Analysis

  • max time kernel
    121s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 13:51

General

  • Target

    c9ecca99998a256658678b9090d70d3f3c8d51e483754d4048b55ac918f36846.exe

  • Size

    1.1MB

  • MD5

    a57d1f6a3427297bb12188479dabd4be

  • SHA1

    af34bb08c113f83a0d7960f9904406b87c28014e

  • SHA256

    c9ecca99998a256658678b9090d70d3f3c8d51e483754d4048b55ac918f36846

  • SHA512

    2a04727b9ea9d1f7881a1b101aca6ee26de6dfbfa002417e70068eb082ace4057001612151e24ae816d764a5017b11574a06ebaaafc9bb2bcc59e29d9e817d4a

  • SSDEEP

    24576:Uy6FN52vOdxvEc9qa5jbyW7ZskO+RcRUnFFeo/tVrvS0fP5:jKiO3vEc9hhyaYKFFe6S

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9ecca99998a256658678b9090d70d3f3c8d51e483754d4048b55ac918f36846.exe
    "C:\Users\Admin\AppData\Local\Temp\c9ecca99998a256658678b9090d70d3f3c8d51e483754d4048b55ac918f36846.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1372783.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1372783.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8305240.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8305240.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2092
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1487995.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1487995.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3060
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9426785.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9426785.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2652
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2478645.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2478645.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2968
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2776
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1372783.exe

    Filesize

    997KB

    MD5

    85002871a2ed4fe17c3f72441689c83e

    SHA1

    00e45994df9d677353fde9181728d3ce06fe120f

    SHA256

    f0ee22a81fd577b537d71be9e721f5469d5e2a6d7c3efb296909c4d1ed888372

    SHA512

    de6a5a4c5771f31c963fee6839a9231e3402516034c3af47d459be39c98f43f25bfedcf140ce44c5d2bc92a65deea172d3448b66e1fd580c11f8dcb2d5e6fd18

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1372783.exe

    Filesize

    997KB

    MD5

    85002871a2ed4fe17c3f72441689c83e

    SHA1

    00e45994df9d677353fde9181728d3ce06fe120f

    SHA256

    f0ee22a81fd577b537d71be9e721f5469d5e2a6d7c3efb296909c4d1ed888372

    SHA512

    de6a5a4c5771f31c963fee6839a9231e3402516034c3af47d459be39c98f43f25bfedcf140ce44c5d2bc92a65deea172d3448b66e1fd580c11f8dcb2d5e6fd18

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8305240.exe

    Filesize

    815KB

    MD5

    2a8b44eed39ab702740bcf82fd565fb4

    SHA1

    61384e31881520dc08c661019ec53820e808fcb1

    SHA256

    d9a4e367a69fad30bae8620729adba06f398873c933f6f3f9104f940735aacb7

    SHA512

    46c79f84e40da69dbf3c8ec2353a71945e6e5d8177dd3ccfa5b1cade98f9a9b3e529c1cce4ff9eebcdbf8a1642827e0d43fa0c01be1d9f6e0aafa309a3546233

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8305240.exe

    Filesize

    815KB

    MD5

    2a8b44eed39ab702740bcf82fd565fb4

    SHA1

    61384e31881520dc08c661019ec53820e808fcb1

    SHA256

    d9a4e367a69fad30bae8620729adba06f398873c933f6f3f9104f940735aacb7

    SHA512

    46c79f84e40da69dbf3c8ec2353a71945e6e5d8177dd3ccfa5b1cade98f9a9b3e529c1cce4ff9eebcdbf8a1642827e0d43fa0c01be1d9f6e0aafa309a3546233

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1487995.exe

    Filesize

    632KB

    MD5

    e76ef8d029e922397f5c1a0be6d2c0ec

    SHA1

    3d9c07ff586791b2d709deaec95ea299376ad0f0

    SHA256

    0f171eac3b156b42e6798b77800b2ebb4c0b28389c6a72d8d923db850febbe50

    SHA512

    b2cf577451a23807f7118ace9fa7087911d30a3cc18ee4f3e5f86cf43bfa9b323667a789be59dff8271a2895f2a188f58a4d0e852af87f60f9753071ef871730

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1487995.exe

    Filesize

    632KB

    MD5

    e76ef8d029e922397f5c1a0be6d2c0ec

    SHA1

    3d9c07ff586791b2d709deaec95ea299376ad0f0

    SHA256

    0f171eac3b156b42e6798b77800b2ebb4c0b28389c6a72d8d923db850febbe50

    SHA512

    b2cf577451a23807f7118ace9fa7087911d30a3cc18ee4f3e5f86cf43bfa9b323667a789be59dff8271a2895f2a188f58a4d0e852af87f60f9753071ef871730

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9426785.exe

    Filesize

    354KB

    MD5

    0786e4b895105a3f2cfe4cd2752506e5

    SHA1

    01ac7d9dd441e75381819c4d3311bae01e539f12

    SHA256

    96bdb586e27c81912651edc0264d9cc8f4b6d37588ce24fc492f3d8c42218274

    SHA512

    f573c36ffdb46858b4132e513f54c56189638b4483d0ea44b949bfddab3ceb71fabd746fbb7823e0fbdfda5a8eebf9946de55feb60227cd253b375bf6f4ef86a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9426785.exe

    Filesize

    354KB

    MD5

    0786e4b895105a3f2cfe4cd2752506e5

    SHA1

    01ac7d9dd441e75381819c4d3311bae01e539f12

    SHA256

    96bdb586e27c81912651edc0264d9cc8f4b6d37588ce24fc492f3d8c42218274

    SHA512

    f573c36ffdb46858b4132e513f54c56189638b4483d0ea44b949bfddab3ceb71fabd746fbb7823e0fbdfda5a8eebf9946de55feb60227cd253b375bf6f4ef86a

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2478645.exe

    Filesize

    250KB

    MD5

    cb8744534ada10ea58ad5877059da4f3

    SHA1

    df0bf8e196cd6e25ab525259aea905ae89fff95f

    SHA256

    1a6dea038248ca8c837a0cf5a97b67ecf38b838bb692782106d8f154cec78c43

    SHA512

    9245ed1f4b296b2b6f282f502d1ad179c3366774bb9cbb5501db90b02ef7bb99b61546feca06bc416d01ce35edd7f266abef05e72e3a62d3f42ed4e1029577a9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2478645.exe

    Filesize

    250KB

    MD5

    cb8744534ada10ea58ad5877059da4f3

    SHA1

    df0bf8e196cd6e25ab525259aea905ae89fff95f

    SHA256

    1a6dea038248ca8c837a0cf5a97b67ecf38b838bb692782106d8f154cec78c43

    SHA512

    9245ed1f4b296b2b6f282f502d1ad179c3366774bb9cbb5501db90b02ef7bb99b61546feca06bc416d01ce35edd7f266abef05e72e3a62d3f42ed4e1029577a9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2478645.exe

    Filesize

    250KB

    MD5

    cb8744534ada10ea58ad5877059da4f3

    SHA1

    df0bf8e196cd6e25ab525259aea905ae89fff95f

    SHA256

    1a6dea038248ca8c837a0cf5a97b67ecf38b838bb692782106d8f154cec78c43

    SHA512

    9245ed1f4b296b2b6f282f502d1ad179c3366774bb9cbb5501db90b02ef7bb99b61546feca06bc416d01ce35edd7f266abef05e72e3a62d3f42ed4e1029577a9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1372783.exe

    Filesize

    997KB

    MD5

    85002871a2ed4fe17c3f72441689c83e

    SHA1

    00e45994df9d677353fde9181728d3ce06fe120f

    SHA256

    f0ee22a81fd577b537d71be9e721f5469d5e2a6d7c3efb296909c4d1ed888372

    SHA512

    de6a5a4c5771f31c963fee6839a9231e3402516034c3af47d459be39c98f43f25bfedcf140ce44c5d2bc92a65deea172d3448b66e1fd580c11f8dcb2d5e6fd18

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1372783.exe

    Filesize

    997KB

    MD5

    85002871a2ed4fe17c3f72441689c83e

    SHA1

    00e45994df9d677353fde9181728d3ce06fe120f

    SHA256

    f0ee22a81fd577b537d71be9e721f5469d5e2a6d7c3efb296909c4d1ed888372

    SHA512

    de6a5a4c5771f31c963fee6839a9231e3402516034c3af47d459be39c98f43f25bfedcf140ce44c5d2bc92a65deea172d3448b66e1fd580c11f8dcb2d5e6fd18

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8305240.exe

    Filesize

    815KB

    MD5

    2a8b44eed39ab702740bcf82fd565fb4

    SHA1

    61384e31881520dc08c661019ec53820e808fcb1

    SHA256

    d9a4e367a69fad30bae8620729adba06f398873c933f6f3f9104f940735aacb7

    SHA512

    46c79f84e40da69dbf3c8ec2353a71945e6e5d8177dd3ccfa5b1cade98f9a9b3e529c1cce4ff9eebcdbf8a1642827e0d43fa0c01be1d9f6e0aafa309a3546233

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8305240.exe

    Filesize

    815KB

    MD5

    2a8b44eed39ab702740bcf82fd565fb4

    SHA1

    61384e31881520dc08c661019ec53820e808fcb1

    SHA256

    d9a4e367a69fad30bae8620729adba06f398873c933f6f3f9104f940735aacb7

    SHA512

    46c79f84e40da69dbf3c8ec2353a71945e6e5d8177dd3ccfa5b1cade98f9a9b3e529c1cce4ff9eebcdbf8a1642827e0d43fa0c01be1d9f6e0aafa309a3546233

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1487995.exe

    Filesize

    632KB

    MD5

    e76ef8d029e922397f5c1a0be6d2c0ec

    SHA1

    3d9c07ff586791b2d709deaec95ea299376ad0f0

    SHA256

    0f171eac3b156b42e6798b77800b2ebb4c0b28389c6a72d8d923db850febbe50

    SHA512

    b2cf577451a23807f7118ace9fa7087911d30a3cc18ee4f3e5f86cf43bfa9b323667a789be59dff8271a2895f2a188f58a4d0e852af87f60f9753071ef871730

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1487995.exe

    Filesize

    632KB

    MD5

    e76ef8d029e922397f5c1a0be6d2c0ec

    SHA1

    3d9c07ff586791b2d709deaec95ea299376ad0f0

    SHA256

    0f171eac3b156b42e6798b77800b2ebb4c0b28389c6a72d8d923db850febbe50

    SHA512

    b2cf577451a23807f7118ace9fa7087911d30a3cc18ee4f3e5f86cf43bfa9b323667a789be59dff8271a2895f2a188f58a4d0e852af87f60f9753071ef871730

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9426785.exe

    Filesize

    354KB

    MD5

    0786e4b895105a3f2cfe4cd2752506e5

    SHA1

    01ac7d9dd441e75381819c4d3311bae01e539f12

    SHA256

    96bdb586e27c81912651edc0264d9cc8f4b6d37588ce24fc492f3d8c42218274

    SHA512

    f573c36ffdb46858b4132e513f54c56189638b4483d0ea44b949bfddab3ceb71fabd746fbb7823e0fbdfda5a8eebf9946de55feb60227cd253b375bf6f4ef86a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9426785.exe

    Filesize

    354KB

    MD5

    0786e4b895105a3f2cfe4cd2752506e5

    SHA1

    01ac7d9dd441e75381819c4d3311bae01e539f12

    SHA256

    96bdb586e27c81912651edc0264d9cc8f4b6d37588ce24fc492f3d8c42218274

    SHA512

    f573c36ffdb46858b4132e513f54c56189638b4483d0ea44b949bfddab3ceb71fabd746fbb7823e0fbdfda5a8eebf9946de55feb60227cd253b375bf6f4ef86a

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2478645.exe

    Filesize

    250KB

    MD5

    cb8744534ada10ea58ad5877059da4f3

    SHA1

    df0bf8e196cd6e25ab525259aea905ae89fff95f

    SHA256

    1a6dea038248ca8c837a0cf5a97b67ecf38b838bb692782106d8f154cec78c43

    SHA512

    9245ed1f4b296b2b6f282f502d1ad179c3366774bb9cbb5501db90b02ef7bb99b61546feca06bc416d01ce35edd7f266abef05e72e3a62d3f42ed4e1029577a9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2478645.exe

    Filesize

    250KB

    MD5

    cb8744534ada10ea58ad5877059da4f3

    SHA1

    df0bf8e196cd6e25ab525259aea905ae89fff95f

    SHA256

    1a6dea038248ca8c837a0cf5a97b67ecf38b838bb692782106d8f154cec78c43

    SHA512

    9245ed1f4b296b2b6f282f502d1ad179c3366774bb9cbb5501db90b02ef7bb99b61546feca06bc416d01ce35edd7f266abef05e72e3a62d3f42ed4e1029577a9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2478645.exe

    Filesize

    250KB

    MD5

    cb8744534ada10ea58ad5877059da4f3

    SHA1

    df0bf8e196cd6e25ab525259aea905ae89fff95f

    SHA256

    1a6dea038248ca8c837a0cf5a97b67ecf38b838bb692782106d8f154cec78c43

    SHA512

    9245ed1f4b296b2b6f282f502d1ad179c3366774bb9cbb5501db90b02ef7bb99b61546feca06bc416d01ce35edd7f266abef05e72e3a62d3f42ed4e1029577a9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2478645.exe

    Filesize

    250KB

    MD5

    cb8744534ada10ea58ad5877059da4f3

    SHA1

    df0bf8e196cd6e25ab525259aea905ae89fff95f

    SHA256

    1a6dea038248ca8c837a0cf5a97b67ecf38b838bb692782106d8f154cec78c43

    SHA512

    9245ed1f4b296b2b6f282f502d1ad179c3366774bb9cbb5501db90b02ef7bb99b61546feca06bc416d01ce35edd7f266abef05e72e3a62d3f42ed4e1029577a9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2478645.exe

    Filesize

    250KB

    MD5

    cb8744534ada10ea58ad5877059da4f3

    SHA1

    df0bf8e196cd6e25ab525259aea905ae89fff95f

    SHA256

    1a6dea038248ca8c837a0cf5a97b67ecf38b838bb692782106d8f154cec78c43

    SHA512

    9245ed1f4b296b2b6f282f502d1ad179c3366774bb9cbb5501db90b02ef7bb99b61546feca06bc416d01ce35edd7f266abef05e72e3a62d3f42ed4e1029577a9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2478645.exe

    Filesize

    250KB

    MD5

    cb8744534ada10ea58ad5877059da4f3

    SHA1

    df0bf8e196cd6e25ab525259aea905ae89fff95f

    SHA256

    1a6dea038248ca8c837a0cf5a97b67ecf38b838bb692782106d8f154cec78c43

    SHA512

    9245ed1f4b296b2b6f282f502d1ad179c3366774bb9cbb5501db90b02ef7bb99b61546feca06bc416d01ce35edd7f266abef05e72e3a62d3f42ed4e1029577a9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2478645.exe

    Filesize

    250KB

    MD5

    cb8744534ada10ea58ad5877059da4f3

    SHA1

    df0bf8e196cd6e25ab525259aea905ae89fff95f

    SHA256

    1a6dea038248ca8c837a0cf5a97b67ecf38b838bb692782106d8f154cec78c43

    SHA512

    9245ed1f4b296b2b6f282f502d1ad179c3366774bb9cbb5501db90b02ef7bb99b61546feca06bc416d01ce35edd7f266abef05e72e3a62d3f42ed4e1029577a9

  • memory/2776-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2776-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2776-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2776-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2776-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2776-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2776-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2776-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB