Analysis

  • max time kernel
    119s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 09:38

General

  • Target

    d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9.exe

  • Size

    1.0MB

  • MD5

    db8acd5be8a7c44b2ba095f8b7a0e4ca

  • SHA1

    c76e2e44da677d0125552be5854446a38245783a

  • SHA256

    d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9

  • SHA512

    417bee2b74914c8e304254ec7b346a18e8d053a6ca834378b32e380531d48373de4c31377855318574bc84bf763a8aba58c3b18113d42358390936110f839f36

  • SSDEEP

    24576:4yx+FdLEae5sGpHBqDB57wt/TEKt4xi2xaF+yP:/gFdwae5sGHg7wTvOximaF

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9.exe
    "C:\Users\Admin\AppData\Local\Temp\d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8108492.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8108492.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6831366.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6831366.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2820256.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2820256.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1352
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8902725.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8902725.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2724
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6092041.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6092041.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2644
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2756
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8108492.exe

    Filesize

    960KB

    MD5

    5aed6e76df3b8c8724ca52ca0ef9372b

    SHA1

    dcfbf75722b99b03bd3a60b0aadc9391aba7d9af

    SHA256

    5419554d340a1b2df52f89e37e4cfd92f5e59c14f1949fd154a9b16146032a0f

    SHA512

    951174df311c7ed4e90e17869bb842313d08ee9c580f4c58357f7c2f81bf687343f2416f468702113ce511c9ccefd7c2d500fec1cb31c106e1dea9b4d1ca0a68

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8108492.exe

    Filesize

    960KB

    MD5

    5aed6e76df3b8c8724ca52ca0ef9372b

    SHA1

    dcfbf75722b99b03bd3a60b0aadc9391aba7d9af

    SHA256

    5419554d340a1b2df52f89e37e4cfd92f5e59c14f1949fd154a9b16146032a0f

    SHA512

    951174df311c7ed4e90e17869bb842313d08ee9c580f4c58357f7c2f81bf687343f2416f468702113ce511c9ccefd7c2d500fec1cb31c106e1dea9b4d1ca0a68

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6831366.exe

    Filesize

    777KB

    MD5

    18a563479c3595a2a1ae02df067a4411

    SHA1

    1a7f67b6c0c9c471c2de5da303fda3166baa19b0

    SHA256

    a0641977850bce2869e40eaec4805e2a44c360b154bde92fef6579acff275874

    SHA512

    1ec953e7f7194aedb8634ac6b6ce11608b37f6fe21757830bc03c2010f19c3cf4a5caef4423d393d897e6a24e50e378082b951a7597754e17a0f12aee752f899

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6831366.exe

    Filesize

    777KB

    MD5

    18a563479c3595a2a1ae02df067a4411

    SHA1

    1a7f67b6c0c9c471c2de5da303fda3166baa19b0

    SHA256

    a0641977850bce2869e40eaec4805e2a44c360b154bde92fef6579acff275874

    SHA512

    1ec953e7f7194aedb8634ac6b6ce11608b37f6fe21757830bc03c2010f19c3cf4a5caef4423d393d897e6a24e50e378082b951a7597754e17a0f12aee752f899

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2820256.exe

    Filesize

    595KB

    MD5

    095a1656d85be124deea780c6a2b7e84

    SHA1

    31da21614f669180d1084eb71ca971d24d01acc3

    SHA256

    0c994c799a53e461cbc0ffe0ca338c55cf3c26897a2b61f5093949ec19bb9655

    SHA512

    9bfd221d5e25c0c9c5084e3cf9b6589936f03d149ead179a30b3ecf6dd3131bedd7180295d58ecc6b4a7961edf578d1517846012a67e05966a70c070e18f0007

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2820256.exe

    Filesize

    595KB

    MD5

    095a1656d85be124deea780c6a2b7e84

    SHA1

    31da21614f669180d1084eb71ca971d24d01acc3

    SHA256

    0c994c799a53e461cbc0ffe0ca338c55cf3c26897a2b61f5093949ec19bb9655

    SHA512

    9bfd221d5e25c0c9c5084e3cf9b6589936f03d149ead179a30b3ecf6dd3131bedd7180295d58ecc6b4a7961edf578d1517846012a67e05966a70c070e18f0007

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8902725.exe

    Filesize

    334KB

    MD5

    858b235e76cd4210afc589742eb85509

    SHA1

    0727c7972d6b15b1260b10a60885bf4486b28252

    SHA256

    fc23a35ccd39cc68870eeb70eac2a224fbb2a0551aaeeed98c8575315d3d8ff8

    SHA512

    8850dcee419d7abe2980cbfceaa43310de5bd64c5879c25e5965a081ec08a2af6abf98b36269016205e0f189fcc6ff1e27d029556f6b4a6363903ae099887603

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8902725.exe

    Filesize

    334KB

    MD5

    858b235e76cd4210afc589742eb85509

    SHA1

    0727c7972d6b15b1260b10a60885bf4486b28252

    SHA256

    fc23a35ccd39cc68870eeb70eac2a224fbb2a0551aaeeed98c8575315d3d8ff8

    SHA512

    8850dcee419d7abe2980cbfceaa43310de5bd64c5879c25e5965a081ec08a2af6abf98b36269016205e0f189fcc6ff1e27d029556f6b4a6363903ae099887603

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6092041.exe

    Filesize

    221KB

    MD5

    d494f34caf7041adfafbc850166ed57b

    SHA1

    06f2b2ff69e7b0b8ceeed3ebbd4232746d80da3d

    SHA256

    f6e004d875fbd14f8d1456f09dc81d796f0e6a5f3baacf8c76a47e23829f58ac

    SHA512

    77067d4908f0a109244e015113b156af45a5d204779d8284ce079ee6a20e1b1191953d5f78c555e64a254dba6c5686248d55cef4e093000fac7a0d2fb28fb548

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6092041.exe

    Filesize

    221KB

    MD5

    d494f34caf7041adfafbc850166ed57b

    SHA1

    06f2b2ff69e7b0b8ceeed3ebbd4232746d80da3d

    SHA256

    f6e004d875fbd14f8d1456f09dc81d796f0e6a5f3baacf8c76a47e23829f58ac

    SHA512

    77067d4908f0a109244e015113b156af45a5d204779d8284ce079ee6a20e1b1191953d5f78c555e64a254dba6c5686248d55cef4e093000fac7a0d2fb28fb548

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6092041.exe

    Filesize

    221KB

    MD5

    d494f34caf7041adfafbc850166ed57b

    SHA1

    06f2b2ff69e7b0b8ceeed3ebbd4232746d80da3d

    SHA256

    f6e004d875fbd14f8d1456f09dc81d796f0e6a5f3baacf8c76a47e23829f58ac

    SHA512

    77067d4908f0a109244e015113b156af45a5d204779d8284ce079ee6a20e1b1191953d5f78c555e64a254dba6c5686248d55cef4e093000fac7a0d2fb28fb548

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8108492.exe

    Filesize

    960KB

    MD5

    5aed6e76df3b8c8724ca52ca0ef9372b

    SHA1

    dcfbf75722b99b03bd3a60b0aadc9391aba7d9af

    SHA256

    5419554d340a1b2df52f89e37e4cfd92f5e59c14f1949fd154a9b16146032a0f

    SHA512

    951174df311c7ed4e90e17869bb842313d08ee9c580f4c58357f7c2f81bf687343f2416f468702113ce511c9ccefd7c2d500fec1cb31c106e1dea9b4d1ca0a68

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8108492.exe

    Filesize

    960KB

    MD5

    5aed6e76df3b8c8724ca52ca0ef9372b

    SHA1

    dcfbf75722b99b03bd3a60b0aadc9391aba7d9af

    SHA256

    5419554d340a1b2df52f89e37e4cfd92f5e59c14f1949fd154a9b16146032a0f

    SHA512

    951174df311c7ed4e90e17869bb842313d08ee9c580f4c58357f7c2f81bf687343f2416f468702113ce511c9ccefd7c2d500fec1cb31c106e1dea9b4d1ca0a68

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6831366.exe

    Filesize

    777KB

    MD5

    18a563479c3595a2a1ae02df067a4411

    SHA1

    1a7f67b6c0c9c471c2de5da303fda3166baa19b0

    SHA256

    a0641977850bce2869e40eaec4805e2a44c360b154bde92fef6579acff275874

    SHA512

    1ec953e7f7194aedb8634ac6b6ce11608b37f6fe21757830bc03c2010f19c3cf4a5caef4423d393d897e6a24e50e378082b951a7597754e17a0f12aee752f899

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6831366.exe

    Filesize

    777KB

    MD5

    18a563479c3595a2a1ae02df067a4411

    SHA1

    1a7f67b6c0c9c471c2de5da303fda3166baa19b0

    SHA256

    a0641977850bce2869e40eaec4805e2a44c360b154bde92fef6579acff275874

    SHA512

    1ec953e7f7194aedb8634ac6b6ce11608b37f6fe21757830bc03c2010f19c3cf4a5caef4423d393d897e6a24e50e378082b951a7597754e17a0f12aee752f899

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2820256.exe

    Filesize

    595KB

    MD5

    095a1656d85be124deea780c6a2b7e84

    SHA1

    31da21614f669180d1084eb71ca971d24d01acc3

    SHA256

    0c994c799a53e461cbc0ffe0ca338c55cf3c26897a2b61f5093949ec19bb9655

    SHA512

    9bfd221d5e25c0c9c5084e3cf9b6589936f03d149ead179a30b3ecf6dd3131bedd7180295d58ecc6b4a7961edf578d1517846012a67e05966a70c070e18f0007

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2820256.exe

    Filesize

    595KB

    MD5

    095a1656d85be124deea780c6a2b7e84

    SHA1

    31da21614f669180d1084eb71ca971d24d01acc3

    SHA256

    0c994c799a53e461cbc0ffe0ca338c55cf3c26897a2b61f5093949ec19bb9655

    SHA512

    9bfd221d5e25c0c9c5084e3cf9b6589936f03d149ead179a30b3ecf6dd3131bedd7180295d58ecc6b4a7961edf578d1517846012a67e05966a70c070e18f0007

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8902725.exe

    Filesize

    334KB

    MD5

    858b235e76cd4210afc589742eb85509

    SHA1

    0727c7972d6b15b1260b10a60885bf4486b28252

    SHA256

    fc23a35ccd39cc68870eeb70eac2a224fbb2a0551aaeeed98c8575315d3d8ff8

    SHA512

    8850dcee419d7abe2980cbfceaa43310de5bd64c5879c25e5965a081ec08a2af6abf98b36269016205e0f189fcc6ff1e27d029556f6b4a6363903ae099887603

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8902725.exe

    Filesize

    334KB

    MD5

    858b235e76cd4210afc589742eb85509

    SHA1

    0727c7972d6b15b1260b10a60885bf4486b28252

    SHA256

    fc23a35ccd39cc68870eeb70eac2a224fbb2a0551aaeeed98c8575315d3d8ff8

    SHA512

    8850dcee419d7abe2980cbfceaa43310de5bd64c5879c25e5965a081ec08a2af6abf98b36269016205e0f189fcc6ff1e27d029556f6b4a6363903ae099887603

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6092041.exe

    Filesize

    221KB

    MD5

    d494f34caf7041adfafbc850166ed57b

    SHA1

    06f2b2ff69e7b0b8ceeed3ebbd4232746d80da3d

    SHA256

    f6e004d875fbd14f8d1456f09dc81d796f0e6a5f3baacf8c76a47e23829f58ac

    SHA512

    77067d4908f0a109244e015113b156af45a5d204779d8284ce079ee6a20e1b1191953d5f78c555e64a254dba6c5686248d55cef4e093000fac7a0d2fb28fb548

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6092041.exe

    Filesize

    221KB

    MD5

    d494f34caf7041adfafbc850166ed57b

    SHA1

    06f2b2ff69e7b0b8ceeed3ebbd4232746d80da3d

    SHA256

    f6e004d875fbd14f8d1456f09dc81d796f0e6a5f3baacf8c76a47e23829f58ac

    SHA512

    77067d4908f0a109244e015113b156af45a5d204779d8284ce079ee6a20e1b1191953d5f78c555e64a254dba6c5686248d55cef4e093000fac7a0d2fb28fb548

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6092041.exe

    Filesize

    221KB

    MD5

    d494f34caf7041adfafbc850166ed57b

    SHA1

    06f2b2ff69e7b0b8ceeed3ebbd4232746d80da3d

    SHA256

    f6e004d875fbd14f8d1456f09dc81d796f0e6a5f3baacf8c76a47e23829f58ac

    SHA512

    77067d4908f0a109244e015113b156af45a5d204779d8284ce079ee6a20e1b1191953d5f78c555e64a254dba6c5686248d55cef4e093000fac7a0d2fb28fb548

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6092041.exe

    Filesize

    221KB

    MD5

    d494f34caf7041adfafbc850166ed57b

    SHA1

    06f2b2ff69e7b0b8ceeed3ebbd4232746d80da3d

    SHA256

    f6e004d875fbd14f8d1456f09dc81d796f0e6a5f3baacf8c76a47e23829f58ac

    SHA512

    77067d4908f0a109244e015113b156af45a5d204779d8284ce079ee6a20e1b1191953d5f78c555e64a254dba6c5686248d55cef4e093000fac7a0d2fb28fb548

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6092041.exe

    Filesize

    221KB

    MD5

    d494f34caf7041adfafbc850166ed57b

    SHA1

    06f2b2ff69e7b0b8ceeed3ebbd4232746d80da3d

    SHA256

    f6e004d875fbd14f8d1456f09dc81d796f0e6a5f3baacf8c76a47e23829f58ac

    SHA512

    77067d4908f0a109244e015113b156af45a5d204779d8284ce079ee6a20e1b1191953d5f78c555e64a254dba6c5686248d55cef4e093000fac7a0d2fb28fb548

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6092041.exe

    Filesize

    221KB

    MD5

    d494f34caf7041adfafbc850166ed57b

    SHA1

    06f2b2ff69e7b0b8ceeed3ebbd4232746d80da3d

    SHA256

    f6e004d875fbd14f8d1456f09dc81d796f0e6a5f3baacf8c76a47e23829f58ac

    SHA512

    77067d4908f0a109244e015113b156af45a5d204779d8284ce079ee6a20e1b1191953d5f78c555e64a254dba6c5686248d55cef4e093000fac7a0d2fb28fb548

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6092041.exe

    Filesize

    221KB

    MD5

    d494f34caf7041adfafbc850166ed57b

    SHA1

    06f2b2ff69e7b0b8ceeed3ebbd4232746d80da3d

    SHA256

    f6e004d875fbd14f8d1456f09dc81d796f0e6a5f3baacf8c76a47e23829f58ac

    SHA512

    77067d4908f0a109244e015113b156af45a5d204779d8284ce079ee6a20e1b1191953d5f78c555e64a254dba6c5686248d55cef4e093000fac7a0d2fb28fb548

  • memory/2756-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2756-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2756-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2756-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2756-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2756-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2756-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2756-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB