Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 14:43

General

  • Target

    e9332afea3bee583b8f9347d0cccfc9cc1862c931c40fd8fa2ce799b1709563d.exe

  • Size

    1.1MB

  • MD5

    38b69dfe1cae1c7ca64c73604fc5ef71

  • SHA1

    1940f30c14e3250cc2a73b011a99761ee8c4e07d

  • SHA256

    e9332afea3bee583b8f9347d0cccfc9cc1862c931c40fd8fa2ce799b1709563d

  • SHA512

    2a0952508db26400027e38701238fad5bf0f7ebcadfd49ee859364370089fb60787d2c378fc2422d65fdb2934919ebbbc9bcdf71a9e3335a5075d6281d18233f

  • SSDEEP

    24576:oyVFkuEBN0Ycb5IGHNXaUf3b/dSnmXx6MkA2oy6:vfBEBN0P5JRJdYmXxnb

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9332afea3bee583b8f9347d0cccfc9cc1862c931c40fd8fa2ce799b1709563d.exe
    "C:\Users\Admin\AppData\Local\Temp\e9332afea3bee583b8f9347d0cccfc9cc1862c931c40fd8fa2ce799b1709563d.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0986151.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0986151.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1884
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9008752.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9008752.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1342078.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1342078.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2560
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7829098.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7829098.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2364
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7984878.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7984878.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2828
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2700
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2240
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 280
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2492

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0986151.exe

            Filesize

            996KB

            MD5

            17b78d95ca9b684eda14337ee0e2bc58

            SHA1

            2901391445de303ac6478f10d05c98277bf25d3d

            SHA256

            18aadd6920e60e1a2a2c3f295aa24eae38b1abb5c5ea754e5b8d3f8a9cf3318f

            SHA512

            6dd9120f627076b44d981ff12236f838b36f6153ae9d71227b69ba14f4707051f36121de655d2b1fc6cde14bbf6053825a317ce27ee201747b75ac7430d13b46

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0986151.exe

            Filesize

            996KB

            MD5

            17b78d95ca9b684eda14337ee0e2bc58

            SHA1

            2901391445de303ac6478f10d05c98277bf25d3d

            SHA256

            18aadd6920e60e1a2a2c3f295aa24eae38b1abb5c5ea754e5b8d3f8a9cf3318f

            SHA512

            6dd9120f627076b44d981ff12236f838b36f6153ae9d71227b69ba14f4707051f36121de655d2b1fc6cde14bbf6053825a317ce27ee201747b75ac7430d13b46

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9008752.exe

            Filesize

            813KB

            MD5

            e2a25fbf352a8ce93468fb702ab5b16e

            SHA1

            df09e030c61961b971f7ae4812506bf793344710

            SHA256

            9b9ff52248f86158f65c22021a99347c975dccfac5c68ec6187dd18bcad1e501

            SHA512

            a8329e00c0b55370a6243982d9d33f92869aa8de9fba88ffd2ac3c072b0bf13054e30fea9a8d488a263f627268406bb9b630ea299762ed68bb1c0a2f732501e2

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9008752.exe

            Filesize

            813KB

            MD5

            e2a25fbf352a8ce93468fb702ab5b16e

            SHA1

            df09e030c61961b971f7ae4812506bf793344710

            SHA256

            9b9ff52248f86158f65c22021a99347c975dccfac5c68ec6187dd18bcad1e501

            SHA512

            a8329e00c0b55370a6243982d9d33f92869aa8de9fba88ffd2ac3c072b0bf13054e30fea9a8d488a263f627268406bb9b630ea299762ed68bb1c0a2f732501e2

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1342078.exe

            Filesize

            631KB

            MD5

            b5a3e28af0ed89f3b05170ff5feff2f3

            SHA1

            46db6629c48ae1f62a7ffe733a0f027dcf838ab6

            SHA256

            c18cbdcb57d8cd6516ac99358dd9476fd8c9f1e0c656fb3280866fdc33c995cc

            SHA512

            e3ccd913b6e8651879e2553404cef48de0b59119cdbfe026adefa8fcf3b80f742bf853171327f704c2d834683946e4dc275f08c78be807ac4e9fa7685261dd1f

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1342078.exe

            Filesize

            631KB

            MD5

            b5a3e28af0ed89f3b05170ff5feff2f3

            SHA1

            46db6629c48ae1f62a7ffe733a0f027dcf838ab6

            SHA256

            c18cbdcb57d8cd6516ac99358dd9476fd8c9f1e0c656fb3280866fdc33c995cc

            SHA512

            e3ccd913b6e8651879e2553404cef48de0b59119cdbfe026adefa8fcf3b80f742bf853171327f704c2d834683946e4dc275f08c78be807ac4e9fa7685261dd1f

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7829098.exe

            Filesize

            354KB

            MD5

            1ca66e8b2371de337a73ed25b149e3b5

            SHA1

            bd7a0980fec2e529558c0a9242433497280ee7d5

            SHA256

            a9be828d6e5d2a2f1443673161394d1821db091be7c87b536ca11a6bc184c9b6

            SHA512

            c131ddf7c384e807defa2320d1747e6ce352ccda22d50adc3c1e434f6cc200c7ad867bb277ff6c30dbc11f791d30e0cae075ff71d212d5b2702fdde22498ae61

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7829098.exe

            Filesize

            354KB

            MD5

            1ca66e8b2371de337a73ed25b149e3b5

            SHA1

            bd7a0980fec2e529558c0a9242433497280ee7d5

            SHA256

            a9be828d6e5d2a2f1443673161394d1821db091be7c87b536ca11a6bc184c9b6

            SHA512

            c131ddf7c384e807defa2320d1747e6ce352ccda22d50adc3c1e434f6cc200c7ad867bb277ff6c30dbc11f791d30e0cae075ff71d212d5b2702fdde22498ae61

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7984878.exe

            Filesize

            250KB

            MD5

            f00c45cd7ddf8ad48c530d5a91905a2c

            SHA1

            10eb6c0010baa89285f03480b9dd99c679eec451

            SHA256

            3e39ecd58abb3f3ac25de779f02f6c8480b800cc33315c60ef71e3606b82a59f

            SHA512

            db85d63a6498f0857fcd9151dd3359a3331f316218e0857aef138ea0e245edab482779d1f7fcdcd401d9eb359d8d96be166039be01da6eb39f0e7db0b5d12c7d

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7984878.exe

            Filesize

            250KB

            MD5

            f00c45cd7ddf8ad48c530d5a91905a2c

            SHA1

            10eb6c0010baa89285f03480b9dd99c679eec451

            SHA256

            3e39ecd58abb3f3ac25de779f02f6c8480b800cc33315c60ef71e3606b82a59f

            SHA512

            db85d63a6498f0857fcd9151dd3359a3331f316218e0857aef138ea0e245edab482779d1f7fcdcd401d9eb359d8d96be166039be01da6eb39f0e7db0b5d12c7d

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7984878.exe

            Filesize

            250KB

            MD5

            f00c45cd7ddf8ad48c530d5a91905a2c

            SHA1

            10eb6c0010baa89285f03480b9dd99c679eec451

            SHA256

            3e39ecd58abb3f3ac25de779f02f6c8480b800cc33315c60ef71e3606b82a59f

            SHA512

            db85d63a6498f0857fcd9151dd3359a3331f316218e0857aef138ea0e245edab482779d1f7fcdcd401d9eb359d8d96be166039be01da6eb39f0e7db0b5d12c7d

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0986151.exe

            Filesize

            996KB

            MD5

            17b78d95ca9b684eda14337ee0e2bc58

            SHA1

            2901391445de303ac6478f10d05c98277bf25d3d

            SHA256

            18aadd6920e60e1a2a2c3f295aa24eae38b1abb5c5ea754e5b8d3f8a9cf3318f

            SHA512

            6dd9120f627076b44d981ff12236f838b36f6153ae9d71227b69ba14f4707051f36121de655d2b1fc6cde14bbf6053825a317ce27ee201747b75ac7430d13b46

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0986151.exe

            Filesize

            996KB

            MD5

            17b78d95ca9b684eda14337ee0e2bc58

            SHA1

            2901391445de303ac6478f10d05c98277bf25d3d

            SHA256

            18aadd6920e60e1a2a2c3f295aa24eae38b1abb5c5ea754e5b8d3f8a9cf3318f

            SHA512

            6dd9120f627076b44d981ff12236f838b36f6153ae9d71227b69ba14f4707051f36121de655d2b1fc6cde14bbf6053825a317ce27ee201747b75ac7430d13b46

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9008752.exe

            Filesize

            813KB

            MD5

            e2a25fbf352a8ce93468fb702ab5b16e

            SHA1

            df09e030c61961b971f7ae4812506bf793344710

            SHA256

            9b9ff52248f86158f65c22021a99347c975dccfac5c68ec6187dd18bcad1e501

            SHA512

            a8329e00c0b55370a6243982d9d33f92869aa8de9fba88ffd2ac3c072b0bf13054e30fea9a8d488a263f627268406bb9b630ea299762ed68bb1c0a2f732501e2

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9008752.exe

            Filesize

            813KB

            MD5

            e2a25fbf352a8ce93468fb702ab5b16e

            SHA1

            df09e030c61961b971f7ae4812506bf793344710

            SHA256

            9b9ff52248f86158f65c22021a99347c975dccfac5c68ec6187dd18bcad1e501

            SHA512

            a8329e00c0b55370a6243982d9d33f92869aa8de9fba88ffd2ac3c072b0bf13054e30fea9a8d488a263f627268406bb9b630ea299762ed68bb1c0a2f732501e2

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1342078.exe

            Filesize

            631KB

            MD5

            b5a3e28af0ed89f3b05170ff5feff2f3

            SHA1

            46db6629c48ae1f62a7ffe733a0f027dcf838ab6

            SHA256

            c18cbdcb57d8cd6516ac99358dd9476fd8c9f1e0c656fb3280866fdc33c995cc

            SHA512

            e3ccd913b6e8651879e2553404cef48de0b59119cdbfe026adefa8fcf3b80f742bf853171327f704c2d834683946e4dc275f08c78be807ac4e9fa7685261dd1f

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1342078.exe

            Filesize

            631KB

            MD5

            b5a3e28af0ed89f3b05170ff5feff2f3

            SHA1

            46db6629c48ae1f62a7ffe733a0f027dcf838ab6

            SHA256

            c18cbdcb57d8cd6516ac99358dd9476fd8c9f1e0c656fb3280866fdc33c995cc

            SHA512

            e3ccd913b6e8651879e2553404cef48de0b59119cdbfe026adefa8fcf3b80f742bf853171327f704c2d834683946e4dc275f08c78be807ac4e9fa7685261dd1f

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7829098.exe

            Filesize

            354KB

            MD5

            1ca66e8b2371de337a73ed25b149e3b5

            SHA1

            bd7a0980fec2e529558c0a9242433497280ee7d5

            SHA256

            a9be828d6e5d2a2f1443673161394d1821db091be7c87b536ca11a6bc184c9b6

            SHA512

            c131ddf7c384e807defa2320d1747e6ce352ccda22d50adc3c1e434f6cc200c7ad867bb277ff6c30dbc11f791d30e0cae075ff71d212d5b2702fdde22498ae61

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7829098.exe

            Filesize

            354KB

            MD5

            1ca66e8b2371de337a73ed25b149e3b5

            SHA1

            bd7a0980fec2e529558c0a9242433497280ee7d5

            SHA256

            a9be828d6e5d2a2f1443673161394d1821db091be7c87b536ca11a6bc184c9b6

            SHA512

            c131ddf7c384e807defa2320d1747e6ce352ccda22d50adc3c1e434f6cc200c7ad867bb277ff6c30dbc11f791d30e0cae075ff71d212d5b2702fdde22498ae61

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7984878.exe

            Filesize

            250KB

            MD5

            f00c45cd7ddf8ad48c530d5a91905a2c

            SHA1

            10eb6c0010baa89285f03480b9dd99c679eec451

            SHA256

            3e39ecd58abb3f3ac25de779f02f6c8480b800cc33315c60ef71e3606b82a59f

            SHA512

            db85d63a6498f0857fcd9151dd3359a3331f316218e0857aef138ea0e245edab482779d1f7fcdcd401d9eb359d8d96be166039be01da6eb39f0e7db0b5d12c7d

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7984878.exe

            Filesize

            250KB

            MD5

            f00c45cd7ddf8ad48c530d5a91905a2c

            SHA1

            10eb6c0010baa89285f03480b9dd99c679eec451

            SHA256

            3e39ecd58abb3f3ac25de779f02f6c8480b800cc33315c60ef71e3606b82a59f

            SHA512

            db85d63a6498f0857fcd9151dd3359a3331f316218e0857aef138ea0e245edab482779d1f7fcdcd401d9eb359d8d96be166039be01da6eb39f0e7db0b5d12c7d

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7984878.exe

            Filesize

            250KB

            MD5

            f00c45cd7ddf8ad48c530d5a91905a2c

            SHA1

            10eb6c0010baa89285f03480b9dd99c679eec451

            SHA256

            3e39ecd58abb3f3ac25de779f02f6c8480b800cc33315c60ef71e3606b82a59f

            SHA512

            db85d63a6498f0857fcd9151dd3359a3331f316218e0857aef138ea0e245edab482779d1f7fcdcd401d9eb359d8d96be166039be01da6eb39f0e7db0b5d12c7d

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7984878.exe

            Filesize

            250KB

            MD5

            f00c45cd7ddf8ad48c530d5a91905a2c

            SHA1

            10eb6c0010baa89285f03480b9dd99c679eec451

            SHA256

            3e39ecd58abb3f3ac25de779f02f6c8480b800cc33315c60ef71e3606b82a59f

            SHA512

            db85d63a6498f0857fcd9151dd3359a3331f316218e0857aef138ea0e245edab482779d1f7fcdcd401d9eb359d8d96be166039be01da6eb39f0e7db0b5d12c7d

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7984878.exe

            Filesize

            250KB

            MD5

            f00c45cd7ddf8ad48c530d5a91905a2c

            SHA1

            10eb6c0010baa89285f03480b9dd99c679eec451

            SHA256

            3e39ecd58abb3f3ac25de779f02f6c8480b800cc33315c60ef71e3606b82a59f

            SHA512

            db85d63a6498f0857fcd9151dd3359a3331f316218e0857aef138ea0e245edab482779d1f7fcdcd401d9eb359d8d96be166039be01da6eb39f0e7db0b5d12c7d

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7984878.exe

            Filesize

            250KB

            MD5

            f00c45cd7ddf8ad48c530d5a91905a2c

            SHA1

            10eb6c0010baa89285f03480b9dd99c679eec451

            SHA256

            3e39ecd58abb3f3ac25de779f02f6c8480b800cc33315c60ef71e3606b82a59f

            SHA512

            db85d63a6498f0857fcd9151dd3359a3331f316218e0857aef138ea0e245edab482779d1f7fcdcd401d9eb359d8d96be166039be01da6eb39f0e7db0b5d12c7d

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7984878.exe

            Filesize

            250KB

            MD5

            f00c45cd7ddf8ad48c530d5a91905a2c

            SHA1

            10eb6c0010baa89285f03480b9dd99c679eec451

            SHA256

            3e39ecd58abb3f3ac25de779f02f6c8480b800cc33315c60ef71e3606b82a59f

            SHA512

            db85d63a6498f0857fcd9151dd3359a3331f316218e0857aef138ea0e245edab482779d1f7fcdcd401d9eb359d8d96be166039be01da6eb39f0e7db0b5d12c7d

          • memory/2240-55-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/2240-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

            Filesize

            4KB

          • memory/2240-60-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/2240-62-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/2240-58-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/2240-56-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/2240-54-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/2240-53-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB