Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 14:13

General

  • Target

    0df316a92d290f75d5514aac98f103fd50488c4fddea761f5e15711ae292caea.exe

  • Size

    1.1MB

  • MD5

    8340cbf4ef9057869a36252052ffc8e1

  • SHA1

    8c73e711ccf9318d092c507dd7b71b1690260830

  • SHA256

    0df316a92d290f75d5514aac98f103fd50488c4fddea761f5e15711ae292caea

  • SHA512

    3ee36fca63968ffa9cd5a2d8452c7e212474b89b99551a0637b9159dbe7ada921fc120678bcc765c34acf675fbec065a037a94186418255ef4ff52427e5fb442

  • SSDEEP

    24576:cyKQNVM5Q9PsZC6WxKCsMW3Mu5ZniHk8XTlXzioihKJ6:LhNqQpLJx23hiHkodmjE

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0df316a92d290f75d5514aac98f103fd50488c4fddea761f5e15711ae292caea.exe
    "C:\Users\Admin\AppData\Local\Temp\0df316a92d290f75d5514aac98f103fd50488c4fddea761f5e15711ae292caea.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2168539.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2168539.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9539115.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9539115.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2216
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7948356.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7948356.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3040
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2912715.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2912715.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2796
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2784
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2660
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2820
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 280
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2052

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2168539.exe

      Filesize

      982KB

      MD5

      ff0c13d57bbe76da4c6090096d05e217

      SHA1

      0496ee4663ab99de6ad4a7eb8dc7ab9ea205ffb7

      SHA256

      d2bc425aeb954f7281ab3e6b427579711c901f0ec518f42ad5e6c2a277c877b4

      SHA512

      280ecbc8d3b9cbe0582a25fdac4a07a2001d054a5b628486585f4e04e03cd1062ae5254332224ef64f2e4ed907a8022db2aae2753892bc7297a42457769860b4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2168539.exe

      Filesize

      982KB

      MD5

      ff0c13d57bbe76da4c6090096d05e217

      SHA1

      0496ee4663ab99de6ad4a7eb8dc7ab9ea205ffb7

      SHA256

      d2bc425aeb954f7281ab3e6b427579711c901f0ec518f42ad5e6c2a277c877b4

      SHA512

      280ecbc8d3b9cbe0582a25fdac4a07a2001d054a5b628486585f4e04e03cd1062ae5254332224ef64f2e4ed907a8022db2aae2753892bc7297a42457769860b4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9539115.exe

      Filesize

      799KB

      MD5

      05ca183502e77cb03d308ed5a252d7b7

      SHA1

      142e93422683251292f37173ab02e8c5266a0fbb

      SHA256

      6997ab781b7e2c9d4c9130595512df3693fead2bc3f320c88f22e26df939dd3c

      SHA512

      72deb7cf6871fc61069cd495079b507edaa698ebc111ee65a26a33ce3b1ebc279c67192bb1d1291c4a984295408737387a150dbe4f499c11ac37433134e78b90

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9539115.exe

      Filesize

      799KB

      MD5

      05ca183502e77cb03d308ed5a252d7b7

      SHA1

      142e93422683251292f37173ab02e8c5266a0fbb

      SHA256

      6997ab781b7e2c9d4c9130595512df3693fead2bc3f320c88f22e26df939dd3c

      SHA512

      72deb7cf6871fc61069cd495079b507edaa698ebc111ee65a26a33ce3b1ebc279c67192bb1d1291c4a984295408737387a150dbe4f499c11ac37433134e78b90

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7948356.exe

      Filesize

      616KB

      MD5

      f56d1aa329cb0f3e678927e129293656

      SHA1

      d4b17f3b6c7af6f169bf48169ddd8fa1e9ad0e7f

      SHA256

      146d8b55de758a585a1914d140b05ad6f6d17004be2cf603fea063bd981b9a95

      SHA512

      ec713227e9fa55e01a9710c4fc4ffec728fcb7fd79c2a404dd19d8a0d26d1d8beb1eea483cd401f2376e97b338c810909b24fe697b131b59efeb6b1a4cfdde2c

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7948356.exe

      Filesize

      616KB

      MD5

      f56d1aa329cb0f3e678927e129293656

      SHA1

      d4b17f3b6c7af6f169bf48169ddd8fa1e9ad0e7f

      SHA256

      146d8b55de758a585a1914d140b05ad6f6d17004be2cf603fea063bd981b9a95

      SHA512

      ec713227e9fa55e01a9710c4fc4ffec728fcb7fd79c2a404dd19d8a0d26d1d8beb1eea483cd401f2376e97b338c810909b24fe697b131b59efeb6b1a4cfdde2c

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2912715.exe

      Filesize

      346KB

      MD5

      eae3cda76bc73efa7aeeebd088f13468

      SHA1

      9ed11a7af120527f553dc326767cefe67673fd7b

      SHA256

      924ee5df65f796ff8df3b1fbf92f76cb004f955ac9b522016abe0eec41d80c3f

      SHA512

      7e349dec2fa11fec6c7297e424a68cbf02b6251884c23979451b26e4dc582c20cc17e9c1f956d117c0c55b58d23003ec8846bff700f956ff2735fa8b1c3641db

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2912715.exe

      Filesize

      346KB

      MD5

      eae3cda76bc73efa7aeeebd088f13468

      SHA1

      9ed11a7af120527f553dc326767cefe67673fd7b

      SHA256

      924ee5df65f796ff8df3b1fbf92f76cb004f955ac9b522016abe0eec41d80c3f

      SHA512

      7e349dec2fa11fec6c7297e424a68cbf02b6251884c23979451b26e4dc582c20cc17e9c1f956d117c0c55b58d23003ec8846bff700f956ff2735fa8b1c3641db

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

      Filesize

      235KB

      MD5

      3dc564499bd26115b2abd40f33137643

      SHA1

      4dd3e2712c266e499c97922e3e31e1f6b283864c

      SHA256

      a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

      SHA512

      6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

      Filesize

      235KB

      MD5

      3dc564499bd26115b2abd40f33137643

      SHA1

      4dd3e2712c266e499c97922e3e31e1f6b283864c

      SHA256

      a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

      SHA512

      6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

      Filesize

      235KB

      MD5

      3dc564499bd26115b2abd40f33137643

      SHA1

      4dd3e2712c266e499c97922e3e31e1f6b283864c

      SHA256

      a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

      SHA512

      6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z2168539.exe

      Filesize

      982KB

      MD5

      ff0c13d57bbe76da4c6090096d05e217

      SHA1

      0496ee4663ab99de6ad4a7eb8dc7ab9ea205ffb7

      SHA256

      d2bc425aeb954f7281ab3e6b427579711c901f0ec518f42ad5e6c2a277c877b4

      SHA512

      280ecbc8d3b9cbe0582a25fdac4a07a2001d054a5b628486585f4e04e03cd1062ae5254332224ef64f2e4ed907a8022db2aae2753892bc7297a42457769860b4

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z2168539.exe

      Filesize

      982KB

      MD5

      ff0c13d57bbe76da4c6090096d05e217

      SHA1

      0496ee4663ab99de6ad4a7eb8dc7ab9ea205ffb7

      SHA256

      d2bc425aeb954f7281ab3e6b427579711c901f0ec518f42ad5e6c2a277c877b4

      SHA512

      280ecbc8d3b9cbe0582a25fdac4a07a2001d054a5b628486585f4e04e03cd1062ae5254332224ef64f2e4ed907a8022db2aae2753892bc7297a42457769860b4

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9539115.exe

      Filesize

      799KB

      MD5

      05ca183502e77cb03d308ed5a252d7b7

      SHA1

      142e93422683251292f37173ab02e8c5266a0fbb

      SHA256

      6997ab781b7e2c9d4c9130595512df3693fead2bc3f320c88f22e26df939dd3c

      SHA512

      72deb7cf6871fc61069cd495079b507edaa698ebc111ee65a26a33ce3b1ebc279c67192bb1d1291c4a984295408737387a150dbe4f499c11ac37433134e78b90

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9539115.exe

      Filesize

      799KB

      MD5

      05ca183502e77cb03d308ed5a252d7b7

      SHA1

      142e93422683251292f37173ab02e8c5266a0fbb

      SHA256

      6997ab781b7e2c9d4c9130595512df3693fead2bc3f320c88f22e26df939dd3c

      SHA512

      72deb7cf6871fc61069cd495079b507edaa698ebc111ee65a26a33ce3b1ebc279c67192bb1d1291c4a984295408737387a150dbe4f499c11ac37433134e78b90

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7948356.exe

      Filesize

      616KB

      MD5

      f56d1aa329cb0f3e678927e129293656

      SHA1

      d4b17f3b6c7af6f169bf48169ddd8fa1e9ad0e7f

      SHA256

      146d8b55de758a585a1914d140b05ad6f6d17004be2cf603fea063bd981b9a95

      SHA512

      ec713227e9fa55e01a9710c4fc4ffec728fcb7fd79c2a404dd19d8a0d26d1d8beb1eea483cd401f2376e97b338c810909b24fe697b131b59efeb6b1a4cfdde2c

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7948356.exe

      Filesize

      616KB

      MD5

      f56d1aa329cb0f3e678927e129293656

      SHA1

      d4b17f3b6c7af6f169bf48169ddd8fa1e9ad0e7f

      SHA256

      146d8b55de758a585a1914d140b05ad6f6d17004be2cf603fea063bd981b9a95

      SHA512

      ec713227e9fa55e01a9710c4fc4ffec728fcb7fd79c2a404dd19d8a0d26d1d8beb1eea483cd401f2376e97b338c810909b24fe697b131b59efeb6b1a4cfdde2c

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2912715.exe

      Filesize

      346KB

      MD5

      eae3cda76bc73efa7aeeebd088f13468

      SHA1

      9ed11a7af120527f553dc326767cefe67673fd7b

      SHA256

      924ee5df65f796ff8df3b1fbf92f76cb004f955ac9b522016abe0eec41d80c3f

      SHA512

      7e349dec2fa11fec6c7297e424a68cbf02b6251884c23979451b26e4dc582c20cc17e9c1f956d117c0c55b58d23003ec8846bff700f956ff2735fa8b1c3641db

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2912715.exe

      Filesize

      346KB

      MD5

      eae3cda76bc73efa7aeeebd088f13468

      SHA1

      9ed11a7af120527f553dc326767cefe67673fd7b

      SHA256

      924ee5df65f796ff8df3b1fbf92f76cb004f955ac9b522016abe0eec41d80c3f

      SHA512

      7e349dec2fa11fec6c7297e424a68cbf02b6251884c23979451b26e4dc582c20cc17e9c1f956d117c0c55b58d23003ec8846bff700f956ff2735fa8b1c3641db

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

      Filesize

      235KB

      MD5

      3dc564499bd26115b2abd40f33137643

      SHA1

      4dd3e2712c266e499c97922e3e31e1f6b283864c

      SHA256

      a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

      SHA512

      6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

      Filesize

      235KB

      MD5

      3dc564499bd26115b2abd40f33137643

      SHA1

      4dd3e2712c266e499c97922e3e31e1f6b283864c

      SHA256

      a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

      SHA512

      6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

      Filesize

      235KB

      MD5

      3dc564499bd26115b2abd40f33137643

      SHA1

      4dd3e2712c266e499c97922e3e31e1f6b283864c

      SHA256

      a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

      SHA512

      6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

      Filesize

      235KB

      MD5

      3dc564499bd26115b2abd40f33137643

      SHA1

      4dd3e2712c266e499c97922e3e31e1f6b283864c

      SHA256

      a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

      SHA512

      6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

      Filesize

      235KB

      MD5

      3dc564499bd26115b2abd40f33137643

      SHA1

      4dd3e2712c266e499c97922e3e31e1f6b283864c

      SHA256

      a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

      SHA512

      6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

      Filesize

      235KB

      MD5

      3dc564499bd26115b2abd40f33137643

      SHA1

      4dd3e2712c266e499c97922e3e31e1f6b283864c

      SHA256

      a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

      SHA512

      6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

      Filesize

      235KB

      MD5

      3dc564499bd26115b2abd40f33137643

      SHA1

      4dd3e2712c266e499c97922e3e31e1f6b283864c

      SHA256

      a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

      SHA512

      6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

    • memory/2820-61-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2820-62-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2820-64-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2820-66-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2820-59-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2820-57-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2820-55-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2820-53-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB