Analysis

  • max time kernel
    118s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 14:41

General

  • Target

    a7e1b7a2d6aba3d6c249102f2c4ac10aa6ca48385fe378ebc4e15858f2b01396.exe

  • Size

    1.3MB

  • MD5

    b77d2ad25537a09b15157fdcd1dab982

  • SHA1

    4323a0a8e71b046f00ad12c37b78018b8981bbb7

  • SHA256

    a7e1b7a2d6aba3d6c249102f2c4ac10aa6ca48385fe378ebc4e15858f2b01396

  • SHA512

    158857d4b891a0dffa5879445e0a767fdec896064b8f64f6d297a95da0894071821d56e4490db9002a7b41b423477c55b183490b4b72d73acc5c2f81e7301db6

  • SSDEEP

    24576:MysYjKGlDua22PLm62I6fDDKb4uIJ9/n/5r+oi9LgZcpalnHQ:7dxVuT62/npJ/509JGnH

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 17 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7e1b7a2d6aba3d6c249102f2c4ac10aa6ca48385fe378ebc4e15858f2b01396.exe
    "C:\Users\Admin\AppData\Local\Temp\a7e1b7a2d6aba3d6c249102f2c4ac10aa6ca48385fe378ebc4e15858f2b01396.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3969114.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3969114.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1388
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0549545.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0549545.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2468
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5896512.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5896512.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2744
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8216649.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8216649.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2788
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v6159038.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v6159038.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:1744
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0200309.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0200309.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2492
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2612
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 272
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:576

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3969114.exe

          Filesize

          1.2MB

          MD5

          d04259a7b0ac6567a32e84e354934db7

          SHA1

          e1410a85ca44e22d0f816c19c34e9e782cc036b2

          SHA256

          303a3b3ec7a541a8c324144d208f4d49a50eef7966b726b551ff28b3c8c7cf75

          SHA512

          d54bec5da5a81101443d82a659e58d72a4ead0556a5ab57247b445b1193a2dbbd03aee17402ec14d0646ee6fc289d5b2c1b612ac77085046b9db814e5f79a79a

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3969114.exe

          Filesize

          1.2MB

          MD5

          d04259a7b0ac6567a32e84e354934db7

          SHA1

          e1410a85ca44e22d0f816c19c34e9e782cc036b2

          SHA256

          303a3b3ec7a541a8c324144d208f4d49a50eef7966b726b551ff28b3c8c7cf75

          SHA512

          d54bec5da5a81101443d82a659e58d72a4ead0556a5ab57247b445b1193a2dbbd03aee17402ec14d0646ee6fc289d5b2c1b612ac77085046b9db814e5f79a79a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0549545.exe

          Filesize

          954KB

          MD5

          b65641f23eead5be7a64228632048588

          SHA1

          25ec492c675c5f9178e22fe9987de28188932252

          SHA256

          e9a8b4bb4dd37e699485236af8b9f652f2d7a93c83e9ce906ac2e6ffe1fb5e42

          SHA512

          b41516ed28383054bbd9e89868a8294317ca6b6ff4ff4ca5769246a6e9ad3b87e7f9b3f6ef0b03ec650723e5454d1db809357b875243bf273071d97eea71b2bb

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0549545.exe

          Filesize

          954KB

          MD5

          b65641f23eead5be7a64228632048588

          SHA1

          25ec492c675c5f9178e22fe9987de28188932252

          SHA256

          e9a8b4bb4dd37e699485236af8b9f652f2d7a93c83e9ce906ac2e6ffe1fb5e42

          SHA512

          b41516ed28383054bbd9e89868a8294317ca6b6ff4ff4ca5769246a6e9ad3b87e7f9b3f6ef0b03ec650723e5454d1db809357b875243bf273071d97eea71b2bb

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5896512.exe

          Filesize

          798KB

          MD5

          157ab8c360f13fbd7aa37b85a0af7060

          SHA1

          4aa259321877a246488466bc5d7d5fecb17942b2

          SHA256

          27a7a018dc01d3d0b66183d8c8669275ecf9ce7f44e0b4bdb1c252998fe3e5d6

          SHA512

          72d9b19e0b2dffe2bc848cf0a8bd72ca579535dc9b962ed4f86a0cfcc587c7b17092b3b971a2b6e16c33723c72da356c9a07f1f520015a34f2d62cd437010ed5

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5896512.exe

          Filesize

          798KB

          MD5

          157ab8c360f13fbd7aa37b85a0af7060

          SHA1

          4aa259321877a246488466bc5d7d5fecb17942b2

          SHA256

          27a7a018dc01d3d0b66183d8c8669275ecf9ce7f44e0b4bdb1c252998fe3e5d6

          SHA512

          72d9b19e0b2dffe2bc848cf0a8bd72ca579535dc9b962ed4f86a0cfcc587c7b17092b3b971a2b6e16c33723c72da356c9a07f1f520015a34f2d62cd437010ed5

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8216649.exe

          Filesize

          632KB

          MD5

          c1f230f17299e0549b94ec105eb2dc67

          SHA1

          0f169a3b824a614035798defde6955174f6432a0

          SHA256

          7e6a9c35e171d255a239a3b2bbf9c45fadf790ba0104a97f10025b3a9ff0326f

          SHA512

          62063f8f556299d4a8cd59d66885b55ba47b9b510adb14a579642da8a56f3ed7ec4e383f3a763a4202f531095f472709c4cc78720ca53f31fe52286a3f34c933

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8216649.exe

          Filesize

          632KB

          MD5

          c1f230f17299e0549b94ec105eb2dc67

          SHA1

          0f169a3b824a614035798defde6955174f6432a0

          SHA256

          7e6a9c35e171d255a239a3b2bbf9c45fadf790ba0104a97f10025b3a9ff0326f

          SHA512

          62063f8f556299d4a8cd59d66885b55ba47b9b510adb14a579642da8a56f3ed7ec4e383f3a763a4202f531095f472709c4cc78720ca53f31fe52286a3f34c933

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v6159038.exe

          Filesize

          354KB

          MD5

          7a82dd144bd06a57be4a8385190e87f3

          SHA1

          74347f053565642637582b580c119559691515d1

          SHA256

          4841179e098d20e4801a326d96829782005dc8123c3aac86c32feb5640a21d74

          SHA512

          6500bf243a0f5aa71980cddcd2f8d5624acdaee728bf375f663b2d1c43ae7ab1d005076447eeb576a5f6bcb345c0dfb9fd5141ae023f9d96065b9a0b568a643c

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v6159038.exe

          Filesize

          354KB

          MD5

          7a82dd144bd06a57be4a8385190e87f3

          SHA1

          74347f053565642637582b580c119559691515d1

          SHA256

          4841179e098d20e4801a326d96829782005dc8123c3aac86c32feb5640a21d74

          SHA512

          6500bf243a0f5aa71980cddcd2f8d5624acdaee728bf375f663b2d1c43ae7ab1d005076447eeb576a5f6bcb345c0dfb9fd5141ae023f9d96065b9a0b568a643c

        • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0200309.exe

          Filesize

          250KB

          MD5

          ba346e32088370ccf2fee5d5a39398d3

          SHA1

          db269802cb045e74b1774547cadab962d7c644ba

          SHA256

          08bbfcc52e973f31cc32a1f25d267c089ccc592ae1be4cc5292deffe88bf2ab1

          SHA512

          b377079ac4cea57c20b7fe44a565904bbac067d5730b1af6283c87c5024742205e1b8fac70c70c6634d4b54f5ea16c4e8c49161b7ab7956edc1afb73e37eb6bc

        • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0200309.exe

          Filesize

          250KB

          MD5

          ba346e32088370ccf2fee5d5a39398d3

          SHA1

          db269802cb045e74b1774547cadab962d7c644ba

          SHA256

          08bbfcc52e973f31cc32a1f25d267c089ccc592ae1be4cc5292deffe88bf2ab1

          SHA512

          b377079ac4cea57c20b7fe44a565904bbac067d5730b1af6283c87c5024742205e1b8fac70c70c6634d4b54f5ea16c4e8c49161b7ab7956edc1afb73e37eb6bc

        • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0200309.exe

          Filesize

          250KB

          MD5

          ba346e32088370ccf2fee5d5a39398d3

          SHA1

          db269802cb045e74b1774547cadab962d7c644ba

          SHA256

          08bbfcc52e973f31cc32a1f25d267c089ccc592ae1be4cc5292deffe88bf2ab1

          SHA512

          b377079ac4cea57c20b7fe44a565904bbac067d5730b1af6283c87c5024742205e1b8fac70c70c6634d4b54f5ea16c4e8c49161b7ab7956edc1afb73e37eb6bc

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v3969114.exe

          Filesize

          1.2MB

          MD5

          d04259a7b0ac6567a32e84e354934db7

          SHA1

          e1410a85ca44e22d0f816c19c34e9e782cc036b2

          SHA256

          303a3b3ec7a541a8c324144d208f4d49a50eef7966b726b551ff28b3c8c7cf75

          SHA512

          d54bec5da5a81101443d82a659e58d72a4ead0556a5ab57247b445b1193a2dbbd03aee17402ec14d0646ee6fc289d5b2c1b612ac77085046b9db814e5f79a79a

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v3969114.exe

          Filesize

          1.2MB

          MD5

          d04259a7b0ac6567a32e84e354934db7

          SHA1

          e1410a85ca44e22d0f816c19c34e9e782cc036b2

          SHA256

          303a3b3ec7a541a8c324144d208f4d49a50eef7966b726b551ff28b3c8c7cf75

          SHA512

          d54bec5da5a81101443d82a659e58d72a4ead0556a5ab57247b445b1193a2dbbd03aee17402ec14d0646ee6fc289d5b2c1b612ac77085046b9db814e5f79a79a

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v0549545.exe

          Filesize

          954KB

          MD5

          b65641f23eead5be7a64228632048588

          SHA1

          25ec492c675c5f9178e22fe9987de28188932252

          SHA256

          e9a8b4bb4dd37e699485236af8b9f652f2d7a93c83e9ce906ac2e6ffe1fb5e42

          SHA512

          b41516ed28383054bbd9e89868a8294317ca6b6ff4ff4ca5769246a6e9ad3b87e7f9b3f6ef0b03ec650723e5454d1db809357b875243bf273071d97eea71b2bb

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v0549545.exe

          Filesize

          954KB

          MD5

          b65641f23eead5be7a64228632048588

          SHA1

          25ec492c675c5f9178e22fe9987de28188932252

          SHA256

          e9a8b4bb4dd37e699485236af8b9f652f2d7a93c83e9ce906ac2e6ffe1fb5e42

          SHA512

          b41516ed28383054bbd9e89868a8294317ca6b6ff4ff4ca5769246a6e9ad3b87e7f9b3f6ef0b03ec650723e5454d1db809357b875243bf273071d97eea71b2bb

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v5896512.exe

          Filesize

          798KB

          MD5

          157ab8c360f13fbd7aa37b85a0af7060

          SHA1

          4aa259321877a246488466bc5d7d5fecb17942b2

          SHA256

          27a7a018dc01d3d0b66183d8c8669275ecf9ce7f44e0b4bdb1c252998fe3e5d6

          SHA512

          72d9b19e0b2dffe2bc848cf0a8bd72ca579535dc9b962ed4f86a0cfcc587c7b17092b3b971a2b6e16c33723c72da356c9a07f1f520015a34f2d62cd437010ed5

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v5896512.exe

          Filesize

          798KB

          MD5

          157ab8c360f13fbd7aa37b85a0af7060

          SHA1

          4aa259321877a246488466bc5d7d5fecb17942b2

          SHA256

          27a7a018dc01d3d0b66183d8c8669275ecf9ce7f44e0b4bdb1c252998fe3e5d6

          SHA512

          72d9b19e0b2dffe2bc848cf0a8bd72ca579535dc9b962ed4f86a0cfcc587c7b17092b3b971a2b6e16c33723c72da356c9a07f1f520015a34f2d62cd437010ed5

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v8216649.exe

          Filesize

          632KB

          MD5

          c1f230f17299e0549b94ec105eb2dc67

          SHA1

          0f169a3b824a614035798defde6955174f6432a0

          SHA256

          7e6a9c35e171d255a239a3b2bbf9c45fadf790ba0104a97f10025b3a9ff0326f

          SHA512

          62063f8f556299d4a8cd59d66885b55ba47b9b510adb14a579642da8a56f3ed7ec4e383f3a763a4202f531095f472709c4cc78720ca53f31fe52286a3f34c933

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v8216649.exe

          Filesize

          632KB

          MD5

          c1f230f17299e0549b94ec105eb2dc67

          SHA1

          0f169a3b824a614035798defde6955174f6432a0

          SHA256

          7e6a9c35e171d255a239a3b2bbf9c45fadf790ba0104a97f10025b3a9ff0326f

          SHA512

          62063f8f556299d4a8cd59d66885b55ba47b9b510adb14a579642da8a56f3ed7ec4e383f3a763a4202f531095f472709c4cc78720ca53f31fe52286a3f34c933

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v6159038.exe

          Filesize

          354KB

          MD5

          7a82dd144bd06a57be4a8385190e87f3

          SHA1

          74347f053565642637582b580c119559691515d1

          SHA256

          4841179e098d20e4801a326d96829782005dc8123c3aac86c32feb5640a21d74

          SHA512

          6500bf243a0f5aa71980cddcd2f8d5624acdaee728bf375f663b2d1c43ae7ab1d005076447eeb576a5f6bcb345c0dfb9fd5141ae023f9d96065b9a0b568a643c

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v6159038.exe

          Filesize

          354KB

          MD5

          7a82dd144bd06a57be4a8385190e87f3

          SHA1

          74347f053565642637582b580c119559691515d1

          SHA256

          4841179e098d20e4801a326d96829782005dc8123c3aac86c32feb5640a21d74

          SHA512

          6500bf243a0f5aa71980cddcd2f8d5624acdaee728bf375f663b2d1c43ae7ab1d005076447eeb576a5f6bcb345c0dfb9fd5141ae023f9d96065b9a0b568a643c

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0200309.exe

          Filesize

          250KB

          MD5

          ba346e32088370ccf2fee5d5a39398d3

          SHA1

          db269802cb045e74b1774547cadab962d7c644ba

          SHA256

          08bbfcc52e973f31cc32a1f25d267c089ccc592ae1be4cc5292deffe88bf2ab1

          SHA512

          b377079ac4cea57c20b7fe44a565904bbac067d5730b1af6283c87c5024742205e1b8fac70c70c6634d4b54f5ea16c4e8c49161b7ab7956edc1afb73e37eb6bc

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0200309.exe

          Filesize

          250KB

          MD5

          ba346e32088370ccf2fee5d5a39398d3

          SHA1

          db269802cb045e74b1774547cadab962d7c644ba

          SHA256

          08bbfcc52e973f31cc32a1f25d267c089ccc592ae1be4cc5292deffe88bf2ab1

          SHA512

          b377079ac4cea57c20b7fe44a565904bbac067d5730b1af6283c87c5024742205e1b8fac70c70c6634d4b54f5ea16c4e8c49161b7ab7956edc1afb73e37eb6bc

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0200309.exe

          Filesize

          250KB

          MD5

          ba346e32088370ccf2fee5d5a39398d3

          SHA1

          db269802cb045e74b1774547cadab962d7c644ba

          SHA256

          08bbfcc52e973f31cc32a1f25d267c089ccc592ae1be4cc5292deffe88bf2ab1

          SHA512

          b377079ac4cea57c20b7fe44a565904bbac067d5730b1af6283c87c5024742205e1b8fac70c70c6634d4b54f5ea16c4e8c49161b7ab7956edc1afb73e37eb6bc

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0200309.exe

          Filesize

          250KB

          MD5

          ba346e32088370ccf2fee5d5a39398d3

          SHA1

          db269802cb045e74b1774547cadab962d7c644ba

          SHA256

          08bbfcc52e973f31cc32a1f25d267c089ccc592ae1be4cc5292deffe88bf2ab1

          SHA512

          b377079ac4cea57c20b7fe44a565904bbac067d5730b1af6283c87c5024742205e1b8fac70c70c6634d4b54f5ea16c4e8c49161b7ab7956edc1afb73e37eb6bc

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0200309.exe

          Filesize

          250KB

          MD5

          ba346e32088370ccf2fee5d5a39398d3

          SHA1

          db269802cb045e74b1774547cadab962d7c644ba

          SHA256

          08bbfcc52e973f31cc32a1f25d267c089ccc592ae1be4cc5292deffe88bf2ab1

          SHA512

          b377079ac4cea57c20b7fe44a565904bbac067d5730b1af6283c87c5024742205e1b8fac70c70c6634d4b54f5ea16c4e8c49161b7ab7956edc1afb73e37eb6bc

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0200309.exe

          Filesize

          250KB

          MD5

          ba346e32088370ccf2fee5d5a39398d3

          SHA1

          db269802cb045e74b1774547cadab962d7c644ba

          SHA256

          08bbfcc52e973f31cc32a1f25d267c089ccc592ae1be4cc5292deffe88bf2ab1

          SHA512

          b377079ac4cea57c20b7fe44a565904bbac067d5730b1af6283c87c5024742205e1b8fac70c70c6634d4b54f5ea16c4e8c49161b7ab7956edc1afb73e37eb6bc

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0200309.exe

          Filesize

          250KB

          MD5

          ba346e32088370ccf2fee5d5a39398d3

          SHA1

          db269802cb045e74b1774547cadab962d7c644ba

          SHA256

          08bbfcc52e973f31cc32a1f25d267c089ccc592ae1be4cc5292deffe88bf2ab1

          SHA512

          b377079ac4cea57c20b7fe44a565904bbac067d5730b1af6283c87c5024742205e1b8fac70c70c6634d4b54f5ea16c4e8c49161b7ab7956edc1afb73e37eb6bc

        • memory/2612-72-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2612-74-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2612-76-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2612-63-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2612-65-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2612-67-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2612-69-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2612-71-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB