Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 12:39

General

  • Target

    1fc8622b763617f90e2ee058e6c09348.exe

  • Size

    1.1MB

  • MD5

    1fc8622b763617f90e2ee058e6c09348

  • SHA1

    564165bdb0632f8e181a948867c75139306cc2bb

  • SHA256

    6bd623fc398c6c9bbb23c9cd11a6db42bd8c648e156eb848659fa95b207a1c89

  • SHA512

    083e9dc1f16e27736cafd98584c6c264024a390c5e0f00e666aa3ea2dce8fc450ef3b063e64de9d59d4e2cab78d5c6382613cdbfa00f7363450d36717861661c

  • SSDEEP

    12288:wMrsy90EojlIDkf8tx5m/XfNxbw/Suup8d8+d3CdfskJRl0LuFL+52c3ySskUEVG:MyI81SXfPjus8dZcsOf0LuFKj3yjBo6

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fc8622b763617f90e2ee058e6c09348.exe
    "C:\Users\Admin\AppData\Local\Temp\1fc8622b763617f90e2ee058e6c09348.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0215862.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0215862.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3689785.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3689785.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1960
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4729170.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4729170.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2104
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4058130.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4058130.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2756
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0156729.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0156729.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2604
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2616
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2788
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 280
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2820

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0215862.exe
      Filesize

      997KB

      MD5

      239dc5932e54be100b050abfc02877df

      SHA1

      e5074b65bf9c51436ba87fa27dde6d9e0caba2c2

      SHA256

      c719a3f1eeb1436b75667456d2d3ecfbe3a11e8d54c654cd5018da71868f7c73

      SHA512

      919c5d4f44d7e97124e3a554f8e53af9f8cd360e3e57bc71b64c95d5f699ddb1e8f6143fc746fe6be5ce4bb748b73f620435986c8333ba406d6c2b7da5d7b438

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0215862.exe
      Filesize

      997KB

      MD5

      239dc5932e54be100b050abfc02877df

      SHA1

      e5074b65bf9c51436ba87fa27dde6d9e0caba2c2

      SHA256

      c719a3f1eeb1436b75667456d2d3ecfbe3a11e8d54c654cd5018da71868f7c73

      SHA512

      919c5d4f44d7e97124e3a554f8e53af9f8cd360e3e57bc71b64c95d5f699ddb1e8f6143fc746fe6be5ce4bb748b73f620435986c8333ba406d6c2b7da5d7b438

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3689785.exe
      Filesize

      814KB

      MD5

      a5439a2b73a9038351506d71587804a8

      SHA1

      c968335ebb5aaf5638d88f647255942f0bf433de

      SHA256

      b654c66a83c17204c8d44b2714129c8e685a1015d53ec3cbd0fcb84afabc84d0

      SHA512

      bbc3b86740be3cadbad91a642314142406a95a4398b8a9786e4d263614f1ca81ab320523c971d80f69af4e8b92303ad14dac1a1c2e00ab9992a20ec08e097ce0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3689785.exe
      Filesize

      814KB

      MD5

      a5439a2b73a9038351506d71587804a8

      SHA1

      c968335ebb5aaf5638d88f647255942f0bf433de

      SHA256

      b654c66a83c17204c8d44b2714129c8e685a1015d53ec3cbd0fcb84afabc84d0

      SHA512

      bbc3b86740be3cadbad91a642314142406a95a4398b8a9786e4d263614f1ca81ab320523c971d80f69af4e8b92303ad14dac1a1c2e00ab9992a20ec08e097ce0

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4729170.exe
      Filesize

      631KB

      MD5

      80c823f408ec39181f045eec108619ea

      SHA1

      281c7f10193047cdd15a5fd7247d304969f93e0c

      SHA256

      86101fa3659b001ff0a9a6fcdb0c56372c246ec92aa7ce1b8d616fc8c036d7f9

      SHA512

      99e7c3587d7f5f12b45b2b9d769d4c47ef61175bf4c7c6168585794fb2ee71d1df577a3a77d6434fb432d7f44883b671a36874559650644a019d33b557a1f681

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4729170.exe
      Filesize

      631KB

      MD5

      80c823f408ec39181f045eec108619ea

      SHA1

      281c7f10193047cdd15a5fd7247d304969f93e0c

      SHA256

      86101fa3659b001ff0a9a6fcdb0c56372c246ec92aa7ce1b8d616fc8c036d7f9

      SHA512

      99e7c3587d7f5f12b45b2b9d769d4c47ef61175bf4c7c6168585794fb2ee71d1df577a3a77d6434fb432d7f44883b671a36874559650644a019d33b557a1f681

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4058130.exe
      Filesize

      354KB

      MD5

      121215643bb83a33a06a56e067cf29f8

      SHA1

      0f0000b409a2c845c8f3f2fb4584f8eb4d1ca373

      SHA256

      afecd7afdfea0fa8b8fe45de8eacf4cc1ef888697f1d41557f8ad87f1fd2c17a

      SHA512

      9ffd940bb069b6434297cc149de577478249c02e41935155a94a6b2d14f63613831e79beaa1657398e750a9479c2101761a7346582bf58b4b163eea38bfb40ca

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4058130.exe
      Filesize

      354KB

      MD5

      121215643bb83a33a06a56e067cf29f8

      SHA1

      0f0000b409a2c845c8f3f2fb4584f8eb4d1ca373

      SHA256

      afecd7afdfea0fa8b8fe45de8eacf4cc1ef888697f1d41557f8ad87f1fd2c17a

      SHA512

      9ffd940bb069b6434297cc149de577478249c02e41935155a94a6b2d14f63613831e79beaa1657398e750a9479c2101761a7346582bf58b4b163eea38bfb40ca

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0156729.exe
      Filesize

      250KB

      MD5

      76e210dc90c6c61c56fb944ce039063c

      SHA1

      0081eca64039fbb4221997de642ffeb89be00036

      SHA256

      290471039062e596eeee2629906dc66a8a18a67e1360f1a9bb8d746f707312cc

      SHA512

      18c6595db3557df75049bf654430af82e5ab24728d8d3c8d33c12fff7b45f762319ec42beb8ce928b2114fcb11e7671fba76b36574b8a44476635e6e469ae9a9

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0156729.exe
      Filesize

      250KB

      MD5

      76e210dc90c6c61c56fb944ce039063c

      SHA1

      0081eca64039fbb4221997de642ffeb89be00036

      SHA256

      290471039062e596eeee2629906dc66a8a18a67e1360f1a9bb8d746f707312cc

      SHA512

      18c6595db3557df75049bf654430af82e5ab24728d8d3c8d33c12fff7b45f762319ec42beb8ce928b2114fcb11e7671fba76b36574b8a44476635e6e469ae9a9

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0156729.exe
      Filesize

      250KB

      MD5

      76e210dc90c6c61c56fb944ce039063c

      SHA1

      0081eca64039fbb4221997de642ffeb89be00036

      SHA256

      290471039062e596eeee2629906dc66a8a18a67e1360f1a9bb8d746f707312cc

      SHA512

      18c6595db3557df75049bf654430af82e5ab24728d8d3c8d33c12fff7b45f762319ec42beb8ce928b2114fcb11e7671fba76b36574b8a44476635e6e469ae9a9

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0215862.exe
      Filesize

      997KB

      MD5

      239dc5932e54be100b050abfc02877df

      SHA1

      e5074b65bf9c51436ba87fa27dde6d9e0caba2c2

      SHA256

      c719a3f1eeb1436b75667456d2d3ecfbe3a11e8d54c654cd5018da71868f7c73

      SHA512

      919c5d4f44d7e97124e3a554f8e53af9f8cd360e3e57bc71b64c95d5f699ddb1e8f6143fc746fe6be5ce4bb748b73f620435986c8333ba406d6c2b7da5d7b438

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0215862.exe
      Filesize

      997KB

      MD5

      239dc5932e54be100b050abfc02877df

      SHA1

      e5074b65bf9c51436ba87fa27dde6d9e0caba2c2

      SHA256

      c719a3f1eeb1436b75667456d2d3ecfbe3a11e8d54c654cd5018da71868f7c73

      SHA512

      919c5d4f44d7e97124e3a554f8e53af9f8cd360e3e57bc71b64c95d5f699ddb1e8f6143fc746fe6be5ce4bb748b73f620435986c8333ba406d6c2b7da5d7b438

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3689785.exe
      Filesize

      814KB

      MD5

      a5439a2b73a9038351506d71587804a8

      SHA1

      c968335ebb5aaf5638d88f647255942f0bf433de

      SHA256

      b654c66a83c17204c8d44b2714129c8e685a1015d53ec3cbd0fcb84afabc84d0

      SHA512

      bbc3b86740be3cadbad91a642314142406a95a4398b8a9786e4d263614f1ca81ab320523c971d80f69af4e8b92303ad14dac1a1c2e00ab9992a20ec08e097ce0

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3689785.exe
      Filesize

      814KB

      MD5

      a5439a2b73a9038351506d71587804a8

      SHA1

      c968335ebb5aaf5638d88f647255942f0bf433de

      SHA256

      b654c66a83c17204c8d44b2714129c8e685a1015d53ec3cbd0fcb84afabc84d0

      SHA512

      bbc3b86740be3cadbad91a642314142406a95a4398b8a9786e4d263614f1ca81ab320523c971d80f69af4e8b92303ad14dac1a1c2e00ab9992a20ec08e097ce0

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4729170.exe
      Filesize

      631KB

      MD5

      80c823f408ec39181f045eec108619ea

      SHA1

      281c7f10193047cdd15a5fd7247d304969f93e0c

      SHA256

      86101fa3659b001ff0a9a6fcdb0c56372c246ec92aa7ce1b8d616fc8c036d7f9

      SHA512

      99e7c3587d7f5f12b45b2b9d769d4c47ef61175bf4c7c6168585794fb2ee71d1df577a3a77d6434fb432d7f44883b671a36874559650644a019d33b557a1f681

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4729170.exe
      Filesize

      631KB

      MD5

      80c823f408ec39181f045eec108619ea

      SHA1

      281c7f10193047cdd15a5fd7247d304969f93e0c

      SHA256

      86101fa3659b001ff0a9a6fcdb0c56372c246ec92aa7ce1b8d616fc8c036d7f9

      SHA512

      99e7c3587d7f5f12b45b2b9d769d4c47ef61175bf4c7c6168585794fb2ee71d1df577a3a77d6434fb432d7f44883b671a36874559650644a019d33b557a1f681

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z4058130.exe
      Filesize

      354KB

      MD5

      121215643bb83a33a06a56e067cf29f8

      SHA1

      0f0000b409a2c845c8f3f2fb4584f8eb4d1ca373

      SHA256

      afecd7afdfea0fa8b8fe45de8eacf4cc1ef888697f1d41557f8ad87f1fd2c17a

      SHA512

      9ffd940bb069b6434297cc149de577478249c02e41935155a94a6b2d14f63613831e79beaa1657398e750a9479c2101761a7346582bf58b4b163eea38bfb40ca

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z4058130.exe
      Filesize

      354KB

      MD5

      121215643bb83a33a06a56e067cf29f8

      SHA1

      0f0000b409a2c845c8f3f2fb4584f8eb4d1ca373

      SHA256

      afecd7afdfea0fa8b8fe45de8eacf4cc1ef888697f1d41557f8ad87f1fd2c17a

      SHA512

      9ffd940bb069b6434297cc149de577478249c02e41935155a94a6b2d14f63613831e79beaa1657398e750a9479c2101761a7346582bf58b4b163eea38bfb40ca

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0156729.exe
      Filesize

      250KB

      MD5

      76e210dc90c6c61c56fb944ce039063c

      SHA1

      0081eca64039fbb4221997de642ffeb89be00036

      SHA256

      290471039062e596eeee2629906dc66a8a18a67e1360f1a9bb8d746f707312cc

      SHA512

      18c6595db3557df75049bf654430af82e5ab24728d8d3c8d33c12fff7b45f762319ec42beb8ce928b2114fcb11e7671fba76b36574b8a44476635e6e469ae9a9

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0156729.exe
      Filesize

      250KB

      MD5

      76e210dc90c6c61c56fb944ce039063c

      SHA1

      0081eca64039fbb4221997de642ffeb89be00036

      SHA256

      290471039062e596eeee2629906dc66a8a18a67e1360f1a9bb8d746f707312cc

      SHA512

      18c6595db3557df75049bf654430af82e5ab24728d8d3c8d33c12fff7b45f762319ec42beb8ce928b2114fcb11e7671fba76b36574b8a44476635e6e469ae9a9

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0156729.exe
      Filesize

      250KB

      MD5

      76e210dc90c6c61c56fb944ce039063c

      SHA1

      0081eca64039fbb4221997de642ffeb89be00036

      SHA256

      290471039062e596eeee2629906dc66a8a18a67e1360f1a9bb8d746f707312cc

      SHA512

      18c6595db3557df75049bf654430af82e5ab24728d8d3c8d33c12fff7b45f762319ec42beb8ce928b2114fcb11e7671fba76b36574b8a44476635e6e469ae9a9

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0156729.exe
      Filesize

      250KB

      MD5

      76e210dc90c6c61c56fb944ce039063c

      SHA1

      0081eca64039fbb4221997de642ffeb89be00036

      SHA256

      290471039062e596eeee2629906dc66a8a18a67e1360f1a9bb8d746f707312cc

      SHA512

      18c6595db3557df75049bf654430af82e5ab24728d8d3c8d33c12fff7b45f762319ec42beb8ce928b2114fcb11e7671fba76b36574b8a44476635e6e469ae9a9

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0156729.exe
      Filesize

      250KB

      MD5

      76e210dc90c6c61c56fb944ce039063c

      SHA1

      0081eca64039fbb4221997de642ffeb89be00036

      SHA256

      290471039062e596eeee2629906dc66a8a18a67e1360f1a9bb8d746f707312cc

      SHA512

      18c6595db3557df75049bf654430af82e5ab24728d8d3c8d33c12fff7b45f762319ec42beb8ce928b2114fcb11e7671fba76b36574b8a44476635e6e469ae9a9

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0156729.exe
      Filesize

      250KB

      MD5

      76e210dc90c6c61c56fb944ce039063c

      SHA1

      0081eca64039fbb4221997de642ffeb89be00036

      SHA256

      290471039062e596eeee2629906dc66a8a18a67e1360f1a9bb8d746f707312cc

      SHA512

      18c6595db3557df75049bf654430af82e5ab24728d8d3c8d33c12fff7b45f762319ec42beb8ce928b2114fcb11e7671fba76b36574b8a44476635e6e469ae9a9

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0156729.exe
      Filesize

      250KB

      MD5

      76e210dc90c6c61c56fb944ce039063c

      SHA1

      0081eca64039fbb4221997de642ffeb89be00036

      SHA256

      290471039062e596eeee2629906dc66a8a18a67e1360f1a9bb8d746f707312cc

      SHA512

      18c6595db3557df75049bf654430af82e5ab24728d8d3c8d33c12fff7b45f762319ec42beb8ce928b2114fcb11e7671fba76b36574b8a44476635e6e469ae9a9

    • memory/2788-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
      Filesize

      4KB

    • memory/2788-58-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2788-60-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2788-62-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2788-56-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2788-55-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2788-54-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2788-53-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB