Analysis

  • max time kernel
    122s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 14:13

General

  • Target

    42c6150a8e33b720e89825db2be6bc06d76190929c82d03324faa294ef3e184e.exe

  • Size

    1.3MB

  • MD5

    3e6cc6888adf34693f8592cf1e727948

  • SHA1

    bcf6446d49fd822ed6768ca1afbc3556f477c55c

  • SHA256

    42c6150a8e33b720e89825db2be6bc06d76190929c82d03324faa294ef3e184e

  • SHA512

    6366c2f2d657b2816a6c64c05c714ed18ae1a45217b74832a9bbc52fbbb029a1c3e21290eee8eceae45eca28e0f0fa82c5ebf056accf3168341882087aeb2062

  • SSDEEP

    24576:vyr3bebwVRqrJcHffQvyRMhwt3uRge2YAPK23iyeEgw8ja:6rTea/ovsMuSge2vPK717

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 17 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42c6150a8e33b720e89825db2be6bc06d76190929c82d03324faa294ef3e184e.exe
    "C:\Users\Admin\AppData\Local\Temp\42c6150a8e33b720e89825db2be6bc06d76190929c82d03324faa294ef3e184e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4074647.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4074647.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6968352.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6968352.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2348
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2644394.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2644394.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1628
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4267275.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4267275.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2616
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v2179818.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v2179818.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:2668
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a7179917.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a7179917.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2480
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2508
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 272
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4074647.exe

    Filesize

    1.2MB

    MD5

    e3d75ef6c2b14bb738b3e500e11de7ef

    SHA1

    60fd40873ad64f59c2f618e4134560f712a99bed

    SHA256

    30b52fd62ec742735d10921f64159347e6d018302aa0f623f2a68552fe1fc6ef

    SHA512

    304539c56d8572445df8e7dedacf09877165d61ce8697019b9aa0b73969b170b604b50336dbfcc4ba70474c2528a9713ded3ab11b86e0facfa19a251c44d26e9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4074647.exe

    Filesize

    1.2MB

    MD5

    e3d75ef6c2b14bb738b3e500e11de7ef

    SHA1

    60fd40873ad64f59c2f618e4134560f712a99bed

    SHA256

    30b52fd62ec742735d10921f64159347e6d018302aa0f623f2a68552fe1fc6ef

    SHA512

    304539c56d8572445df8e7dedacf09877165d61ce8697019b9aa0b73969b170b604b50336dbfcc4ba70474c2528a9713ded3ab11b86e0facfa19a251c44d26e9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6968352.exe

    Filesize

    941KB

    MD5

    ac7ad630a1f0a61c4e64f7d1757cbe6a

    SHA1

    09ef68794baf22ce5b40602fe3c690da159eb12a

    SHA256

    c37209ad11f4fb89abe41610cfc5e58cc87560fc62ebfa80cc3bfd41dc55b28a

    SHA512

    3008c820e4654c691dddcd9de6063a157e137b33078aa140adbf80ea30d0dcb1ce5c0ef8a650fc33b82a03826cb4502b77072fc26988281c33ac6fcb02b45098

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6968352.exe

    Filesize

    941KB

    MD5

    ac7ad630a1f0a61c4e64f7d1757cbe6a

    SHA1

    09ef68794baf22ce5b40602fe3c690da159eb12a

    SHA256

    c37209ad11f4fb89abe41610cfc5e58cc87560fc62ebfa80cc3bfd41dc55b28a

    SHA512

    3008c820e4654c691dddcd9de6063a157e137b33078aa140adbf80ea30d0dcb1ce5c0ef8a650fc33b82a03826cb4502b77072fc26988281c33ac6fcb02b45098

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2644394.exe

    Filesize

    785KB

    MD5

    ce4fd585b9e349c90cd9214646c74f9f

    SHA1

    4377580b44a44b7be88571b724252634b83c28c9

    SHA256

    fa2b64407d9c06c0892b99d8d5b997512eb9627980a712668fb65b58a07d9cfe

    SHA512

    0695c7f700f92bc4d55cfbf730bb21cf39adf69d3eadb3cc373e9d6b6c1b853c10983399eae11037346032bfb078cbfba70f15fa8272de9af78cb30f165d3f28

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2644394.exe

    Filesize

    785KB

    MD5

    ce4fd585b9e349c90cd9214646c74f9f

    SHA1

    4377580b44a44b7be88571b724252634b83c28c9

    SHA256

    fa2b64407d9c06c0892b99d8d5b997512eb9627980a712668fb65b58a07d9cfe

    SHA512

    0695c7f700f92bc4d55cfbf730bb21cf39adf69d3eadb3cc373e9d6b6c1b853c10983399eae11037346032bfb078cbfba70f15fa8272de9af78cb30f165d3f28

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4267275.exe

    Filesize

    618KB

    MD5

    09ae50942f9327039279b07b5cb41390

    SHA1

    48dd9920369e92e7d799109f3f9632f717a3be54

    SHA256

    cc292f3d6b93a30ef5038599f8fae8c570c4e51b18f7ab772b851c0e2e3a31fb

    SHA512

    b3c592987c35d6ab5ede6ac8087a0d8401f39f4b64ccd6bb160458d51e51320c3c506ce2df472428fe97c9f13706356599341398ec3f4031378d437e88439fed

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4267275.exe

    Filesize

    618KB

    MD5

    09ae50942f9327039279b07b5cb41390

    SHA1

    48dd9920369e92e7d799109f3f9632f717a3be54

    SHA256

    cc292f3d6b93a30ef5038599f8fae8c570c4e51b18f7ab772b851c0e2e3a31fb

    SHA512

    b3c592987c35d6ab5ede6ac8087a0d8401f39f4b64ccd6bb160458d51e51320c3c506ce2df472428fe97c9f13706356599341398ec3f4031378d437e88439fed

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v2179818.exe

    Filesize

    347KB

    MD5

    37f207239193220d5d30c76293aece6e

    SHA1

    d9568751d7c3ed8e12c7ea7b38a2db2e7bccaaf3

    SHA256

    fdb983c203b62133727f8092e70e591a0dc3e575e7bdf2cfead352a6fb2c4673

    SHA512

    3d5c1c701d95798423c2cb9a49f397f1434aa3b3c0d0e9521cd237f1ce83ecbb7f50762894669eb3776194f5b133929146d92f2a001ee214e10cdc46fa315061

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v2179818.exe

    Filesize

    347KB

    MD5

    37f207239193220d5d30c76293aece6e

    SHA1

    d9568751d7c3ed8e12c7ea7b38a2db2e7bccaaf3

    SHA256

    fdb983c203b62133727f8092e70e591a0dc3e575e7bdf2cfead352a6fb2c4673

    SHA512

    3d5c1c701d95798423c2cb9a49f397f1434aa3b3c0d0e9521cd237f1ce83ecbb7f50762894669eb3776194f5b133929146d92f2a001ee214e10cdc46fa315061

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a7179917.exe

    Filesize

    235KB

    MD5

    a29cb3eca250caa0ce741c6d73149d57

    SHA1

    39eeec1628465893c382a7ee533fa2e7bc39bd99

    SHA256

    b915ee1c72295ec876c995d0e9e6e3695b0ef5f44df81408ec3211c6267e5a34

    SHA512

    581bdf9242549547a2b44e96f7fdb3cc8725d449c4c0a07bd98eff0e558053e26bd0c381d012d3dd40a489a825c6db32e3fe9ccc721bab540a4cd3e8b4819048

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a7179917.exe

    Filesize

    235KB

    MD5

    a29cb3eca250caa0ce741c6d73149d57

    SHA1

    39eeec1628465893c382a7ee533fa2e7bc39bd99

    SHA256

    b915ee1c72295ec876c995d0e9e6e3695b0ef5f44df81408ec3211c6267e5a34

    SHA512

    581bdf9242549547a2b44e96f7fdb3cc8725d449c4c0a07bd98eff0e558053e26bd0c381d012d3dd40a489a825c6db32e3fe9ccc721bab540a4cd3e8b4819048

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a7179917.exe

    Filesize

    235KB

    MD5

    a29cb3eca250caa0ce741c6d73149d57

    SHA1

    39eeec1628465893c382a7ee533fa2e7bc39bd99

    SHA256

    b915ee1c72295ec876c995d0e9e6e3695b0ef5f44df81408ec3211c6267e5a34

    SHA512

    581bdf9242549547a2b44e96f7fdb3cc8725d449c4c0a07bd98eff0e558053e26bd0c381d012d3dd40a489a825c6db32e3fe9ccc721bab540a4cd3e8b4819048

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v4074647.exe

    Filesize

    1.2MB

    MD5

    e3d75ef6c2b14bb738b3e500e11de7ef

    SHA1

    60fd40873ad64f59c2f618e4134560f712a99bed

    SHA256

    30b52fd62ec742735d10921f64159347e6d018302aa0f623f2a68552fe1fc6ef

    SHA512

    304539c56d8572445df8e7dedacf09877165d61ce8697019b9aa0b73969b170b604b50336dbfcc4ba70474c2528a9713ded3ab11b86e0facfa19a251c44d26e9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v4074647.exe

    Filesize

    1.2MB

    MD5

    e3d75ef6c2b14bb738b3e500e11de7ef

    SHA1

    60fd40873ad64f59c2f618e4134560f712a99bed

    SHA256

    30b52fd62ec742735d10921f64159347e6d018302aa0f623f2a68552fe1fc6ef

    SHA512

    304539c56d8572445df8e7dedacf09877165d61ce8697019b9aa0b73969b170b604b50336dbfcc4ba70474c2528a9713ded3ab11b86e0facfa19a251c44d26e9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6968352.exe

    Filesize

    941KB

    MD5

    ac7ad630a1f0a61c4e64f7d1757cbe6a

    SHA1

    09ef68794baf22ce5b40602fe3c690da159eb12a

    SHA256

    c37209ad11f4fb89abe41610cfc5e58cc87560fc62ebfa80cc3bfd41dc55b28a

    SHA512

    3008c820e4654c691dddcd9de6063a157e137b33078aa140adbf80ea30d0dcb1ce5c0ef8a650fc33b82a03826cb4502b77072fc26988281c33ac6fcb02b45098

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6968352.exe

    Filesize

    941KB

    MD5

    ac7ad630a1f0a61c4e64f7d1757cbe6a

    SHA1

    09ef68794baf22ce5b40602fe3c690da159eb12a

    SHA256

    c37209ad11f4fb89abe41610cfc5e58cc87560fc62ebfa80cc3bfd41dc55b28a

    SHA512

    3008c820e4654c691dddcd9de6063a157e137b33078aa140adbf80ea30d0dcb1ce5c0ef8a650fc33b82a03826cb4502b77072fc26988281c33ac6fcb02b45098

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v2644394.exe

    Filesize

    785KB

    MD5

    ce4fd585b9e349c90cd9214646c74f9f

    SHA1

    4377580b44a44b7be88571b724252634b83c28c9

    SHA256

    fa2b64407d9c06c0892b99d8d5b997512eb9627980a712668fb65b58a07d9cfe

    SHA512

    0695c7f700f92bc4d55cfbf730bb21cf39adf69d3eadb3cc373e9d6b6c1b853c10983399eae11037346032bfb078cbfba70f15fa8272de9af78cb30f165d3f28

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v2644394.exe

    Filesize

    785KB

    MD5

    ce4fd585b9e349c90cd9214646c74f9f

    SHA1

    4377580b44a44b7be88571b724252634b83c28c9

    SHA256

    fa2b64407d9c06c0892b99d8d5b997512eb9627980a712668fb65b58a07d9cfe

    SHA512

    0695c7f700f92bc4d55cfbf730bb21cf39adf69d3eadb3cc373e9d6b6c1b853c10983399eae11037346032bfb078cbfba70f15fa8272de9af78cb30f165d3f28

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v4267275.exe

    Filesize

    618KB

    MD5

    09ae50942f9327039279b07b5cb41390

    SHA1

    48dd9920369e92e7d799109f3f9632f717a3be54

    SHA256

    cc292f3d6b93a30ef5038599f8fae8c570c4e51b18f7ab772b851c0e2e3a31fb

    SHA512

    b3c592987c35d6ab5ede6ac8087a0d8401f39f4b64ccd6bb160458d51e51320c3c506ce2df472428fe97c9f13706356599341398ec3f4031378d437e88439fed

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v4267275.exe

    Filesize

    618KB

    MD5

    09ae50942f9327039279b07b5cb41390

    SHA1

    48dd9920369e92e7d799109f3f9632f717a3be54

    SHA256

    cc292f3d6b93a30ef5038599f8fae8c570c4e51b18f7ab772b851c0e2e3a31fb

    SHA512

    b3c592987c35d6ab5ede6ac8087a0d8401f39f4b64ccd6bb160458d51e51320c3c506ce2df472428fe97c9f13706356599341398ec3f4031378d437e88439fed

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v2179818.exe

    Filesize

    347KB

    MD5

    37f207239193220d5d30c76293aece6e

    SHA1

    d9568751d7c3ed8e12c7ea7b38a2db2e7bccaaf3

    SHA256

    fdb983c203b62133727f8092e70e591a0dc3e575e7bdf2cfead352a6fb2c4673

    SHA512

    3d5c1c701d95798423c2cb9a49f397f1434aa3b3c0d0e9521cd237f1ce83ecbb7f50762894669eb3776194f5b133929146d92f2a001ee214e10cdc46fa315061

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v2179818.exe

    Filesize

    347KB

    MD5

    37f207239193220d5d30c76293aece6e

    SHA1

    d9568751d7c3ed8e12c7ea7b38a2db2e7bccaaf3

    SHA256

    fdb983c203b62133727f8092e70e591a0dc3e575e7bdf2cfead352a6fb2c4673

    SHA512

    3d5c1c701d95798423c2cb9a49f397f1434aa3b3c0d0e9521cd237f1ce83ecbb7f50762894669eb3776194f5b133929146d92f2a001ee214e10cdc46fa315061

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a7179917.exe

    Filesize

    235KB

    MD5

    a29cb3eca250caa0ce741c6d73149d57

    SHA1

    39eeec1628465893c382a7ee533fa2e7bc39bd99

    SHA256

    b915ee1c72295ec876c995d0e9e6e3695b0ef5f44df81408ec3211c6267e5a34

    SHA512

    581bdf9242549547a2b44e96f7fdb3cc8725d449c4c0a07bd98eff0e558053e26bd0c381d012d3dd40a489a825c6db32e3fe9ccc721bab540a4cd3e8b4819048

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a7179917.exe

    Filesize

    235KB

    MD5

    a29cb3eca250caa0ce741c6d73149d57

    SHA1

    39eeec1628465893c382a7ee533fa2e7bc39bd99

    SHA256

    b915ee1c72295ec876c995d0e9e6e3695b0ef5f44df81408ec3211c6267e5a34

    SHA512

    581bdf9242549547a2b44e96f7fdb3cc8725d449c4c0a07bd98eff0e558053e26bd0c381d012d3dd40a489a825c6db32e3fe9ccc721bab540a4cd3e8b4819048

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a7179917.exe

    Filesize

    235KB

    MD5

    a29cb3eca250caa0ce741c6d73149d57

    SHA1

    39eeec1628465893c382a7ee533fa2e7bc39bd99

    SHA256

    b915ee1c72295ec876c995d0e9e6e3695b0ef5f44df81408ec3211c6267e5a34

    SHA512

    581bdf9242549547a2b44e96f7fdb3cc8725d449c4c0a07bd98eff0e558053e26bd0c381d012d3dd40a489a825c6db32e3fe9ccc721bab540a4cd3e8b4819048

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a7179917.exe

    Filesize

    235KB

    MD5

    a29cb3eca250caa0ce741c6d73149d57

    SHA1

    39eeec1628465893c382a7ee533fa2e7bc39bd99

    SHA256

    b915ee1c72295ec876c995d0e9e6e3695b0ef5f44df81408ec3211c6267e5a34

    SHA512

    581bdf9242549547a2b44e96f7fdb3cc8725d449c4c0a07bd98eff0e558053e26bd0c381d012d3dd40a489a825c6db32e3fe9ccc721bab540a4cd3e8b4819048

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a7179917.exe

    Filesize

    235KB

    MD5

    a29cb3eca250caa0ce741c6d73149d57

    SHA1

    39eeec1628465893c382a7ee533fa2e7bc39bd99

    SHA256

    b915ee1c72295ec876c995d0e9e6e3695b0ef5f44df81408ec3211c6267e5a34

    SHA512

    581bdf9242549547a2b44e96f7fdb3cc8725d449c4c0a07bd98eff0e558053e26bd0c381d012d3dd40a489a825c6db32e3fe9ccc721bab540a4cd3e8b4819048

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a7179917.exe

    Filesize

    235KB

    MD5

    a29cb3eca250caa0ce741c6d73149d57

    SHA1

    39eeec1628465893c382a7ee533fa2e7bc39bd99

    SHA256

    b915ee1c72295ec876c995d0e9e6e3695b0ef5f44df81408ec3211c6267e5a34

    SHA512

    581bdf9242549547a2b44e96f7fdb3cc8725d449c4c0a07bd98eff0e558053e26bd0c381d012d3dd40a489a825c6db32e3fe9ccc721bab540a4cd3e8b4819048

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a7179917.exe

    Filesize

    235KB

    MD5

    a29cb3eca250caa0ce741c6d73149d57

    SHA1

    39eeec1628465893c382a7ee533fa2e7bc39bd99

    SHA256

    b915ee1c72295ec876c995d0e9e6e3695b0ef5f44df81408ec3211c6267e5a34

    SHA512

    581bdf9242549547a2b44e96f7fdb3cc8725d449c4c0a07bd98eff0e558053e26bd0c381d012d3dd40a489a825c6db32e3fe9ccc721bab540a4cd3e8b4819048

  • memory/2508-66-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2508-68-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2508-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2508-72-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2508-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2508-65-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2508-64-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2508-63-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB