Analysis

  • max time kernel
    26s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 14:02

General

  • Target

    5739c862947a8486ab2ec1b15ea5d4e66ffb63e8c6d5049ff1fca75b4e938d40.exe

  • Size

    1.1MB

  • MD5

    6a5c4d384e0127ed7ec925a106d2fb04

  • SHA1

    5b0d241245617c0cebbb76d7a438ea19c9073a6f

  • SHA256

    5739c862947a8486ab2ec1b15ea5d4e66ffb63e8c6d5049ff1fca75b4e938d40

  • SHA512

    0a7ffec7266b11b23f6915812260d95550b32d9cd9ca8311dbe5fce352733b1af910b1fd1a1cbb6c925bbb238c5d4ee3ac560db92c72d46cc07f2ef8398efdcc

  • SSDEEP

    12288:AMr2y90gxzNdKEA7jfgZTbJTrScJo9q9Wg+4Iiy492mEP3OR3jOTlJyLe2BuUDpo:myRxA7sZTbZ2QmTUe2B5WbhUXE+S66

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5739c862947a8486ab2ec1b15ea5d4e66ffb63e8c6d5049ff1fca75b4e938d40.exe
    "C:\Users\Admin\AppData\Local\Temp\5739c862947a8486ab2ec1b15ea5d4e66ffb63e8c6d5049ff1fca75b4e938d40.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7658003.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7658003.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3983329.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3983329.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2584463.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2584463.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2536
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6916545.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6916545.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2532
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8663661.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8663661.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3016
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1624
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7658003.exe

    Filesize

    997KB

    MD5

    b73eb8ee0a00ad329d4f5d44ba810fe7

    SHA1

    732f8d4e3c02749f943f58b558f055cfb82ed385

    SHA256

    e120850eb4be336de436a3bd06c1b9f5cb395ad76c3241fabe3169b0803632b1

    SHA512

    c47be546131d41786e762df9f5fc34e6d20302379cbb580716043dc21d714ae7f08e472244549aa9f1b22edb1ecebddaaa4b416a7c5556447e48ac68b2db90b8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7658003.exe

    Filesize

    997KB

    MD5

    b73eb8ee0a00ad329d4f5d44ba810fe7

    SHA1

    732f8d4e3c02749f943f58b558f055cfb82ed385

    SHA256

    e120850eb4be336de436a3bd06c1b9f5cb395ad76c3241fabe3169b0803632b1

    SHA512

    c47be546131d41786e762df9f5fc34e6d20302379cbb580716043dc21d714ae7f08e472244549aa9f1b22edb1ecebddaaa4b416a7c5556447e48ac68b2db90b8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3983329.exe

    Filesize

    814KB

    MD5

    69d6cd90be53f7bc3e65e9da7401f840

    SHA1

    e70e6736eb5e38ca6e2e0c2e1248ef49ec147326

    SHA256

    0bb5ed6629170f3fa81810cdce14ae0cbf7048b3d42826d6dcf29a3057ed73da

    SHA512

    2cb46fa26ff77abdc00f86f433f23e92699ac8d685413a80ee5bdaa019cabf14d9313dd3daed73098da81308f5468c529a1d50f447df83385a24ead215da58b5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3983329.exe

    Filesize

    814KB

    MD5

    69d6cd90be53f7bc3e65e9da7401f840

    SHA1

    e70e6736eb5e38ca6e2e0c2e1248ef49ec147326

    SHA256

    0bb5ed6629170f3fa81810cdce14ae0cbf7048b3d42826d6dcf29a3057ed73da

    SHA512

    2cb46fa26ff77abdc00f86f433f23e92699ac8d685413a80ee5bdaa019cabf14d9313dd3daed73098da81308f5468c529a1d50f447df83385a24ead215da58b5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2584463.exe

    Filesize

    631KB

    MD5

    4d44a567f2dc0d13d0a8c828574583bf

    SHA1

    1901e5f1f1631f46563c8c0ff40a40d5de21b273

    SHA256

    cbd399dca37a811e31c7eec52a66cd08176ba58f270f67dd23102dddcd050f2e

    SHA512

    8148f34c201c1193db90b53784285e81fa099bd874c93600477d586d2a4f985a895b6b7a56e84749595ad1c1c03716133fb1abd5bd5a94df0ff22d246e03e065

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2584463.exe

    Filesize

    631KB

    MD5

    4d44a567f2dc0d13d0a8c828574583bf

    SHA1

    1901e5f1f1631f46563c8c0ff40a40d5de21b273

    SHA256

    cbd399dca37a811e31c7eec52a66cd08176ba58f270f67dd23102dddcd050f2e

    SHA512

    8148f34c201c1193db90b53784285e81fa099bd874c93600477d586d2a4f985a895b6b7a56e84749595ad1c1c03716133fb1abd5bd5a94df0ff22d246e03e065

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6916545.exe

    Filesize

    353KB

    MD5

    92b33827f1b4839ccf66fbcc842b207a

    SHA1

    5b1105107fd3ad5ed7fd63a53c0714d98e208584

    SHA256

    5c76290e09c49af19453802bb3c5df3b6ab72222324b7d9df257d534b50884c1

    SHA512

    047293342a9dd71d80a5b0d4f48bd3f27a356693043606f3209d51ad28b80c6001588ff662313ea261d1833a08f649115d51d0d1a9b178a97109bcd5c6c3023a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6916545.exe

    Filesize

    353KB

    MD5

    92b33827f1b4839ccf66fbcc842b207a

    SHA1

    5b1105107fd3ad5ed7fd63a53c0714d98e208584

    SHA256

    5c76290e09c49af19453802bb3c5df3b6ab72222324b7d9df257d534b50884c1

    SHA512

    047293342a9dd71d80a5b0d4f48bd3f27a356693043606f3209d51ad28b80c6001588ff662313ea261d1833a08f649115d51d0d1a9b178a97109bcd5c6c3023a

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8663661.exe

    Filesize

    250KB

    MD5

    2a9a90f5bb64df62bcc26f09885a4e89

    SHA1

    5bcad05f4fb9a13576b7bb77127d5c44b98650ad

    SHA256

    2971d91f347226bf67d8338c6c77f1a29bd56b02526a6055c1a6faef35eeb1a3

    SHA512

    c098adfa1ddfe54972ec4751e40af27c20e0f591626bbef0975f3294ce3a9be739c98c2d0ebd18d6cb48e733e6adfa970b2197270c3a5fc8d1e96f7e013410cc

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8663661.exe

    Filesize

    250KB

    MD5

    2a9a90f5bb64df62bcc26f09885a4e89

    SHA1

    5bcad05f4fb9a13576b7bb77127d5c44b98650ad

    SHA256

    2971d91f347226bf67d8338c6c77f1a29bd56b02526a6055c1a6faef35eeb1a3

    SHA512

    c098adfa1ddfe54972ec4751e40af27c20e0f591626bbef0975f3294ce3a9be739c98c2d0ebd18d6cb48e733e6adfa970b2197270c3a5fc8d1e96f7e013410cc

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8663661.exe

    Filesize

    250KB

    MD5

    2a9a90f5bb64df62bcc26f09885a4e89

    SHA1

    5bcad05f4fb9a13576b7bb77127d5c44b98650ad

    SHA256

    2971d91f347226bf67d8338c6c77f1a29bd56b02526a6055c1a6faef35eeb1a3

    SHA512

    c098adfa1ddfe54972ec4751e40af27c20e0f591626bbef0975f3294ce3a9be739c98c2d0ebd18d6cb48e733e6adfa970b2197270c3a5fc8d1e96f7e013410cc

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7658003.exe

    Filesize

    997KB

    MD5

    b73eb8ee0a00ad329d4f5d44ba810fe7

    SHA1

    732f8d4e3c02749f943f58b558f055cfb82ed385

    SHA256

    e120850eb4be336de436a3bd06c1b9f5cb395ad76c3241fabe3169b0803632b1

    SHA512

    c47be546131d41786e762df9f5fc34e6d20302379cbb580716043dc21d714ae7f08e472244549aa9f1b22edb1ecebddaaa4b416a7c5556447e48ac68b2db90b8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7658003.exe

    Filesize

    997KB

    MD5

    b73eb8ee0a00ad329d4f5d44ba810fe7

    SHA1

    732f8d4e3c02749f943f58b558f055cfb82ed385

    SHA256

    e120850eb4be336de436a3bd06c1b9f5cb395ad76c3241fabe3169b0803632b1

    SHA512

    c47be546131d41786e762df9f5fc34e6d20302379cbb580716043dc21d714ae7f08e472244549aa9f1b22edb1ecebddaaa4b416a7c5556447e48ac68b2db90b8

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3983329.exe

    Filesize

    814KB

    MD5

    69d6cd90be53f7bc3e65e9da7401f840

    SHA1

    e70e6736eb5e38ca6e2e0c2e1248ef49ec147326

    SHA256

    0bb5ed6629170f3fa81810cdce14ae0cbf7048b3d42826d6dcf29a3057ed73da

    SHA512

    2cb46fa26ff77abdc00f86f433f23e92699ac8d685413a80ee5bdaa019cabf14d9313dd3daed73098da81308f5468c529a1d50f447df83385a24ead215da58b5

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3983329.exe

    Filesize

    814KB

    MD5

    69d6cd90be53f7bc3e65e9da7401f840

    SHA1

    e70e6736eb5e38ca6e2e0c2e1248ef49ec147326

    SHA256

    0bb5ed6629170f3fa81810cdce14ae0cbf7048b3d42826d6dcf29a3057ed73da

    SHA512

    2cb46fa26ff77abdc00f86f433f23e92699ac8d685413a80ee5bdaa019cabf14d9313dd3daed73098da81308f5468c529a1d50f447df83385a24ead215da58b5

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2584463.exe

    Filesize

    631KB

    MD5

    4d44a567f2dc0d13d0a8c828574583bf

    SHA1

    1901e5f1f1631f46563c8c0ff40a40d5de21b273

    SHA256

    cbd399dca37a811e31c7eec52a66cd08176ba58f270f67dd23102dddcd050f2e

    SHA512

    8148f34c201c1193db90b53784285e81fa099bd874c93600477d586d2a4f985a895b6b7a56e84749595ad1c1c03716133fb1abd5bd5a94df0ff22d246e03e065

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2584463.exe

    Filesize

    631KB

    MD5

    4d44a567f2dc0d13d0a8c828574583bf

    SHA1

    1901e5f1f1631f46563c8c0ff40a40d5de21b273

    SHA256

    cbd399dca37a811e31c7eec52a66cd08176ba58f270f67dd23102dddcd050f2e

    SHA512

    8148f34c201c1193db90b53784285e81fa099bd874c93600477d586d2a4f985a895b6b7a56e84749595ad1c1c03716133fb1abd5bd5a94df0ff22d246e03e065

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6916545.exe

    Filesize

    353KB

    MD5

    92b33827f1b4839ccf66fbcc842b207a

    SHA1

    5b1105107fd3ad5ed7fd63a53c0714d98e208584

    SHA256

    5c76290e09c49af19453802bb3c5df3b6ab72222324b7d9df257d534b50884c1

    SHA512

    047293342a9dd71d80a5b0d4f48bd3f27a356693043606f3209d51ad28b80c6001588ff662313ea261d1833a08f649115d51d0d1a9b178a97109bcd5c6c3023a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6916545.exe

    Filesize

    353KB

    MD5

    92b33827f1b4839ccf66fbcc842b207a

    SHA1

    5b1105107fd3ad5ed7fd63a53c0714d98e208584

    SHA256

    5c76290e09c49af19453802bb3c5df3b6ab72222324b7d9df257d534b50884c1

    SHA512

    047293342a9dd71d80a5b0d4f48bd3f27a356693043606f3209d51ad28b80c6001588ff662313ea261d1833a08f649115d51d0d1a9b178a97109bcd5c6c3023a

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8663661.exe

    Filesize

    250KB

    MD5

    2a9a90f5bb64df62bcc26f09885a4e89

    SHA1

    5bcad05f4fb9a13576b7bb77127d5c44b98650ad

    SHA256

    2971d91f347226bf67d8338c6c77f1a29bd56b02526a6055c1a6faef35eeb1a3

    SHA512

    c098adfa1ddfe54972ec4751e40af27c20e0f591626bbef0975f3294ce3a9be739c98c2d0ebd18d6cb48e733e6adfa970b2197270c3a5fc8d1e96f7e013410cc

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8663661.exe

    Filesize

    250KB

    MD5

    2a9a90f5bb64df62bcc26f09885a4e89

    SHA1

    5bcad05f4fb9a13576b7bb77127d5c44b98650ad

    SHA256

    2971d91f347226bf67d8338c6c77f1a29bd56b02526a6055c1a6faef35eeb1a3

    SHA512

    c098adfa1ddfe54972ec4751e40af27c20e0f591626bbef0975f3294ce3a9be739c98c2d0ebd18d6cb48e733e6adfa970b2197270c3a5fc8d1e96f7e013410cc

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8663661.exe

    Filesize

    250KB

    MD5

    2a9a90f5bb64df62bcc26f09885a4e89

    SHA1

    5bcad05f4fb9a13576b7bb77127d5c44b98650ad

    SHA256

    2971d91f347226bf67d8338c6c77f1a29bd56b02526a6055c1a6faef35eeb1a3

    SHA512

    c098adfa1ddfe54972ec4751e40af27c20e0f591626bbef0975f3294ce3a9be739c98c2d0ebd18d6cb48e733e6adfa970b2197270c3a5fc8d1e96f7e013410cc

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8663661.exe

    Filesize

    250KB

    MD5

    2a9a90f5bb64df62bcc26f09885a4e89

    SHA1

    5bcad05f4fb9a13576b7bb77127d5c44b98650ad

    SHA256

    2971d91f347226bf67d8338c6c77f1a29bd56b02526a6055c1a6faef35eeb1a3

    SHA512

    c098adfa1ddfe54972ec4751e40af27c20e0f591626bbef0975f3294ce3a9be739c98c2d0ebd18d6cb48e733e6adfa970b2197270c3a5fc8d1e96f7e013410cc

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8663661.exe

    Filesize

    250KB

    MD5

    2a9a90f5bb64df62bcc26f09885a4e89

    SHA1

    5bcad05f4fb9a13576b7bb77127d5c44b98650ad

    SHA256

    2971d91f347226bf67d8338c6c77f1a29bd56b02526a6055c1a6faef35eeb1a3

    SHA512

    c098adfa1ddfe54972ec4751e40af27c20e0f591626bbef0975f3294ce3a9be739c98c2d0ebd18d6cb48e733e6adfa970b2197270c3a5fc8d1e96f7e013410cc

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8663661.exe

    Filesize

    250KB

    MD5

    2a9a90f5bb64df62bcc26f09885a4e89

    SHA1

    5bcad05f4fb9a13576b7bb77127d5c44b98650ad

    SHA256

    2971d91f347226bf67d8338c6c77f1a29bd56b02526a6055c1a6faef35eeb1a3

    SHA512

    c098adfa1ddfe54972ec4751e40af27c20e0f591626bbef0975f3294ce3a9be739c98c2d0ebd18d6cb48e733e6adfa970b2197270c3a5fc8d1e96f7e013410cc

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8663661.exe

    Filesize

    250KB

    MD5

    2a9a90f5bb64df62bcc26f09885a4e89

    SHA1

    5bcad05f4fb9a13576b7bb77127d5c44b98650ad

    SHA256

    2971d91f347226bf67d8338c6c77f1a29bd56b02526a6055c1a6faef35eeb1a3

    SHA512

    c098adfa1ddfe54972ec4751e40af27c20e0f591626bbef0975f3294ce3a9be739c98c2d0ebd18d6cb48e733e6adfa970b2197270c3a5fc8d1e96f7e013410cc

  • memory/1624-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1624-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1624-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1624-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1624-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1624-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1624-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1624-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB