Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 14:16

General

  • Target

    7d7577ee380ae5a106ba1294afe1f2589ba7f4f3a320ba4b5921b5ed2fb7bae4.exe

  • Size

    1.1MB

  • MD5

    a79dbf0864fd161889fc880435032f96

  • SHA1

    2c7446a3671a19f946453c46c13fb093e0a9f369

  • SHA256

    7d7577ee380ae5a106ba1294afe1f2589ba7f4f3a320ba4b5921b5ed2fb7bae4

  • SHA512

    2e8edc2b1b0e3d2d232ac3473a03a687469453c7989f0c12c3fe08dd7062183d29024e605e122d254774e94af58b49482ff18a1c015aeb580b889d670e01cdba

  • SSDEEP

    24576:4yelM4L+LJmD4XQ8qyA+dS/5Sj+t2IEiDw6hsa:/ei4LCmD2DqypQRys2IEZys

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d7577ee380ae5a106ba1294afe1f2589ba7f4f3a320ba4b5921b5ed2fb7bae4.exe
    "C:\Users\Admin\AppData\Local\Temp\7d7577ee380ae5a106ba1294afe1f2589ba7f4f3a320ba4b5921b5ed2fb7bae4.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4340677.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4340677.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7052840.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7052840.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1020378.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1020378.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2740
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0722780.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0722780.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2516
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1544638.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1544638.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2756
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:536
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:2676
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2556
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 288
                    7⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:2528

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4340677.exe

        Filesize

        988KB

        MD5

        7a3e0268127c7c3ffc4afcb59cbf760a

        SHA1

        5641b502eead8b1794ff3a2469f365556be59dde

        SHA256

        89382388026cc48b52dda5398b51e56ae659582ea189da46ff66a8de9f3b60a7

        SHA512

        aa90509288c8e82c147be8ffb2ff112170ba355b28e178db87330ef585a39f90104ac28f02bc0c149211457aec5e01c5b24032ff6011a32112825d130444dd31

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4340677.exe

        Filesize

        988KB

        MD5

        7a3e0268127c7c3ffc4afcb59cbf760a

        SHA1

        5641b502eead8b1794ff3a2469f365556be59dde

        SHA256

        89382388026cc48b52dda5398b51e56ae659582ea189da46ff66a8de9f3b60a7

        SHA512

        aa90509288c8e82c147be8ffb2ff112170ba355b28e178db87330ef585a39f90104ac28f02bc0c149211457aec5e01c5b24032ff6011a32112825d130444dd31

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7052840.exe

        Filesize

        805KB

        MD5

        1fb0a7ecbd1902e56b40a7ede0058e55

        SHA1

        dd7cee517a49951b2574d400344c3bed37a6e1c2

        SHA256

        b717835a0ea1db043724c452743feb1de08b1c6a2129488fb21f0507d24f6c11

        SHA512

        1d5044092fcc9e94837dabaea97c36288db75b4be788795b70a8e115f12744ced864951fa2b9ee40c17bbe835e2a488b3bcd7f2e020fd2958f4511a98e3849bf

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7052840.exe

        Filesize

        805KB

        MD5

        1fb0a7ecbd1902e56b40a7ede0058e55

        SHA1

        dd7cee517a49951b2574d400344c3bed37a6e1c2

        SHA256

        b717835a0ea1db043724c452743feb1de08b1c6a2129488fb21f0507d24f6c11

        SHA512

        1d5044092fcc9e94837dabaea97c36288db75b4be788795b70a8e115f12744ced864951fa2b9ee40c17bbe835e2a488b3bcd7f2e020fd2958f4511a98e3849bf

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1020378.exe

        Filesize

        622KB

        MD5

        43d34067bcaf1d2a3ee44b6485602cb1

        SHA1

        f3de763a31a7a620ea03f4e45ea8a009897d3ba7

        SHA256

        dda432efed4dfad4d946f5ba53a41a7ec365b1fa2cf9f7fc78a9eec84bfb43da

        SHA512

        f97fd9eb669ca8e24805e0b4b6874b4f1abe923d242d4c8f01b30a2c28407dfff43bba5b3e3e074d13f4020406aceddec41b0cc0ecb4605f4e78f1c433271e6b

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1020378.exe

        Filesize

        622KB

        MD5

        43d34067bcaf1d2a3ee44b6485602cb1

        SHA1

        f3de763a31a7a620ea03f4e45ea8a009897d3ba7

        SHA256

        dda432efed4dfad4d946f5ba53a41a7ec365b1fa2cf9f7fc78a9eec84bfb43da

        SHA512

        f97fd9eb669ca8e24805e0b4b6874b4f1abe923d242d4c8f01b30a2c28407dfff43bba5b3e3e074d13f4020406aceddec41b0cc0ecb4605f4e78f1c433271e6b

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0722780.exe

        Filesize

        351KB

        MD5

        e6782db1e977476da12fd29fc9ea56a3

        SHA1

        047c9781658ace78d790831a09aa13a5562bb68b

        SHA256

        9b5b7a8803bb6e2d75f0b4563e8cfa30b171ea32eb136f6bfc3f5717fc8e8a5c

        SHA512

        52e5c9532eb9a6485ecc8349bf875b73ccd53cd17d9fa2fbbf1377a887a6a3b9b28cfe7c4af8d54bdc6c0ac7ac0644fb70dcda4d7da424ea600ec5661ed10367

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0722780.exe

        Filesize

        351KB

        MD5

        e6782db1e977476da12fd29fc9ea56a3

        SHA1

        047c9781658ace78d790831a09aa13a5562bb68b

        SHA256

        9b5b7a8803bb6e2d75f0b4563e8cfa30b171ea32eb136f6bfc3f5717fc8e8a5c

        SHA512

        52e5c9532eb9a6485ecc8349bf875b73ccd53cd17d9fa2fbbf1377a887a6a3b9b28cfe7c4af8d54bdc6c0ac7ac0644fb70dcda4d7da424ea600ec5661ed10367

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1544638.exe

        Filesize

        235KB

        MD5

        d5f1a6b11896fda5e5947eef32dd4401

        SHA1

        9f89af22046d0e4823c43d48896632d10c78bab4

        SHA256

        7aadc4440de54c65e6adce903d9802e25b05a9d67bbe60dd0c68898870ffc878

        SHA512

        01284b1e57d59bfcdf92f01b58d9a547c4a9157fd7c66336054981e7c55ec9e6affba3b41bff8e75775a348fd97d89de465a58f64fca18acdfd1a4fd8db2dd36

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1544638.exe

        Filesize

        235KB

        MD5

        d5f1a6b11896fda5e5947eef32dd4401

        SHA1

        9f89af22046d0e4823c43d48896632d10c78bab4

        SHA256

        7aadc4440de54c65e6adce903d9802e25b05a9d67bbe60dd0c68898870ffc878

        SHA512

        01284b1e57d59bfcdf92f01b58d9a547c4a9157fd7c66336054981e7c55ec9e6affba3b41bff8e75775a348fd97d89de465a58f64fca18acdfd1a4fd8db2dd36

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1544638.exe

        Filesize

        235KB

        MD5

        d5f1a6b11896fda5e5947eef32dd4401

        SHA1

        9f89af22046d0e4823c43d48896632d10c78bab4

        SHA256

        7aadc4440de54c65e6adce903d9802e25b05a9d67bbe60dd0c68898870ffc878

        SHA512

        01284b1e57d59bfcdf92f01b58d9a547c4a9157fd7c66336054981e7c55ec9e6affba3b41bff8e75775a348fd97d89de465a58f64fca18acdfd1a4fd8db2dd36

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4340677.exe

        Filesize

        988KB

        MD5

        7a3e0268127c7c3ffc4afcb59cbf760a

        SHA1

        5641b502eead8b1794ff3a2469f365556be59dde

        SHA256

        89382388026cc48b52dda5398b51e56ae659582ea189da46ff66a8de9f3b60a7

        SHA512

        aa90509288c8e82c147be8ffb2ff112170ba355b28e178db87330ef585a39f90104ac28f02bc0c149211457aec5e01c5b24032ff6011a32112825d130444dd31

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4340677.exe

        Filesize

        988KB

        MD5

        7a3e0268127c7c3ffc4afcb59cbf760a

        SHA1

        5641b502eead8b1794ff3a2469f365556be59dde

        SHA256

        89382388026cc48b52dda5398b51e56ae659582ea189da46ff66a8de9f3b60a7

        SHA512

        aa90509288c8e82c147be8ffb2ff112170ba355b28e178db87330ef585a39f90104ac28f02bc0c149211457aec5e01c5b24032ff6011a32112825d130444dd31

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7052840.exe

        Filesize

        805KB

        MD5

        1fb0a7ecbd1902e56b40a7ede0058e55

        SHA1

        dd7cee517a49951b2574d400344c3bed37a6e1c2

        SHA256

        b717835a0ea1db043724c452743feb1de08b1c6a2129488fb21f0507d24f6c11

        SHA512

        1d5044092fcc9e94837dabaea97c36288db75b4be788795b70a8e115f12744ced864951fa2b9ee40c17bbe835e2a488b3bcd7f2e020fd2958f4511a98e3849bf

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7052840.exe

        Filesize

        805KB

        MD5

        1fb0a7ecbd1902e56b40a7ede0058e55

        SHA1

        dd7cee517a49951b2574d400344c3bed37a6e1c2

        SHA256

        b717835a0ea1db043724c452743feb1de08b1c6a2129488fb21f0507d24f6c11

        SHA512

        1d5044092fcc9e94837dabaea97c36288db75b4be788795b70a8e115f12744ced864951fa2b9ee40c17bbe835e2a488b3bcd7f2e020fd2958f4511a98e3849bf

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1020378.exe

        Filesize

        622KB

        MD5

        43d34067bcaf1d2a3ee44b6485602cb1

        SHA1

        f3de763a31a7a620ea03f4e45ea8a009897d3ba7

        SHA256

        dda432efed4dfad4d946f5ba53a41a7ec365b1fa2cf9f7fc78a9eec84bfb43da

        SHA512

        f97fd9eb669ca8e24805e0b4b6874b4f1abe923d242d4c8f01b30a2c28407dfff43bba5b3e3e074d13f4020406aceddec41b0cc0ecb4605f4e78f1c433271e6b

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1020378.exe

        Filesize

        622KB

        MD5

        43d34067bcaf1d2a3ee44b6485602cb1

        SHA1

        f3de763a31a7a620ea03f4e45ea8a009897d3ba7

        SHA256

        dda432efed4dfad4d946f5ba53a41a7ec365b1fa2cf9f7fc78a9eec84bfb43da

        SHA512

        f97fd9eb669ca8e24805e0b4b6874b4f1abe923d242d4c8f01b30a2c28407dfff43bba5b3e3e074d13f4020406aceddec41b0cc0ecb4605f4e78f1c433271e6b

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z0722780.exe

        Filesize

        351KB

        MD5

        e6782db1e977476da12fd29fc9ea56a3

        SHA1

        047c9781658ace78d790831a09aa13a5562bb68b

        SHA256

        9b5b7a8803bb6e2d75f0b4563e8cfa30b171ea32eb136f6bfc3f5717fc8e8a5c

        SHA512

        52e5c9532eb9a6485ecc8349bf875b73ccd53cd17d9fa2fbbf1377a887a6a3b9b28cfe7c4af8d54bdc6c0ac7ac0644fb70dcda4d7da424ea600ec5661ed10367

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z0722780.exe

        Filesize

        351KB

        MD5

        e6782db1e977476da12fd29fc9ea56a3

        SHA1

        047c9781658ace78d790831a09aa13a5562bb68b

        SHA256

        9b5b7a8803bb6e2d75f0b4563e8cfa30b171ea32eb136f6bfc3f5717fc8e8a5c

        SHA512

        52e5c9532eb9a6485ecc8349bf875b73ccd53cd17d9fa2fbbf1377a887a6a3b9b28cfe7c4af8d54bdc6c0ac7ac0644fb70dcda4d7da424ea600ec5661ed10367

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1544638.exe

        Filesize

        235KB

        MD5

        d5f1a6b11896fda5e5947eef32dd4401

        SHA1

        9f89af22046d0e4823c43d48896632d10c78bab4

        SHA256

        7aadc4440de54c65e6adce903d9802e25b05a9d67bbe60dd0c68898870ffc878

        SHA512

        01284b1e57d59bfcdf92f01b58d9a547c4a9157fd7c66336054981e7c55ec9e6affba3b41bff8e75775a348fd97d89de465a58f64fca18acdfd1a4fd8db2dd36

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1544638.exe

        Filesize

        235KB

        MD5

        d5f1a6b11896fda5e5947eef32dd4401

        SHA1

        9f89af22046d0e4823c43d48896632d10c78bab4

        SHA256

        7aadc4440de54c65e6adce903d9802e25b05a9d67bbe60dd0c68898870ffc878

        SHA512

        01284b1e57d59bfcdf92f01b58d9a547c4a9157fd7c66336054981e7c55ec9e6affba3b41bff8e75775a348fd97d89de465a58f64fca18acdfd1a4fd8db2dd36

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1544638.exe

        Filesize

        235KB

        MD5

        d5f1a6b11896fda5e5947eef32dd4401

        SHA1

        9f89af22046d0e4823c43d48896632d10c78bab4

        SHA256

        7aadc4440de54c65e6adce903d9802e25b05a9d67bbe60dd0c68898870ffc878

        SHA512

        01284b1e57d59bfcdf92f01b58d9a547c4a9157fd7c66336054981e7c55ec9e6affba3b41bff8e75775a348fd97d89de465a58f64fca18acdfd1a4fd8db2dd36

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1544638.exe

        Filesize

        235KB

        MD5

        d5f1a6b11896fda5e5947eef32dd4401

        SHA1

        9f89af22046d0e4823c43d48896632d10c78bab4

        SHA256

        7aadc4440de54c65e6adce903d9802e25b05a9d67bbe60dd0c68898870ffc878

        SHA512

        01284b1e57d59bfcdf92f01b58d9a547c4a9157fd7c66336054981e7c55ec9e6affba3b41bff8e75775a348fd97d89de465a58f64fca18acdfd1a4fd8db2dd36

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1544638.exe

        Filesize

        235KB

        MD5

        d5f1a6b11896fda5e5947eef32dd4401

        SHA1

        9f89af22046d0e4823c43d48896632d10c78bab4

        SHA256

        7aadc4440de54c65e6adce903d9802e25b05a9d67bbe60dd0c68898870ffc878

        SHA512

        01284b1e57d59bfcdf92f01b58d9a547c4a9157fd7c66336054981e7c55ec9e6affba3b41bff8e75775a348fd97d89de465a58f64fca18acdfd1a4fd8db2dd36

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1544638.exe

        Filesize

        235KB

        MD5

        d5f1a6b11896fda5e5947eef32dd4401

        SHA1

        9f89af22046d0e4823c43d48896632d10c78bab4

        SHA256

        7aadc4440de54c65e6adce903d9802e25b05a9d67bbe60dd0c68898870ffc878

        SHA512

        01284b1e57d59bfcdf92f01b58d9a547c4a9157fd7c66336054981e7c55ec9e6affba3b41bff8e75775a348fd97d89de465a58f64fca18acdfd1a4fd8db2dd36

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1544638.exe

        Filesize

        235KB

        MD5

        d5f1a6b11896fda5e5947eef32dd4401

        SHA1

        9f89af22046d0e4823c43d48896632d10c78bab4

        SHA256

        7aadc4440de54c65e6adce903d9802e25b05a9d67bbe60dd0c68898870ffc878

        SHA512

        01284b1e57d59bfcdf92f01b58d9a547c4a9157fd7c66336054981e7c55ec9e6affba3b41bff8e75775a348fd97d89de465a58f64fca18acdfd1a4fd8db2dd36

      • memory/2556-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

        Filesize

        4KB

      • memory/2556-58-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2556-60-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2556-62-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2556-53-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2556-54-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2556-56-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2556-55-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB