Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 14:16

General

  • Target

    3501fa48a20cba0e49b19eb3d3c0c28f8a0e8378597880388906acae42113b67.exe

  • Size

    1.1MB

  • MD5

    cc547a87aaac25c88c6dfe04428d9821

  • SHA1

    bb666be55fdaf3a048fb1236da8493e51ae6da3b

  • SHA256

    3501fa48a20cba0e49b19eb3d3c0c28f8a0e8378597880388906acae42113b67

  • SHA512

    d8e8f97d8baa8d32c842561cacc7d54272f31f645fbd490526979ab90982218901480d35390929cdff8a957d4972fc6e996ecd0b01856728955aadeee022c13c

  • SSDEEP

    24576:3yWz/N6S9xztf/YNUEeFqVzevE6TuARQg4Y4FArTfgiT7Fr8bQVIH:CWJr99NCUjUzV6TuARQy4FqTxFr8b7

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3501fa48a20cba0e49b19eb3d3c0c28f8a0e8378597880388906acae42113b67.exe
    "C:\Users\Admin\AppData\Local\Temp\3501fa48a20cba0e49b19eb3d3c0c28f8a0e8378597880388906acae42113b67.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5545370.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5545370.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0465709.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0465709.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2140
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3208663.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3208663.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2716
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7793819.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7793819.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2588
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9566369.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9566369.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2920
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2608
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2464

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5545370.exe

          Filesize

          997KB

          MD5

          f1196dd4d04dd8bf0177909984332d1b

          SHA1

          43735101a7cb903d25f0267436c772222be31e97

          SHA256

          5d8f378f8d6563d62a1c573a0b810912bb0a50e1b4dd66f9d49632ebd9cd92f8

          SHA512

          60f0290dfdd4e091d35caa4f8c138963fd3595f562576195310d9ab09722ce2dad6cb9be24833809540454322823c9d996972890eeba3caaf51e7296836e17d3

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5545370.exe

          Filesize

          997KB

          MD5

          f1196dd4d04dd8bf0177909984332d1b

          SHA1

          43735101a7cb903d25f0267436c772222be31e97

          SHA256

          5d8f378f8d6563d62a1c573a0b810912bb0a50e1b4dd66f9d49632ebd9cd92f8

          SHA512

          60f0290dfdd4e091d35caa4f8c138963fd3595f562576195310d9ab09722ce2dad6cb9be24833809540454322823c9d996972890eeba3caaf51e7296836e17d3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0465709.exe

          Filesize

          815KB

          MD5

          35be1c3e3b79e97d222d74fb1d422d27

          SHA1

          1b038f10493871e42581e6dbf062d6f96a3109be

          SHA256

          733ca24f214d3f3de2d827e5689c6541a4e26fc4922227cd511716b797e0c04e

          SHA512

          eca84fde3ef1a700dc9b566c0981644076c22a444a07aeab5677360265604eef77b26d5091fdca1b2492e1eb7c151d5d0ae274a3a07f522398b1d347b39ce9c6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0465709.exe

          Filesize

          815KB

          MD5

          35be1c3e3b79e97d222d74fb1d422d27

          SHA1

          1b038f10493871e42581e6dbf062d6f96a3109be

          SHA256

          733ca24f214d3f3de2d827e5689c6541a4e26fc4922227cd511716b797e0c04e

          SHA512

          eca84fde3ef1a700dc9b566c0981644076c22a444a07aeab5677360265604eef77b26d5091fdca1b2492e1eb7c151d5d0ae274a3a07f522398b1d347b39ce9c6

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3208663.exe

          Filesize

          632KB

          MD5

          80021f86af4992c6d26ca26a9b934f47

          SHA1

          b54537795310d05c75b65ad7d054861990b4361b

          SHA256

          e56b25ad53c5773b06bb749885980a0ec26683ed4d79f30af48160a08d64fa47

          SHA512

          9fe600f363d32917c89aec3d9e1f2c18ed1d5b4e4ffe07d233c035e0c3fa959b40fceadf5d18cf995d80c7ea282a1892931a7b30d7a53d02271874365c2ac94c

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3208663.exe

          Filesize

          632KB

          MD5

          80021f86af4992c6d26ca26a9b934f47

          SHA1

          b54537795310d05c75b65ad7d054861990b4361b

          SHA256

          e56b25ad53c5773b06bb749885980a0ec26683ed4d79f30af48160a08d64fa47

          SHA512

          9fe600f363d32917c89aec3d9e1f2c18ed1d5b4e4ffe07d233c035e0c3fa959b40fceadf5d18cf995d80c7ea282a1892931a7b30d7a53d02271874365c2ac94c

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7793819.exe

          Filesize

          354KB

          MD5

          6060b73ba4f114676cc40671ba7dff84

          SHA1

          d96ddaa5d3cb58c6bc4b92f889b862dd093b216a

          SHA256

          fbdec6d6672b97d62ba6143c0fef2dafbfe2d623ca4d42e60b4232d38ce9e1a0

          SHA512

          d383db3b1455710bbc535d560f789d1ce060a218638e8ae1c0ff1dd5507c9a0342aae7e7366c32162de5d1e03e3e84991fc552a99dd939bb8cb9d69ebb3875d9

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7793819.exe

          Filesize

          354KB

          MD5

          6060b73ba4f114676cc40671ba7dff84

          SHA1

          d96ddaa5d3cb58c6bc4b92f889b862dd093b216a

          SHA256

          fbdec6d6672b97d62ba6143c0fef2dafbfe2d623ca4d42e60b4232d38ce9e1a0

          SHA512

          d383db3b1455710bbc535d560f789d1ce060a218638e8ae1c0ff1dd5507c9a0342aae7e7366c32162de5d1e03e3e84991fc552a99dd939bb8cb9d69ebb3875d9

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9566369.exe

          Filesize

          250KB

          MD5

          1d34300e44d9573490a35960a9555a72

          SHA1

          dab3a2f09f5d46ba07d7e03be154a7f18b4fac15

          SHA256

          2144105b41b4f34ea1433858d44b6dae1af833484ad0c71c52fb961a726e091e

          SHA512

          e3f524b390aaf92810fb60119ca76b9517c154f5730ed2b9b945bc5069efb3398057624d8ebe636b707df8f3c64d02808a954768538877a3c34b2d2b0a7d8d4a

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9566369.exe

          Filesize

          250KB

          MD5

          1d34300e44d9573490a35960a9555a72

          SHA1

          dab3a2f09f5d46ba07d7e03be154a7f18b4fac15

          SHA256

          2144105b41b4f34ea1433858d44b6dae1af833484ad0c71c52fb961a726e091e

          SHA512

          e3f524b390aaf92810fb60119ca76b9517c154f5730ed2b9b945bc5069efb3398057624d8ebe636b707df8f3c64d02808a954768538877a3c34b2d2b0a7d8d4a

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9566369.exe

          Filesize

          250KB

          MD5

          1d34300e44d9573490a35960a9555a72

          SHA1

          dab3a2f09f5d46ba07d7e03be154a7f18b4fac15

          SHA256

          2144105b41b4f34ea1433858d44b6dae1af833484ad0c71c52fb961a726e091e

          SHA512

          e3f524b390aaf92810fb60119ca76b9517c154f5730ed2b9b945bc5069efb3398057624d8ebe636b707df8f3c64d02808a954768538877a3c34b2d2b0a7d8d4a

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5545370.exe

          Filesize

          997KB

          MD5

          f1196dd4d04dd8bf0177909984332d1b

          SHA1

          43735101a7cb903d25f0267436c772222be31e97

          SHA256

          5d8f378f8d6563d62a1c573a0b810912bb0a50e1b4dd66f9d49632ebd9cd92f8

          SHA512

          60f0290dfdd4e091d35caa4f8c138963fd3595f562576195310d9ab09722ce2dad6cb9be24833809540454322823c9d996972890eeba3caaf51e7296836e17d3

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5545370.exe

          Filesize

          997KB

          MD5

          f1196dd4d04dd8bf0177909984332d1b

          SHA1

          43735101a7cb903d25f0267436c772222be31e97

          SHA256

          5d8f378f8d6563d62a1c573a0b810912bb0a50e1b4dd66f9d49632ebd9cd92f8

          SHA512

          60f0290dfdd4e091d35caa4f8c138963fd3595f562576195310d9ab09722ce2dad6cb9be24833809540454322823c9d996972890eeba3caaf51e7296836e17d3

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z0465709.exe

          Filesize

          815KB

          MD5

          35be1c3e3b79e97d222d74fb1d422d27

          SHA1

          1b038f10493871e42581e6dbf062d6f96a3109be

          SHA256

          733ca24f214d3f3de2d827e5689c6541a4e26fc4922227cd511716b797e0c04e

          SHA512

          eca84fde3ef1a700dc9b566c0981644076c22a444a07aeab5677360265604eef77b26d5091fdca1b2492e1eb7c151d5d0ae274a3a07f522398b1d347b39ce9c6

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z0465709.exe

          Filesize

          815KB

          MD5

          35be1c3e3b79e97d222d74fb1d422d27

          SHA1

          1b038f10493871e42581e6dbf062d6f96a3109be

          SHA256

          733ca24f214d3f3de2d827e5689c6541a4e26fc4922227cd511716b797e0c04e

          SHA512

          eca84fde3ef1a700dc9b566c0981644076c22a444a07aeab5677360265604eef77b26d5091fdca1b2492e1eb7c151d5d0ae274a3a07f522398b1d347b39ce9c6

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z3208663.exe

          Filesize

          632KB

          MD5

          80021f86af4992c6d26ca26a9b934f47

          SHA1

          b54537795310d05c75b65ad7d054861990b4361b

          SHA256

          e56b25ad53c5773b06bb749885980a0ec26683ed4d79f30af48160a08d64fa47

          SHA512

          9fe600f363d32917c89aec3d9e1f2c18ed1d5b4e4ffe07d233c035e0c3fa959b40fceadf5d18cf995d80c7ea282a1892931a7b30d7a53d02271874365c2ac94c

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z3208663.exe

          Filesize

          632KB

          MD5

          80021f86af4992c6d26ca26a9b934f47

          SHA1

          b54537795310d05c75b65ad7d054861990b4361b

          SHA256

          e56b25ad53c5773b06bb749885980a0ec26683ed4d79f30af48160a08d64fa47

          SHA512

          9fe600f363d32917c89aec3d9e1f2c18ed1d5b4e4ffe07d233c035e0c3fa959b40fceadf5d18cf995d80c7ea282a1892931a7b30d7a53d02271874365c2ac94c

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7793819.exe

          Filesize

          354KB

          MD5

          6060b73ba4f114676cc40671ba7dff84

          SHA1

          d96ddaa5d3cb58c6bc4b92f889b862dd093b216a

          SHA256

          fbdec6d6672b97d62ba6143c0fef2dafbfe2d623ca4d42e60b4232d38ce9e1a0

          SHA512

          d383db3b1455710bbc535d560f789d1ce060a218638e8ae1c0ff1dd5507c9a0342aae7e7366c32162de5d1e03e3e84991fc552a99dd939bb8cb9d69ebb3875d9

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7793819.exe

          Filesize

          354KB

          MD5

          6060b73ba4f114676cc40671ba7dff84

          SHA1

          d96ddaa5d3cb58c6bc4b92f889b862dd093b216a

          SHA256

          fbdec6d6672b97d62ba6143c0fef2dafbfe2d623ca4d42e60b4232d38ce9e1a0

          SHA512

          d383db3b1455710bbc535d560f789d1ce060a218638e8ae1c0ff1dd5507c9a0342aae7e7366c32162de5d1e03e3e84991fc552a99dd939bb8cb9d69ebb3875d9

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9566369.exe

          Filesize

          250KB

          MD5

          1d34300e44d9573490a35960a9555a72

          SHA1

          dab3a2f09f5d46ba07d7e03be154a7f18b4fac15

          SHA256

          2144105b41b4f34ea1433858d44b6dae1af833484ad0c71c52fb961a726e091e

          SHA512

          e3f524b390aaf92810fb60119ca76b9517c154f5730ed2b9b945bc5069efb3398057624d8ebe636b707df8f3c64d02808a954768538877a3c34b2d2b0a7d8d4a

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9566369.exe

          Filesize

          250KB

          MD5

          1d34300e44d9573490a35960a9555a72

          SHA1

          dab3a2f09f5d46ba07d7e03be154a7f18b4fac15

          SHA256

          2144105b41b4f34ea1433858d44b6dae1af833484ad0c71c52fb961a726e091e

          SHA512

          e3f524b390aaf92810fb60119ca76b9517c154f5730ed2b9b945bc5069efb3398057624d8ebe636b707df8f3c64d02808a954768538877a3c34b2d2b0a7d8d4a

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9566369.exe

          Filesize

          250KB

          MD5

          1d34300e44d9573490a35960a9555a72

          SHA1

          dab3a2f09f5d46ba07d7e03be154a7f18b4fac15

          SHA256

          2144105b41b4f34ea1433858d44b6dae1af833484ad0c71c52fb961a726e091e

          SHA512

          e3f524b390aaf92810fb60119ca76b9517c154f5730ed2b9b945bc5069efb3398057624d8ebe636b707df8f3c64d02808a954768538877a3c34b2d2b0a7d8d4a

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9566369.exe

          Filesize

          250KB

          MD5

          1d34300e44d9573490a35960a9555a72

          SHA1

          dab3a2f09f5d46ba07d7e03be154a7f18b4fac15

          SHA256

          2144105b41b4f34ea1433858d44b6dae1af833484ad0c71c52fb961a726e091e

          SHA512

          e3f524b390aaf92810fb60119ca76b9517c154f5730ed2b9b945bc5069efb3398057624d8ebe636b707df8f3c64d02808a954768538877a3c34b2d2b0a7d8d4a

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9566369.exe

          Filesize

          250KB

          MD5

          1d34300e44d9573490a35960a9555a72

          SHA1

          dab3a2f09f5d46ba07d7e03be154a7f18b4fac15

          SHA256

          2144105b41b4f34ea1433858d44b6dae1af833484ad0c71c52fb961a726e091e

          SHA512

          e3f524b390aaf92810fb60119ca76b9517c154f5730ed2b9b945bc5069efb3398057624d8ebe636b707df8f3c64d02808a954768538877a3c34b2d2b0a7d8d4a

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9566369.exe

          Filesize

          250KB

          MD5

          1d34300e44d9573490a35960a9555a72

          SHA1

          dab3a2f09f5d46ba07d7e03be154a7f18b4fac15

          SHA256

          2144105b41b4f34ea1433858d44b6dae1af833484ad0c71c52fb961a726e091e

          SHA512

          e3f524b390aaf92810fb60119ca76b9517c154f5730ed2b9b945bc5069efb3398057624d8ebe636b707df8f3c64d02808a954768538877a3c34b2d2b0a7d8d4a

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9566369.exe

          Filesize

          250KB

          MD5

          1d34300e44d9573490a35960a9555a72

          SHA1

          dab3a2f09f5d46ba07d7e03be154a7f18b4fac15

          SHA256

          2144105b41b4f34ea1433858d44b6dae1af833484ad0c71c52fb961a726e091e

          SHA512

          e3f524b390aaf92810fb60119ca76b9517c154f5730ed2b9b945bc5069efb3398057624d8ebe636b707df8f3c64d02808a954768538877a3c34b2d2b0a7d8d4a

        • memory/2464-62-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2464-60-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2464-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2464-58-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2464-56-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2464-55-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2464-54-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2464-53-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB