Analysis

  • max time kernel
    117s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 14:14

General

  • Target

    775776201e20d90baeadd21102f4979b564d1df5f501d21c53ab0eb8db9a3512.exe

  • Size

    1.3MB

  • MD5

    c84f1acb197203afcfeac4f3e5c68f04

  • SHA1

    715d2587f0238647b23ccc0679a6e09480c49b65

  • SHA256

    775776201e20d90baeadd21102f4979b564d1df5f501d21c53ab0eb8db9a3512

  • SHA512

    7ba17a99b7ec0292ef12b950e13d0d9a5ff69114b89676ea635b425aceb454d8090b5b85f4c1b1c1e930a7b4440bd8d542fc7b0b7e67dce0779f25e183ad6b92

  • SSDEEP

    24576:kyyr2x3wu+X2BNLgMAaIAen1ZQD9zgCyh8oOKDrh+YArlLakulO0:zyr2x3wVms3aBenMRzt+l+/Ylg

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 17 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\775776201e20d90baeadd21102f4979b564d1df5f501d21c53ab0eb8db9a3512.exe
    "C:\Users\Admin\AppData\Local\Temp\775776201e20d90baeadd21102f4979b564d1df5f501d21c53ab0eb8db9a3512.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9570233.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9570233.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2512
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4570346.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4570346.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1412
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5987817.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5987817.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2424
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8962129.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8962129.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2448
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v5390003.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v5390003.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:1724
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a2097350.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a2097350.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:524
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2332
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 272
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9570233.exe

    Filesize

    1.2MB

    MD5

    d462460a319f807a3fbe3495ebbdd171

    SHA1

    48ed5fb121a3df061cb7e7d711fd9f423ec4218c

    SHA256

    1b039690f5cf8749acd1c454025f4269ef992527eb879cb3dc901f53a18302bb

    SHA512

    c5b60604a287a916b53b2b3416a25ce5863da39ac5d7862bf1da3f3c4d771bd484701d254a5a05ce929ef14969ca1b3250c67ea7b546eae55876e975928fa68c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9570233.exe

    Filesize

    1.2MB

    MD5

    d462460a319f807a3fbe3495ebbdd171

    SHA1

    48ed5fb121a3df061cb7e7d711fd9f423ec4218c

    SHA256

    1b039690f5cf8749acd1c454025f4269ef992527eb879cb3dc901f53a18302bb

    SHA512

    c5b60604a287a916b53b2b3416a25ce5863da39ac5d7862bf1da3f3c4d771bd484701d254a5a05ce929ef14969ca1b3250c67ea7b546eae55876e975928fa68c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4570346.exe

    Filesize

    951KB

    MD5

    17122edeaa945ab55f7c1750b34bf7d9

    SHA1

    9619acfec17581986278b2e9252a47708a1148d1

    SHA256

    c4fd5435e871f756fb2a63f92b1e579448d66a01f0e4ab9a32cf0c1da7196e4a

    SHA512

    7129c2c73925d67e722161a3058a1d071dc5b8b0d017680bd7ba6186d81f22818ab2caade2e348d09c30a9cb4609561fb73bd93f09cbca79e854ca762a5f87a9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4570346.exe

    Filesize

    951KB

    MD5

    17122edeaa945ab55f7c1750b34bf7d9

    SHA1

    9619acfec17581986278b2e9252a47708a1148d1

    SHA256

    c4fd5435e871f756fb2a63f92b1e579448d66a01f0e4ab9a32cf0c1da7196e4a

    SHA512

    7129c2c73925d67e722161a3058a1d071dc5b8b0d017680bd7ba6186d81f22818ab2caade2e348d09c30a9cb4609561fb73bd93f09cbca79e854ca762a5f87a9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5987817.exe

    Filesize

    797KB

    MD5

    215377efce57f806e88da01fadb4e31a

    SHA1

    9adbe1a571efa79ced55622e3fe74f2a6406f0b5

    SHA256

    538ba012013aa73f6eb0e40b6b3ae563f72336a116b6f87043568dc3eef14dff

    SHA512

    a00c9520ccb63f602c160a7937642aec01d0bd9b159cfdf81ba8642827db834a8e84403752f5cca605d5707751b9d4fa1a4e91f98c79d0c20c126533874425c5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5987817.exe

    Filesize

    797KB

    MD5

    215377efce57f806e88da01fadb4e31a

    SHA1

    9adbe1a571efa79ced55622e3fe74f2a6406f0b5

    SHA256

    538ba012013aa73f6eb0e40b6b3ae563f72336a116b6f87043568dc3eef14dff

    SHA512

    a00c9520ccb63f602c160a7937642aec01d0bd9b159cfdf81ba8642827db834a8e84403752f5cca605d5707751b9d4fa1a4e91f98c79d0c20c126533874425c5

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8962129.exe

    Filesize

    631KB

    MD5

    2a9b7e00ba7582d36d08a5cbb6bf94b1

    SHA1

    17f01a44de9e0dd1a80a025326afb04eb76bdabd

    SHA256

    44f4b8c895f83d772a74ed58d44e27bd6c1209e0f74dc15637c8c33be9a73263

    SHA512

    50e4758bf0ff47a2c05ad6b37bc3c696758b990be93ff28637fc1cc488f66fa8eec761bbb6512bc48178a033e27ca6e2d92b365864412f16e13d1be7e51d2ac0

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8962129.exe

    Filesize

    631KB

    MD5

    2a9b7e00ba7582d36d08a5cbb6bf94b1

    SHA1

    17f01a44de9e0dd1a80a025326afb04eb76bdabd

    SHA256

    44f4b8c895f83d772a74ed58d44e27bd6c1209e0f74dc15637c8c33be9a73263

    SHA512

    50e4758bf0ff47a2c05ad6b37bc3c696758b990be93ff28637fc1cc488f66fa8eec761bbb6512bc48178a033e27ca6e2d92b365864412f16e13d1be7e51d2ac0

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v5390003.exe

    Filesize

    354KB

    MD5

    29d6ec1f5cd8cf7591eeb3d0347bc941

    SHA1

    8f6d27faecb450b0ea816c041cedd15f3b894962

    SHA256

    87cf5f41b55ce3fb5f2119fa06ca644f78b2ac93601fe093d7c0947b570a2c15

    SHA512

    bfcc01d90e26e292e64a4784037c745315f0facfe5cb878700756fe04d9439732061e74c10c22a9ce50a95771d078e8cb567665ffeebfd30f5824d8c40d11ab1

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v5390003.exe

    Filesize

    354KB

    MD5

    29d6ec1f5cd8cf7591eeb3d0347bc941

    SHA1

    8f6d27faecb450b0ea816c041cedd15f3b894962

    SHA256

    87cf5f41b55ce3fb5f2119fa06ca644f78b2ac93601fe093d7c0947b570a2c15

    SHA512

    bfcc01d90e26e292e64a4784037c745315f0facfe5cb878700756fe04d9439732061e74c10c22a9ce50a95771d078e8cb567665ffeebfd30f5824d8c40d11ab1

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a2097350.exe

    Filesize

    250KB

    MD5

    452448317b39902f4778a4c0f9a44b5d

    SHA1

    83278921dbb09cb796e55f9981808154a27d206a

    SHA256

    acfcce604ff81a8c3862743abd9e0a86c32e44ac14779c592ef7b0371ccb68d6

    SHA512

    88a44bc1920ef5ad97e03091f828eada2dc59bb0738d74a2d2dc597ba2390ea70dd137e098280b03849c450671e274dd09b706b9328205c17d25310bb11c64d4

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a2097350.exe

    Filesize

    250KB

    MD5

    452448317b39902f4778a4c0f9a44b5d

    SHA1

    83278921dbb09cb796e55f9981808154a27d206a

    SHA256

    acfcce604ff81a8c3862743abd9e0a86c32e44ac14779c592ef7b0371ccb68d6

    SHA512

    88a44bc1920ef5ad97e03091f828eada2dc59bb0738d74a2d2dc597ba2390ea70dd137e098280b03849c450671e274dd09b706b9328205c17d25310bb11c64d4

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a2097350.exe

    Filesize

    250KB

    MD5

    452448317b39902f4778a4c0f9a44b5d

    SHA1

    83278921dbb09cb796e55f9981808154a27d206a

    SHA256

    acfcce604ff81a8c3862743abd9e0a86c32e44ac14779c592ef7b0371ccb68d6

    SHA512

    88a44bc1920ef5ad97e03091f828eada2dc59bb0738d74a2d2dc597ba2390ea70dd137e098280b03849c450671e274dd09b706b9328205c17d25310bb11c64d4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v9570233.exe

    Filesize

    1.2MB

    MD5

    d462460a319f807a3fbe3495ebbdd171

    SHA1

    48ed5fb121a3df061cb7e7d711fd9f423ec4218c

    SHA256

    1b039690f5cf8749acd1c454025f4269ef992527eb879cb3dc901f53a18302bb

    SHA512

    c5b60604a287a916b53b2b3416a25ce5863da39ac5d7862bf1da3f3c4d771bd484701d254a5a05ce929ef14969ca1b3250c67ea7b546eae55876e975928fa68c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v9570233.exe

    Filesize

    1.2MB

    MD5

    d462460a319f807a3fbe3495ebbdd171

    SHA1

    48ed5fb121a3df061cb7e7d711fd9f423ec4218c

    SHA256

    1b039690f5cf8749acd1c454025f4269ef992527eb879cb3dc901f53a18302bb

    SHA512

    c5b60604a287a916b53b2b3416a25ce5863da39ac5d7862bf1da3f3c4d771bd484701d254a5a05ce929ef14969ca1b3250c67ea7b546eae55876e975928fa68c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v4570346.exe

    Filesize

    951KB

    MD5

    17122edeaa945ab55f7c1750b34bf7d9

    SHA1

    9619acfec17581986278b2e9252a47708a1148d1

    SHA256

    c4fd5435e871f756fb2a63f92b1e579448d66a01f0e4ab9a32cf0c1da7196e4a

    SHA512

    7129c2c73925d67e722161a3058a1d071dc5b8b0d017680bd7ba6186d81f22818ab2caade2e348d09c30a9cb4609561fb73bd93f09cbca79e854ca762a5f87a9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v4570346.exe

    Filesize

    951KB

    MD5

    17122edeaa945ab55f7c1750b34bf7d9

    SHA1

    9619acfec17581986278b2e9252a47708a1148d1

    SHA256

    c4fd5435e871f756fb2a63f92b1e579448d66a01f0e4ab9a32cf0c1da7196e4a

    SHA512

    7129c2c73925d67e722161a3058a1d071dc5b8b0d017680bd7ba6186d81f22818ab2caade2e348d09c30a9cb4609561fb73bd93f09cbca79e854ca762a5f87a9

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v5987817.exe

    Filesize

    797KB

    MD5

    215377efce57f806e88da01fadb4e31a

    SHA1

    9adbe1a571efa79ced55622e3fe74f2a6406f0b5

    SHA256

    538ba012013aa73f6eb0e40b6b3ae563f72336a116b6f87043568dc3eef14dff

    SHA512

    a00c9520ccb63f602c160a7937642aec01d0bd9b159cfdf81ba8642827db834a8e84403752f5cca605d5707751b9d4fa1a4e91f98c79d0c20c126533874425c5

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v5987817.exe

    Filesize

    797KB

    MD5

    215377efce57f806e88da01fadb4e31a

    SHA1

    9adbe1a571efa79ced55622e3fe74f2a6406f0b5

    SHA256

    538ba012013aa73f6eb0e40b6b3ae563f72336a116b6f87043568dc3eef14dff

    SHA512

    a00c9520ccb63f602c160a7937642aec01d0bd9b159cfdf81ba8642827db834a8e84403752f5cca605d5707751b9d4fa1a4e91f98c79d0c20c126533874425c5

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v8962129.exe

    Filesize

    631KB

    MD5

    2a9b7e00ba7582d36d08a5cbb6bf94b1

    SHA1

    17f01a44de9e0dd1a80a025326afb04eb76bdabd

    SHA256

    44f4b8c895f83d772a74ed58d44e27bd6c1209e0f74dc15637c8c33be9a73263

    SHA512

    50e4758bf0ff47a2c05ad6b37bc3c696758b990be93ff28637fc1cc488f66fa8eec761bbb6512bc48178a033e27ca6e2d92b365864412f16e13d1be7e51d2ac0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v8962129.exe

    Filesize

    631KB

    MD5

    2a9b7e00ba7582d36d08a5cbb6bf94b1

    SHA1

    17f01a44de9e0dd1a80a025326afb04eb76bdabd

    SHA256

    44f4b8c895f83d772a74ed58d44e27bd6c1209e0f74dc15637c8c33be9a73263

    SHA512

    50e4758bf0ff47a2c05ad6b37bc3c696758b990be93ff28637fc1cc488f66fa8eec761bbb6512bc48178a033e27ca6e2d92b365864412f16e13d1be7e51d2ac0

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v5390003.exe

    Filesize

    354KB

    MD5

    29d6ec1f5cd8cf7591eeb3d0347bc941

    SHA1

    8f6d27faecb450b0ea816c041cedd15f3b894962

    SHA256

    87cf5f41b55ce3fb5f2119fa06ca644f78b2ac93601fe093d7c0947b570a2c15

    SHA512

    bfcc01d90e26e292e64a4784037c745315f0facfe5cb878700756fe04d9439732061e74c10c22a9ce50a95771d078e8cb567665ffeebfd30f5824d8c40d11ab1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v5390003.exe

    Filesize

    354KB

    MD5

    29d6ec1f5cd8cf7591eeb3d0347bc941

    SHA1

    8f6d27faecb450b0ea816c041cedd15f3b894962

    SHA256

    87cf5f41b55ce3fb5f2119fa06ca644f78b2ac93601fe093d7c0947b570a2c15

    SHA512

    bfcc01d90e26e292e64a4784037c745315f0facfe5cb878700756fe04d9439732061e74c10c22a9ce50a95771d078e8cb567665ffeebfd30f5824d8c40d11ab1

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a2097350.exe

    Filesize

    250KB

    MD5

    452448317b39902f4778a4c0f9a44b5d

    SHA1

    83278921dbb09cb796e55f9981808154a27d206a

    SHA256

    acfcce604ff81a8c3862743abd9e0a86c32e44ac14779c592ef7b0371ccb68d6

    SHA512

    88a44bc1920ef5ad97e03091f828eada2dc59bb0738d74a2d2dc597ba2390ea70dd137e098280b03849c450671e274dd09b706b9328205c17d25310bb11c64d4

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a2097350.exe

    Filesize

    250KB

    MD5

    452448317b39902f4778a4c0f9a44b5d

    SHA1

    83278921dbb09cb796e55f9981808154a27d206a

    SHA256

    acfcce604ff81a8c3862743abd9e0a86c32e44ac14779c592ef7b0371ccb68d6

    SHA512

    88a44bc1920ef5ad97e03091f828eada2dc59bb0738d74a2d2dc597ba2390ea70dd137e098280b03849c450671e274dd09b706b9328205c17d25310bb11c64d4

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a2097350.exe

    Filesize

    250KB

    MD5

    452448317b39902f4778a4c0f9a44b5d

    SHA1

    83278921dbb09cb796e55f9981808154a27d206a

    SHA256

    acfcce604ff81a8c3862743abd9e0a86c32e44ac14779c592ef7b0371ccb68d6

    SHA512

    88a44bc1920ef5ad97e03091f828eada2dc59bb0738d74a2d2dc597ba2390ea70dd137e098280b03849c450671e274dd09b706b9328205c17d25310bb11c64d4

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a2097350.exe

    Filesize

    250KB

    MD5

    452448317b39902f4778a4c0f9a44b5d

    SHA1

    83278921dbb09cb796e55f9981808154a27d206a

    SHA256

    acfcce604ff81a8c3862743abd9e0a86c32e44ac14779c592ef7b0371ccb68d6

    SHA512

    88a44bc1920ef5ad97e03091f828eada2dc59bb0738d74a2d2dc597ba2390ea70dd137e098280b03849c450671e274dd09b706b9328205c17d25310bb11c64d4

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a2097350.exe

    Filesize

    250KB

    MD5

    452448317b39902f4778a4c0f9a44b5d

    SHA1

    83278921dbb09cb796e55f9981808154a27d206a

    SHA256

    acfcce604ff81a8c3862743abd9e0a86c32e44ac14779c592ef7b0371ccb68d6

    SHA512

    88a44bc1920ef5ad97e03091f828eada2dc59bb0738d74a2d2dc597ba2390ea70dd137e098280b03849c450671e274dd09b706b9328205c17d25310bb11c64d4

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a2097350.exe

    Filesize

    250KB

    MD5

    452448317b39902f4778a4c0f9a44b5d

    SHA1

    83278921dbb09cb796e55f9981808154a27d206a

    SHA256

    acfcce604ff81a8c3862743abd9e0a86c32e44ac14779c592ef7b0371ccb68d6

    SHA512

    88a44bc1920ef5ad97e03091f828eada2dc59bb0738d74a2d2dc597ba2390ea70dd137e098280b03849c450671e274dd09b706b9328205c17d25310bb11c64d4

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a2097350.exe

    Filesize

    250KB

    MD5

    452448317b39902f4778a4c0f9a44b5d

    SHA1

    83278921dbb09cb796e55f9981808154a27d206a

    SHA256

    acfcce604ff81a8c3862743abd9e0a86c32e44ac14779c592ef7b0371ccb68d6

    SHA512

    88a44bc1920ef5ad97e03091f828eada2dc59bb0738d74a2d2dc597ba2390ea70dd137e098280b03849c450671e274dd09b706b9328205c17d25310bb11c64d4

  • memory/2332-66-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2332-68-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2332-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2332-72-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2332-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2332-65-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2332-64-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2332-63-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB