Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 13:56

General

  • Target

    01cbb546edbbf2f07c95b072826e1243baa3062126a5344486411ee9ab5e290a.exe

  • Size

    1.1MB

  • MD5

    11f83175ec6575abd45436c7668c01bc

  • SHA1

    57f0e1b4781ba132de91e5576cd364d50f10bb3e

  • SHA256

    01cbb546edbbf2f07c95b072826e1243baa3062126a5344486411ee9ab5e290a

  • SHA512

    16f3258979e68384a2c54b81eec3a091c3b8845dff3b08c8e4a4f104c85821bf6865e2104d5357c69143a63929bc23123831c570ace1a770ca9d0c6f625db813

  • SSDEEP

    24576:pyhndiwDNEpl1e5cW33ARdhCg2i261WBu:cxQwupl1EcWnAfW61WB

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01cbb546edbbf2f07c95b072826e1243baa3062126a5344486411ee9ab5e290a.exe
    "C:\Users\Admin\AppData\Local\Temp\01cbb546edbbf2f07c95b072826e1243baa3062126a5344486411ee9ab5e290a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8399060.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8399060.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9172143.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9172143.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8621977.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8621977.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2656
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9042311.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9042311.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2756
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3949953.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3949953.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2524
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2564
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8399060.exe

    Filesize

    997KB

    MD5

    125889453ebdfbb81962871ca60c211d

    SHA1

    4f91919f47efc655d0962a94bc64ca49827fa27a

    SHA256

    dee10fed2b628fa64dbdb0522cd335eb7bafdbc9cc2071debcd005b3f1f90ac5

    SHA512

    0c298602f1dfbbf276498834990303cb8e4747a90e7b0e686569ea6aeab66416ddef5589f79d281f536400f90952fbeb51ba90ba615bca7f237e8b04077a44d5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8399060.exe

    Filesize

    997KB

    MD5

    125889453ebdfbb81962871ca60c211d

    SHA1

    4f91919f47efc655d0962a94bc64ca49827fa27a

    SHA256

    dee10fed2b628fa64dbdb0522cd335eb7bafdbc9cc2071debcd005b3f1f90ac5

    SHA512

    0c298602f1dfbbf276498834990303cb8e4747a90e7b0e686569ea6aeab66416ddef5589f79d281f536400f90952fbeb51ba90ba615bca7f237e8b04077a44d5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9172143.exe

    Filesize

    814KB

    MD5

    a1432de0cbe7b5de9aedd93de7db99a2

    SHA1

    54be7b3cdc1db5d246a8d34b42cdd1df249d1a60

    SHA256

    dba4b377929fb8874341cf742cd19f210a3da8a744c8ee5f8f66a08d1f7ddacc

    SHA512

    68157e9167727b79c77ff131e40c050f448a0284500b4527111673af6f085b0d88c98dbee7f7371b8ccc32b62b36c8477590c95936eb0630ed5f18c379d3f175

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9172143.exe

    Filesize

    814KB

    MD5

    a1432de0cbe7b5de9aedd93de7db99a2

    SHA1

    54be7b3cdc1db5d246a8d34b42cdd1df249d1a60

    SHA256

    dba4b377929fb8874341cf742cd19f210a3da8a744c8ee5f8f66a08d1f7ddacc

    SHA512

    68157e9167727b79c77ff131e40c050f448a0284500b4527111673af6f085b0d88c98dbee7f7371b8ccc32b62b36c8477590c95936eb0630ed5f18c379d3f175

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8621977.exe

    Filesize

    632KB

    MD5

    21066eb79ee78c2ebf306274d5f2af33

    SHA1

    4c1b7dafd108438d92cd94c5e7947618ee84e2e9

    SHA256

    c19f6da89b1d941751c55f801f2857ccd16c60b06b7dc0f4aeed5b0e8ab6b7a7

    SHA512

    04f1b24e8d03cf161a85b8ced045b8f657406333ea66912951aba337e03ceb1cab2b03f63846b8247eace64153f90bc9c9debc02edd1447ddb1f9d7a41ef49a8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8621977.exe

    Filesize

    632KB

    MD5

    21066eb79ee78c2ebf306274d5f2af33

    SHA1

    4c1b7dafd108438d92cd94c5e7947618ee84e2e9

    SHA256

    c19f6da89b1d941751c55f801f2857ccd16c60b06b7dc0f4aeed5b0e8ab6b7a7

    SHA512

    04f1b24e8d03cf161a85b8ced045b8f657406333ea66912951aba337e03ceb1cab2b03f63846b8247eace64153f90bc9c9debc02edd1447ddb1f9d7a41ef49a8

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9042311.exe

    Filesize

    354KB

    MD5

    55a99381d7aa126fa46789c95c1dcd91

    SHA1

    9d6ac425831d190b47dc8a3eadd537f0b9f23041

    SHA256

    7c4ef10fac562ab5f2542731bdc9e4599cf466bcf831a5dafd8673907883b536

    SHA512

    50c21a070f5203c0078e13dd24277c1ea8cfee9fd7e82053f630d0d9090b5a12b2c08a71160f17e5b272edea3e6bf3c2c56a898ffad3aea72d277ca6253bf6d2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9042311.exe

    Filesize

    354KB

    MD5

    55a99381d7aa126fa46789c95c1dcd91

    SHA1

    9d6ac425831d190b47dc8a3eadd537f0b9f23041

    SHA256

    7c4ef10fac562ab5f2542731bdc9e4599cf466bcf831a5dafd8673907883b536

    SHA512

    50c21a070f5203c0078e13dd24277c1ea8cfee9fd7e82053f630d0d9090b5a12b2c08a71160f17e5b272edea3e6bf3c2c56a898ffad3aea72d277ca6253bf6d2

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3949953.exe

    Filesize

    250KB

    MD5

    6ca9edc49b9719b5377829c0fe76c982

    SHA1

    104e69e28ae2767cac31f6b8c8c53cfaca3722ff

    SHA256

    bdf128e0b3ea9e6380174a17bf8bbbe834ef131fd092ecd328563e4d905882ad

    SHA512

    3b83136c30641b8726ee48f9a950b0f4ca67a661d5aa105a53d2b5bb8420d925852fd6280c96d6e5393c38a10f94d9646221b6f33deb7978f8cfb6de5bf6ffce

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3949953.exe

    Filesize

    250KB

    MD5

    6ca9edc49b9719b5377829c0fe76c982

    SHA1

    104e69e28ae2767cac31f6b8c8c53cfaca3722ff

    SHA256

    bdf128e0b3ea9e6380174a17bf8bbbe834ef131fd092ecd328563e4d905882ad

    SHA512

    3b83136c30641b8726ee48f9a950b0f4ca67a661d5aa105a53d2b5bb8420d925852fd6280c96d6e5393c38a10f94d9646221b6f33deb7978f8cfb6de5bf6ffce

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3949953.exe

    Filesize

    250KB

    MD5

    6ca9edc49b9719b5377829c0fe76c982

    SHA1

    104e69e28ae2767cac31f6b8c8c53cfaca3722ff

    SHA256

    bdf128e0b3ea9e6380174a17bf8bbbe834ef131fd092ecd328563e4d905882ad

    SHA512

    3b83136c30641b8726ee48f9a950b0f4ca67a661d5aa105a53d2b5bb8420d925852fd6280c96d6e5393c38a10f94d9646221b6f33deb7978f8cfb6de5bf6ffce

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8399060.exe

    Filesize

    997KB

    MD5

    125889453ebdfbb81962871ca60c211d

    SHA1

    4f91919f47efc655d0962a94bc64ca49827fa27a

    SHA256

    dee10fed2b628fa64dbdb0522cd335eb7bafdbc9cc2071debcd005b3f1f90ac5

    SHA512

    0c298602f1dfbbf276498834990303cb8e4747a90e7b0e686569ea6aeab66416ddef5589f79d281f536400f90952fbeb51ba90ba615bca7f237e8b04077a44d5

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8399060.exe

    Filesize

    997KB

    MD5

    125889453ebdfbb81962871ca60c211d

    SHA1

    4f91919f47efc655d0962a94bc64ca49827fa27a

    SHA256

    dee10fed2b628fa64dbdb0522cd335eb7bafdbc9cc2071debcd005b3f1f90ac5

    SHA512

    0c298602f1dfbbf276498834990303cb8e4747a90e7b0e686569ea6aeab66416ddef5589f79d281f536400f90952fbeb51ba90ba615bca7f237e8b04077a44d5

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9172143.exe

    Filesize

    814KB

    MD5

    a1432de0cbe7b5de9aedd93de7db99a2

    SHA1

    54be7b3cdc1db5d246a8d34b42cdd1df249d1a60

    SHA256

    dba4b377929fb8874341cf742cd19f210a3da8a744c8ee5f8f66a08d1f7ddacc

    SHA512

    68157e9167727b79c77ff131e40c050f448a0284500b4527111673af6f085b0d88c98dbee7f7371b8ccc32b62b36c8477590c95936eb0630ed5f18c379d3f175

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9172143.exe

    Filesize

    814KB

    MD5

    a1432de0cbe7b5de9aedd93de7db99a2

    SHA1

    54be7b3cdc1db5d246a8d34b42cdd1df249d1a60

    SHA256

    dba4b377929fb8874341cf742cd19f210a3da8a744c8ee5f8f66a08d1f7ddacc

    SHA512

    68157e9167727b79c77ff131e40c050f448a0284500b4527111673af6f085b0d88c98dbee7f7371b8ccc32b62b36c8477590c95936eb0630ed5f18c379d3f175

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8621977.exe

    Filesize

    632KB

    MD5

    21066eb79ee78c2ebf306274d5f2af33

    SHA1

    4c1b7dafd108438d92cd94c5e7947618ee84e2e9

    SHA256

    c19f6da89b1d941751c55f801f2857ccd16c60b06b7dc0f4aeed5b0e8ab6b7a7

    SHA512

    04f1b24e8d03cf161a85b8ced045b8f657406333ea66912951aba337e03ceb1cab2b03f63846b8247eace64153f90bc9c9debc02edd1447ddb1f9d7a41ef49a8

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8621977.exe

    Filesize

    632KB

    MD5

    21066eb79ee78c2ebf306274d5f2af33

    SHA1

    4c1b7dafd108438d92cd94c5e7947618ee84e2e9

    SHA256

    c19f6da89b1d941751c55f801f2857ccd16c60b06b7dc0f4aeed5b0e8ab6b7a7

    SHA512

    04f1b24e8d03cf161a85b8ced045b8f657406333ea66912951aba337e03ceb1cab2b03f63846b8247eace64153f90bc9c9debc02edd1447ddb1f9d7a41ef49a8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9042311.exe

    Filesize

    354KB

    MD5

    55a99381d7aa126fa46789c95c1dcd91

    SHA1

    9d6ac425831d190b47dc8a3eadd537f0b9f23041

    SHA256

    7c4ef10fac562ab5f2542731bdc9e4599cf466bcf831a5dafd8673907883b536

    SHA512

    50c21a070f5203c0078e13dd24277c1ea8cfee9fd7e82053f630d0d9090b5a12b2c08a71160f17e5b272edea3e6bf3c2c56a898ffad3aea72d277ca6253bf6d2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9042311.exe

    Filesize

    354KB

    MD5

    55a99381d7aa126fa46789c95c1dcd91

    SHA1

    9d6ac425831d190b47dc8a3eadd537f0b9f23041

    SHA256

    7c4ef10fac562ab5f2542731bdc9e4599cf466bcf831a5dafd8673907883b536

    SHA512

    50c21a070f5203c0078e13dd24277c1ea8cfee9fd7e82053f630d0d9090b5a12b2c08a71160f17e5b272edea3e6bf3c2c56a898ffad3aea72d277ca6253bf6d2

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3949953.exe

    Filesize

    250KB

    MD5

    6ca9edc49b9719b5377829c0fe76c982

    SHA1

    104e69e28ae2767cac31f6b8c8c53cfaca3722ff

    SHA256

    bdf128e0b3ea9e6380174a17bf8bbbe834ef131fd092ecd328563e4d905882ad

    SHA512

    3b83136c30641b8726ee48f9a950b0f4ca67a661d5aa105a53d2b5bb8420d925852fd6280c96d6e5393c38a10f94d9646221b6f33deb7978f8cfb6de5bf6ffce

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3949953.exe

    Filesize

    250KB

    MD5

    6ca9edc49b9719b5377829c0fe76c982

    SHA1

    104e69e28ae2767cac31f6b8c8c53cfaca3722ff

    SHA256

    bdf128e0b3ea9e6380174a17bf8bbbe834ef131fd092ecd328563e4d905882ad

    SHA512

    3b83136c30641b8726ee48f9a950b0f4ca67a661d5aa105a53d2b5bb8420d925852fd6280c96d6e5393c38a10f94d9646221b6f33deb7978f8cfb6de5bf6ffce

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3949953.exe

    Filesize

    250KB

    MD5

    6ca9edc49b9719b5377829c0fe76c982

    SHA1

    104e69e28ae2767cac31f6b8c8c53cfaca3722ff

    SHA256

    bdf128e0b3ea9e6380174a17bf8bbbe834ef131fd092ecd328563e4d905882ad

    SHA512

    3b83136c30641b8726ee48f9a950b0f4ca67a661d5aa105a53d2b5bb8420d925852fd6280c96d6e5393c38a10f94d9646221b6f33deb7978f8cfb6de5bf6ffce

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3949953.exe

    Filesize

    250KB

    MD5

    6ca9edc49b9719b5377829c0fe76c982

    SHA1

    104e69e28ae2767cac31f6b8c8c53cfaca3722ff

    SHA256

    bdf128e0b3ea9e6380174a17bf8bbbe834ef131fd092ecd328563e4d905882ad

    SHA512

    3b83136c30641b8726ee48f9a950b0f4ca67a661d5aa105a53d2b5bb8420d925852fd6280c96d6e5393c38a10f94d9646221b6f33deb7978f8cfb6de5bf6ffce

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3949953.exe

    Filesize

    250KB

    MD5

    6ca9edc49b9719b5377829c0fe76c982

    SHA1

    104e69e28ae2767cac31f6b8c8c53cfaca3722ff

    SHA256

    bdf128e0b3ea9e6380174a17bf8bbbe834ef131fd092ecd328563e4d905882ad

    SHA512

    3b83136c30641b8726ee48f9a950b0f4ca67a661d5aa105a53d2b5bb8420d925852fd6280c96d6e5393c38a10f94d9646221b6f33deb7978f8cfb6de5bf6ffce

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3949953.exe

    Filesize

    250KB

    MD5

    6ca9edc49b9719b5377829c0fe76c982

    SHA1

    104e69e28ae2767cac31f6b8c8c53cfaca3722ff

    SHA256

    bdf128e0b3ea9e6380174a17bf8bbbe834ef131fd092ecd328563e4d905882ad

    SHA512

    3b83136c30641b8726ee48f9a950b0f4ca67a661d5aa105a53d2b5bb8420d925852fd6280c96d6e5393c38a10f94d9646221b6f33deb7978f8cfb6de5bf6ffce

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3949953.exe

    Filesize

    250KB

    MD5

    6ca9edc49b9719b5377829c0fe76c982

    SHA1

    104e69e28ae2767cac31f6b8c8c53cfaca3722ff

    SHA256

    bdf128e0b3ea9e6380174a17bf8bbbe834ef131fd092ecd328563e4d905882ad

    SHA512

    3b83136c30641b8726ee48f9a950b0f4ca67a661d5aa105a53d2b5bb8420d925852fd6280c96d6e5393c38a10f94d9646221b6f33deb7978f8cfb6de5bf6ffce

  • memory/2564-65-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2564-59-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2564-57-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2564-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2564-60-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2564-61-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2564-63-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2564-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB