Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 09:34

General

  • Target

    34da6ece2c9a97d6c2e647d1f330946f774f33a73d0fc7d6b81de64f2c73ece7.exe

  • Size

    1.0MB

  • MD5

    2500cc1ac24011d637e0c48d4cb04f78

  • SHA1

    541793e81d062bbfe9c72d910f43fd91679c7f4c

  • SHA256

    34da6ece2c9a97d6c2e647d1f330946f774f33a73d0fc7d6b81de64f2c73ece7

  • SHA512

    6c62275782d6a1839b60ee38907f5f172c1e648adba2f58f6738095b4b0310dfab42ffdbb5891d047739162d08ba10caffbca98ae9961256e341dd617cc66292

  • SSDEEP

    24576:eywvGgQm9uKYg40JfNz8ZOUPyL4aLxoOfEFR:twWbpd0JfNgZbPeLxi

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34da6ece2c9a97d6c2e647d1f330946f774f33a73d0fc7d6b81de64f2c73ece7.exe
    "C:\Users\Admin\AppData\Local\Temp\34da6ece2c9a97d6c2e647d1f330946f774f33a73d0fc7d6b81de64f2c73ece7.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1871349.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1871349.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6326565.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6326565.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2092
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7372573.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7372573.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3060
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2190626.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2190626.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2652
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7561540.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7561540.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2968
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2776
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1871349.exe

    Filesize

    961KB

    MD5

    fd19f92920461fffb462252d98db3e82

    SHA1

    82cf0755dc86b0875ccf59d344dc4bf86e249aa5

    SHA256

    22396d0b1810a8a908951d5c93c311f7ac5c91ea2bee05b7e55753049170888d

    SHA512

    cacf57af8d7b664da95837f8142f674c243c18c9345650698eeb7b4011a7bc3d1923b5e92c8acafa30407ac850b59aae884f0a55575d5796b15707d719ee1bb9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1871349.exe

    Filesize

    961KB

    MD5

    fd19f92920461fffb462252d98db3e82

    SHA1

    82cf0755dc86b0875ccf59d344dc4bf86e249aa5

    SHA256

    22396d0b1810a8a908951d5c93c311f7ac5c91ea2bee05b7e55753049170888d

    SHA512

    cacf57af8d7b664da95837f8142f674c243c18c9345650698eeb7b4011a7bc3d1923b5e92c8acafa30407ac850b59aae884f0a55575d5796b15707d719ee1bb9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6326565.exe

    Filesize

    778KB

    MD5

    80f35325252d4b02fef3c0ba2548c0da

    SHA1

    9402eede340a1c659a33b360d77f60245252934e

    SHA256

    6e07b28b83bfffce99d0101f2d10b2860839271dfa1388413ba93aaffa48065a

    SHA512

    adf14c25447e92c8381b515e54537f7aa7b4b784233a73d14493a5465628709b4869f1d6783238745704b29cfb4e4dcf5e4866e4623991260c6d76f304441587

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6326565.exe

    Filesize

    778KB

    MD5

    80f35325252d4b02fef3c0ba2548c0da

    SHA1

    9402eede340a1c659a33b360d77f60245252934e

    SHA256

    6e07b28b83bfffce99d0101f2d10b2860839271dfa1388413ba93aaffa48065a

    SHA512

    adf14c25447e92c8381b515e54537f7aa7b4b784233a73d14493a5465628709b4869f1d6783238745704b29cfb4e4dcf5e4866e4623991260c6d76f304441587

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7372573.exe

    Filesize

    595KB

    MD5

    7e635b5b9dc2250c31150031fa3c307b

    SHA1

    e05dff9872a5ef02c11805b2fe833c6579285229

    SHA256

    aef20fc804e7ac24e20eaed1c93e17791663a5255b48cee128f68686b9c6b8a3

    SHA512

    143a7913ab5e5167290410dddfdcf5391c233f2d18dafb244cdcd31ebd90e2955138da568f7027e325271d6ccb1946b95b230663b0165f2fabc1f5b9f2c81cbb

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7372573.exe

    Filesize

    595KB

    MD5

    7e635b5b9dc2250c31150031fa3c307b

    SHA1

    e05dff9872a5ef02c11805b2fe833c6579285229

    SHA256

    aef20fc804e7ac24e20eaed1c93e17791663a5255b48cee128f68686b9c6b8a3

    SHA512

    143a7913ab5e5167290410dddfdcf5391c233f2d18dafb244cdcd31ebd90e2955138da568f7027e325271d6ccb1946b95b230663b0165f2fabc1f5b9f2c81cbb

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2190626.exe

    Filesize

    334KB

    MD5

    481034cefe958c638c0027d83779b3b3

    SHA1

    39f5740e7d459ac9bb86c610d9292100a298471c

    SHA256

    73486204b06ea4495e702971c004581c05e57c7857b52610dff89c261e03aefb

    SHA512

    f5793186496763368155ad9aa3ae1ce8f4b801deab742262feac31fb43a04b1c3d8ca9842a60d797c24ae88046ba00ce852ab2d343958e02aba0e08aa9f310e0

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2190626.exe

    Filesize

    334KB

    MD5

    481034cefe958c638c0027d83779b3b3

    SHA1

    39f5740e7d459ac9bb86c610d9292100a298471c

    SHA256

    73486204b06ea4495e702971c004581c05e57c7857b52610dff89c261e03aefb

    SHA512

    f5793186496763368155ad9aa3ae1ce8f4b801deab742262feac31fb43a04b1c3d8ca9842a60d797c24ae88046ba00ce852ab2d343958e02aba0e08aa9f310e0

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7561540.exe

    Filesize

    221KB

    MD5

    b4724fd46cde84f3e1a1ab38f5ef9d0e

    SHA1

    c90a2d707c88b05e10968481c5d90a42ca838928

    SHA256

    74892e50063a00f4e09536f6485eabe1b1fba652d38ce9e3daf9684fb2d5d27b

    SHA512

    894ae77ced03a2e8728117c0c552521c5f1dc82a0c1406376d02236c9ea385d536ef0833b09f3a006bcf545f1526d38aed24cb75fbef37f997db359ff00d40fb

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7561540.exe

    Filesize

    221KB

    MD5

    b4724fd46cde84f3e1a1ab38f5ef9d0e

    SHA1

    c90a2d707c88b05e10968481c5d90a42ca838928

    SHA256

    74892e50063a00f4e09536f6485eabe1b1fba652d38ce9e3daf9684fb2d5d27b

    SHA512

    894ae77ced03a2e8728117c0c552521c5f1dc82a0c1406376d02236c9ea385d536ef0833b09f3a006bcf545f1526d38aed24cb75fbef37f997db359ff00d40fb

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7561540.exe

    Filesize

    221KB

    MD5

    b4724fd46cde84f3e1a1ab38f5ef9d0e

    SHA1

    c90a2d707c88b05e10968481c5d90a42ca838928

    SHA256

    74892e50063a00f4e09536f6485eabe1b1fba652d38ce9e3daf9684fb2d5d27b

    SHA512

    894ae77ced03a2e8728117c0c552521c5f1dc82a0c1406376d02236c9ea385d536ef0833b09f3a006bcf545f1526d38aed24cb75fbef37f997db359ff00d40fb

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1871349.exe

    Filesize

    961KB

    MD5

    fd19f92920461fffb462252d98db3e82

    SHA1

    82cf0755dc86b0875ccf59d344dc4bf86e249aa5

    SHA256

    22396d0b1810a8a908951d5c93c311f7ac5c91ea2bee05b7e55753049170888d

    SHA512

    cacf57af8d7b664da95837f8142f674c243c18c9345650698eeb7b4011a7bc3d1923b5e92c8acafa30407ac850b59aae884f0a55575d5796b15707d719ee1bb9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1871349.exe

    Filesize

    961KB

    MD5

    fd19f92920461fffb462252d98db3e82

    SHA1

    82cf0755dc86b0875ccf59d344dc4bf86e249aa5

    SHA256

    22396d0b1810a8a908951d5c93c311f7ac5c91ea2bee05b7e55753049170888d

    SHA512

    cacf57af8d7b664da95837f8142f674c243c18c9345650698eeb7b4011a7bc3d1923b5e92c8acafa30407ac850b59aae884f0a55575d5796b15707d719ee1bb9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6326565.exe

    Filesize

    778KB

    MD5

    80f35325252d4b02fef3c0ba2548c0da

    SHA1

    9402eede340a1c659a33b360d77f60245252934e

    SHA256

    6e07b28b83bfffce99d0101f2d10b2860839271dfa1388413ba93aaffa48065a

    SHA512

    adf14c25447e92c8381b515e54537f7aa7b4b784233a73d14493a5465628709b4869f1d6783238745704b29cfb4e4dcf5e4866e4623991260c6d76f304441587

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6326565.exe

    Filesize

    778KB

    MD5

    80f35325252d4b02fef3c0ba2548c0da

    SHA1

    9402eede340a1c659a33b360d77f60245252934e

    SHA256

    6e07b28b83bfffce99d0101f2d10b2860839271dfa1388413ba93aaffa48065a

    SHA512

    adf14c25447e92c8381b515e54537f7aa7b4b784233a73d14493a5465628709b4869f1d6783238745704b29cfb4e4dcf5e4866e4623991260c6d76f304441587

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7372573.exe

    Filesize

    595KB

    MD5

    7e635b5b9dc2250c31150031fa3c307b

    SHA1

    e05dff9872a5ef02c11805b2fe833c6579285229

    SHA256

    aef20fc804e7ac24e20eaed1c93e17791663a5255b48cee128f68686b9c6b8a3

    SHA512

    143a7913ab5e5167290410dddfdcf5391c233f2d18dafb244cdcd31ebd90e2955138da568f7027e325271d6ccb1946b95b230663b0165f2fabc1f5b9f2c81cbb

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7372573.exe

    Filesize

    595KB

    MD5

    7e635b5b9dc2250c31150031fa3c307b

    SHA1

    e05dff9872a5ef02c11805b2fe833c6579285229

    SHA256

    aef20fc804e7ac24e20eaed1c93e17791663a5255b48cee128f68686b9c6b8a3

    SHA512

    143a7913ab5e5167290410dddfdcf5391c233f2d18dafb244cdcd31ebd90e2955138da568f7027e325271d6ccb1946b95b230663b0165f2fabc1f5b9f2c81cbb

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2190626.exe

    Filesize

    334KB

    MD5

    481034cefe958c638c0027d83779b3b3

    SHA1

    39f5740e7d459ac9bb86c610d9292100a298471c

    SHA256

    73486204b06ea4495e702971c004581c05e57c7857b52610dff89c261e03aefb

    SHA512

    f5793186496763368155ad9aa3ae1ce8f4b801deab742262feac31fb43a04b1c3d8ca9842a60d797c24ae88046ba00ce852ab2d343958e02aba0e08aa9f310e0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2190626.exe

    Filesize

    334KB

    MD5

    481034cefe958c638c0027d83779b3b3

    SHA1

    39f5740e7d459ac9bb86c610d9292100a298471c

    SHA256

    73486204b06ea4495e702971c004581c05e57c7857b52610dff89c261e03aefb

    SHA512

    f5793186496763368155ad9aa3ae1ce8f4b801deab742262feac31fb43a04b1c3d8ca9842a60d797c24ae88046ba00ce852ab2d343958e02aba0e08aa9f310e0

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7561540.exe

    Filesize

    221KB

    MD5

    b4724fd46cde84f3e1a1ab38f5ef9d0e

    SHA1

    c90a2d707c88b05e10968481c5d90a42ca838928

    SHA256

    74892e50063a00f4e09536f6485eabe1b1fba652d38ce9e3daf9684fb2d5d27b

    SHA512

    894ae77ced03a2e8728117c0c552521c5f1dc82a0c1406376d02236c9ea385d536ef0833b09f3a006bcf545f1526d38aed24cb75fbef37f997db359ff00d40fb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7561540.exe

    Filesize

    221KB

    MD5

    b4724fd46cde84f3e1a1ab38f5ef9d0e

    SHA1

    c90a2d707c88b05e10968481c5d90a42ca838928

    SHA256

    74892e50063a00f4e09536f6485eabe1b1fba652d38ce9e3daf9684fb2d5d27b

    SHA512

    894ae77ced03a2e8728117c0c552521c5f1dc82a0c1406376d02236c9ea385d536ef0833b09f3a006bcf545f1526d38aed24cb75fbef37f997db359ff00d40fb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7561540.exe

    Filesize

    221KB

    MD5

    b4724fd46cde84f3e1a1ab38f5ef9d0e

    SHA1

    c90a2d707c88b05e10968481c5d90a42ca838928

    SHA256

    74892e50063a00f4e09536f6485eabe1b1fba652d38ce9e3daf9684fb2d5d27b

    SHA512

    894ae77ced03a2e8728117c0c552521c5f1dc82a0c1406376d02236c9ea385d536ef0833b09f3a006bcf545f1526d38aed24cb75fbef37f997db359ff00d40fb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7561540.exe

    Filesize

    221KB

    MD5

    b4724fd46cde84f3e1a1ab38f5ef9d0e

    SHA1

    c90a2d707c88b05e10968481c5d90a42ca838928

    SHA256

    74892e50063a00f4e09536f6485eabe1b1fba652d38ce9e3daf9684fb2d5d27b

    SHA512

    894ae77ced03a2e8728117c0c552521c5f1dc82a0c1406376d02236c9ea385d536ef0833b09f3a006bcf545f1526d38aed24cb75fbef37f997db359ff00d40fb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7561540.exe

    Filesize

    221KB

    MD5

    b4724fd46cde84f3e1a1ab38f5ef9d0e

    SHA1

    c90a2d707c88b05e10968481c5d90a42ca838928

    SHA256

    74892e50063a00f4e09536f6485eabe1b1fba652d38ce9e3daf9684fb2d5d27b

    SHA512

    894ae77ced03a2e8728117c0c552521c5f1dc82a0c1406376d02236c9ea385d536ef0833b09f3a006bcf545f1526d38aed24cb75fbef37f997db359ff00d40fb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7561540.exe

    Filesize

    221KB

    MD5

    b4724fd46cde84f3e1a1ab38f5ef9d0e

    SHA1

    c90a2d707c88b05e10968481c5d90a42ca838928

    SHA256

    74892e50063a00f4e09536f6485eabe1b1fba652d38ce9e3daf9684fb2d5d27b

    SHA512

    894ae77ced03a2e8728117c0c552521c5f1dc82a0c1406376d02236c9ea385d536ef0833b09f3a006bcf545f1526d38aed24cb75fbef37f997db359ff00d40fb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7561540.exe

    Filesize

    221KB

    MD5

    b4724fd46cde84f3e1a1ab38f5ef9d0e

    SHA1

    c90a2d707c88b05e10968481c5d90a42ca838928

    SHA256

    74892e50063a00f4e09536f6485eabe1b1fba652d38ce9e3daf9684fb2d5d27b

    SHA512

    894ae77ced03a2e8728117c0c552521c5f1dc82a0c1406376d02236c9ea385d536ef0833b09f3a006bcf545f1526d38aed24cb75fbef37f997db359ff00d40fb

  • memory/2776-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2776-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2776-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2776-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2776-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2776-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2776-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2776-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB