d03de052b4e

      SHA512

      586a9dcbc9855884f71d733c10dd7c98b61acaf84d3826b614da1862d59db8da5351d0180b10d56948b7e5a978ad9bcd409c8a31639eff32ec8c0863cabd8d5e

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6877585.exe

      Filesize

      860KB

      MD5

      c68658e9a103011944a9e028bbc0c73a

      SHA1

      f66157e532f3ccf9366312e2d01d4c8f6ac5eeb7

      SHA256

      a5072e86c513259650849b9cf0e500a3c6960f555dec88b397a83d03de052b4e

      SHA512

      586a9dcbc9855884f71d733c10dd7c98b61acaf84d3826b614da1862d59db8da5351d0180b10d56948b7e5a978ad9bcd409c8a31639eff32ec8c0863cabd8d5e

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6877585.exe

      Filesize

      860KB

      MD5

      c68658e9a103011944a9e028bbc0c73a

      SHA1

      f66157e532f3ccf9366312e2d01d4c8f6ac5eeb7

      SHA256

      a5072e86c513259650849b9cf0e500a3c6960f555dec88b397a83d03de052b4e

      SHA512

      586a9dcbc9855884f71d733c10dd7c98b61acaf84d3826b614da1862d59db8da5351d0180b10d56948b7e5a978ad9bcd409c8a31639eff32ec8c0863cabd8d5e

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6877585.exe

      Filesize

      860KB

      MD5

      c68658e9a103011944a9e028bbc0c73a

      SHA1

      f66157e532f3ccf9366312e2d01d4c8f6ac5eeb7

      SHA256

      a5072e86c513259650849b9cf0e500a3c6960f555dec88b397a83d03de052b4e

      SHA512

      586a9dcbc9855884f71d733c10dd7c98b61acaf84d3826b614da1862d59db8da5351d0180b10d56948b7e5a978ad9bcd409c8a31639eff32ec8c0863cabd8d5e

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6877585.exe

      Filesize

      860KB

      MD5

      c68658e9a103011944a9e028bbc0c73a

      SHA1

      f66157e532f3ccf9366312e2d01d4c8f6ac5eeb7

      SHA256

      a5072e86c513259650849b9cf0e500a3c6960f555dec88b397a83d03de052b4e

      SHA512

      586a9dcbc9855884f71d733c10dd7c98b61acaf84d3826b614da1862d59db8da5351d0180b10d56948b7e5a978ad9bcd409c8a31639eff32ec8c0863cabd8d5e

    • memory/2696-61-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2696-62-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2696-66-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2696-64-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2696-59-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2696-57-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2696-55-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2696-53-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.