Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 09:21

General

  • Target

    cdfb958464687685aa20ef88be643ae77320411f1d5dc8b71abdd44959e90551.exe

  • Size

    1.0MB

  • MD5

    aafe88fe1b886a4691eee43eda1a52df

  • SHA1

    327a1c8e2be8d109578c223e6bfff0f28bee3923

  • SHA256

    cdfb958464687685aa20ef88be643ae77320411f1d5dc8b71abdd44959e90551

  • SHA512

    cac01f4697802e3c9960ad7ce6abfdd5213e8c07fadd2b4e42103f1f9c2849eb88e3ad91beb0ed592b4afc7e1229f45d9f1f3c58a0bad9e2dfd78caea6bc4e7e

  • SSDEEP

    24576:Xy4LmI0DR2a4XwbJgws0WaeIUK1WnWYxvKVmIGT:i4LmRNZzgwsXfp9xCG

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cdfb958464687685aa20ef88be643ae77320411f1d5dc8b71abdd44959e90551.exe
    "C:\Users\Admin\AppData\Local\Temp\cdfb958464687685aa20ef88be643ae77320411f1d5dc8b71abdd44959e90551.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4729538.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4729538.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0604571.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0604571.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7250140.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7250140.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2592
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7324248.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7324248.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2620
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6236654.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6236654.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2844
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2600
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4729538.exe

    Filesize

    960KB

    MD5

    6b16321a3e7d3c340cfddeab4cbc2fd1

    SHA1

    4076643383b36491d38ca4834dcf5bf31a623df0

    SHA256

    e58f28fa39943b0c92e474485565d082b19366ddb5999d06fa404fdc7025ac34

    SHA512

    08d5a8699cc4c9940d69336e86289d5ebb9c035aff7f0cf04fc927dc8f1f47ded92888db81c9b04d1a3b0fbe46931c3c1d361eeed0739f3f41ea21d86d4db442

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4729538.exe

    Filesize

    960KB

    MD5

    6b16321a3e7d3c340cfddeab4cbc2fd1

    SHA1

    4076643383b36491d38ca4834dcf5bf31a623df0

    SHA256

    e58f28fa39943b0c92e474485565d082b19366ddb5999d06fa404fdc7025ac34

    SHA512

    08d5a8699cc4c9940d69336e86289d5ebb9c035aff7f0cf04fc927dc8f1f47ded92888db81c9b04d1a3b0fbe46931c3c1d361eeed0739f3f41ea21d86d4db442

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0604571.exe

    Filesize

    778KB

    MD5

    2967c243e5fd1f19d5d26b1100a18a9d

    SHA1

    84ce8d85c7956b02ac954ed5905a6246b7647ce4

    SHA256

    591b967e54ce5537d1303cb1b6c20204cc3102f59522d6f70a4decf913f20081

    SHA512

    d7cd6bbdb3f7be793fdb388b5cdcc64a61f5ce890d0d343d708524ff774a550fd1ded81c702832988c5a7f487bb122f7905ecb90ab23d0a58472b9fb72c0f8e2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0604571.exe

    Filesize

    778KB

    MD5

    2967c243e5fd1f19d5d26b1100a18a9d

    SHA1

    84ce8d85c7956b02ac954ed5905a6246b7647ce4

    SHA256

    591b967e54ce5537d1303cb1b6c20204cc3102f59522d6f70a4decf913f20081

    SHA512

    d7cd6bbdb3f7be793fdb388b5cdcc64a61f5ce890d0d343d708524ff774a550fd1ded81c702832988c5a7f487bb122f7905ecb90ab23d0a58472b9fb72c0f8e2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7250140.exe

    Filesize

    595KB

    MD5

    09d97fffeb3c0750733680396c837b20

    SHA1

    cca6a4c0130c797087ae0248961cb422518f4c26

    SHA256

    b9b9f2b0cc1512b92fcc014dc564a9040d929ba0875d94e2841579664be4f14b

    SHA512

    b6326ab3eb8ab3e5299b507d76b23401f47ab05d5e4a833b07e24c4437b205920bb21ef6db1b1922719416a2e638ab2c155e956d36b65e297accb76de4d94744

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7250140.exe

    Filesize

    595KB

    MD5

    09d97fffeb3c0750733680396c837b20

    SHA1

    cca6a4c0130c797087ae0248961cb422518f4c26

    SHA256

    b9b9f2b0cc1512b92fcc014dc564a9040d929ba0875d94e2841579664be4f14b

    SHA512

    b6326ab3eb8ab3e5299b507d76b23401f47ab05d5e4a833b07e24c4437b205920bb21ef6db1b1922719416a2e638ab2c155e956d36b65e297accb76de4d94744

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7324248.exe

    Filesize

    334KB

    MD5

    05e9fbfe4c5d3f142acd8f2121b6eb01

    SHA1

    2abbc0be1c0c326687766a3664d3b946cb92a1b0

    SHA256

    820fea85e24f60416ad6bf0edd5c1572e5b97f5003b25238fb6eee916586393c

    SHA512

    fc94b054f2a1b756903f1fcb6e610db38c35f73f51aec1798a2f7ba5b3da5f1263ea693ca125d915c81510dfb44f38215b66665b125ef85dd0c417c5e0ec6683

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7324248.exe

    Filesize

    334KB

    MD5

    05e9fbfe4c5d3f142acd8f2121b6eb01

    SHA1

    2abbc0be1c0c326687766a3664d3b946cb92a1b0

    SHA256

    820fea85e24f60416ad6bf0edd5c1572e5b97f5003b25238fb6eee916586393c

    SHA512

    fc94b054f2a1b756903f1fcb6e610db38c35f73f51aec1798a2f7ba5b3da5f1263ea693ca125d915c81510dfb44f38215b66665b125ef85dd0c417c5e0ec6683

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6236654.exe

    Filesize

    221KB

    MD5

    2e89da5a794c92440685aa77fcd41321

    SHA1

    4475a9ead5a5e5bd0f9e4a590cc4355a79ec1f41

    SHA256

    e4925e99ecc4a8905e49da4bf6789cb383052e6dc62e0d97cc5831ef2aa11b20

    SHA512

    d13731b16f4f5b9c8773262d714374a8d9f58a509e31b83a57c554f1a53ec95b694d40292d56cdd29a98790c65d0fadb5970757706c9df79740a273fb7835bf1

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6236654.exe

    Filesize

    221KB

    MD5

    2e89da5a794c92440685aa77fcd41321

    SHA1

    4475a9ead5a5e5bd0f9e4a590cc4355a79ec1f41

    SHA256

    e4925e99ecc4a8905e49da4bf6789cb383052e6dc62e0d97cc5831ef2aa11b20

    SHA512

    d13731b16f4f5b9c8773262d714374a8d9f58a509e31b83a57c554f1a53ec95b694d40292d56cdd29a98790c65d0fadb5970757706c9df79740a273fb7835bf1

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6236654.exe

    Filesize

    221KB

    MD5

    2e89da5a794c92440685aa77fcd41321

    SHA1

    4475a9ead5a5e5bd0f9e4a590cc4355a79ec1f41

    SHA256

    e4925e99ecc4a8905e49da4bf6789cb383052e6dc62e0d97cc5831ef2aa11b20

    SHA512

    d13731b16f4f5b9c8773262d714374a8d9f58a509e31b83a57c554f1a53ec95b694d40292d56cdd29a98790c65d0fadb5970757706c9df79740a273fb7835bf1

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4729538.exe

    Filesize

    960KB

    MD5

    6b16321a3e7d3c340cfddeab4cbc2fd1

    SHA1

    4076643383b36491d38ca4834dcf5bf31a623df0

    SHA256

    e58f28fa39943b0c92e474485565d082b19366ddb5999d06fa404fdc7025ac34

    SHA512

    08d5a8699cc4c9940d69336e86289d5ebb9c035aff7f0cf04fc927dc8f1f47ded92888db81c9b04d1a3b0fbe46931c3c1d361eeed0739f3f41ea21d86d4db442

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4729538.exe

    Filesize

    960KB

    MD5

    6b16321a3e7d3c340cfddeab4cbc2fd1

    SHA1

    4076643383b36491d38ca4834dcf5bf31a623df0

    SHA256

    e58f28fa39943b0c92e474485565d082b19366ddb5999d06fa404fdc7025ac34

    SHA512

    08d5a8699cc4c9940d69336e86289d5ebb9c035aff7f0cf04fc927dc8f1f47ded92888db81c9b04d1a3b0fbe46931c3c1d361eeed0739f3f41ea21d86d4db442

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z0604571.exe

    Filesize

    778KB

    MD5

    2967c243e5fd1f19d5d26b1100a18a9d

    SHA1

    84ce8d85c7956b02ac954ed5905a6246b7647ce4

    SHA256

    591b967e54ce5537d1303cb1b6c20204cc3102f59522d6f70a4decf913f20081

    SHA512

    d7cd6bbdb3f7be793fdb388b5cdcc64a61f5ce890d0d343d708524ff774a550fd1ded81c702832988c5a7f487bb122f7905ecb90ab23d0a58472b9fb72c0f8e2

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z0604571.exe

    Filesize

    778KB

    MD5

    2967c243e5fd1f19d5d26b1100a18a9d

    SHA1

    84ce8d85c7956b02ac954ed5905a6246b7647ce4

    SHA256

    591b967e54ce5537d1303cb1b6c20204cc3102f59522d6f70a4decf913f20081

    SHA512

    d7cd6bbdb3f7be793fdb388b5cdcc64a61f5ce890d0d343d708524ff774a550fd1ded81c702832988c5a7f487bb122f7905ecb90ab23d0a58472b9fb72c0f8e2

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7250140.exe

    Filesize

    595KB

    MD5

    09d97fffeb3c0750733680396c837b20

    SHA1

    cca6a4c0130c797087ae0248961cb422518f4c26

    SHA256

    b9b9f2b0cc1512b92fcc014dc564a9040d929ba0875d94e2841579664be4f14b

    SHA512

    b6326ab3eb8ab3e5299b507d76b23401f47ab05d5e4a833b07e24c4437b205920bb21ef6db1b1922719416a2e638ab2c155e956d36b65e297accb76de4d94744

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7250140.exe

    Filesize

    595KB

    MD5

    09d97fffeb3c0750733680396c837b20

    SHA1

    cca6a4c0130c797087ae0248961cb422518f4c26

    SHA256

    b9b9f2b0cc1512b92fcc014dc564a9040d929ba0875d94e2841579664be4f14b

    SHA512

    b6326ab3eb8ab3e5299b507d76b23401f47ab05d5e4a833b07e24c4437b205920bb21ef6db1b1922719416a2e638ab2c155e956d36b65e297accb76de4d94744

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7324248.exe

    Filesize

    334KB

    MD5

    05e9fbfe4c5d3f142acd8f2121b6eb01

    SHA1

    2abbc0be1c0c326687766a3664d3b946cb92a1b0

    SHA256

    820fea85e24f60416ad6bf0edd5c1572e5b97f5003b25238fb6eee916586393c

    SHA512

    fc94b054f2a1b756903f1fcb6e610db38c35f73f51aec1798a2f7ba5b3da5f1263ea693ca125d915c81510dfb44f38215b66665b125ef85dd0c417c5e0ec6683

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7324248.exe

    Filesize

    334KB

    MD5

    05e9fbfe4c5d3f142acd8f2121b6eb01

    SHA1

    2abbc0be1c0c326687766a3664d3b946cb92a1b0

    SHA256

    820fea85e24f60416ad6bf0edd5c1572e5b97f5003b25238fb6eee916586393c

    SHA512

    fc94b054f2a1b756903f1fcb6e610db38c35f73f51aec1798a2f7ba5b3da5f1263ea693ca125d915c81510dfb44f38215b66665b125ef85dd0c417c5e0ec6683

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6236654.exe

    Filesize

    221KB

    MD5

    2e89da5a794c92440685aa77fcd41321

    SHA1

    4475a9ead5a5e5bd0f9e4a590cc4355a79ec1f41

    SHA256

    e4925e99ecc4a8905e49da4bf6789cb383052e6dc62e0d97cc5831ef2aa11b20

    SHA512

    d13731b16f4f5b9c8773262d714374a8d9f58a509e31b83a57c554f1a53ec95b694d40292d56cdd29a98790c65d0fadb5970757706c9df79740a273fb7835bf1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6236654.exe

    Filesize

    221KB

    MD5

    2e89da5a794c92440685aa77fcd41321

    SHA1

    4475a9ead5a5e5bd0f9e4a590cc4355a79ec1f41

    SHA256

    e4925e99ecc4a8905e49da4bf6789cb383052e6dc62e0d97cc5831ef2aa11b20

    SHA512

    d13731b16f4f5b9c8773262d714374a8d9f58a509e31b83a57c554f1a53ec95b694d40292d56cdd29a98790c65d0fadb5970757706c9df79740a273fb7835bf1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6236654.exe

    Filesize

    221KB

    MD5

    2e89da5a794c92440685aa77fcd41321

    SHA1

    4475a9ead5a5e5bd0f9e4a590cc4355a79ec1f41

    SHA256

    e4925e99ecc4a8905e49da4bf6789cb383052e6dc62e0d97cc5831ef2aa11b20

    SHA512

    d13731b16f4f5b9c8773262d714374a8d9f58a509e31b83a57c554f1a53ec95b694d40292d56cdd29a98790c65d0fadb5970757706c9df79740a273fb7835bf1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6236654.exe

    Filesize

    221KB

    MD5

    2e89da5a794c92440685aa77fcd41321

    SHA1

    4475a9ead5a5e5bd0f9e4a590cc4355a79ec1f41

    SHA256

    e4925e99ecc4a8905e49da4bf6789cb383052e6dc62e0d97cc5831ef2aa11b20

    SHA512

    d13731b16f4f5b9c8773262d714374a8d9f58a509e31b83a57c554f1a53ec95b694d40292d56cdd29a98790c65d0fadb5970757706c9df79740a273fb7835bf1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6236654.exe

    Filesize

    221KB

    MD5

    2e89da5a794c92440685aa77fcd41321

    SHA1

    4475a9ead5a5e5bd0f9e4a590cc4355a79ec1f41

    SHA256

    e4925e99ecc4a8905e49da4bf6789cb383052e6dc62e0d97cc5831ef2aa11b20

    SHA512

    d13731b16f4f5b9c8773262d714374a8d9f58a509e31b83a57c554f1a53ec95b694d40292d56cdd29a98790c65d0fadb5970757706c9df79740a273fb7835bf1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6236654.exe

    Filesize

    221KB

    MD5

    2e89da5a794c92440685aa77fcd41321

    SHA1

    4475a9ead5a5e5bd0f9e4a590cc4355a79ec1f41

    SHA256

    e4925e99ecc4a8905e49da4bf6789cb383052e6dc62e0d97cc5831ef2aa11b20

    SHA512

    d13731b16f4f5b9c8773262d714374a8d9f58a509e31b83a57c554f1a53ec95b694d40292d56cdd29a98790c65d0fadb5970757706c9df79740a273fb7835bf1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6236654.exe

    Filesize

    221KB

    MD5

    2e89da5a794c92440685aa77fcd41321

    SHA1

    4475a9ead5a5e5bd0f9e4a590cc4355a79ec1f41

    SHA256

    e4925e99ecc4a8905e49da4bf6789cb383052e6dc62e0d97cc5831ef2aa11b20

    SHA512

    d13731b16f4f5b9c8773262d714374a8d9f58a509e31b83a57c554f1a53ec95b694d40292d56cdd29a98790c65d0fadb5970757706c9df79740a273fb7835bf1

  • memory/2600-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2600-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2600-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2600-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2600-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2600-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2600-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2600-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB