Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 09:42

General

  • Target

    604b728b42ee4df22f9ca5ac383430f963f327f084eb809659e7afada4e6a408.exe

  • Size

    1.0MB

  • MD5

    8433bd7314b2d3888b7913ddf6ba1eb3

  • SHA1

    7de2722684733c5092fd63cc3b7c82d4756575c8

  • SHA256

    604b728b42ee4df22f9ca5ac383430f963f327f084eb809659e7afada4e6a408

  • SHA512

    5edee3d2ea8022b584fc8c16a580cce2c1b0ad275d5097d89e609cd749f3b065a4cf04425c92b2bb8095c1d714861b6868831732590ff32d84ed8136465b2b20

  • SSDEEP

    12288:IMrwy90hZF/Y20cGlFricwpWy/mi3OV5KklFVmD6LU1A8reE9g05XcUDYESoii7x:Yy+rYficA/T3VkVmD0CaE7Evw7PRwK

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\604b728b42ee4df22f9ca5ac383430f963f327f084eb809659e7afada4e6a408.exe
    "C:\Users\Admin\AppData\Local\Temp\604b728b42ee4df22f9ca5ac383430f963f327f084eb809659e7afada4e6a408.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0300128.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0300128.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9553186.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9553186.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2924
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6706604.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6706604.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2780
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1711343.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1711343.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2072
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5582146.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5582146.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2736
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2528
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0300128.exe

    Filesize

    960KB

    MD5

    2f678f32b4b614416177403886974f72

    SHA1

    c19104f56a5286211bbc1cced750eac9a0fccbc8

    SHA256

    6a7c25c9b8265ab06e6a021803b1ba2c53fd197b765a488f79ba1da1e188e1dc

    SHA512

    2915bbe1f521dedd72bac946be0b0bad05ac341f88905e7f4b4b7d1cbd0698527965bbd0c64c219aecf224c01098ef5980d783ad723bca2a37c28281bcf648e8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0300128.exe

    Filesize

    960KB

    MD5

    2f678f32b4b614416177403886974f72

    SHA1

    c19104f56a5286211bbc1cced750eac9a0fccbc8

    SHA256

    6a7c25c9b8265ab06e6a021803b1ba2c53fd197b765a488f79ba1da1e188e1dc

    SHA512

    2915bbe1f521dedd72bac946be0b0bad05ac341f88905e7f4b4b7d1cbd0698527965bbd0c64c219aecf224c01098ef5980d783ad723bca2a37c28281bcf648e8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9553186.exe

    Filesize

    777KB

    MD5

    9cc85cef6ae6b9bff93705fc230f0d12

    SHA1

    833300ae5dc7d13e6d26f6edf1d93eb966e85f49

    SHA256

    35eafed6c88e3c6e680b24601cc8ccdf41d4f73023b87f9ff87c297cebd1bfe4

    SHA512

    87343fc32e7dc1f557e549e8ffbf062feae7cbb33adfd3d54f4b23a1f1f6574f18ef3a8cdb53b170cfffb82a5a59e968a5f49eea20d30b4408143bd9fd437bf0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9553186.exe

    Filesize

    777KB

    MD5

    9cc85cef6ae6b9bff93705fc230f0d12

    SHA1

    833300ae5dc7d13e6d26f6edf1d93eb966e85f49

    SHA256

    35eafed6c88e3c6e680b24601cc8ccdf41d4f73023b87f9ff87c297cebd1bfe4

    SHA512

    87343fc32e7dc1f557e549e8ffbf062feae7cbb33adfd3d54f4b23a1f1f6574f18ef3a8cdb53b170cfffb82a5a59e968a5f49eea20d30b4408143bd9fd437bf0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6706604.exe

    Filesize

    595KB

    MD5

    2f76a51d7e42fabd183f4e6f1ee532f0

    SHA1

    4db239223fe23d32efa5e14437d0d0fa5f08f2af

    SHA256

    695376c657ebef5cb667e6547921907475ad6fdc5d162e5b54940812e9b9dac7

    SHA512

    7315de0ec4a0d359d304571f44d0b5b4a2a415258c35ae0ae3ac4f45c565444bcdeb3e1079100ffec03950464a442f995af72722be7b385addd6c100ae2d5f81

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6706604.exe

    Filesize

    595KB

    MD5

    2f76a51d7e42fabd183f4e6f1ee532f0

    SHA1

    4db239223fe23d32efa5e14437d0d0fa5f08f2af

    SHA256

    695376c657ebef5cb667e6547921907475ad6fdc5d162e5b54940812e9b9dac7

    SHA512

    7315de0ec4a0d359d304571f44d0b5b4a2a415258c35ae0ae3ac4f45c565444bcdeb3e1079100ffec03950464a442f995af72722be7b385addd6c100ae2d5f81

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1711343.exe

    Filesize

    335KB

    MD5

    73e436587c8572d8e3ba9b01512f478a

    SHA1

    0d12e5f177dc9bdc525e4942c2a9753f3f640acf

    SHA256

    5f36f95cf6ed1b37831878621ab22ebce9a1cb2f5789cf930a7e90fca3eac40c

    SHA512

    42e90280f4dfab078c8bada5bae43758a129970237275cfa3e5e5f9010d0c8cd24159987f5e48349eadd3b857f9c12ffa0b3be1298c8b3b9a9544c9969a3ed33

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1711343.exe

    Filesize

    335KB

    MD5

    73e436587c8572d8e3ba9b01512f478a

    SHA1

    0d12e5f177dc9bdc525e4942c2a9753f3f640acf

    SHA256

    5f36f95cf6ed1b37831878621ab22ebce9a1cb2f5789cf930a7e90fca3eac40c

    SHA512

    42e90280f4dfab078c8bada5bae43758a129970237275cfa3e5e5f9010d0c8cd24159987f5e48349eadd3b857f9c12ffa0b3be1298c8b3b9a9544c9969a3ed33

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5582146.exe

    Filesize

    221KB

    MD5

    340656d4daac257b56cdf96cd47acf7e

    SHA1

    5a2a5bda603a202dcd9c231d624afe3363f0092c

    SHA256

    a7fb66ef7c750edcf2abe3c26ae834d4dec54e1fef3b2e82da9932d9f1e5afe6

    SHA512

    71b3741cd7d8e01a64caa4bd3c8e92f6fb40f0898204b51f1d439f231a132290fe7c0b16e68b569d3b44ba0c51f6ef0d2debbaf91868fb4842497acfdadbe781

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5582146.exe

    Filesize

    221KB

    MD5

    340656d4daac257b56cdf96cd47acf7e

    SHA1

    5a2a5bda603a202dcd9c231d624afe3363f0092c

    SHA256

    a7fb66ef7c750edcf2abe3c26ae834d4dec54e1fef3b2e82da9932d9f1e5afe6

    SHA512

    71b3741cd7d8e01a64caa4bd3c8e92f6fb40f0898204b51f1d439f231a132290fe7c0b16e68b569d3b44ba0c51f6ef0d2debbaf91868fb4842497acfdadbe781

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5582146.exe

    Filesize

    221KB

    MD5

    340656d4daac257b56cdf96cd47acf7e

    SHA1

    5a2a5bda603a202dcd9c231d624afe3363f0092c

    SHA256

    a7fb66ef7c750edcf2abe3c26ae834d4dec54e1fef3b2e82da9932d9f1e5afe6

    SHA512

    71b3741cd7d8e01a64caa4bd3c8e92f6fb40f0898204b51f1d439f231a132290fe7c0b16e68b569d3b44ba0c51f6ef0d2debbaf91868fb4842497acfdadbe781

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0300128.exe

    Filesize

    960KB

    MD5

    2f678f32b4b614416177403886974f72

    SHA1

    c19104f56a5286211bbc1cced750eac9a0fccbc8

    SHA256

    6a7c25c9b8265ab06e6a021803b1ba2c53fd197b765a488f79ba1da1e188e1dc

    SHA512

    2915bbe1f521dedd72bac946be0b0bad05ac341f88905e7f4b4b7d1cbd0698527965bbd0c64c219aecf224c01098ef5980d783ad723bca2a37c28281bcf648e8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0300128.exe

    Filesize

    960KB

    MD5

    2f678f32b4b614416177403886974f72

    SHA1

    c19104f56a5286211bbc1cced750eac9a0fccbc8

    SHA256

    6a7c25c9b8265ab06e6a021803b1ba2c53fd197b765a488f79ba1da1e188e1dc

    SHA512

    2915bbe1f521dedd72bac946be0b0bad05ac341f88905e7f4b4b7d1cbd0698527965bbd0c64c219aecf224c01098ef5980d783ad723bca2a37c28281bcf648e8

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9553186.exe

    Filesize

    777KB

    MD5

    9cc85cef6ae6b9bff93705fc230f0d12

    SHA1

    833300ae5dc7d13e6d26f6edf1d93eb966e85f49

    SHA256

    35eafed6c88e3c6e680b24601cc8ccdf41d4f73023b87f9ff87c297cebd1bfe4

    SHA512

    87343fc32e7dc1f557e549e8ffbf062feae7cbb33adfd3d54f4b23a1f1f6574f18ef3a8cdb53b170cfffb82a5a59e968a5f49eea20d30b4408143bd9fd437bf0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9553186.exe

    Filesize

    777KB

    MD5

    9cc85cef6ae6b9bff93705fc230f0d12

    SHA1

    833300ae5dc7d13e6d26f6edf1d93eb966e85f49

    SHA256

    35eafed6c88e3c6e680b24601cc8ccdf41d4f73023b87f9ff87c297cebd1bfe4

    SHA512

    87343fc32e7dc1f557e549e8ffbf062feae7cbb33adfd3d54f4b23a1f1f6574f18ef3a8cdb53b170cfffb82a5a59e968a5f49eea20d30b4408143bd9fd437bf0

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6706604.exe

    Filesize

    595KB

    MD5

    2f76a51d7e42fabd183f4e6f1ee532f0

    SHA1

    4db239223fe23d32efa5e14437d0d0fa5f08f2af

    SHA256

    695376c657ebef5cb667e6547921907475ad6fdc5d162e5b54940812e9b9dac7

    SHA512

    7315de0ec4a0d359d304571f44d0b5b4a2a415258c35ae0ae3ac4f45c565444bcdeb3e1079100ffec03950464a442f995af72722be7b385addd6c100ae2d5f81

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6706604.exe

    Filesize

    595KB

    MD5

    2f76a51d7e42fabd183f4e6f1ee532f0

    SHA1

    4db239223fe23d32efa5e14437d0d0fa5f08f2af

    SHA256

    695376c657ebef5cb667e6547921907475ad6fdc5d162e5b54940812e9b9dac7

    SHA512

    7315de0ec4a0d359d304571f44d0b5b4a2a415258c35ae0ae3ac4f45c565444bcdeb3e1079100ffec03950464a442f995af72722be7b385addd6c100ae2d5f81

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z1711343.exe

    Filesize

    335KB

    MD5

    73e436587c8572d8e3ba9b01512f478a

    SHA1

    0d12e5f177dc9bdc525e4942c2a9753f3f640acf

    SHA256

    5f36f95cf6ed1b37831878621ab22ebce9a1cb2f5789cf930a7e90fca3eac40c

    SHA512

    42e90280f4dfab078c8bada5bae43758a129970237275cfa3e5e5f9010d0c8cd24159987f5e48349eadd3b857f9c12ffa0b3be1298c8b3b9a9544c9969a3ed33

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z1711343.exe

    Filesize

    335KB

    MD5

    73e436587c8572d8e3ba9b01512f478a

    SHA1

    0d12e5f177dc9bdc525e4942c2a9753f3f640acf

    SHA256

    5f36f95cf6ed1b37831878621ab22ebce9a1cb2f5789cf930a7e90fca3eac40c

    SHA512

    42e90280f4dfab078c8bada5bae43758a129970237275cfa3e5e5f9010d0c8cd24159987f5e48349eadd3b857f9c12ffa0b3be1298c8b3b9a9544c9969a3ed33

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5582146.exe

    Filesize

    221KB

    MD5

    340656d4daac257b56cdf96cd47acf7e

    SHA1

    5a2a5bda603a202dcd9c231d624afe3363f0092c

    SHA256

    a7fb66ef7c750edcf2abe3c26ae834d4dec54e1fef3b2e82da9932d9f1e5afe6

    SHA512

    71b3741cd7d8e01a64caa4bd3c8e92f6fb40f0898204b51f1d439f231a132290fe7c0b16e68b569d3b44ba0c51f6ef0d2debbaf91868fb4842497acfdadbe781

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5582146.exe

    Filesize

    221KB

    MD5

    340656d4daac257b56cdf96cd47acf7e

    SHA1

    5a2a5bda603a202dcd9c231d624afe3363f0092c

    SHA256

    a7fb66ef7c750edcf2abe3c26ae834d4dec54e1fef3b2e82da9932d9f1e5afe6

    SHA512

    71b3741cd7d8e01a64caa4bd3c8e92f6fb40f0898204b51f1d439f231a132290fe7c0b16e68b569d3b44ba0c51f6ef0d2debbaf91868fb4842497acfdadbe781

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5582146.exe

    Filesize

    221KB

    MD5

    340656d4daac257b56cdf96cd47acf7e

    SHA1

    5a2a5bda603a202dcd9c231d624afe3363f0092c

    SHA256

    a7fb66ef7c750edcf2abe3c26ae834d4dec54e1fef3b2e82da9932d9f1e5afe6

    SHA512

    71b3741cd7d8e01a64caa4bd3c8e92f6fb40f0898204b51f1d439f231a132290fe7c0b16e68b569d3b44ba0c51f6ef0d2debbaf91868fb4842497acfdadbe781

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5582146.exe

    Filesize

    221KB

    MD5

    340656d4daac257b56cdf96cd47acf7e

    SHA1

    5a2a5bda603a202dcd9c231d624afe3363f0092c

    SHA256

    a7fb66ef7c750edcf2abe3c26ae834d4dec54e1fef3b2e82da9932d9f1e5afe6

    SHA512

    71b3741cd7d8e01a64caa4bd3c8e92f6fb40f0898204b51f1d439f231a132290fe7c0b16e68b569d3b44ba0c51f6ef0d2debbaf91868fb4842497acfdadbe781

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5582146.exe

    Filesize

    221KB

    MD5

    340656d4daac257b56cdf96cd47acf7e

    SHA1

    5a2a5bda603a202dcd9c231d624afe3363f0092c

    SHA256

    a7fb66ef7c750edcf2abe3c26ae834d4dec54e1fef3b2e82da9932d9f1e5afe6

    SHA512

    71b3741cd7d8e01a64caa4bd3c8e92f6fb40f0898204b51f1d439f231a132290fe7c0b16e68b569d3b44ba0c51f6ef0d2debbaf91868fb4842497acfdadbe781

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5582146.exe

    Filesize

    221KB

    MD5

    340656d4daac257b56cdf96cd47acf7e

    SHA1

    5a2a5bda603a202dcd9c231d624afe3363f0092c

    SHA256

    a7fb66ef7c750edcf2abe3c26ae834d4dec54e1fef3b2e82da9932d9f1e5afe6

    SHA512

    71b3741cd7d8e01a64caa4bd3c8e92f6fb40f0898204b51f1d439f231a132290fe7c0b16e68b569d3b44ba0c51f6ef0d2debbaf91868fb4842497acfdadbe781

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5582146.exe

    Filesize

    221KB

    MD5

    340656d4daac257b56cdf96cd47acf7e

    SHA1

    5a2a5bda603a202dcd9c231d624afe3363f0092c

    SHA256

    a7fb66ef7c750edcf2abe3c26ae834d4dec54e1fef3b2e82da9932d9f1e5afe6

    SHA512

    71b3741cd7d8e01a64caa4bd3c8e92f6fb40f0898204b51f1d439f231a132290fe7c0b16e68b569d3b44ba0c51f6ef0d2debbaf91868fb4842497acfdadbe781

  • memory/2528-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2528-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2528-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2528-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2528-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2528-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2528-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2528-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB