Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 11:41

General

  • Target

    44b2e50818d385954d078ce2f62d4172.exe

  • Size

    1.0MB

  • MD5

    44b2e50818d385954d078ce2f62d4172

  • SHA1

    6605450f0920bf5761d3d3c5eaa38948fc8489f8

  • SHA256

    f1f5f87d3abd8ca2a0be081f113ba16383360ebad13d3e1930af75cd99786b78

  • SHA512

    fd8a623f383a3e43a4278b698c1c9f511074a9af45a7028b6f3f98eb729e2f64e064c44eb09f018242c140bc61a3d3ee80e793e325efbcd1a33dbe77748bae81

  • SSDEEP

    24576:NyFcAEQ0BbmYYvh7Yp5bNT35wiMVXkntvl0xOu8W:oFtWFYpsp5bNTp22exOu8

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44b2e50818d385954d078ce2f62d4172.exe
    "C:\Users\Admin\AppData\Local\Temp\44b2e50818d385954d078ce2f62d4172.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9088164.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9088164.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3679420.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3679420.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1197641.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1197641.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2756
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7338299.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7338299.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2644
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5348483.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5348483.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2856
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2252
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9088164.exe

    Filesize

    966KB

    MD5

    798fbc2541aabf97dec35b743757d7c4

    SHA1

    648e3ecea9d4f3c3e7ef4117ad92fe82d9c23ce8

    SHA256

    a93e771719fea1e8b23166b46b6ca8617c7f9340e83d7ff9ca1cb4aba596acaa

    SHA512

    64f5c95c7aae55612ee4b39795ec39dbc70def07b7da18b55cceb3e39c3ef83aac5cb6f8ca54dffec456d2ce9bc31e91fe32539a04b30b23af1a68c8199c2b95

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9088164.exe

    Filesize

    966KB

    MD5

    798fbc2541aabf97dec35b743757d7c4

    SHA1

    648e3ecea9d4f3c3e7ef4117ad92fe82d9c23ce8

    SHA256

    a93e771719fea1e8b23166b46b6ca8617c7f9340e83d7ff9ca1cb4aba596acaa

    SHA512

    64f5c95c7aae55612ee4b39795ec39dbc70def07b7da18b55cceb3e39c3ef83aac5cb6f8ca54dffec456d2ce9bc31e91fe32539a04b30b23af1a68c8199c2b95

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3679420.exe

    Filesize

    783KB

    MD5

    89d0c5385d9c5ec29040e58c5fecbfc9

    SHA1

    a52c7090643c443c66aff9a8c0512d7933de6ffd

    SHA256

    b6ca2bc43309af5a4b9b9f399d46d5f163813e6b398ad60b7e99f40cd537a013

    SHA512

    b63e7770bee8de0ade7350ff884ff2d23fd4b4fe5ea2558709145b7b5146f00605eb8d8f61e013f6688ebe8aeffa894c18b3c4725049a52b5288bff1799c24ba

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3679420.exe

    Filesize

    783KB

    MD5

    89d0c5385d9c5ec29040e58c5fecbfc9

    SHA1

    a52c7090643c443c66aff9a8c0512d7933de6ffd

    SHA256

    b6ca2bc43309af5a4b9b9f399d46d5f163813e6b398ad60b7e99f40cd537a013

    SHA512

    b63e7770bee8de0ade7350ff884ff2d23fd4b4fe5ea2558709145b7b5146f00605eb8d8f61e013f6688ebe8aeffa894c18b3c4725049a52b5288bff1799c24ba

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1197641.exe

    Filesize

    600KB

    MD5

    5b876239ab9d387f1101cb4f55bc40e4

    SHA1

    4ffea9e7c018553a250b6a04a8f0a8cf130a9c48

    SHA256

    eed80a38ea985062219f01ad343b61b99a1b835cb59c818ee44b7dedd55f7468

    SHA512

    333288c593628e8035d34c8982402f034c8a61015b76e69d8802e5adb4c9781aae17674ed9a523cbb608e131af5d163533dc1b628b68d4ee13a142a2e6003a48

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1197641.exe

    Filesize

    600KB

    MD5

    5b876239ab9d387f1101cb4f55bc40e4

    SHA1

    4ffea9e7c018553a250b6a04a8f0a8cf130a9c48

    SHA256

    eed80a38ea985062219f01ad343b61b99a1b835cb59c818ee44b7dedd55f7468

    SHA512

    333288c593628e8035d34c8982402f034c8a61015b76e69d8802e5adb4c9781aae17674ed9a523cbb608e131af5d163533dc1b628b68d4ee13a142a2e6003a48

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7338299.exe

    Filesize

    338KB

    MD5

    bde82a9864fc7150f72ee2a2f5e2eaca

    SHA1

    960e7f40c2c2a495d521c34473d13dc15f0bc373

    SHA256

    3305317da904e9d0679212986adf3098d38e9661736c3a4252182110d82388d6

    SHA512

    f055c6f9a372d2b398a293d6997989730aec2e62e7aaa308dec352369ab46d46fc81901d17b9dfc64921dbd0f456ed85c12af5283d5cb7568b75134ee512e852

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7338299.exe

    Filesize

    338KB

    MD5

    bde82a9864fc7150f72ee2a2f5e2eaca

    SHA1

    960e7f40c2c2a495d521c34473d13dc15f0bc373

    SHA256

    3305317da904e9d0679212986adf3098d38e9661736c3a4252182110d82388d6

    SHA512

    f055c6f9a372d2b398a293d6997989730aec2e62e7aaa308dec352369ab46d46fc81901d17b9dfc64921dbd0f456ed85c12af5283d5cb7568b75134ee512e852

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5348483.exe

    Filesize

    217KB

    MD5

    9655da77e4a05dcd2eb0c3e96afa97bf

    SHA1

    83e342c458c05b2a2b3d04a346fd590ab0d8ba5d

    SHA256

    940126a8bc36fe5f2c18c0b5b18438424b6ccc06656220803c66d44d3cdcfa0e

    SHA512

    1f44fed512fa68a42de064272647abfc23d807d6e56d95082e8b3edb58fb03edcb5ce8c5f755f1c0c89bee746a5503d4fafd9ba890d2b49685ec370f42452651

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5348483.exe

    Filesize

    217KB

    MD5

    9655da77e4a05dcd2eb0c3e96afa97bf

    SHA1

    83e342c458c05b2a2b3d04a346fd590ab0d8ba5d

    SHA256

    940126a8bc36fe5f2c18c0b5b18438424b6ccc06656220803c66d44d3cdcfa0e

    SHA512

    1f44fed512fa68a42de064272647abfc23d807d6e56d95082e8b3edb58fb03edcb5ce8c5f755f1c0c89bee746a5503d4fafd9ba890d2b49685ec370f42452651

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5348483.exe

    Filesize

    217KB

    MD5

    9655da77e4a05dcd2eb0c3e96afa97bf

    SHA1

    83e342c458c05b2a2b3d04a346fd590ab0d8ba5d

    SHA256

    940126a8bc36fe5f2c18c0b5b18438424b6ccc06656220803c66d44d3cdcfa0e

    SHA512

    1f44fed512fa68a42de064272647abfc23d807d6e56d95082e8b3edb58fb03edcb5ce8c5f755f1c0c89bee746a5503d4fafd9ba890d2b49685ec370f42452651

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9088164.exe

    Filesize

    966KB

    MD5

    798fbc2541aabf97dec35b743757d7c4

    SHA1

    648e3ecea9d4f3c3e7ef4117ad92fe82d9c23ce8

    SHA256

    a93e771719fea1e8b23166b46b6ca8617c7f9340e83d7ff9ca1cb4aba596acaa

    SHA512

    64f5c95c7aae55612ee4b39795ec39dbc70def07b7da18b55cceb3e39c3ef83aac5cb6f8ca54dffec456d2ce9bc31e91fe32539a04b30b23af1a68c8199c2b95

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9088164.exe

    Filesize

    966KB

    MD5

    798fbc2541aabf97dec35b743757d7c4

    SHA1

    648e3ecea9d4f3c3e7ef4117ad92fe82d9c23ce8

    SHA256

    a93e771719fea1e8b23166b46b6ca8617c7f9340e83d7ff9ca1cb4aba596acaa

    SHA512

    64f5c95c7aae55612ee4b39795ec39dbc70def07b7da18b55cceb3e39c3ef83aac5cb6f8ca54dffec456d2ce9bc31e91fe32539a04b30b23af1a68c8199c2b95

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3679420.exe

    Filesize

    783KB

    MD5

    89d0c5385d9c5ec29040e58c5fecbfc9

    SHA1

    a52c7090643c443c66aff9a8c0512d7933de6ffd

    SHA256

    b6ca2bc43309af5a4b9b9f399d46d5f163813e6b398ad60b7e99f40cd537a013

    SHA512

    b63e7770bee8de0ade7350ff884ff2d23fd4b4fe5ea2558709145b7b5146f00605eb8d8f61e013f6688ebe8aeffa894c18b3c4725049a52b5288bff1799c24ba

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3679420.exe

    Filesize

    783KB

    MD5

    89d0c5385d9c5ec29040e58c5fecbfc9

    SHA1

    a52c7090643c443c66aff9a8c0512d7933de6ffd

    SHA256

    b6ca2bc43309af5a4b9b9f399d46d5f163813e6b398ad60b7e99f40cd537a013

    SHA512

    b63e7770bee8de0ade7350ff884ff2d23fd4b4fe5ea2558709145b7b5146f00605eb8d8f61e013f6688ebe8aeffa894c18b3c4725049a52b5288bff1799c24ba

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1197641.exe

    Filesize

    600KB

    MD5

    5b876239ab9d387f1101cb4f55bc40e4

    SHA1

    4ffea9e7c018553a250b6a04a8f0a8cf130a9c48

    SHA256

    eed80a38ea985062219f01ad343b61b99a1b835cb59c818ee44b7dedd55f7468

    SHA512

    333288c593628e8035d34c8982402f034c8a61015b76e69d8802e5adb4c9781aae17674ed9a523cbb608e131af5d163533dc1b628b68d4ee13a142a2e6003a48

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1197641.exe

    Filesize

    600KB

    MD5

    5b876239ab9d387f1101cb4f55bc40e4

    SHA1

    4ffea9e7c018553a250b6a04a8f0a8cf130a9c48

    SHA256

    eed80a38ea985062219f01ad343b61b99a1b835cb59c818ee44b7dedd55f7468

    SHA512

    333288c593628e8035d34c8982402f034c8a61015b76e69d8802e5adb4c9781aae17674ed9a523cbb608e131af5d163533dc1b628b68d4ee13a142a2e6003a48

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7338299.exe

    Filesize

    338KB

    MD5

    bde82a9864fc7150f72ee2a2f5e2eaca

    SHA1

    960e7f40c2c2a495d521c34473d13dc15f0bc373

    SHA256

    3305317da904e9d0679212986adf3098d38e9661736c3a4252182110d82388d6

    SHA512

    f055c6f9a372d2b398a293d6997989730aec2e62e7aaa308dec352369ab46d46fc81901d17b9dfc64921dbd0f456ed85c12af5283d5cb7568b75134ee512e852

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7338299.exe

    Filesize

    338KB

    MD5

    bde82a9864fc7150f72ee2a2f5e2eaca

    SHA1

    960e7f40c2c2a495d521c34473d13dc15f0bc373

    SHA256

    3305317da904e9d0679212986adf3098d38e9661736c3a4252182110d82388d6

    SHA512

    f055c6f9a372d2b398a293d6997989730aec2e62e7aaa308dec352369ab46d46fc81901d17b9dfc64921dbd0f456ed85c12af5283d5cb7568b75134ee512e852

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5348483.exe

    Filesize

    217KB

    MD5

    9655da77e4a05dcd2eb0c3e96afa97bf

    SHA1

    83e342c458c05b2a2b3d04a346fd590ab0d8ba5d

    SHA256

    940126a8bc36fe5f2c18c0b5b18438424b6ccc06656220803c66d44d3cdcfa0e

    SHA512

    1f44fed512fa68a42de064272647abfc23d807d6e56d95082e8b3edb58fb03edcb5ce8c5f755f1c0c89bee746a5503d4fafd9ba890d2b49685ec370f42452651

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5348483.exe

    Filesize

    217KB

    MD5

    9655da77e4a05dcd2eb0c3e96afa97bf

    SHA1

    83e342c458c05b2a2b3d04a346fd590ab0d8ba5d

    SHA256

    940126a8bc36fe5f2c18c0b5b18438424b6ccc06656220803c66d44d3cdcfa0e

    SHA512

    1f44fed512fa68a42de064272647abfc23d807d6e56d95082e8b3edb58fb03edcb5ce8c5f755f1c0c89bee746a5503d4fafd9ba890d2b49685ec370f42452651

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5348483.exe

    Filesize

    217KB

    MD5

    9655da77e4a05dcd2eb0c3e96afa97bf

    SHA1

    83e342c458c05b2a2b3d04a346fd590ab0d8ba5d

    SHA256

    940126a8bc36fe5f2c18c0b5b18438424b6ccc06656220803c66d44d3cdcfa0e

    SHA512

    1f44fed512fa68a42de064272647abfc23d807d6e56d95082e8b3edb58fb03edcb5ce8c5f755f1c0c89bee746a5503d4fafd9ba890d2b49685ec370f42452651

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5348483.exe

    Filesize

    217KB

    MD5

    9655da77e4a05dcd2eb0c3e96afa97bf

    SHA1

    83e342c458c05b2a2b3d04a346fd590ab0d8ba5d

    SHA256

    940126a8bc36fe5f2c18c0b5b18438424b6ccc06656220803c66d44d3cdcfa0e

    SHA512

    1f44fed512fa68a42de064272647abfc23d807d6e56d95082e8b3edb58fb03edcb5ce8c5f755f1c0c89bee746a5503d4fafd9ba890d2b49685ec370f42452651

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5348483.exe

    Filesize

    217KB

    MD5

    9655da77e4a05dcd2eb0c3e96afa97bf

    SHA1

    83e342c458c05b2a2b3d04a346fd590ab0d8ba5d

    SHA256

    940126a8bc36fe5f2c18c0b5b18438424b6ccc06656220803c66d44d3cdcfa0e

    SHA512

    1f44fed512fa68a42de064272647abfc23d807d6e56d95082e8b3edb58fb03edcb5ce8c5f755f1c0c89bee746a5503d4fafd9ba890d2b49685ec370f42452651

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5348483.exe

    Filesize

    217KB

    MD5

    9655da77e4a05dcd2eb0c3e96afa97bf

    SHA1

    83e342c458c05b2a2b3d04a346fd590ab0d8ba5d

    SHA256

    940126a8bc36fe5f2c18c0b5b18438424b6ccc06656220803c66d44d3cdcfa0e

    SHA512

    1f44fed512fa68a42de064272647abfc23d807d6e56d95082e8b3edb58fb03edcb5ce8c5f755f1c0c89bee746a5503d4fafd9ba890d2b49685ec370f42452651

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5348483.exe

    Filesize

    217KB

    MD5

    9655da77e4a05dcd2eb0c3e96afa97bf

    SHA1

    83e342c458c05b2a2b3d04a346fd590ab0d8ba5d

    SHA256

    940126a8bc36fe5f2c18c0b5b18438424b6ccc06656220803c66d44d3cdcfa0e

    SHA512

    1f44fed512fa68a42de064272647abfc23d807d6e56d95082e8b3edb58fb03edcb5ce8c5f755f1c0c89bee746a5503d4fafd9ba890d2b49685ec370f42452651

  • memory/2252-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2252-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2252-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2252-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2252-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2252-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2252-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2252-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB