Analysis

  • max time kernel
    122s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 14:13

General

  • Target

    d757268b941e469ca9ef76c854f2e95baff429c25ca83329fd7c3c52f0f1d471.exe

  • Size

    1.1MB

  • MD5

    0b471759fd1586cdb0018f057cb5776c

  • SHA1

    38a987a624df00ed57c89914a1ec8ae443b2af86

  • SHA256

    d757268b941e469ca9ef76c854f2e95baff429c25ca83329fd7c3c52f0f1d471

  • SHA512

    77e81ecd653542f9d75047b821fea8f83ceabc39064b9baa0746a0eacf33ee654e9204f108488a81bb7c077cd39bd0efd0422e974a4ce491738c272d4c0eea50

  • SSDEEP

    24576:Vyl3XDTo4lfvUlQhvcAhzogDGuItDZI6A+BEX00R5bREn:wl3XQofvUOhvnhLDktDq5+2/RA

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d757268b941e469ca9ef76c854f2e95baff429c25ca83329fd7c3c52f0f1d471.exe
    "C:\Users\Admin\AppData\Local\Temp\d757268b941e469ca9ef76c854f2e95baff429c25ca83329fd7c3c52f0f1d471.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8313869.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8313869.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1965634.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1965634.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1960
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8587016.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8587016.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1896
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3475883.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3475883.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2748
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2908329.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2908329.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2604
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2616
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8313869.exe

    Filesize

    997KB

    MD5

    e446cd5a2040c0c57ec3124d12e26e86

    SHA1

    398ab007ef871f40f45b7cb56d4b7bce3230ef9e

    SHA256

    284766bfd21d1153fe0854fdf0e9eeecece7ecca128ef6815594b04a5806eb58

    SHA512

    94492a1c78a24e923bfc8407f1366111fa17475c2d6db6772edf0ded939925551238668392b0c0700a7d1406056898a77b3eccf4f8f5dead89bd17d177ecd63d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8313869.exe

    Filesize

    997KB

    MD5

    e446cd5a2040c0c57ec3124d12e26e86

    SHA1

    398ab007ef871f40f45b7cb56d4b7bce3230ef9e

    SHA256

    284766bfd21d1153fe0854fdf0e9eeecece7ecca128ef6815594b04a5806eb58

    SHA512

    94492a1c78a24e923bfc8407f1366111fa17475c2d6db6772edf0ded939925551238668392b0c0700a7d1406056898a77b3eccf4f8f5dead89bd17d177ecd63d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1965634.exe

    Filesize

    814KB

    MD5

    63bd1270047f426b9e60f5981086f667

    SHA1

    651769a3574938b80bbb4e1dfd7fa298d93348ca

    SHA256

    f593ab7bb9ed2a4c35c7c5ac5c662ced39b472af0391ed73c5c7cac9087f6044

    SHA512

    c3cb03c6788715ca7f26a2ad9d60a4e319dfcca433b9f758b041f189de3d20e12f403546f1e5ab43ecbe85c58bf22e2e53350c846e17b3b44c0bd6e1efad3615

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1965634.exe

    Filesize

    814KB

    MD5

    63bd1270047f426b9e60f5981086f667

    SHA1

    651769a3574938b80bbb4e1dfd7fa298d93348ca

    SHA256

    f593ab7bb9ed2a4c35c7c5ac5c662ced39b472af0391ed73c5c7cac9087f6044

    SHA512

    c3cb03c6788715ca7f26a2ad9d60a4e319dfcca433b9f758b041f189de3d20e12f403546f1e5ab43ecbe85c58bf22e2e53350c846e17b3b44c0bd6e1efad3615

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8587016.exe

    Filesize

    631KB

    MD5

    0484e8b3e780c408a42f386d81633eee

    SHA1

    a780aa5a454ba69ea4b60809cd7bbc97f838e557

    SHA256

    a3f54ae230571f470a294e3778047355186efb92cc2939e40a7aab602ee1080f

    SHA512

    313b2bf5b25851fdbb30444a1ba73f7e4b17c1059708782e7de4b61b9655775eb6f14e7c944d435a97773124f9eaf2c9e61ae8fe3210e50ea79557fa8bb6b4f4

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8587016.exe

    Filesize

    631KB

    MD5

    0484e8b3e780c408a42f386d81633eee

    SHA1

    a780aa5a454ba69ea4b60809cd7bbc97f838e557

    SHA256

    a3f54ae230571f470a294e3778047355186efb92cc2939e40a7aab602ee1080f

    SHA512

    313b2bf5b25851fdbb30444a1ba73f7e4b17c1059708782e7de4b61b9655775eb6f14e7c944d435a97773124f9eaf2c9e61ae8fe3210e50ea79557fa8bb6b4f4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3475883.exe

    Filesize

    354KB

    MD5

    eb1bed077e815143be0bfcd524ae52ed

    SHA1

    c555f924d8f886d381a9865bcb471988fb73863c

    SHA256

    43276aeb739e7a348202115a07e8542dd62435950f1ea8fed31ddb083659c330

    SHA512

    71d0154754616f26aa20783540cf8ad45c4aee16df53009de1c3bc7c8a87e2a136dc234b4a63c236db0ef755d49dcd60e395c08939ddefad34c47fecbf2b3484

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3475883.exe

    Filesize

    354KB

    MD5

    eb1bed077e815143be0bfcd524ae52ed

    SHA1

    c555f924d8f886d381a9865bcb471988fb73863c

    SHA256

    43276aeb739e7a348202115a07e8542dd62435950f1ea8fed31ddb083659c330

    SHA512

    71d0154754616f26aa20783540cf8ad45c4aee16df53009de1c3bc7c8a87e2a136dc234b4a63c236db0ef755d49dcd60e395c08939ddefad34c47fecbf2b3484

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2908329.exe

    Filesize

    250KB

    MD5

    6063eed07c37e90b18b1c916adda934c

    SHA1

    8e0b7fb5fb866aea198ffaeebcfefae439424358

    SHA256

    ece1d6356742fd2ca340ed220ba3b0c7ec25bda6ca33df7ad5ed5a8d78b49feb

    SHA512

    f447fe49c361dcebc7aeacebc0a45c7b2ea76c216029e70741e2b45f0fd85b8147cbb9035feae820ac692babe9bc8b44381f85244b98c23809cfb4f97c691641

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2908329.exe

    Filesize

    250KB

    MD5

    6063eed07c37e90b18b1c916adda934c

    SHA1

    8e0b7fb5fb866aea198ffaeebcfefae439424358

    SHA256

    ece1d6356742fd2ca340ed220ba3b0c7ec25bda6ca33df7ad5ed5a8d78b49feb

    SHA512

    f447fe49c361dcebc7aeacebc0a45c7b2ea76c216029e70741e2b45f0fd85b8147cbb9035feae820ac692babe9bc8b44381f85244b98c23809cfb4f97c691641

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2908329.exe

    Filesize

    250KB

    MD5

    6063eed07c37e90b18b1c916adda934c

    SHA1

    8e0b7fb5fb866aea198ffaeebcfefae439424358

    SHA256

    ece1d6356742fd2ca340ed220ba3b0c7ec25bda6ca33df7ad5ed5a8d78b49feb

    SHA512

    f447fe49c361dcebc7aeacebc0a45c7b2ea76c216029e70741e2b45f0fd85b8147cbb9035feae820ac692babe9bc8b44381f85244b98c23809cfb4f97c691641

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8313869.exe

    Filesize

    997KB

    MD5

    e446cd5a2040c0c57ec3124d12e26e86

    SHA1

    398ab007ef871f40f45b7cb56d4b7bce3230ef9e

    SHA256

    284766bfd21d1153fe0854fdf0e9eeecece7ecca128ef6815594b04a5806eb58

    SHA512

    94492a1c78a24e923bfc8407f1366111fa17475c2d6db6772edf0ded939925551238668392b0c0700a7d1406056898a77b3eccf4f8f5dead89bd17d177ecd63d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8313869.exe

    Filesize

    997KB

    MD5

    e446cd5a2040c0c57ec3124d12e26e86

    SHA1

    398ab007ef871f40f45b7cb56d4b7bce3230ef9e

    SHA256

    284766bfd21d1153fe0854fdf0e9eeecece7ecca128ef6815594b04a5806eb58

    SHA512

    94492a1c78a24e923bfc8407f1366111fa17475c2d6db6772edf0ded939925551238668392b0c0700a7d1406056898a77b3eccf4f8f5dead89bd17d177ecd63d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1965634.exe

    Filesize

    814KB

    MD5

    63bd1270047f426b9e60f5981086f667

    SHA1

    651769a3574938b80bbb4e1dfd7fa298d93348ca

    SHA256

    f593ab7bb9ed2a4c35c7c5ac5c662ced39b472af0391ed73c5c7cac9087f6044

    SHA512

    c3cb03c6788715ca7f26a2ad9d60a4e319dfcca433b9f758b041f189de3d20e12f403546f1e5ab43ecbe85c58bf22e2e53350c846e17b3b44c0bd6e1efad3615

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1965634.exe

    Filesize

    814KB

    MD5

    63bd1270047f426b9e60f5981086f667

    SHA1

    651769a3574938b80bbb4e1dfd7fa298d93348ca

    SHA256

    f593ab7bb9ed2a4c35c7c5ac5c662ced39b472af0391ed73c5c7cac9087f6044

    SHA512

    c3cb03c6788715ca7f26a2ad9d60a4e319dfcca433b9f758b041f189de3d20e12f403546f1e5ab43ecbe85c58bf22e2e53350c846e17b3b44c0bd6e1efad3615

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8587016.exe

    Filesize

    631KB

    MD5

    0484e8b3e780c408a42f386d81633eee

    SHA1

    a780aa5a454ba69ea4b60809cd7bbc97f838e557

    SHA256

    a3f54ae230571f470a294e3778047355186efb92cc2939e40a7aab602ee1080f

    SHA512

    313b2bf5b25851fdbb30444a1ba73f7e4b17c1059708782e7de4b61b9655775eb6f14e7c944d435a97773124f9eaf2c9e61ae8fe3210e50ea79557fa8bb6b4f4

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8587016.exe

    Filesize

    631KB

    MD5

    0484e8b3e780c408a42f386d81633eee

    SHA1

    a780aa5a454ba69ea4b60809cd7bbc97f838e557

    SHA256

    a3f54ae230571f470a294e3778047355186efb92cc2939e40a7aab602ee1080f

    SHA512

    313b2bf5b25851fdbb30444a1ba73f7e4b17c1059708782e7de4b61b9655775eb6f14e7c944d435a97773124f9eaf2c9e61ae8fe3210e50ea79557fa8bb6b4f4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z3475883.exe

    Filesize

    354KB

    MD5

    eb1bed077e815143be0bfcd524ae52ed

    SHA1

    c555f924d8f886d381a9865bcb471988fb73863c

    SHA256

    43276aeb739e7a348202115a07e8542dd62435950f1ea8fed31ddb083659c330

    SHA512

    71d0154754616f26aa20783540cf8ad45c4aee16df53009de1c3bc7c8a87e2a136dc234b4a63c236db0ef755d49dcd60e395c08939ddefad34c47fecbf2b3484

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z3475883.exe

    Filesize

    354KB

    MD5

    eb1bed077e815143be0bfcd524ae52ed

    SHA1

    c555f924d8f886d381a9865bcb471988fb73863c

    SHA256

    43276aeb739e7a348202115a07e8542dd62435950f1ea8fed31ddb083659c330

    SHA512

    71d0154754616f26aa20783540cf8ad45c4aee16df53009de1c3bc7c8a87e2a136dc234b4a63c236db0ef755d49dcd60e395c08939ddefad34c47fecbf2b3484

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2908329.exe

    Filesize

    250KB

    MD5

    6063eed07c37e90b18b1c916adda934c

    SHA1

    8e0b7fb5fb866aea198ffaeebcfefae439424358

    SHA256

    ece1d6356742fd2ca340ed220ba3b0c7ec25bda6ca33df7ad5ed5a8d78b49feb

    SHA512

    f447fe49c361dcebc7aeacebc0a45c7b2ea76c216029e70741e2b45f0fd85b8147cbb9035feae820ac692babe9bc8b44381f85244b98c23809cfb4f97c691641

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2908329.exe

    Filesize

    250KB

    MD5

    6063eed07c37e90b18b1c916adda934c

    SHA1

    8e0b7fb5fb866aea198ffaeebcfefae439424358

    SHA256

    ece1d6356742fd2ca340ed220ba3b0c7ec25bda6ca33df7ad5ed5a8d78b49feb

    SHA512

    f447fe49c361dcebc7aeacebc0a45c7b2ea76c216029e70741e2b45f0fd85b8147cbb9035feae820ac692babe9bc8b44381f85244b98c23809cfb4f97c691641

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2908329.exe

    Filesize

    250KB

    MD5

    6063eed07c37e90b18b1c916adda934c

    SHA1

    8e0b7fb5fb866aea198ffaeebcfefae439424358

    SHA256

    ece1d6356742fd2ca340ed220ba3b0c7ec25bda6ca33df7ad5ed5a8d78b49feb

    SHA512

    f447fe49c361dcebc7aeacebc0a45c7b2ea76c216029e70741e2b45f0fd85b8147cbb9035feae820ac692babe9bc8b44381f85244b98c23809cfb4f97c691641

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2908329.exe

    Filesize

    250KB

    MD5

    6063eed07c37e90b18b1c916adda934c

    SHA1

    8e0b7fb5fb866aea198ffaeebcfefae439424358

    SHA256

    ece1d6356742fd2ca340ed220ba3b0c7ec25bda6ca33df7ad5ed5a8d78b49feb

    SHA512

    f447fe49c361dcebc7aeacebc0a45c7b2ea76c216029e70741e2b45f0fd85b8147cbb9035feae820ac692babe9bc8b44381f85244b98c23809cfb4f97c691641

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2908329.exe

    Filesize

    250KB

    MD5

    6063eed07c37e90b18b1c916adda934c

    SHA1

    8e0b7fb5fb866aea198ffaeebcfefae439424358

    SHA256

    ece1d6356742fd2ca340ed220ba3b0c7ec25bda6ca33df7ad5ed5a8d78b49feb

    SHA512

    f447fe49c361dcebc7aeacebc0a45c7b2ea76c216029e70741e2b45f0fd85b8147cbb9035feae820ac692babe9bc8b44381f85244b98c23809cfb4f97c691641

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2908329.exe

    Filesize

    250KB

    MD5

    6063eed07c37e90b18b1c916adda934c

    SHA1

    8e0b7fb5fb866aea198ffaeebcfefae439424358

    SHA256

    ece1d6356742fd2ca340ed220ba3b0c7ec25bda6ca33df7ad5ed5a8d78b49feb

    SHA512

    f447fe49c361dcebc7aeacebc0a45c7b2ea76c216029e70741e2b45f0fd85b8147cbb9035feae820ac692babe9bc8b44381f85244b98c23809cfb4f97c691641

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2908329.exe

    Filesize

    250KB

    MD5

    6063eed07c37e90b18b1c916adda934c

    SHA1

    8e0b7fb5fb866aea198ffaeebcfefae439424358

    SHA256

    ece1d6356742fd2ca340ed220ba3b0c7ec25bda6ca33df7ad5ed5a8d78b49feb

    SHA512

    f447fe49c361dcebc7aeacebc0a45c7b2ea76c216029e70741e2b45f0fd85b8147cbb9035feae820ac692babe9bc8b44381f85244b98c23809cfb4f97c691641

  • memory/2616-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2616-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2616-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2616-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2616-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2616-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2616-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2616-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB