Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 09:40

General

  • Target

    a4707fc5d11a20de8f36e89bc25125d1423d6d262714612614c1f98067ff7dab.exe

  • Size

    1.0MB

  • MD5

    d8ee8ff611eb4dda727af875435f411a

  • SHA1

    405247062662a5d93cf5f49c38c83af4392f4f2b

  • SHA256

    a4707fc5d11a20de8f36e89bc25125d1423d6d262714612614c1f98067ff7dab

  • SHA512

    f7f1135d00e2283bb713aec54c8a7078cdb6475becba3751c2ad5e0c819cb5b46e6920bb4ee9d123c49ee75b6b08093878a8596a7e0811e875f65f914b727c41

  • SSDEEP

    24576:MygLGlHX02iPii0UaxY/wP1Dk+gNgu1UFDqRnEwcpjAm:7zl30z2q/r9fYDq6wcpj

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4707fc5d11a20de8f36e89bc25125d1423d6d262714612614c1f98067ff7dab.exe
    "C:\Users\Admin\AppData\Local\Temp\a4707fc5d11a20de8f36e89bc25125d1423d6d262714612614c1f98067ff7dab.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9831884.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9831884.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8929242.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8929242.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2492
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2963343.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2963343.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2132
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5125957.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5125957.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2692
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2108591.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2108591.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2700
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1148
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9831884.exe

    Filesize

    962KB

    MD5

    f7df1066b04035f389ad3fbe217be180

    SHA1

    30d04dbeb4489ef9d3969b75ac88710c5eb55a33

    SHA256

    a5411a14cff03f5cc9bcb742662c10dbfa32dafea744f06936a08ec46c8aca35

    SHA512

    2a56a5a24feca6bf3ff010510da925e6968ddb91f74c82aae49bdd6c42675b6f7886834a0fefe3f1a51fd568cf418f36da53727c143d421a2dcd6113fd94141a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9831884.exe

    Filesize

    962KB

    MD5

    f7df1066b04035f389ad3fbe217be180

    SHA1

    30d04dbeb4489ef9d3969b75ac88710c5eb55a33

    SHA256

    a5411a14cff03f5cc9bcb742662c10dbfa32dafea744f06936a08ec46c8aca35

    SHA512

    2a56a5a24feca6bf3ff010510da925e6968ddb91f74c82aae49bdd6c42675b6f7886834a0fefe3f1a51fd568cf418f36da53727c143d421a2dcd6113fd94141a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8929242.exe

    Filesize

    779KB

    MD5

    a807b1798da39bc04329cb1e025c47a4

    SHA1

    c8ddf8322fbe6edb989e5884645add7bbe20e894

    SHA256

    6825af83abc8ae07e690c79505ef6a4ab1389b8701ef9b84ab5720964f1f4eba

    SHA512

    6d1b0378ddba22a39de48c4bd1be1a7f3ab5deaa5c55d07db0e50b1e467169be311311666b279877abd01f17b0d94f2c4034cee5118417e27773f1182911d7cd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8929242.exe

    Filesize

    779KB

    MD5

    a807b1798da39bc04329cb1e025c47a4

    SHA1

    c8ddf8322fbe6edb989e5884645add7bbe20e894

    SHA256

    6825af83abc8ae07e690c79505ef6a4ab1389b8701ef9b84ab5720964f1f4eba

    SHA512

    6d1b0378ddba22a39de48c4bd1be1a7f3ab5deaa5c55d07db0e50b1e467169be311311666b279877abd01f17b0d94f2c4034cee5118417e27773f1182911d7cd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2963343.exe

    Filesize

    596KB

    MD5

    7548776b07c967b4738a4cf639e9dda7

    SHA1

    f1fa4c90f518218d79d3248b30186da6fe9678f3

    SHA256

    b2e96adcc6a2ac9c1ea73ce28bb853222c8bd5dd317132be8630487acbcb8b30

    SHA512

    5790d7de847ad8434ea4ef8295a5aa192472613bd8d05cfc30e0ea44a202cc809d1d648df7e79e2902d612c42027d0428d0f093c0fc2f7322d59c89421762926

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2963343.exe

    Filesize

    596KB

    MD5

    7548776b07c967b4738a4cf639e9dda7

    SHA1

    f1fa4c90f518218d79d3248b30186da6fe9678f3

    SHA256

    b2e96adcc6a2ac9c1ea73ce28bb853222c8bd5dd317132be8630487acbcb8b30

    SHA512

    5790d7de847ad8434ea4ef8295a5aa192472613bd8d05cfc30e0ea44a202cc809d1d648df7e79e2902d612c42027d0428d0f093c0fc2f7322d59c89421762926

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5125957.exe

    Filesize

    335KB

    MD5

    26dffc2dab45043e368371cfe95834c5

    SHA1

    295b28984cac6e75a83a07bd51b263b651e0cb42

    SHA256

    3245ab4d0d602c06ef7418520b65833cf936c96152b78e4b8def8534e514ff06

    SHA512

    52d62cd9426d17afd118f88a6a76b7189480cda2f8a29efafa27e67f7a4454f24885b65df8ae80cbb60ffca19579b713b20b405a78fb917c5d37dbb7dfba4768

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5125957.exe

    Filesize

    335KB

    MD5

    26dffc2dab45043e368371cfe95834c5

    SHA1

    295b28984cac6e75a83a07bd51b263b651e0cb42

    SHA256

    3245ab4d0d602c06ef7418520b65833cf936c96152b78e4b8def8534e514ff06

    SHA512

    52d62cd9426d17afd118f88a6a76b7189480cda2f8a29efafa27e67f7a4454f24885b65df8ae80cbb60ffca19579b713b20b405a78fb917c5d37dbb7dfba4768

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2108591.exe

    Filesize

    221KB

    MD5

    0f944d791b55dde29cdd260a5184c5c5

    SHA1

    d719979520d0c0ccace0931e069a47e6ea8a6941

    SHA256

    b3aa4b140546d7a6ddb6a1fedb079df1c8ceb8353be1e1f05b0dc3fce12297d8

    SHA512

    708a61307834958a08a8a7a5923f8623f3adb1dd9a9c6c9e28d5a6b753c4bd74e4284654934e944b36f24995ce405a4b4de2ce14869c91fe11525eef2dbde856

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2108591.exe

    Filesize

    221KB

    MD5

    0f944d791b55dde29cdd260a5184c5c5

    SHA1

    d719979520d0c0ccace0931e069a47e6ea8a6941

    SHA256

    b3aa4b140546d7a6ddb6a1fedb079df1c8ceb8353be1e1f05b0dc3fce12297d8

    SHA512

    708a61307834958a08a8a7a5923f8623f3adb1dd9a9c6c9e28d5a6b753c4bd74e4284654934e944b36f24995ce405a4b4de2ce14869c91fe11525eef2dbde856

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2108591.exe

    Filesize

    221KB

    MD5

    0f944d791b55dde29cdd260a5184c5c5

    SHA1

    d719979520d0c0ccace0931e069a47e6ea8a6941

    SHA256

    b3aa4b140546d7a6ddb6a1fedb079df1c8ceb8353be1e1f05b0dc3fce12297d8

    SHA512

    708a61307834958a08a8a7a5923f8623f3adb1dd9a9c6c9e28d5a6b753c4bd74e4284654934e944b36f24995ce405a4b4de2ce14869c91fe11525eef2dbde856

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9831884.exe

    Filesize

    962KB

    MD5

    f7df1066b04035f389ad3fbe217be180

    SHA1

    30d04dbeb4489ef9d3969b75ac88710c5eb55a33

    SHA256

    a5411a14cff03f5cc9bcb742662c10dbfa32dafea744f06936a08ec46c8aca35

    SHA512

    2a56a5a24feca6bf3ff010510da925e6968ddb91f74c82aae49bdd6c42675b6f7886834a0fefe3f1a51fd568cf418f36da53727c143d421a2dcd6113fd94141a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9831884.exe

    Filesize

    962KB

    MD5

    f7df1066b04035f389ad3fbe217be180

    SHA1

    30d04dbeb4489ef9d3969b75ac88710c5eb55a33

    SHA256

    a5411a14cff03f5cc9bcb742662c10dbfa32dafea744f06936a08ec46c8aca35

    SHA512

    2a56a5a24feca6bf3ff010510da925e6968ddb91f74c82aae49bdd6c42675b6f7886834a0fefe3f1a51fd568cf418f36da53727c143d421a2dcd6113fd94141a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8929242.exe

    Filesize

    779KB

    MD5

    a807b1798da39bc04329cb1e025c47a4

    SHA1

    c8ddf8322fbe6edb989e5884645add7bbe20e894

    SHA256

    6825af83abc8ae07e690c79505ef6a4ab1389b8701ef9b84ab5720964f1f4eba

    SHA512

    6d1b0378ddba22a39de48c4bd1be1a7f3ab5deaa5c55d07db0e50b1e467169be311311666b279877abd01f17b0d94f2c4034cee5118417e27773f1182911d7cd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8929242.exe

    Filesize

    779KB

    MD5

    a807b1798da39bc04329cb1e025c47a4

    SHA1

    c8ddf8322fbe6edb989e5884645add7bbe20e894

    SHA256

    6825af83abc8ae07e690c79505ef6a4ab1389b8701ef9b84ab5720964f1f4eba

    SHA512

    6d1b0378ddba22a39de48c4bd1be1a7f3ab5deaa5c55d07db0e50b1e467169be311311666b279877abd01f17b0d94f2c4034cee5118417e27773f1182911d7cd

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2963343.exe

    Filesize

    596KB

    MD5

    7548776b07c967b4738a4cf639e9dda7

    SHA1

    f1fa4c90f518218d79d3248b30186da6fe9678f3

    SHA256

    b2e96adcc6a2ac9c1ea73ce28bb853222c8bd5dd317132be8630487acbcb8b30

    SHA512

    5790d7de847ad8434ea4ef8295a5aa192472613bd8d05cfc30e0ea44a202cc809d1d648df7e79e2902d612c42027d0428d0f093c0fc2f7322d59c89421762926

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2963343.exe

    Filesize

    596KB

    MD5

    7548776b07c967b4738a4cf639e9dda7

    SHA1

    f1fa4c90f518218d79d3248b30186da6fe9678f3

    SHA256

    b2e96adcc6a2ac9c1ea73ce28bb853222c8bd5dd317132be8630487acbcb8b30

    SHA512

    5790d7de847ad8434ea4ef8295a5aa192472613bd8d05cfc30e0ea44a202cc809d1d648df7e79e2902d612c42027d0428d0f093c0fc2f7322d59c89421762926

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z5125957.exe

    Filesize

    335KB

    MD5

    26dffc2dab45043e368371cfe95834c5

    SHA1

    295b28984cac6e75a83a07bd51b263b651e0cb42

    SHA256

    3245ab4d0d602c06ef7418520b65833cf936c96152b78e4b8def8534e514ff06

    SHA512

    52d62cd9426d17afd118f88a6a76b7189480cda2f8a29efafa27e67f7a4454f24885b65df8ae80cbb60ffca19579b713b20b405a78fb917c5d37dbb7dfba4768

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z5125957.exe

    Filesize

    335KB

    MD5

    26dffc2dab45043e368371cfe95834c5

    SHA1

    295b28984cac6e75a83a07bd51b263b651e0cb42

    SHA256

    3245ab4d0d602c06ef7418520b65833cf936c96152b78e4b8def8534e514ff06

    SHA512

    52d62cd9426d17afd118f88a6a76b7189480cda2f8a29efafa27e67f7a4454f24885b65df8ae80cbb60ffca19579b713b20b405a78fb917c5d37dbb7dfba4768

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2108591.exe

    Filesize

    221KB

    MD5

    0f944d791b55dde29cdd260a5184c5c5

    SHA1

    d719979520d0c0ccace0931e069a47e6ea8a6941

    SHA256

    b3aa4b140546d7a6ddb6a1fedb079df1c8ceb8353be1e1f05b0dc3fce12297d8

    SHA512

    708a61307834958a08a8a7a5923f8623f3adb1dd9a9c6c9e28d5a6b753c4bd74e4284654934e944b36f24995ce405a4b4de2ce14869c91fe11525eef2dbde856

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2108591.exe

    Filesize

    221KB

    MD5

    0f944d791b55dde29cdd260a5184c5c5

    SHA1

    d719979520d0c0ccace0931e069a47e6ea8a6941

    SHA256

    b3aa4b140546d7a6ddb6a1fedb079df1c8ceb8353be1e1f05b0dc3fce12297d8

    SHA512

    708a61307834958a08a8a7a5923f8623f3adb1dd9a9c6c9e28d5a6b753c4bd74e4284654934e944b36f24995ce405a4b4de2ce14869c91fe11525eef2dbde856

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2108591.exe

    Filesize

    221KB

    MD5

    0f944d791b55dde29cdd260a5184c5c5

    SHA1

    d719979520d0c0ccace0931e069a47e6ea8a6941

    SHA256

    b3aa4b140546d7a6ddb6a1fedb079df1c8ceb8353be1e1f05b0dc3fce12297d8

    SHA512

    708a61307834958a08a8a7a5923f8623f3adb1dd9a9c6c9e28d5a6b753c4bd74e4284654934e944b36f24995ce405a4b4de2ce14869c91fe11525eef2dbde856

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2108591.exe

    Filesize

    221KB

    MD5

    0f944d791b55dde29cdd260a5184c5c5

    SHA1

    d719979520d0c0ccace0931e069a47e6ea8a6941

    SHA256

    b3aa4b140546d7a6ddb6a1fedb079df1c8ceb8353be1e1f05b0dc3fce12297d8

    SHA512

    708a61307834958a08a8a7a5923f8623f3adb1dd9a9c6c9e28d5a6b753c4bd74e4284654934e944b36f24995ce405a4b4de2ce14869c91fe11525eef2dbde856

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2108591.exe

    Filesize

    221KB

    MD5

    0f944d791b55dde29cdd260a5184c5c5

    SHA1

    d719979520d0c0ccace0931e069a47e6ea8a6941

    SHA256

    b3aa4b140546d7a6ddb6a1fedb079df1c8ceb8353be1e1f05b0dc3fce12297d8

    SHA512

    708a61307834958a08a8a7a5923f8623f3adb1dd9a9c6c9e28d5a6b753c4bd74e4284654934e944b36f24995ce405a4b4de2ce14869c91fe11525eef2dbde856

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2108591.exe

    Filesize

    221KB

    MD5

    0f944d791b55dde29cdd260a5184c5c5

    SHA1

    d719979520d0c0ccace0931e069a47e6ea8a6941

    SHA256

    b3aa4b140546d7a6ddb6a1fedb079df1c8ceb8353be1e1f05b0dc3fce12297d8

    SHA512

    708a61307834958a08a8a7a5923f8623f3adb1dd9a9c6c9e28d5a6b753c4bd74e4284654934e944b36f24995ce405a4b4de2ce14869c91fe11525eef2dbde856

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2108591.exe

    Filesize

    221KB

    MD5

    0f944d791b55dde29cdd260a5184c5c5

    SHA1

    d719979520d0c0ccace0931e069a47e6ea8a6941

    SHA256

    b3aa4b140546d7a6ddb6a1fedb079df1c8ceb8353be1e1f05b0dc3fce12297d8

    SHA512

    708a61307834958a08a8a7a5923f8623f3adb1dd9a9c6c9e28d5a6b753c4bd74e4284654934e944b36f24995ce405a4b4de2ce14869c91fe11525eef2dbde856

  • memory/1148-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1148-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1148-64-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1148-66-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1148-57-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1148-59-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1148-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1148-61-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB