Analysis

  • max time kernel
    121s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 12:31

General

  • Target

    5ee4d56ab9b4c561ae652f66b8d9750c.exe

  • Size

    1.1MB

  • MD5

    5ee4d56ab9b4c561ae652f66b8d9750c

  • SHA1

    bc1f7f4606da7c427984249976f9d8aae0f91a4c

  • SHA256

    4b0e79d395083723c3dd3a17b0c34ccf0b7a2f670e6aae6b9194ecf1fe0a4dac

  • SHA512

    880c5f9106dd42933a4b6c5cd18dc4250cdabf3b78a8bea517bd74d1db7219844376d59792a5bba317c24e012455f3c6f7d30547ee65568e4970d51cdd18f22f

  • SSDEEP

    24576:hy8TQOLVciUgq0s1CWqMctYA/pFA0UUbVTJ6Mv3vUox:U/cV7XTLaq9UURT4

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ee4d56ab9b4c561ae652f66b8d9750c.exe
    "C:\Users\Admin\AppData\Local\Temp\5ee4d56ab9b4c561ae652f66b8d9750c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1046657.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1046657.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7772281.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7772281.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1184
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9259279.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9259279.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2716
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8635948.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8635948.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2636
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8603293.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8603293.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2760
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 288
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2492
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2732
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2752
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      1⤵
        PID:2204

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1046657.exe

        Filesize

        997KB

        MD5

        3af68c108eda57d729f500e7bbd56e9f

        SHA1

        95b6523b95fa963fa346d37fa9b8bd59d4a446b1

        SHA256

        b914aa18261dec7f8ca4bf8fb91089582a6584889921a1fb9bfbde9c8776e535

        SHA512

        719494cb64fc7b72b2dda98ec6123c121f1a13d50360b441a0cc69344fd29e27c5cd821778b5a2bed6c7de7a21352ecebc7981b89f1c7a3fcad5892e5ccfc7ef

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1046657.exe

        Filesize

        997KB

        MD5

        3af68c108eda57d729f500e7bbd56e9f

        SHA1

        95b6523b95fa963fa346d37fa9b8bd59d4a446b1

        SHA256

        b914aa18261dec7f8ca4bf8fb91089582a6584889921a1fb9bfbde9c8776e535

        SHA512

        719494cb64fc7b72b2dda98ec6123c121f1a13d50360b441a0cc69344fd29e27c5cd821778b5a2bed6c7de7a21352ecebc7981b89f1c7a3fcad5892e5ccfc7ef

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7772281.exe

        Filesize

        814KB

        MD5

        b6f7bbde98ee890a375ccbfa8d6a3723

        SHA1

        2d5080a07e9016be0c64913d12d8f5fb5e542611

        SHA256

        3459a4c3b28c350a6f15b7f27b61c90a6cc9156b78d4850a9cbd19ec86b21ff1

        SHA512

        ef6fc4a503c74b56d9aaad413ad1c46926e3eb8410c3398320c8459fee562fc33d8afb23b2e1fa26eb35763be027d5002a90a0f61b304e6d5e7f627dd68dc594

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7772281.exe

        Filesize

        814KB

        MD5

        b6f7bbde98ee890a375ccbfa8d6a3723

        SHA1

        2d5080a07e9016be0c64913d12d8f5fb5e542611

        SHA256

        3459a4c3b28c350a6f15b7f27b61c90a6cc9156b78d4850a9cbd19ec86b21ff1

        SHA512

        ef6fc4a503c74b56d9aaad413ad1c46926e3eb8410c3398320c8459fee562fc33d8afb23b2e1fa26eb35763be027d5002a90a0f61b304e6d5e7f627dd68dc594

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9259279.exe

        Filesize

        631KB

        MD5

        80a3aefe44c20f0a1b4fa9a9843c8334

        SHA1

        a8b49df6f191fce719ac9d26487fa093c53df52c

        SHA256

        72fee0671762c548300a2fb4e4759ddfe34f9379a379e2beb9ca3d062db9440b

        SHA512

        7d3432aa73f54ffbf11d581c1d786586d40042814111e262dd5bf2e07d09ce61bcc75beb26d45991f25065526ff9d18cd1540d8d4c7f0b3c02da30f80199a672

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9259279.exe

        Filesize

        631KB

        MD5

        80a3aefe44c20f0a1b4fa9a9843c8334

        SHA1

        a8b49df6f191fce719ac9d26487fa093c53df52c

        SHA256

        72fee0671762c548300a2fb4e4759ddfe34f9379a379e2beb9ca3d062db9440b

        SHA512

        7d3432aa73f54ffbf11d581c1d786586d40042814111e262dd5bf2e07d09ce61bcc75beb26d45991f25065526ff9d18cd1540d8d4c7f0b3c02da30f80199a672

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8635948.exe

        Filesize

        354KB

        MD5

        c18723f22cef8a507395ea469ada4a18

        SHA1

        210c2b2ac47813a1f544ef2ea9f5a8a6e602a961

        SHA256

        1f5fcd7f228c235cc4231ecb19870843f80904d5ede96f7d3b4b37918a67b4cf

        SHA512

        c02a1b135c1dd6eff2defbab178e90884a213548c92d9f206dc5f0fc3ba4d2ad69010a3287b33262dc324021f8db1e4410f60cefd225f713eb543056c149121c

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8635948.exe

        Filesize

        354KB

        MD5

        c18723f22cef8a507395ea469ada4a18

        SHA1

        210c2b2ac47813a1f544ef2ea9f5a8a6e602a961

        SHA256

        1f5fcd7f228c235cc4231ecb19870843f80904d5ede96f7d3b4b37918a67b4cf

        SHA512

        c02a1b135c1dd6eff2defbab178e90884a213548c92d9f206dc5f0fc3ba4d2ad69010a3287b33262dc324021f8db1e4410f60cefd225f713eb543056c149121c

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8603293.exe

        Filesize

        250KB

        MD5

        7e54db4c91c4afbff61772ab7c5b6494

        SHA1

        8f8ab5ce482db4380f232c420377be7ba25239cc

        SHA256

        41046925e9cf09d66552f1073b605f15c1cb243d7886244e6a82b5322080df7a

        SHA512

        92ca77be46cbf344fb82e7af2a873c195da4947e2c7673f0c1ffeace80cb9c7e24037a1729ca91c8f4b4a9b2f7e47ec3ba57345dd1c5d3f7894ec56684733dab

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8603293.exe

        Filesize

        250KB

        MD5

        7e54db4c91c4afbff61772ab7c5b6494

        SHA1

        8f8ab5ce482db4380f232c420377be7ba25239cc

        SHA256

        41046925e9cf09d66552f1073b605f15c1cb243d7886244e6a82b5322080df7a

        SHA512

        92ca77be46cbf344fb82e7af2a873c195da4947e2c7673f0c1ffeace80cb9c7e24037a1729ca91c8f4b4a9b2f7e47ec3ba57345dd1c5d3f7894ec56684733dab

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8603293.exe

        Filesize

        250KB

        MD5

        7e54db4c91c4afbff61772ab7c5b6494

        SHA1

        8f8ab5ce482db4380f232c420377be7ba25239cc

        SHA256

        41046925e9cf09d66552f1073b605f15c1cb243d7886244e6a82b5322080df7a

        SHA512

        92ca77be46cbf344fb82e7af2a873c195da4947e2c7673f0c1ffeace80cb9c7e24037a1729ca91c8f4b4a9b2f7e47ec3ba57345dd1c5d3f7894ec56684733dab

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1046657.exe

        Filesize

        997KB

        MD5

        3af68c108eda57d729f500e7bbd56e9f

        SHA1

        95b6523b95fa963fa346d37fa9b8bd59d4a446b1

        SHA256

        b914aa18261dec7f8ca4bf8fb91089582a6584889921a1fb9bfbde9c8776e535

        SHA512

        719494cb64fc7b72b2dda98ec6123c121f1a13d50360b441a0cc69344fd29e27c5cd821778b5a2bed6c7de7a21352ecebc7981b89f1c7a3fcad5892e5ccfc7ef

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1046657.exe

        Filesize

        997KB

        MD5

        3af68c108eda57d729f500e7bbd56e9f

        SHA1

        95b6523b95fa963fa346d37fa9b8bd59d4a446b1

        SHA256

        b914aa18261dec7f8ca4bf8fb91089582a6584889921a1fb9bfbde9c8776e535

        SHA512

        719494cb64fc7b72b2dda98ec6123c121f1a13d50360b441a0cc69344fd29e27c5cd821778b5a2bed6c7de7a21352ecebc7981b89f1c7a3fcad5892e5ccfc7ef

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7772281.exe

        Filesize

        814KB

        MD5

        b6f7bbde98ee890a375ccbfa8d6a3723

        SHA1

        2d5080a07e9016be0c64913d12d8f5fb5e542611

        SHA256

        3459a4c3b28c350a6f15b7f27b61c90a6cc9156b78d4850a9cbd19ec86b21ff1

        SHA512

        ef6fc4a503c74b56d9aaad413ad1c46926e3eb8410c3398320c8459fee562fc33d8afb23b2e1fa26eb35763be027d5002a90a0f61b304e6d5e7f627dd68dc594

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7772281.exe

        Filesize

        814KB

        MD5

        b6f7bbde98ee890a375ccbfa8d6a3723

        SHA1

        2d5080a07e9016be0c64913d12d8f5fb5e542611

        SHA256

        3459a4c3b28c350a6f15b7f27b61c90a6cc9156b78d4850a9cbd19ec86b21ff1

        SHA512

        ef6fc4a503c74b56d9aaad413ad1c46926e3eb8410c3398320c8459fee562fc33d8afb23b2e1fa26eb35763be027d5002a90a0f61b304e6d5e7f627dd68dc594

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9259279.exe

        Filesize

        631KB

        MD5

        80a3aefe44c20f0a1b4fa9a9843c8334

        SHA1

        a8b49df6f191fce719ac9d26487fa093c53df52c

        SHA256

        72fee0671762c548300a2fb4e4759ddfe34f9379a379e2beb9ca3d062db9440b

        SHA512

        7d3432aa73f54ffbf11d581c1d786586d40042814111e262dd5bf2e07d09ce61bcc75beb26d45991f25065526ff9d18cd1540d8d4c7f0b3c02da30f80199a672

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9259279.exe

        Filesize

        631KB

        MD5

        80a3aefe44c20f0a1b4fa9a9843c8334

        SHA1

        a8b49df6f191fce719ac9d26487fa093c53df52c

        SHA256

        72fee0671762c548300a2fb4e4759ddfe34f9379a379e2beb9ca3d062db9440b

        SHA512

        7d3432aa73f54ffbf11d581c1d786586d40042814111e262dd5bf2e07d09ce61bcc75beb26d45991f25065526ff9d18cd1540d8d4c7f0b3c02da30f80199a672

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8635948.exe

        Filesize

        354KB

        MD5

        c18723f22cef8a507395ea469ada4a18

        SHA1

        210c2b2ac47813a1f544ef2ea9f5a8a6e602a961

        SHA256

        1f5fcd7f228c235cc4231ecb19870843f80904d5ede96f7d3b4b37918a67b4cf

        SHA512

        c02a1b135c1dd6eff2defbab178e90884a213548c92d9f206dc5f0fc3ba4d2ad69010a3287b33262dc324021f8db1e4410f60cefd225f713eb543056c149121c

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8635948.exe

        Filesize

        354KB

        MD5

        c18723f22cef8a507395ea469ada4a18

        SHA1

        210c2b2ac47813a1f544ef2ea9f5a8a6e602a961

        SHA256

        1f5fcd7f228c235cc4231ecb19870843f80904d5ede96f7d3b4b37918a67b4cf

        SHA512

        c02a1b135c1dd6eff2defbab178e90884a213548c92d9f206dc5f0fc3ba4d2ad69010a3287b33262dc324021f8db1e4410f60cefd225f713eb543056c149121c

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8603293.exe

        Filesize

        250KB

        MD5

        7e54db4c91c4afbff61772ab7c5b6494

        SHA1

        8f8ab5ce482db4380f232c420377be7ba25239cc

        SHA256

        41046925e9cf09d66552f1073b605f15c1cb243d7886244e6a82b5322080df7a

        SHA512

        92ca77be46cbf344fb82e7af2a873c195da4947e2c7673f0c1ffeace80cb9c7e24037a1729ca91c8f4b4a9b2f7e47ec3ba57345dd1c5d3f7894ec56684733dab

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8603293.exe

        Filesize

        250KB

        MD5

        7e54db4c91c4afbff61772ab7c5b6494

        SHA1

        8f8ab5ce482db4380f232c420377be7ba25239cc

        SHA256

        41046925e9cf09d66552f1073b605f15c1cb243d7886244e6a82b5322080df7a

        SHA512

        92ca77be46cbf344fb82e7af2a873c195da4947e2c7673f0c1ffeace80cb9c7e24037a1729ca91c8f4b4a9b2f7e47ec3ba57345dd1c5d3f7894ec56684733dab

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8603293.exe

        Filesize

        250KB

        MD5

        7e54db4c91c4afbff61772ab7c5b6494

        SHA1

        8f8ab5ce482db4380f232c420377be7ba25239cc

        SHA256

        41046925e9cf09d66552f1073b605f15c1cb243d7886244e6a82b5322080df7a

        SHA512

        92ca77be46cbf344fb82e7af2a873c195da4947e2c7673f0c1ffeace80cb9c7e24037a1729ca91c8f4b4a9b2f7e47ec3ba57345dd1c5d3f7894ec56684733dab

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8603293.exe

        Filesize

        250KB

        MD5

        7e54db4c91c4afbff61772ab7c5b6494

        SHA1

        8f8ab5ce482db4380f232c420377be7ba25239cc

        SHA256

        41046925e9cf09d66552f1073b605f15c1cb243d7886244e6a82b5322080df7a

        SHA512

        92ca77be46cbf344fb82e7af2a873c195da4947e2c7673f0c1ffeace80cb9c7e24037a1729ca91c8f4b4a9b2f7e47ec3ba57345dd1c5d3f7894ec56684733dab

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8603293.exe

        Filesize

        250KB

        MD5

        7e54db4c91c4afbff61772ab7c5b6494

        SHA1

        8f8ab5ce482db4380f232c420377be7ba25239cc

        SHA256

        41046925e9cf09d66552f1073b605f15c1cb243d7886244e6a82b5322080df7a

        SHA512

        92ca77be46cbf344fb82e7af2a873c195da4947e2c7673f0c1ffeace80cb9c7e24037a1729ca91c8f4b4a9b2f7e47ec3ba57345dd1c5d3f7894ec56684733dab

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8603293.exe

        Filesize

        250KB

        MD5

        7e54db4c91c4afbff61772ab7c5b6494

        SHA1

        8f8ab5ce482db4380f232c420377be7ba25239cc

        SHA256

        41046925e9cf09d66552f1073b605f15c1cb243d7886244e6a82b5322080df7a

        SHA512

        92ca77be46cbf344fb82e7af2a873c195da4947e2c7673f0c1ffeace80cb9c7e24037a1729ca91c8f4b4a9b2f7e47ec3ba57345dd1c5d3f7894ec56684733dab

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8603293.exe

        Filesize

        250KB

        MD5

        7e54db4c91c4afbff61772ab7c5b6494

        SHA1

        8f8ab5ce482db4380f232c420377be7ba25239cc

        SHA256

        41046925e9cf09d66552f1073b605f15c1cb243d7886244e6a82b5322080df7a

        SHA512

        92ca77be46cbf344fb82e7af2a873c195da4947e2c7673f0c1ffeace80cb9c7e24037a1729ca91c8f4b4a9b2f7e47ec3ba57345dd1c5d3f7894ec56684733dab

      • memory/2732-58-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2732-60-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2732-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

        Filesize

        4KB

      • memory/2732-56-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2732-55-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2732-54-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2732-53-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2732-62-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB