Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 14:14

General

  • Target

    8fed47e81cdff91443768cbc8e826d1632ca470f8e8067b3a79c014226615997.exe

  • Size

    1.1MB

  • MD5

    14623416ef7d4b2c90b5fcabc7ecc04a

  • SHA1

    783b7fc5603887c5d14163cabe7a26e8206553af

  • SHA256

    8fed47e81cdff91443768cbc8e826d1632ca470f8e8067b3a79c014226615997

  • SHA512

    604cc502293544f3d09926721b42678c56588e4464624fbedbbe13c23334cd0d9ca57c69019eeef75584f8d947b2f7416db03c4c840d4f72f3e21fb29065fda6

  • SSDEEP

    12288:FMrNy9051nrSsFB5Ggp8/Q0lxr2wjxyIgTA89UnTMlznkcrAd2wcCzc/Akw35IxO:0yib9W/LlWXW4zkcEALuU0wxGuQxtJ

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8fed47e81cdff91443768cbc8e826d1632ca470f8e8067b3a79c014226615997.exe
    "C:\Users\Admin\AppData\Local\Temp\8fed47e81cdff91443768cbc8e826d1632ca470f8e8067b3a79c014226615997.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9295842.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9295842.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8708808.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8708808.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2568
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2948702.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2948702.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2708
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3672935.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3672935.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2732
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6045973.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6045973.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2132
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2764
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9295842.exe

    Filesize

    984KB

    MD5

    1feecce858d080f346b7214523dd064c

    SHA1

    32fc98313ffa38b7dbdc8474fca717ede325216c

    SHA256

    c43ad9ca5f3d75a6df0b48732958d9b0d6ecdc6fb5519503de36f372565e649f

    SHA512

    23cbb067d5af156ba8ecc9c5f75e4301466f558a6eb18417db56c4291cf0d5dea26d566ffb1d593c7c824cf48250b1b978bb8a810a26269c0d8c792b2ed42e69

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9295842.exe

    Filesize

    984KB

    MD5

    1feecce858d080f346b7214523dd064c

    SHA1

    32fc98313ffa38b7dbdc8474fca717ede325216c

    SHA256

    c43ad9ca5f3d75a6df0b48732958d9b0d6ecdc6fb5519503de36f372565e649f

    SHA512

    23cbb067d5af156ba8ecc9c5f75e4301466f558a6eb18417db56c4291cf0d5dea26d566ffb1d593c7c824cf48250b1b978bb8a810a26269c0d8c792b2ed42e69

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8708808.exe

    Filesize

    801KB

    MD5

    3452e8ddc0112b13ef10fe29302b9432

    SHA1

    9c7493a2f17fc0d7afa6e59812f2cb8501496d57

    SHA256

    f82c2da4eb2c20669205768b78d865766877dd84669778808efc4f0ad473d20b

    SHA512

    f1029a4a8c6380fa732979c9a359091006ddd0afc932be10171b648f4800df857c54c09f8bb3ce57a6ede03ce053c844e56df7f328c3051411f99e704765924e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8708808.exe

    Filesize

    801KB

    MD5

    3452e8ddc0112b13ef10fe29302b9432

    SHA1

    9c7493a2f17fc0d7afa6e59812f2cb8501496d57

    SHA256

    f82c2da4eb2c20669205768b78d865766877dd84669778808efc4f0ad473d20b

    SHA512

    f1029a4a8c6380fa732979c9a359091006ddd0afc932be10171b648f4800df857c54c09f8bb3ce57a6ede03ce053c844e56df7f328c3051411f99e704765924e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2948702.exe

    Filesize

    618KB

    MD5

    6bb1b57bd05b811ccf8c3003f58f400f

    SHA1

    6fe8d70ad4a5af58773658604c90474b23e159cf

    SHA256

    32311a7bc418030259e8e1e927a2d94334a8fbd3cf8fe0fb0f8523b03aefe4aa

    SHA512

    ede56b0773815c325fc025617c35ff1e0792e811f57ae94b523dfdbd978df46ad24fbb24dcf847e093f80ee3f60e820db5bad5753aa54b106b83b0a3fe1650f5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2948702.exe

    Filesize

    618KB

    MD5

    6bb1b57bd05b811ccf8c3003f58f400f

    SHA1

    6fe8d70ad4a5af58773658604c90474b23e159cf

    SHA256

    32311a7bc418030259e8e1e927a2d94334a8fbd3cf8fe0fb0f8523b03aefe4aa

    SHA512

    ede56b0773815c325fc025617c35ff1e0792e811f57ae94b523dfdbd978df46ad24fbb24dcf847e093f80ee3f60e820db5bad5753aa54b106b83b0a3fe1650f5

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3672935.exe

    Filesize

    347KB

    MD5

    f7d885f2f8441b784af9a82f4427d21d

    SHA1

    dab510aa6972a4785bf4a725e3c420e369fea81c

    SHA256

    6dc7672e0403e2eeb0d6d8a82e1b7ddd8c663057140505948a192c023dd9e168

    SHA512

    f4635ded0c78a0bd19ba418eeaa3141e47c5e98b5a8d58ebde6f2511937b7a6accdb1d0062d9fb51249e286888ecab4865bf4efee27e8e4a7ecf400cdd8d771f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3672935.exe

    Filesize

    347KB

    MD5

    f7d885f2f8441b784af9a82f4427d21d

    SHA1

    dab510aa6972a4785bf4a725e3c420e369fea81c

    SHA256

    6dc7672e0403e2eeb0d6d8a82e1b7ddd8c663057140505948a192c023dd9e168

    SHA512

    f4635ded0c78a0bd19ba418eeaa3141e47c5e98b5a8d58ebde6f2511937b7a6accdb1d0062d9fb51249e286888ecab4865bf4efee27e8e4a7ecf400cdd8d771f

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6045973.exe

    Filesize

    235KB

    MD5

    d60a49951af8f7106be9a65620235558

    SHA1

    49660b9e1da6d30f7fe6248f69a0c93cbb2e901f

    SHA256

    02161545b87e86f101254e0334609442c949d898842c80b93d5c48802b99e0c0

    SHA512

    1973f0f2574959d18c6c81f1af62fbb86dd78da7ffc825d019ded4bc366761f76d445f1be8eca6a5e223cc20d99dd7befe76de81ca1e544391de7a07114f7006

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6045973.exe

    Filesize

    235KB

    MD5

    d60a49951af8f7106be9a65620235558

    SHA1

    49660b9e1da6d30f7fe6248f69a0c93cbb2e901f

    SHA256

    02161545b87e86f101254e0334609442c949d898842c80b93d5c48802b99e0c0

    SHA512

    1973f0f2574959d18c6c81f1af62fbb86dd78da7ffc825d019ded4bc366761f76d445f1be8eca6a5e223cc20d99dd7befe76de81ca1e544391de7a07114f7006

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6045973.exe

    Filesize

    235KB

    MD5

    d60a49951af8f7106be9a65620235558

    SHA1

    49660b9e1da6d30f7fe6248f69a0c93cbb2e901f

    SHA256

    02161545b87e86f101254e0334609442c949d898842c80b93d5c48802b99e0c0

    SHA512

    1973f0f2574959d18c6c81f1af62fbb86dd78da7ffc825d019ded4bc366761f76d445f1be8eca6a5e223cc20d99dd7befe76de81ca1e544391de7a07114f7006

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9295842.exe

    Filesize

    984KB

    MD5

    1feecce858d080f346b7214523dd064c

    SHA1

    32fc98313ffa38b7dbdc8474fca717ede325216c

    SHA256

    c43ad9ca5f3d75a6df0b48732958d9b0d6ecdc6fb5519503de36f372565e649f

    SHA512

    23cbb067d5af156ba8ecc9c5f75e4301466f558a6eb18417db56c4291cf0d5dea26d566ffb1d593c7c824cf48250b1b978bb8a810a26269c0d8c792b2ed42e69

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9295842.exe

    Filesize

    984KB

    MD5

    1feecce858d080f346b7214523dd064c

    SHA1

    32fc98313ffa38b7dbdc8474fca717ede325216c

    SHA256

    c43ad9ca5f3d75a6df0b48732958d9b0d6ecdc6fb5519503de36f372565e649f

    SHA512

    23cbb067d5af156ba8ecc9c5f75e4301466f558a6eb18417db56c4291cf0d5dea26d566ffb1d593c7c824cf48250b1b978bb8a810a26269c0d8c792b2ed42e69

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8708808.exe

    Filesize

    801KB

    MD5

    3452e8ddc0112b13ef10fe29302b9432

    SHA1

    9c7493a2f17fc0d7afa6e59812f2cb8501496d57

    SHA256

    f82c2da4eb2c20669205768b78d865766877dd84669778808efc4f0ad473d20b

    SHA512

    f1029a4a8c6380fa732979c9a359091006ddd0afc932be10171b648f4800df857c54c09f8bb3ce57a6ede03ce053c844e56df7f328c3051411f99e704765924e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8708808.exe

    Filesize

    801KB

    MD5

    3452e8ddc0112b13ef10fe29302b9432

    SHA1

    9c7493a2f17fc0d7afa6e59812f2cb8501496d57

    SHA256

    f82c2da4eb2c20669205768b78d865766877dd84669778808efc4f0ad473d20b

    SHA512

    f1029a4a8c6380fa732979c9a359091006ddd0afc932be10171b648f4800df857c54c09f8bb3ce57a6ede03ce053c844e56df7f328c3051411f99e704765924e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2948702.exe

    Filesize

    618KB

    MD5

    6bb1b57bd05b811ccf8c3003f58f400f

    SHA1

    6fe8d70ad4a5af58773658604c90474b23e159cf

    SHA256

    32311a7bc418030259e8e1e927a2d94334a8fbd3cf8fe0fb0f8523b03aefe4aa

    SHA512

    ede56b0773815c325fc025617c35ff1e0792e811f57ae94b523dfdbd978df46ad24fbb24dcf847e093f80ee3f60e820db5bad5753aa54b106b83b0a3fe1650f5

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2948702.exe

    Filesize

    618KB

    MD5

    6bb1b57bd05b811ccf8c3003f58f400f

    SHA1

    6fe8d70ad4a5af58773658604c90474b23e159cf

    SHA256

    32311a7bc418030259e8e1e927a2d94334a8fbd3cf8fe0fb0f8523b03aefe4aa

    SHA512

    ede56b0773815c325fc025617c35ff1e0792e811f57ae94b523dfdbd978df46ad24fbb24dcf847e093f80ee3f60e820db5bad5753aa54b106b83b0a3fe1650f5

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z3672935.exe

    Filesize

    347KB

    MD5

    f7d885f2f8441b784af9a82f4427d21d

    SHA1

    dab510aa6972a4785bf4a725e3c420e369fea81c

    SHA256

    6dc7672e0403e2eeb0d6d8a82e1b7ddd8c663057140505948a192c023dd9e168

    SHA512

    f4635ded0c78a0bd19ba418eeaa3141e47c5e98b5a8d58ebde6f2511937b7a6accdb1d0062d9fb51249e286888ecab4865bf4efee27e8e4a7ecf400cdd8d771f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z3672935.exe

    Filesize

    347KB

    MD5

    f7d885f2f8441b784af9a82f4427d21d

    SHA1

    dab510aa6972a4785bf4a725e3c420e369fea81c

    SHA256

    6dc7672e0403e2eeb0d6d8a82e1b7ddd8c663057140505948a192c023dd9e168

    SHA512

    f4635ded0c78a0bd19ba418eeaa3141e47c5e98b5a8d58ebde6f2511937b7a6accdb1d0062d9fb51249e286888ecab4865bf4efee27e8e4a7ecf400cdd8d771f

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6045973.exe

    Filesize

    235KB

    MD5

    d60a49951af8f7106be9a65620235558

    SHA1

    49660b9e1da6d30f7fe6248f69a0c93cbb2e901f

    SHA256

    02161545b87e86f101254e0334609442c949d898842c80b93d5c48802b99e0c0

    SHA512

    1973f0f2574959d18c6c81f1af62fbb86dd78da7ffc825d019ded4bc366761f76d445f1be8eca6a5e223cc20d99dd7befe76de81ca1e544391de7a07114f7006

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6045973.exe

    Filesize

    235KB

    MD5

    d60a49951af8f7106be9a65620235558

    SHA1

    49660b9e1da6d30f7fe6248f69a0c93cbb2e901f

    SHA256

    02161545b87e86f101254e0334609442c949d898842c80b93d5c48802b99e0c0

    SHA512

    1973f0f2574959d18c6c81f1af62fbb86dd78da7ffc825d019ded4bc366761f76d445f1be8eca6a5e223cc20d99dd7befe76de81ca1e544391de7a07114f7006

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6045973.exe

    Filesize

    235KB

    MD5

    d60a49951af8f7106be9a65620235558

    SHA1

    49660b9e1da6d30f7fe6248f69a0c93cbb2e901f

    SHA256

    02161545b87e86f101254e0334609442c949d898842c80b93d5c48802b99e0c0

    SHA512

    1973f0f2574959d18c6c81f1af62fbb86dd78da7ffc825d019ded4bc366761f76d445f1be8eca6a5e223cc20d99dd7befe76de81ca1e544391de7a07114f7006

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6045973.exe

    Filesize

    235KB

    MD5

    d60a49951af8f7106be9a65620235558

    SHA1

    49660b9e1da6d30f7fe6248f69a0c93cbb2e901f

    SHA256

    02161545b87e86f101254e0334609442c949d898842c80b93d5c48802b99e0c0

    SHA512

    1973f0f2574959d18c6c81f1af62fbb86dd78da7ffc825d019ded4bc366761f76d445f1be8eca6a5e223cc20d99dd7befe76de81ca1e544391de7a07114f7006

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6045973.exe

    Filesize

    235KB

    MD5

    d60a49951af8f7106be9a65620235558

    SHA1

    49660b9e1da6d30f7fe6248f69a0c93cbb2e901f

    SHA256

    02161545b87e86f101254e0334609442c949d898842c80b93d5c48802b99e0c0

    SHA512

    1973f0f2574959d18c6c81f1af62fbb86dd78da7ffc825d019ded4bc366761f76d445f1be8eca6a5e223cc20d99dd7befe76de81ca1e544391de7a07114f7006

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6045973.exe

    Filesize

    235KB

    MD5

    d60a49951af8f7106be9a65620235558

    SHA1

    49660b9e1da6d30f7fe6248f69a0c93cbb2e901f

    SHA256

    02161545b87e86f101254e0334609442c949d898842c80b93d5c48802b99e0c0

    SHA512

    1973f0f2574959d18c6c81f1af62fbb86dd78da7ffc825d019ded4bc366761f76d445f1be8eca6a5e223cc20d99dd7befe76de81ca1e544391de7a07114f7006

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6045973.exe

    Filesize

    235KB

    MD5

    d60a49951af8f7106be9a65620235558

    SHA1

    49660b9e1da6d30f7fe6248f69a0c93cbb2e901f

    SHA256

    02161545b87e86f101254e0334609442c949d898842c80b93d5c48802b99e0c0

    SHA512

    1973f0f2574959d18c6c81f1af62fbb86dd78da7ffc825d019ded4bc366761f76d445f1be8eca6a5e223cc20d99dd7befe76de81ca1e544391de7a07114f7006

  • memory/2764-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2764-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2764-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2764-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2764-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2764-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2764-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2764-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB