Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    157s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 10:31

General

  • Target

    3ae80dd172615bd0759e16900e375912635ae0b5a752f5c5e2c9573270ca2173.exe

  • Size

    1.0MB

  • MD5

    ecf38eaa1b073325600bb10cd3638813

  • SHA1

    4a031ca57aa11337c0cc36a53f6ee2249d18f021

  • SHA256

    3ae80dd172615bd0759e16900e375912635ae0b5a752f5c5e2c9573270ca2173

  • SHA512

    98efd38253210dd2a3546f5290beb4318e6e48a9cf64b9086366f46b00b2cd7ce09575e0a0189088cb7446bac1f800ed951b3f47728a03d4ad087f1907e40572

  • SSDEEP

    24576:iygAmTZ5tkRtHgWtCThygdIsmPgDRE1yD+sqLnuynr6:JgJ95tMHNtCTh7ILPsMSy

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ae80dd172615bd0759e16900e375912635ae0b5a752f5c5e2c9573270ca2173.exe
    "C:\Users\Admin\AppData\Local\Temp\3ae80dd172615bd0759e16900e375912635ae0b5a752f5c5e2c9573270ca2173.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4143271.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4143271.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9420760.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9420760.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2528
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4066975.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4066975.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1876
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6181408.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6181408.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2580
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1561761.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1561761.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1680
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2860
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4143271.exe

    Filesize

    961KB

    MD5

    37eda4d625fc0fc226c542dde0fb640b

    SHA1

    7ec09fb8e37a7fb316bdabc8f05faba3d19f87b0

    SHA256

    ba476db4fe52d2646cfb555122264d38290f6a4e1f3e088f8a8bf8e62c37c8f1

    SHA512

    09a7c132688d3d33034013113075cd59116697bd84809c969f5905315a8ba7b4ce9478e16fd86a867c5b365e010abb1aaf4036c8ff53c0d64e397c4df770772e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4143271.exe

    Filesize

    961KB

    MD5

    37eda4d625fc0fc226c542dde0fb640b

    SHA1

    7ec09fb8e37a7fb316bdabc8f05faba3d19f87b0

    SHA256

    ba476db4fe52d2646cfb555122264d38290f6a4e1f3e088f8a8bf8e62c37c8f1

    SHA512

    09a7c132688d3d33034013113075cd59116697bd84809c969f5905315a8ba7b4ce9478e16fd86a867c5b365e010abb1aaf4036c8ff53c0d64e397c4df770772e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9420760.exe

    Filesize

    778KB

    MD5

    5642382f4139b0c008bb0e5cef9da356

    SHA1

    426aa5046321190ca74ce0ccf30314d554dadc9b

    SHA256

    c44511ecf78185b606edca1a32f5ae504a2f9da3bd5803dba99c3c54dd4c0ef3

    SHA512

    0053c696c413f591073e241a7b9cc5a784de67b1e6e46a0cee9132aec08d8b8822af5c84ebcee1d241be5b6512728fa594b120702fcd78c52f65d65f4aff9d70

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9420760.exe

    Filesize

    778KB

    MD5

    5642382f4139b0c008bb0e5cef9da356

    SHA1

    426aa5046321190ca74ce0ccf30314d554dadc9b

    SHA256

    c44511ecf78185b606edca1a32f5ae504a2f9da3bd5803dba99c3c54dd4c0ef3

    SHA512

    0053c696c413f591073e241a7b9cc5a784de67b1e6e46a0cee9132aec08d8b8822af5c84ebcee1d241be5b6512728fa594b120702fcd78c52f65d65f4aff9d70

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4066975.exe

    Filesize

    595KB

    MD5

    7489a9e5fb8406e945859322f84fdb14

    SHA1

    604c6ca3eca4dac6c505be9f635360e0bd673018

    SHA256

    bc904f99857f3400108c5af2e83635888bb033871bbcee4ce58b6e50ea7c4623

    SHA512

    a49d11555c61397486f4f004eb700b4d3b79e4fdf6999e73bf7f3c32d78e04df5f061181dff4d0cb87aca84b8690c190f233112306f348561359620d35b8daea

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4066975.exe

    Filesize

    595KB

    MD5

    7489a9e5fb8406e945859322f84fdb14

    SHA1

    604c6ca3eca4dac6c505be9f635360e0bd673018

    SHA256

    bc904f99857f3400108c5af2e83635888bb033871bbcee4ce58b6e50ea7c4623

    SHA512

    a49d11555c61397486f4f004eb700b4d3b79e4fdf6999e73bf7f3c32d78e04df5f061181dff4d0cb87aca84b8690c190f233112306f348561359620d35b8daea

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6181408.exe

    Filesize

    335KB

    MD5

    44881fe80978e9482f413088a8305c52

    SHA1

    ac7f3dc94bf8caabca221f45470d122ccd5e9b22

    SHA256

    0e4756c37900b2084b8ddfa8cea9dd7e07f3332956b8219b9bd19e5c83f8c127

    SHA512

    834b8163957e2cd34c8d3722600633e9ce3099f5b444f0698c589eae959cbec0dd00abcf9022942c73a99e1439318800fa4dd74d98f71310c358e4e1a6a0a336

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6181408.exe

    Filesize

    335KB

    MD5

    44881fe80978e9482f413088a8305c52

    SHA1

    ac7f3dc94bf8caabca221f45470d122ccd5e9b22

    SHA256

    0e4756c37900b2084b8ddfa8cea9dd7e07f3332956b8219b9bd19e5c83f8c127

    SHA512

    834b8163957e2cd34c8d3722600633e9ce3099f5b444f0698c589eae959cbec0dd00abcf9022942c73a99e1439318800fa4dd74d98f71310c358e4e1a6a0a336

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1561761.exe

    Filesize

    221KB

    MD5

    20289d18f581a80bcd3500800c8f246c

    SHA1

    ebcc1a035a01ccc4551d5a0cc583488685f6eec9

    SHA256

    67194fe17194439bbc505d95e9bc4d4eb3ba6bd1b399b60523cb0595fc2fbc10

    SHA512

    c23296333f21fdf8a0b76544d591b36aeef51800179073efd88ca842e8e2c734872e6ab994b53c4aae30e0497594b5888163c7206e92928d635589e99c0572c4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1561761.exe

    Filesize

    221KB

    MD5

    20289d18f581a80bcd3500800c8f246c

    SHA1

    ebcc1a035a01ccc4551d5a0cc583488685f6eec9

    SHA256

    67194fe17194439bbc505d95e9bc4d4eb3ba6bd1b399b60523cb0595fc2fbc10

    SHA512

    c23296333f21fdf8a0b76544d591b36aeef51800179073efd88ca842e8e2c734872e6ab994b53c4aae30e0497594b5888163c7206e92928d635589e99c0572c4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1561761.exe

    Filesize

    221KB

    MD5

    20289d18f581a80bcd3500800c8f246c

    SHA1

    ebcc1a035a01ccc4551d5a0cc583488685f6eec9

    SHA256

    67194fe17194439bbc505d95e9bc4d4eb3ba6bd1b399b60523cb0595fc2fbc10

    SHA512

    c23296333f21fdf8a0b76544d591b36aeef51800179073efd88ca842e8e2c734872e6ab994b53c4aae30e0497594b5888163c7206e92928d635589e99c0572c4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4143271.exe

    Filesize

    961KB

    MD5

    37eda4d625fc0fc226c542dde0fb640b

    SHA1

    7ec09fb8e37a7fb316bdabc8f05faba3d19f87b0

    SHA256

    ba476db4fe52d2646cfb555122264d38290f6a4e1f3e088f8a8bf8e62c37c8f1

    SHA512

    09a7c132688d3d33034013113075cd59116697bd84809c969f5905315a8ba7b4ce9478e16fd86a867c5b365e010abb1aaf4036c8ff53c0d64e397c4df770772e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4143271.exe

    Filesize

    961KB

    MD5

    37eda4d625fc0fc226c542dde0fb640b

    SHA1

    7ec09fb8e37a7fb316bdabc8f05faba3d19f87b0

    SHA256

    ba476db4fe52d2646cfb555122264d38290f6a4e1f3e088f8a8bf8e62c37c8f1

    SHA512

    09a7c132688d3d33034013113075cd59116697bd84809c969f5905315a8ba7b4ce9478e16fd86a867c5b365e010abb1aaf4036c8ff53c0d64e397c4df770772e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9420760.exe

    Filesize

    778KB

    MD5

    5642382f4139b0c008bb0e5cef9da356

    SHA1

    426aa5046321190ca74ce0ccf30314d554dadc9b

    SHA256

    c44511ecf78185b606edca1a32f5ae504a2f9da3bd5803dba99c3c54dd4c0ef3

    SHA512

    0053c696c413f591073e241a7b9cc5a784de67b1e6e46a0cee9132aec08d8b8822af5c84ebcee1d241be5b6512728fa594b120702fcd78c52f65d65f4aff9d70

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9420760.exe

    Filesize

    778KB

    MD5

    5642382f4139b0c008bb0e5cef9da356

    SHA1

    426aa5046321190ca74ce0ccf30314d554dadc9b

    SHA256

    c44511ecf78185b606edca1a32f5ae504a2f9da3bd5803dba99c3c54dd4c0ef3

    SHA512

    0053c696c413f591073e241a7b9cc5a784de67b1e6e46a0cee9132aec08d8b8822af5c84ebcee1d241be5b6512728fa594b120702fcd78c52f65d65f4aff9d70

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4066975.exe

    Filesize

    595KB

    MD5

    7489a9e5fb8406e945859322f84fdb14

    SHA1

    604c6ca3eca4dac6c505be9f635360e0bd673018

    SHA256

    bc904f99857f3400108c5af2e83635888bb033871bbcee4ce58b6e50ea7c4623

    SHA512

    a49d11555c61397486f4f004eb700b4d3b79e4fdf6999e73bf7f3c32d78e04df5f061181dff4d0cb87aca84b8690c190f233112306f348561359620d35b8daea

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4066975.exe

    Filesize

    595KB

    MD5

    7489a9e5fb8406e945859322f84fdb14

    SHA1

    604c6ca3eca4dac6c505be9f635360e0bd673018

    SHA256

    bc904f99857f3400108c5af2e83635888bb033871bbcee4ce58b6e50ea7c4623

    SHA512

    a49d11555c61397486f4f004eb700b4d3b79e4fdf6999e73bf7f3c32d78e04df5f061181dff4d0cb87aca84b8690c190f233112306f348561359620d35b8daea

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6181408.exe

    Filesize

    335KB

    MD5

    44881fe80978e9482f413088a8305c52

    SHA1

    ac7f3dc94bf8caabca221f45470d122ccd5e9b22

    SHA256

    0e4756c37900b2084b8ddfa8cea9dd7e07f3332956b8219b9bd19e5c83f8c127

    SHA512

    834b8163957e2cd34c8d3722600633e9ce3099f5b444f0698c589eae959cbec0dd00abcf9022942c73a99e1439318800fa4dd74d98f71310c358e4e1a6a0a336

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6181408.exe

    Filesize

    335KB

    MD5

    44881fe80978e9482f413088a8305c52

    SHA1

    ac7f3dc94bf8caabca221f45470d122ccd5e9b22

    SHA256

    0e4756c37900b2084b8ddfa8cea9dd7e07f3332956b8219b9bd19e5c83f8c127

    SHA512

    834b8163957e2cd34c8d3722600633e9ce3099f5b444f0698c589eae959cbec0dd00abcf9022942c73a99e1439318800fa4dd74d98f71310c358e4e1a6a0a336

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1561761.exe

    Filesize

    221KB

    MD5

    20289d18f581a80bcd3500800c8f246c

    SHA1

    ebcc1a035a01ccc4551d5a0cc583488685f6eec9

    SHA256

    67194fe17194439bbc505d95e9bc4d4eb3ba6bd1b399b60523cb0595fc2fbc10

    SHA512

    c23296333f21fdf8a0b76544d591b36aeef51800179073efd88ca842e8e2c734872e6ab994b53c4aae30e0497594b5888163c7206e92928d635589e99c0572c4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1561761.exe

    Filesize

    221KB

    MD5

    20289d18f581a80bcd3500800c8f246c

    SHA1

    ebcc1a035a01ccc4551d5a0cc583488685f6eec9

    SHA256

    67194fe17194439bbc505d95e9bc4d4eb3ba6bd1b399b60523cb0595fc2fbc10

    SHA512

    c23296333f21fdf8a0b76544d591b36aeef51800179073efd88ca842e8e2c734872e6ab994b53c4aae30e0497594b5888163c7206e92928d635589e99c0572c4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1561761.exe

    Filesize

    221KB

    MD5

    20289d18f581a80bcd3500800c8f246c

    SHA1

    ebcc1a035a01ccc4551d5a0cc583488685f6eec9

    SHA256

    67194fe17194439bbc505d95e9bc4d4eb3ba6bd1b399b60523cb0595fc2fbc10

    SHA512

    c23296333f21fdf8a0b76544d591b36aeef51800179073efd88ca842e8e2c734872e6ab994b53c4aae30e0497594b5888163c7206e92928d635589e99c0572c4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1561761.exe

    Filesize

    221KB

    MD5

    20289d18f581a80bcd3500800c8f246c

    SHA1

    ebcc1a035a01ccc4551d5a0cc583488685f6eec9

    SHA256

    67194fe17194439bbc505d95e9bc4d4eb3ba6bd1b399b60523cb0595fc2fbc10

    SHA512

    c23296333f21fdf8a0b76544d591b36aeef51800179073efd88ca842e8e2c734872e6ab994b53c4aae30e0497594b5888163c7206e92928d635589e99c0572c4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1561761.exe

    Filesize

    221KB

    MD5

    20289d18f581a80bcd3500800c8f246c

    SHA1

    ebcc1a035a01ccc4551d5a0cc583488685f6eec9

    SHA256

    67194fe17194439bbc505d95e9bc4d4eb3ba6bd1b399b60523cb0595fc2fbc10

    SHA512

    c23296333f21fdf8a0b76544d591b36aeef51800179073efd88ca842e8e2c734872e6ab994b53c4aae30e0497594b5888163c7206e92928d635589e99c0572c4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1561761.exe

    Filesize

    221KB

    MD5

    20289d18f581a80bcd3500800c8f246c

    SHA1

    ebcc1a035a01ccc4551d5a0cc583488685f6eec9

    SHA256

    67194fe17194439bbc505d95e9bc4d4eb3ba6bd1b399b60523cb0595fc2fbc10

    SHA512

    c23296333f21fdf8a0b76544d591b36aeef51800179073efd88ca842e8e2c734872e6ab994b53c4aae30e0497594b5888163c7206e92928d635589e99c0572c4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1561761.exe

    Filesize

    221KB

    MD5

    20289d18f581a80bcd3500800c8f246c

    SHA1

    ebcc1a035a01ccc4551d5a0cc583488685f6eec9

    SHA256

    67194fe17194439bbc505d95e9bc4d4eb3ba6bd1b399b60523cb0595fc2fbc10

    SHA512

    c23296333f21fdf8a0b76544d591b36aeef51800179073efd88ca842e8e2c734872e6ab994b53c4aae30e0497594b5888163c7206e92928d635589e99c0572c4

  • memory/2860-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2860-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2860-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2860-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2860-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2860-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2860-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2860-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB