Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 09:47

General

  • Target

    99848cc08340e2cf167c43f8e2b3e2bab2579e2d629e0cde5a91d8e662c1a517.exe

  • Size

    1.0MB

  • MD5

    15bc81268907f7f6315de9b3830beb10

  • SHA1

    350b1eee417fc6faab484350effee1eee2494025

  • SHA256

    99848cc08340e2cf167c43f8e2b3e2bab2579e2d629e0cde5a91d8e662c1a517

  • SHA512

    9d9c6d9e0f6fcac689cebcec638cf91b04e2183c0dbb0be3dcb08eb0f9dbd6b4dd015f1f3eb86dc1f43adce4c6b3324a631cb08fbaaeb890e06422083b428e18

  • SSDEEP

    24576:Yy5WG3wLfkp9OdoOMqiKJhL6M0ZPLRPfNRDIzqrT6MeQiO/R:f5N3wLsp9OdHRJhmMuR3NCzqrT6XQ5/

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99848cc08340e2cf167c43f8e2b3e2bab2579e2d629e0cde5a91d8e662c1a517.exe
    "C:\Users\Admin\AppData\Local\Temp\99848cc08340e2cf167c43f8e2b3e2bab2579e2d629e0cde5a91d8e662c1a517.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5967850.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5967850.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2012425.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2012425.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1940
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2572156.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2572156.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2056
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6932250.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6932250.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2652
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1436483.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1436483.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2748
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2020
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5967850.exe

    Filesize

    958KB

    MD5

    884b24291740b31667b624c01137333c

    SHA1

    e89bd712ed5613e44bd0f51de2b930fa1a4a64bd

    SHA256

    6ef81d71e3067b8b1457ecf09b998d6d833530e67de325570b175ce9406c35c7

    SHA512

    0c561bfbd6e390d32d950962383c80a73200cc08618f7c372ac5b87d048ae54489a6670b6b0263637ef7ecf92929eaf5d6a26eb7dcc08e27574ed8acfe18eed4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5967850.exe

    Filesize

    958KB

    MD5

    884b24291740b31667b624c01137333c

    SHA1

    e89bd712ed5613e44bd0f51de2b930fa1a4a64bd

    SHA256

    6ef81d71e3067b8b1457ecf09b998d6d833530e67de325570b175ce9406c35c7

    SHA512

    0c561bfbd6e390d32d950962383c80a73200cc08618f7c372ac5b87d048ae54489a6670b6b0263637ef7ecf92929eaf5d6a26eb7dcc08e27574ed8acfe18eed4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2012425.exe

    Filesize

    778KB

    MD5

    41c171114c77f4efe2e33bd15904cefc

    SHA1

    2f7c9d4f16427a4769e9c1ea1a2d9490e8103fc4

    SHA256

    8ca80043948e9ee8b8bf9ceb687a32225c773f525398cea953ba62dff96d12a3

    SHA512

    3f3c486844113da240ff80b8cb59223c5dac12dba377e67cef455a82c5c6919324fdc1fefa3c4a610ba892084c2752fdd7ca385aca1019e52b2f2c343ae9a459

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2012425.exe

    Filesize

    778KB

    MD5

    41c171114c77f4efe2e33bd15904cefc

    SHA1

    2f7c9d4f16427a4769e9c1ea1a2d9490e8103fc4

    SHA256

    8ca80043948e9ee8b8bf9ceb687a32225c773f525398cea953ba62dff96d12a3

    SHA512

    3f3c486844113da240ff80b8cb59223c5dac12dba377e67cef455a82c5c6919324fdc1fefa3c4a610ba892084c2752fdd7ca385aca1019e52b2f2c343ae9a459

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2572156.exe

    Filesize

    595KB

    MD5

    e49d3d5a5e762e5a99b05d8f742b57da

    SHA1

    bc31a644551fb1182573f053489a6b52982967a6

    SHA256

    89d962b4e623af4fa6cbc6be7402e18b3f70d61163aa4c88e5cc67bab5d11929

    SHA512

    f10ff7c8aa6251cb358e6442b8e259b6b36a5204c41210dd8bd90172cf7a1eadfc73a716c4a6e652ec0934385d983e983ce160d7f31fdcb3edb5d3a60df38f4d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2572156.exe

    Filesize

    595KB

    MD5

    e49d3d5a5e762e5a99b05d8f742b57da

    SHA1

    bc31a644551fb1182573f053489a6b52982967a6

    SHA256

    89d962b4e623af4fa6cbc6be7402e18b3f70d61163aa4c88e5cc67bab5d11929

    SHA512

    f10ff7c8aa6251cb358e6442b8e259b6b36a5204c41210dd8bd90172cf7a1eadfc73a716c4a6e652ec0934385d983e983ce160d7f31fdcb3edb5d3a60df38f4d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6932250.exe

    Filesize

    334KB

    MD5

    8ec31ac7ad66fa1f2b9f545e92aa1bb7

    SHA1

    690337588dda78c71f652b8b57d0482589bc9b52

    SHA256

    17b9cf89f099666f3848882150a21ccbf094e021f12f9000b614e9daaa8690a9

    SHA512

    764f1cf6b5d07ed9ff50fcfbd1cfbbde6c112282dc420a67e9c77b6720c152a9ab2099681db5cb25edb04e0f0b46803c4a8bb687f8e866687c82854705c69327

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6932250.exe

    Filesize

    334KB

    MD5

    8ec31ac7ad66fa1f2b9f545e92aa1bb7

    SHA1

    690337588dda78c71f652b8b57d0482589bc9b52

    SHA256

    17b9cf89f099666f3848882150a21ccbf094e021f12f9000b614e9daaa8690a9

    SHA512

    764f1cf6b5d07ed9ff50fcfbd1cfbbde6c112282dc420a67e9c77b6720c152a9ab2099681db5cb25edb04e0f0b46803c4a8bb687f8e866687c82854705c69327

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1436483.exe

    Filesize

    221KB

    MD5

    eccbc2733399e09ed8112b4294776ac6

    SHA1

    36d400a8265902715cc87cb57d9025fe335f7110

    SHA256

    f315e8812ab8b063959a7586f6bbc119589048de51837e05b34acd10719e7fcd

    SHA512

    5111b74bfe01c22e6747b9588d773a1d5e0c7eb0a7dde80ec0813672b43cc9a5bcaf5572189f1c6a1fe66cbcb84258076d9a9557e70176261e37247712355092

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1436483.exe

    Filesize

    221KB

    MD5

    eccbc2733399e09ed8112b4294776ac6

    SHA1

    36d400a8265902715cc87cb57d9025fe335f7110

    SHA256

    f315e8812ab8b063959a7586f6bbc119589048de51837e05b34acd10719e7fcd

    SHA512

    5111b74bfe01c22e6747b9588d773a1d5e0c7eb0a7dde80ec0813672b43cc9a5bcaf5572189f1c6a1fe66cbcb84258076d9a9557e70176261e37247712355092

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1436483.exe

    Filesize

    221KB

    MD5

    eccbc2733399e09ed8112b4294776ac6

    SHA1

    36d400a8265902715cc87cb57d9025fe335f7110

    SHA256

    f315e8812ab8b063959a7586f6bbc119589048de51837e05b34acd10719e7fcd

    SHA512

    5111b74bfe01c22e6747b9588d773a1d5e0c7eb0a7dde80ec0813672b43cc9a5bcaf5572189f1c6a1fe66cbcb84258076d9a9557e70176261e37247712355092

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5967850.exe

    Filesize

    958KB

    MD5

    884b24291740b31667b624c01137333c

    SHA1

    e89bd712ed5613e44bd0f51de2b930fa1a4a64bd

    SHA256

    6ef81d71e3067b8b1457ecf09b998d6d833530e67de325570b175ce9406c35c7

    SHA512

    0c561bfbd6e390d32d950962383c80a73200cc08618f7c372ac5b87d048ae54489a6670b6b0263637ef7ecf92929eaf5d6a26eb7dcc08e27574ed8acfe18eed4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5967850.exe

    Filesize

    958KB

    MD5

    884b24291740b31667b624c01137333c

    SHA1

    e89bd712ed5613e44bd0f51de2b930fa1a4a64bd

    SHA256

    6ef81d71e3067b8b1457ecf09b998d6d833530e67de325570b175ce9406c35c7

    SHA512

    0c561bfbd6e390d32d950962383c80a73200cc08618f7c372ac5b87d048ae54489a6670b6b0263637ef7ecf92929eaf5d6a26eb7dcc08e27574ed8acfe18eed4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2012425.exe

    Filesize

    778KB

    MD5

    41c171114c77f4efe2e33bd15904cefc

    SHA1

    2f7c9d4f16427a4769e9c1ea1a2d9490e8103fc4

    SHA256

    8ca80043948e9ee8b8bf9ceb687a32225c773f525398cea953ba62dff96d12a3

    SHA512

    3f3c486844113da240ff80b8cb59223c5dac12dba377e67cef455a82c5c6919324fdc1fefa3c4a610ba892084c2752fdd7ca385aca1019e52b2f2c343ae9a459

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2012425.exe

    Filesize

    778KB

    MD5

    41c171114c77f4efe2e33bd15904cefc

    SHA1

    2f7c9d4f16427a4769e9c1ea1a2d9490e8103fc4

    SHA256

    8ca80043948e9ee8b8bf9ceb687a32225c773f525398cea953ba62dff96d12a3

    SHA512

    3f3c486844113da240ff80b8cb59223c5dac12dba377e67cef455a82c5c6919324fdc1fefa3c4a610ba892084c2752fdd7ca385aca1019e52b2f2c343ae9a459

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2572156.exe

    Filesize

    595KB

    MD5

    e49d3d5a5e762e5a99b05d8f742b57da

    SHA1

    bc31a644551fb1182573f053489a6b52982967a6

    SHA256

    89d962b4e623af4fa6cbc6be7402e18b3f70d61163aa4c88e5cc67bab5d11929

    SHA512

    f10ff7c8aa6251cb358e6442b8e259b6b36a5204c41210dd8bd90172cf7a1eadfc73a716c4a6e652ec0934385d983e983ce160d7f31fdcb3edb5d3a60df38f4d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2572156.exe

    Filesize

    595KB

    MD5

    e49d3d5a5e762e5a99b05d8f742b57da

    SHA1

    bc31a644551fb1182573f053489a6b52982967a6

    SHA256

    89d962b4e623af4fa6cbc6be7402e18b3f70d61163aa4c88e5cc67bab5d11929

    SHA512

    f10ff7c8aa6251cb358e6442b8e259b6b36a5204c41210dd8bd90172cf7a1eadfc73a716c4a6e652ec0934385d983e983ce160d7f31fdcb3edb5d3a60df38f4d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6932250.exe

    Filesize

    334KB

    MD5

    8ec31ac7ad66fa1f2b9f545e92aa1bb7

    SHA1

    690337588dda78c71f652b8b57d0482589bc9b52

    SHA256

    17b9cf89f099666f3848882150a21ccbf094e021f12f9000b614e9daaa8690a9

    SHA512

    764f1cf6b5d07ed9ff50fcfbd1cfbbde6c112282dc420a67e9c77b6720c152a9ab2099681db5cb25edb04e0f0b46803c4a8bb687f8e866687c82854705c69327

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6932250.exe

    Filesize

    334KB

    MD5

    8ec31ac7ad66fa1f2b9f545e92aa1bb7

    SHA1

    690337588dda78c71f652b8b57d0482589bc9b52

    SHA256

    17b9cf89f099666f3848882150a21ccbf094e021f12f9000b614e9daaa8690a9

    SHA512

    764f1cf6b5d07ed9ff50fcfbd1cfbbde6c112282dc420a67e9c77b6720c152a9ab2099681db5cb25edb04e0f0b46803c4a8bb687f8e866687c82854705c69327

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1436483.exe

    Filesize

    221KB

    MD5

    eccbc2733399e09ed8112b4294776ac6

    SHA1

    36d400a8265902715cc87cb57d9025fe335f7110

    SHA256

    f315e8812ab8b063959a7586f6bbc119589048de51837e05b34acd10719e7fcd

    SHA512

    5111b74bfe01c22e6747b9588d773a1d5e0c7eb0a7dde80ec0813672b43cc9a5bcaf5572189f1c6a1fe66cbcb84258076d9a9557e70176261e37247712355092

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1436483.exe

    Filesize

    221KB

    MD5

    eccbc2733399e09ed8112b4294776ac6

    SHA1

    36d400a8265902715cc87cb57d9025fe335f7110

    SHA256

    f315e8812ab8b063959a7586f6bbc119589048de51837e05b34acd10719e7fcd

    SHA512

    5111b74bfe01c22e6747b9588d773a1d5e0c7eb0a7dde80ec0813672b43cc9a5bcaf5572189f1c6a1fe66cbcb84258076d9a9557e70176261e37247712355092

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1436483.exe

    Filesize

    221KB

    MD5

    eccbc2733399e09ed8112b4294776ac6

    SHA1

    36d400a8265902715cc87cb57d9025fe335f7110

    SHA256

    f315e8812ab8b063959a7586f6bbc119589048de51837e05b34acd10719e7fcd

    SHA512

    5111b74bfe01c22e6747b9588d773a1d5e0c7eb0a7dde80ec0813672b43cc9a5bcaf5572189f1c6a1fe66cbcb84258076d9a9557e70176261e37247712355092

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1436483.exe

    Filesize

    221KB

    MD5

    eccbc2733399e09ed8112b4294776ac6

    SHA1

    36d400a8265902715cc87cb57d9025fe335f7110

    SHA256

    f315e8812ab8b063959a7586f6bbc119589048de51837e05b34acd10719e7fcd

    SHA512

    5111b74bfe01c22e6747b9588d773a1d5e0c7eb0a7dde80ec0813672b43cc9a5bcaf5572189f1c6a1fe66cbcb84258076d9a9557e70176261e37247712355092

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1436483.exe

    Filesize

    221KB

    MD5

    eccbc2733399e09ed8112b4294776ac6

    SHA1

    36d400a8265902715cc87cb57d9025fe335f7110

    SHA256

    f315e8812ab8b063959a7586f6bbc119589048de51837e05b34acd10719e7fcd

    SHA512

    5111b74bfe01c22e6747b9588d773a1d5e0c7eb0a7dde80ec0813672b43cc9a5bcaf5572189f1c6a1fe66cbcb84258076d9a9557e70176261e37247712355092

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1436483.exe

    Filesize

    221KB

    MD5

    eccbc2733399e09ed8112b4294776ac6

    SHA1

    36d400a8265902715cc87cb57d9025fe335f7110

    SHA256

    f315e8812ab8b063959a7586f6bbc119589048de51837e05b34acd10719e7fcd

    SHA512

    5111b74bfe01c22e6747b9588d773a1d5e0c7eb0a7dde80ec0813672b43cc9a5bcaf5572189f1c6a1fe66cbcb84258076d9a9557e70176261e37247712355092

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1436483.exe

    Filesize

    221KB

    MD5

    eccbc2733399e09ed8112b4294776ac6

    SHA1

    36d400a8265902715cc87cb57d9025fe335f7110

    SHA256

    f315e8812ab8b063959a7586f6bbc119589048de51837e05b34acd10719e7fcd

    SHA512

    5111b74bfe01c22e6747b9588d773a1d5e0c7eb0a7dde80ec0813672b43cc9a5bcaf5572189f1c6a1fe66cbcb84258076d9a9557e70176261e37247712355092

  • memory/2020-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2020-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2020-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2020-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2020-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2020-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2020-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2020-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB