Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 14:11

General

  • Target

    7d60632999cb7a025661ce9308e40c8cf9d5acdb17a2faacdf1cd2c51c0c4043.exe

  • Size

    1.1MB

  • MD5

    54f152f5296eec04ed5cfe40627d606d

  • SHA1

    9c9f45ae31f4136dddaa3886afcf61faf7bb1e91

  • SHA256

    7d60632999cb7a025661ce9308e40c8cf9d5acdb17a2faacdf1cd2c51c0c4043

  • SHA512

    48a9e96238b6b0507fa79b315b3817e571dcfe2e97654b8944af552392324e238528da0c8de0bde2121deea248d1c3e9215a725e2a7cea4516f3d520e73224e9

  • SSDEEP

    24576:Gy5DWX7JB6LVnOw5BToTLUGyHlNqXLenS4BV3yht2UMlDIsqAAsoa4G:V5DWX7JB6ROw5R8IGyFSnWV31LlDKI4

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d60632999cb7a025661ce9308e40c8cf9d5acdb17a2faacdf1cd2c51c0c4043.exe
    "C:\Users\Admin\AppData\Local\Temp\7d60632999cb7a025661ce9308e40c8cf9d5acdb17a2faacdf1cd2c51c0c4043.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6486854.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6486854.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2240
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2938382.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2938382.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6949175.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6949175.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2712
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6957121.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6957121.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2680
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3290162.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3290162.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2780
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2800
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:2556
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                      PID:2820
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      7⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2624
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 296
                      7⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:2796

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6486854.exe

          Filesize

          997KB

          MD5

          6700977bfca99753c0271817944aa239

          SHA1

          0de68561874c6c8c423e7daffdb3a4b5cef5cca5

          SHA256

          c9ace4fd8457303ad9bcb4dcfca4e59aca88b1a1df8add7e6a0a35101899bf90

          SHA512

          00a25527ed46e6eae680f806ee3813dd9c7ebb0d66794bedef1afe0249f10eaf35262be4bececa559eec385820f6490a4fc14ed69c55d58e35fc327d92bc05ec

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6486854.exe

          Filesize

          997KB

          MD5

          6700977bfca99753c0271817944aa239

          SHA1

          0de68561874c6c8c423e7daffdb3a4b5cef5cca5

          SHA256

          c9ace4fd8457303ad9bcb4dcfca4e59aca88b1a1df8add7e6a0a35101899bf90

          SHA512

          00a25527ed46e6eae680f806ee3813dd9c7ebb0d66794bedef1afe0249f10eaf35262be4bececa559eec385820f6490a4fc14ed69c55d58e35fc327d92bc05ec

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2938382.exe

          Filesize

          814KB

          MD5

          7fba175670ba0f22703a1ba15da39a8c

          SHA1

          466b4403289132f28ffe4df84f2bc29d4710e815

          SHA256

          7bc37a3e0fcef8c16a69d57b83a84de405d68f25365de5f6dc20e79e22390f6b

          SHA512

          fa00418d3da06f0a5a7f18ee619fa5ba2014f12a834aa489f20313d064eb275525b8479a9697776963ae83f78549d59cd3d33251a0bf21daa118a6be28f08b42

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2938382.exe

          Filesize

          814KB

          MD5

          7fba175670ba0f22703a1ba15da39a8c

          SHA1

          466b4403289132f28ffe4df84f2bc29d4710e815

          SHA256

          7bc37a3e0fcef8c16a69d57b83a84de405d68f25365de5f6dc20e79e22390f6b

          SHA512

          fa00418d3da06f0a5a7f18ee619fa5ba2014f12a834aa489f20313d064eb275525b8479a9697776963ae83f78549d59cd3d33251a0bf21daa118a6be28f08b42

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6949175.exe

          Filesize

          631KB

          MD5

          e618bae2e4681fd09971ce9f44fb89d7

          SHA1

          07a46f2f27cb8c2c3c772fd4005e8221ab3cda82

          SHA256

          1f5f90eb1f49ceba726fb280a149cddb5ad4f25fc9ea0a43c7246d42ce261e9c

          SHA512

          514ee5473c227f1b0df91cc51b8f68bca1250df6d3913e40577f0c0ee01aaa2056a13bf54fa7fb016215b893bc8f3eba2e3732239730ba53c7a7158537536d86

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6949175.exe

          Filesize

          631KB

          MD5

          e618bae2e4681fd09971ce9f44fb89d7

          SHA1

          07a46f2f27cb8c2c3c772fd4005e8221ab3cda82

          SHA256

          1f5f90eb1f49ceba726fb280a149cddb5ad4f25fc9ea0a43c7246d42ce261e9c

          SHA512

          514ee5473c227f1b0df91cc51b8f68bca1250df6d3913e40577f0c0ee01aaa2056a13bf54fa7fb016215b893bc8f3eba2e3732239730ba53c7a7158537536d86

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6957121.exe

          Filesize

          354KB

          MD5

          0aed5ae6b1e723b671360b276039d8ac

          SHA1

          120f8db08f195e6e28bf41f93428bb5047aafab9

          SHA256

          a9d0066c5bf5f05248d8666ebce33a7549379f3234d9b5ddcf78e2f9fab1658f

          SHA512

          affbd6a3cff8108abf7a83d3391de988a012e6e7da3344c4fd89c72a9ea877449a89b135cb302cf0e87156fc240695e8b5c1753ac0860c6686f4751561dc2a67

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6957121.exe

          Filesize

          354KB

          MD5

          0aed5ae6b1e723b671360b276039d8ac

          SHA1

          120f8db08f195e6e28bf41f93428bb5047aafab9

          SHA256

          a9d0066c5bf5f05248d8666ebce33a7549379f3234d9b5ddcf78e2f9fab1658f

          SHA512

          affbd6a3cff8108abf7a83d3391de988a012e6e7da3344c4fd89c72a9ea877449a89b135cb302cf0e87156fc240695e8b5c1753ac0860c6686f4751561dc2a67

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3290162.exe

          Filesize

          250KB

          MD5

          6e7d82b81b53bf617ca01f9ea909e5ba

          SHA1

          86280d7943ca3fbcc0e2e5ce535aa632e8534eef

          SHA256

          bdc3ea8b3747acd33405f0d9a8889372251af746132dd13d3f7fc3ae93e8c05c

          SHA512

          816b6f42333642412ab1e9ca04b6712ebf037ac69440410d32a8d53033d1694ebf9e026184005c75da5ed5cd7d2295a3b5121248eba154e8662646c88b16ef2b

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3290162.exe

          Filesize

          250KB

          MD5

          6e7d82b81b53bf617ca01f9ea909e5ba

          SHA1

          86280d7943ca3fbcc0e2e5ce535aa632e8534eef

          SHA256

          bdc3ea8b3747acd33405f0d9a8889372251af746132dd13d3f7fc3ae93e8c05c

          SHA512

          816b6f42333642412ab1e9ca04b6712ebf037ac69440410d32a8d53033d1694ebf9e026184005c75da5ed5cd7d2295a3b5121248eba154e8662646c88b16ef2b

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3290162.exe

          Filesize

          250KB

          MD5

          6e7d82b81b53bf617ca01f9ea909e5ba

          SHA1

          86280d7943ca3fbcc0e2e5ce535aa632e8534eef

          SHA256

          bdc3ea8b3747acd33405f0d9a8889372251af746132dd13d3f7fc3ae93e8c05c

          SHA512

          816b6f42333642412ab1e9ca04b6712ebf037ac69440410d32a8d53033d1694ebf9e026184005c75da5ed5cd7d2295a3b5121248eba154e8662646c88b16ef2b

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6486854.exe

          Filesize

          997KB

          MD5

          6700977bfca99753c0271817944aa239

          SHA1

          0de68561874c6c8c423e7daffdb3a4b5cef5cca5

          SHA256

          c9ace4fd8457303ad9bcb4dcfca4e59aca88b1a1df8add7e6a0a35101899bf90

          SHA512

          00a25527ed46e6eae680f806ee3813dd9c7ebb0d66794bedef1afe0249f10eaf35262be4bececa559eec385820f6490a4fc14ed69c55d58e35fc327d92bc05ec

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6486854.exe

          Filesize

          997KB

          MD5

          6700977bfca99753c0271817944aa239

          SHA1

          0de68561874c6c8c423e7daffdb3a4b5cef5cca5

          SHA256

          c9ace4fd8457303ad9bcb4dcfca4e59aca88b1a1df8add7e6a0a35101899bf90

          SHA512

          00a25527ed46e6eae680f806ee3813dd9c7ebb0d66794bedef1afe0249f10eaf35262be4bececa559eec385820f6490a4fc14ed69c55d58e35fc327d92bc05ec

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2938382.exe

          Filesize

          814KB

          MD5

          7fba175670ba0f22703a1ba15da39a8c

          SHA1

          466b4403289132f28ffe4df84f2bc29d4710e815

          SHA256

          7bc37a3e0fcef8c16a69d57b83a84de405d68f25365de5f6dc20e79e22390f6b

          SHA512

          fa00418d3da06f0a5a7f18ee619fa5ba2014f12a834aa489f20313d064eb275525b8479a9697776963ae83f78549d59cd3d33251a0bf21daa118a6be28f08b42

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2938382.exe

          Filesize

          814KB

          MD5

          7fba175670ba0f22703a1ba15da39a8c

          SHA1

          466b4403289132f28ffe4df84f2bc29d4710e815

          SHA256

          7bc37a3e0fcef8c16a69d57b83a84de405d68f25365de5f6dc20e79e22390f6b

          SHA512

          fa00418d3da06f0a5a7f18ee619fa5ba2014f12a834aa489f20313d064eb275525b8479a9697776963ae83f78549d59cd3d33251a0bf21daa118a6be28f08b42

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6949175.exe

          Filesize

          631KB

          MD5

          e618bae2e4681fd09971ce9f44fb89d7

          SHA1

          07a46f2f27cb8c2c3c772fd4005e8221ab3cda82

          SHA256

          1f5f90eb1f49ceba726fb280a149cddb5ad4f25fc9ea0a43c7246d42ce261e9c

          SHA512

          514ee5473c227f1b0df91cc51b8f68bca1250df6d3913e40577f0c0ee01aaa2056a13bf54fa7fb016215b893bc8f3eba2e3732239730ba53c7a7158537536d86

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6949175.exe

          Filesize

          631KB

          MD5

          e618bae2e4681fd09971ce9f44fb89d7

          SHA1

          07a46f2f27cb8c2c3c772fd4005e8221ab3cda82

          SHA256

          1f5f90eb1f49ceba726fb280a149cddb5ad4f25fc9ea0a43c7246d42ce261e9c

          SHA512

          514ee5473c227f1b0df91cc51b8f68bca1250df6d3913e40577f0c0ee01aaa2056a13bf54fa7fb016215b893bc8f3eba2e3732239730ba53c7a7158537536d86

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6957121.exe

          Filesize

          354KB

          MD5

          0aed5ae6b1e723b671360b276039d8ac

          SHA1

          120f8db08f195e6e28bf41f93428bb5047aafab9

          SHA256

          a9d0066c5bf5f05248d8666ebce33a7549379f3234d9b5ddcf78e2f9fab1658f

          SHA512

          affbd6a3cff8108abf7a83d3391de988a012e6e7da3344c4fd89c72a9ea877449a89b135cb302cf0e87156fc240695e8b5c1753ac0860c6686f4751561dc2a67

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6957121.exe

          Filesize

          354KB

          MD5

          0aed5ae6b1e723b671360b276039d8ac

          SHA1

          120f8db08f195e6e28bf41f93428bb5047aafab9

          SHA256

          a9d0066c5bf5f05248d8666ebce33a7549379f3234d9b5ddcf78e2f9fab1658f

          SHA512

          affbd6a3cff8108abf7a83d3391de988a012e6e7da3344c4fd89c72a9ea877449a89b135cb302cf0e87156fc240695e8b5c1753ac0860c6686f4751561dc2a67

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3290162.exe

          Filesize

          250KB

          MD5

          6e7d82b81b53bf617ca01f9ea909e5ba

          SHA1

          86280d7943ca3fbcc0e2e5ce535aa632e8534eef

          SHA256

          bdc3ea8b3747acd33405f0d9a8889372251af746132dd13d3f7fc3ae93e8c05c

          SHA512

          816b6f42333642412ab1e9ca04b6712ebf037ac69440410d32a8d53033d1694ebf9e026184005c75da5ed5cd7d2295a3b5121248eba154e8662646c88b16ef2b

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3290162.exe

          Filesize

          250KB

          MD5

          6e7d82b81b53bf617ca01f9ea909e5ba

          SHA1

          86280d7943ca3fbcc0e2e5ce535aa632e8534eef

          SHA256

          bdc3ea8b3747acd33405f0d9a8889372251af746132dd13d3f7fc3ae93e8c05c

          SHA512

          816b6f42333642412ab1e9ca04b6712ebf037ac69440410d32a8d53033d1694ebf9e026184005c75da5ed5cd7d2295a3b5121248eba154e8662646c88b16ef2b

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3290162.exe

          Filesize

          250KB

          MD5

          6e7d82b81b53bf617ca01f9ea909e5ba

          SHA1

          86280d7943ca3fbcc0e2e5ce535aa632e8534eef

          SHA256

          bdc3ea8b3747acd33405f0d9a8889372251af746132dd13d3f7fc3ae93e8c05c

          SHA512

          816b6f42333642412ab1e9ca04b6712ebf037ac69440410d32a8d53033d1694ebf9e026184005c75da5ed5cd7d2295a3b5121248eba154e8662646c88b16ef2b

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3290162.exe

          Filesize

          250KB

          MD5

          6e7d82b81b53bf617ca01f9ea909e5ba

          SHA1

          86280d7943ca3fbcc0e2e5ce535aa632e8534eef

          SHA256

          bdc3ea8b3747acd33405f0d9a8889372251af746132dd13d3f7fc3ae93e8c05c

          SHA512

          816b6f42333642412ab1e9ca04b6712ebf037ac69440410d32a8d53033d1694ebf9e026184005c75da5ed5cd7d2295a3b5121248eba154e8662646c88b16ef2b

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3290162.exe

          Filesize

          250KB

          MD5

          6e7d82b81b53bf617ca01f9ea909e5ba

          SHA1

          86280d7943ca3fbcc0e2e5ce535aa632e8534eef

          SHA256

          bdc3ea8b3747acd33405f0d9a8889372251af746132dd13d3f7fc3ae93e8c05c

          SHA512

          816b6f42333642412ab1e9ca04b6712ebf037ac69440410d32a8d53033d1694ebf9e026184005c75da5ed5cd7d2295a3b5121248eba154e8662646c88b16ef2b

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3290162.exe

          Filesize

          250KB

          MD5

          6e7d82b81b53bf617ca01f9ea909e5ba

          SHA1

          86280d7943ca3fbcc0e2e5ce535aa632e8534eef

          SHA256

          bdc3ea8b3747acd33405f0d9a8889372251af746132dd13d3f7fc3ae93e8c05c

          SHA512

          816b6f42333642412ab1e9ca04b6712ebf037ac69440410d32a8d53033d1694ebf9e026184005c75da5ed5cd7d2295a3b5121248eba154e8662646c88b16ef2b

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3290162.exe

          Filesize

          250KB

          MD5

          6e7d82b81b53bf617ca01f9ea909e5ba

          SHA1

          86280d7943ca3fbcc0e2e5ce535aa632e8534eef

          SHA256

          bdc3ea8b3747acd33405f0d9a8889372251af746132dd13d3f7fc3ae93e8c05c

          SHA512

          816b6f42333642412ab1e9ca04b6712ebf037ac69440410d32a8d53033d1694ebf9e026184005c75da5ed5cd7d2295a3b5121248eba154e8662646c88b16ef2b

        • memory/2624-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2624-58-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2624-60-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2624-62-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2624-56-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2624-55-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2624-54-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2624-53-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB