Analysis

  • max time kernel
    122s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 14:00

General

  • Target

    1ab381aab59eff3766dd694b3d92e3eabafc852df33f201d8aed65811e1ec480.exe

  • Size

    1.0MB

  • MD5

    d6833f6f127cbcd89022dcfceaafef14

  • SHA1

    3aaee1d2e1584a0441b45c334971c8e291bdd083

  • SHA256

    1ab381aab59eff3766dd694b3d92e3eabafc852df33f201d8aed65811e1ec480

  • SHA512

    956efdec4b2d2f534b15de76d6b66b4d8c23b30b0b8cc8e722342fc01ba8fec148a589c4eb0c7b45d406e19b891246603a50ee6d8add1544ba0d7f554a5bfa38

  • SSDEEP

    24576:7yxsyWtdo7CtdohodBFWHtebEewG1I/CF2oOEyK6F+uBW:ubCj/RYs7wGu/CF2WE+c

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ab381aab59eff3766dd694b3d92e3eabafc852df33f201d8aed65811e1ec480.exe
    "C:\Users\Admin\AppData\Local\Temp\1ab381aab59eff3766dd694b3d92e3eabafc852df33f201d8aed65811e1ec480.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8696986.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8696986.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2420
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4838467.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4838467.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2200
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5020665.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5020665.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1888
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0940807.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0940807.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2060
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1814320.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1814320.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2740
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2960
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8696986.exe

    Filesize

    996KB

    MD5

    472e667415580ac0ac185501b9783aa3

    SHA1

    bf0f71f636c804856f2fc134799df56414c5dfb7

    SHA256

    75f72600658b101db740d4753e6585b0c44c44d71acd6b3282ba46a16934c829

    SHA512

    ef4fb1e76925c6306bd36bc1a4f0b062cadbe0fd90662a4734ddb7ab35e1b5f722f91f1a8e0c9b902a842c1d17454b0a0f263826c4793a1034aef3eebf155f6b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8696986.exe

    Filesize

    996KB

    MD5

    472e667415580ac0ac185501b9783aa3

    SHA1

    bf0f71f636c804856f2fc134799df56414c5dfb7

    SHA256

    75f72600658b101db740d4753e6585b0c44c44d71acd6b3282ba46a16934c829

    SHA512

    ef4fb1e76925c6306bd36bc1a4f0b062cadbe0fd90662a4734ddb7ab35e1b5f722f91f1a8e0c9b902a842c1d17454b0a0f263826c4793a1034aef3eebf155f6b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4838467.exe

    Filesize

    814KB

    MD5

    35be545f66f5d903aefc585f5a879d0d

    SHA1

    99b0484cb2060506ba7df765ce463b3337fcc176

    SHA256

    76f72c1920feced3b17b20f89f502495ff20cf5c69061c6b2a69f997dcfc07f1

    SHA512

    785b30068c17b288cc5fcfe36852e5e69c3417de30276d426f04a14d11598b0331895e3948a43cc91bcefa689fa70722781bee2654c262ba5edd3848933ccb15

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4838467.exe

    Filesize

    814KB

    MD5

    35be545f66f5d903aefc585f5a879d0d

    SHA1

    99b0484cb2060506ba7df765ce463b3337fcc176

    SHA256

    76f72c1920feced3b17b20f89f502495ff20cf5c69061c6b2a69f997dcfc07f1

    SHA512

    785b30068c17b288cc5fcfe36852e5e69c3417de30276d426f04a14d11598b0331895e3948a43cc91bcefa689fa70722781bee2654c262ba5edd3848933ccb15

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5020665.exe

    Filesize

    631KB

    MD5

    31e72172124ddd01197c43a6f54137dd

    SHA1

    9a32e1093d6cc22af671debe4a3526d34b595838

    SHA256

    1e62771d9a09778083c57929d8fc855f11365c9cc8574b0fc34b3f77550612c7

    SHA512

    174e63c19854e1a40483dd056453a1c3389d250c430618c3d9f3ad6a348d6be693ba6cbd592aec989380ca7560434e9d3a321a9b75a2887163d051ca13bf1bcb

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5020665.exe

    Filesize

    631KB

    MD5

    31e72172124ddd01197c43a6f54137dd

    SHA1

    9a32e1093d6cc22af671debe4a3526d34b595838

    SHA256

    1e62771d9a09778083c57929d8fc855f11365c9cc8574b0fc34b3f77550612c7

    SHA512

    174e63c19854e1a40483dd056453a1c3389d250c430618c3d9f3ad6a348d6be693ba6cbd592aec989380ca7560434e9d3a321a9b75a2887163d051ca13bf1bcb

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0940807.exe

    Filesize

    353KB

    MD5

    226c9ec603e7127f3f84b8fde5de208b

    SHA1

    28102db29655b2a66ac3516a3bd39219d64e50a9

    SHA256

    f6e7a3fcd542292b0a5409155a5405d803b5a91d0b49e9fcbf62ee21138dea35

    SHA512

    a5af0324cd1be406206146a5a137be00c74854daef7dd27bdc71037ce93c8b36f7cf893099a56e536cfc86f11bf5330ae6f38ab8b0d005f5bd098c703a3493e5

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0940807.exe

    Filesize

    353KB

    MD5

    226c9ec603e7127f3f84b8fde5de208b

    SHA1

    28102db29655b2a66ac3516a3bd39219d64e50a9

    SHA256

    f6e7a3fcd542292b0a5409155a5405d803b5a91d0b49e9fcbf62ee21138dea35

    SHA512

    a5af0324cd1be406206146a5a137be00c74854daef7dd27bdc71037ce93c8b36f7cf893099a56e536cfc86f11bf5330ae6f38ab8b0d005f5bd098c703a3493e5

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1814320.exe

    Filesize

    250KB

    MD5

    56e849d1bd95003cfd0f3c616fbafe2e

    SHA1

    a1b11d077af18a32144a510825df477f8a8cf746

    SHA256

    b7509c02d20948c098e9f2cd28c7e776ac29062fd2356372be78c7a016006b76

    SHA512

    3cb1585574abd180fc818fb975e6f8937395f3f93dda34ab00ece87fe2ee7fb85160199258620afadfb6a8b517c030a11c23953be44bb892b930285de7e7f7d1

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1814320.exe

    Filesize

    250KB

    MD5

    56e849d1bd95003cfd0f3c616fbafe2e

    SHA1

    a1b11d077af18a32144a510825df477f8a8cf746

    SHA256

    b7509c02d20948c098e9f2cd28c7e776ac29062fd2356372be78c7a016006b76

    SHA512

    3cb1585574abd180fc818fb975e6f8937395f3f93dda34ab00ece87fe2ee7fb85160199258620afadfb6a8b517c030a11c23953be44bb892b930285de7e7f7d1

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1814320.exe

    Filesize

    250KB

    MD5

    56e849d1bd95003cfd0f3c616fbafe2e

    SHA1

    a1b11d077af18a32144a510825df477f8a8cf746

    SHA256

    b7509c02d20948c098e9f2cd28c7e776ac29062fd2356372be78c7a016006b76

    SHA512

    3cb1585574abd180fc818fb975e6f8937395f3f93dda34ab00ece87fe2ee7fb85160199258620afadfb6a8b517c030a11c23953be44bb892b930285de7e7f7d1

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8696986.exe

    Filesize

    996KB

    MD5

    472e667415580ac0ac185501b9783aa3

    SHA1

    bf0f71f636c804856f2fc134799df56414c5dfb7

    SHA256

    75f72600658b101db740d4753e6585b0c44c44d71acd6b3282ba46a16934c829

    SHA512

    ef4fb1e76925c6306bd36bc1a4f0b062cadbe0fd90662a4734ddb7ab35e1b5f722f91f1a8e0c9b902a842c1d17454b0a0f263826c4793a1034aef3eebf155f6b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8696986.exe

    Filesize

    996KB

    MD5

    472e667415580ac0ac185501b9783aa3

    SHA1

    bf0f71f636c804856f2fc134799df56414c5dfb7

    SHA256

    75f72600658b101db740d4753e6585b0c44c44d71acd6b3282ba46a16934c829

    SHA512

    ef4fb1e76925c6306bd36bc1a4f0b062cadbe0fd90662a4734ddb7ab35e1b5f722f91f1a8e0c9b902a842c1d17454b0a0f263826c4793a1034aef3eebf155f6b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z4838467.exe

    Filesize

    814KB

    MD5

    35be545f66f5d903aefc585f5a879d0d

    SHA1

    99b0484cb2060506ba7df765ce463b3337fcc176

    SHA256

    76f72c1920feced3b17b20f89f502495ff20cf5c69061c6b2a69f997dcfc07f1

    SHA512

    785b30068c17b288cc5fcfe36852e5e69c3417de30276d426f04a14d11598b0331895e3948a43cc91bcefa689fa70722781bee2654c262ba5edd3848933ccb15

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z4838467.exe

    Filesize

    814KB

    MD5

    35be545f66f5d903aefc585f5a879d0d

    SHA1

    99b0484cb2060506ba7df765ce463b3337fcc176

    SHA256

    76f72c1920feced3b17b20f89f502495ff20cf5c69061c6b2a69f997dcfc07f1

    SHA512

    785b30068c17b288cc5fcfe36852e5e69c3417de30276d426f04a14d11598b0331895e3948a43cc91bcefa689fa70722781bee2654c262ba5edd3848933ccb15

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5020665.exe

    Filesize

    631KB

    MD5

    31e72172124ddd01197c43a6f54137dd

    SHA1

    9a32e1093d6cc22af671debe4a3526d34b595838

    SHA256

    1e62771d9a09778083c57929d8fc855f11365c9cc8574b0fc34b3f77550612c7

    SHA512

    174e63c19854e1a40483dd056453a1c3389d250c430618c3d9f3ad6a348d6be693ba6cbd592aec989380ca7560434e9d3a321a9b75a2887163d051ca13bf1bcb

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5020665.exe

    Filesize

    631KB

    MD5

    31e72172124ddd01197c43a6f54137dd

    SHA1

    9a32e1093d6cc22af671debe4a3526d34b595838

    SHA256

    1e62771d9a09778083c57929d8fc855f11365c9cc8574b0fc34b3f77550612c7

    SHA512

    174e63c19854e1a40483dd056453a1c3389d250c430618c3d9f3ad6a348d6be693ba6cbd592aec989380ca7560434e9d3a321a9b75a2887163d051ca13bf1bcb

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z0940807.exe

    Filesize

    353KB

    MD5

    226c9ec603e7127f3f84b8fde5de208b

    SHA1

    28102db29655b2a66ac3516a3bd39219d64e50a9

    SHA256

    f6e7a3fcd542292b0a5409155a5405d803b5a91d0b49e9fcbf62ee21138dea35

    SHA512

    a5af0324cd1be406206146a5a137be00c74854daef7dd27bdc71037ce93c8b36f7cf893099a56e536cfc86f11bf5330ae6f38ab8b0d005f5bd098c703a3493e5

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z0940807.exe

    Filesize

    353KB

    MD5

    226c9ec603e7127f3f84b8fde5de208b

    SHA1

    28102db29655b2a66ac3516a3bd39219d64e50a9

    SHA256

    f6e7a3fcd542292b0a5409155a5405d803b5a91d0b49e9fcbf62ee21138dea35

    SHA512

    a5af0324cd1be406206146a5a137be00c74854daef7dd27bdc71037ce93c8b36f7cf893099a56e536cfc86f11bf5330ae6f38ab8b0d005f5bd098c703a3493e5

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1814320.exe

    Filesize

    250KB

    MD5

    56e849d1bd95003cfd0f3c616fbafe2e

    SHA1

    a1b11d077af18a32144a510825df477f8a8cf746

    SHA256

    b7509c02d20948c098e9f2cd28c7e776ac29062fd2356372be78c7a016006b76

    SHA512

    3cb1585574abd180fc818fb975e6f8937395f3f93dda34ab00ece87fe2ee7fb85160199258620afadfb6a8b517c030a11c23953be44bb892b930285de7e7f7d1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1814320.exe

    Filesize

    250KB

    MD5

    56e849d1bd95003cfd0f3c616fbafe2e

    SHA1

    a1b11d077af18a32144a510825df477f8a8cf746

    SHA256

    b7509c02d20948c098e9f2cd28c7e776ac29062fd2356372be78c7a016006b76

    SHA512

    3cb1585574abd180fc818fb975e6f8937395f3f93dda34ab00ece87fe2ee7fb85160199258620afadfb6a8b517c030a11c23953be44bb892b930285de7e7f7d1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1814320.exe

    Filesize

    250KB

    MD5

    56e849d1bd95003cfd0f3c616fbafe2e

    SHA1

    a1b11d077af18a32144a510825df477f8a8cf746

    SHA256

    b7509c02d20948c098e9f2cd28c7e776ac29062fd2356372be78c7a016006b76

    SHA512

    3cb1585574abd180fc818fb975e6f8937395f3f93dda34ab00ece87fe2ee7fb85160199258620afadfb6a8b517c030a11c23953be44bb892b930285de7e7f7d1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1814320.exe

    Filesize

    250KB

    MD5

    56e849d1bd95003cfd0f3c616fbafe2e

    SHA1

    a1b11d077af18a32144a510825df477f8a8cf746

    SHA256

    b7509c02d20948c098e9f2cd28c7e776ac29062fd2356372be78c7a016006b76

    SHA512

    3cb1585574abd180fc818fb975e6f8937395f3f93dda34ab00ece87fe2ee7fb85160199258620afadfb6a8b517c030a11c23953be44bb892b930285de7e7f7d1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1814320.exe

    Filesize

    250KB

    MD5

    56e849d1bd95003cfd0f3c616fbafe2e

    SHA1

    a1b11d077af18a32144a510825df477f8a8cf746

    SHA256

    b7509c02d20948c098e9f2cd28c7e776ac29062fd2356372be78c7a016006b76

    SHA512

    3cb1585574abd180fc818fb975e6f8937395f3f93dda34ab00ece87fe2ee7fb85160199258620afadfb6a8b517c030a11c23953be44bb892b930285de7e7f7d1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1814320.exe

    Filesize

    250KB

    MD5

    56e849d1bd95003cfd0f3c616fbafe2e

    SHA1

    a1b11d077af18a32144a510825df477f8a8cf746

    SHA256

    b7509c02d20948c098e9f2cd28c7e776ac29062fd2356372be78c7a016006b76

    SHA512

    3cb1585574abd180fc818fb975e6f8937395f3f93dda34ab00ece87fe2ee7fb85160199258620afadfb6a8b517c030a11c23953be44bb892b930285de7e7f7d1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1814320.exe

    Filesize

    250KB

    MD5

    56e849d1bd95003cfd0f3c616fbafe2e

    SHA1

    a1b11d077af18a32144a510825df477f8a8cf746

    SHA256

    b7509c02d20948c098e9f2cd28c7e776ac29062fd2356372be78c7a016006b76

    SHA512

    3cb1585574abd180fc818fb975e6f8937395f3f93dda34ab00ece87fe2ee7fb85160199258620afadfb6a8b517c030a11c23953be44bb892b930285de7e7f7d1

  • memory/2960-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2960-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2960-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2960-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2960-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2960-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2960-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2960-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB