Analysis

  • max time kernel
    122s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 14:16

General

  • Target

    744fdc798d950d8d4b890617c67c27a48b2fe5cb7cd61b8d09a683c53577f453.exe

  • Size

    1.3MB

  • MD5

    923dfe57fbdd399a2dca8efd588b4804

  • SHA1

    1dc2d17f48573d28904324fc221e1c82c6ae13d2

  • SHA256

    744fdc798d950d8d4b890617c67c27a48b2fe5cb7cd61b8d09a683c53577f453

  • SHA512

    9c4201d68c6676ddca5d375eea13fa337c82eb9c229a4cc46499ba170a3b23fa8f9c75661ec316576325d7f8efe21879357dfc94cb75f2e07aa13dd744c4ddf2

  • SSDEEP

    24576:aykCKpllsq0QZ7mcuF0C93MnBC9qu0Md3tjr99RpHU5edKtXUDFDu5LQkZa++P:hkCK/lsqDdFC3UKj0UJ9zFUTeDu5LQkz

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 17 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\744fdc798d950d8d4b890617c67c27a48b2fe5cb7cd61b8d09a683c53577f453.exe
    "C:\Users\Admin\AppData\Local\Temp\744fdc798d950d8d4b890617c67c27a48b2fe5cb7cd61b8d09a683c53577f453.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5039434.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5039434.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6035552.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6035552.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2968
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3384301.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3384301.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2748
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1705679.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1705679.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2568
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v9655371.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v9655371.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:2696
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a7827126.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a7827126.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2704
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2576
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 272
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5039434.exe

    Filesize

    1.2MB

    MD5

    4ce4cacf15ae258c734ed57d07fbe62a

    SHA1

    c117217ebfaddf59b89daa018bb3ec9e675fc303

    SHA256

    e1eef62c9c8c6fca83edb9439fb852b6b07c368bc28d0710a9a540084c599c83

    SHA512

    8864bfa1ae6ea18a577ac1266f458158d15c5d481f8ec7d25b1bde280f508549a5170403e6718ef2c9cea5cb92db43dc3024ddeb95afc012513332dd826ebd69

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5039434.exe

    Filesize

    1.2MB

    MD5

    4ce4cacf15ae258c734ed57d07fbe62a

    SHA1

    c117217ebfaddf59b89daa018bb3ec9e675fc303

    SHA256

    e1eef62c9c8c6fca83edb9439fb852b6b07c368bc28d0710a9a540084c599c83

    SHA512

    8864bfa1ae6ea18a577ac1266f458158d15c5d481f8ec7d25b1bde280f508549a5170403e6718ef2c9cea5cb92db43dc3024ddeb95afc012513332dd826ebd69

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6035552.exe

    Filesize

    941KB

    MD5

    2b88d24314b148930805f36174128fb4

    SHA1

    d4812d572f4323bd710fdfcac72bfe6256bc085e

    SHA256

    24adce888b55b7ac8f65892af26f367f642db4b20725d8a4597f08db1c74ad88

    SHA512

    5a3141b7f0fc68b978ca61b475fcf34151afd7cdf08d38dee5a5adaea44a114a3b56ee3b3f222cabd45f74ccf3263c508f1bf6046cda507eb7122a5fe64f30c8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6035552.exe

    Filesize

    941KB

    MD5

    2b88d24314b148930805f36174128fb4

    SHA1

    d4812d572f4323bd710fdfcac72bfe6256bc085e

    SHA256

    24adce888b55b7ac8f65892af26f367f642db4b20725d8a4597f08db1c74ad88

    SHA512

    5a3141b7f0fc68b978ca61b475fcf34151afd7cdf08d38dee5a5adaea44a114a3b56ee3b3f222cabd45f74ccf3263c508f1bf6046cda507eb7122a5fe64f30c8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3384301.exe

    Filesize

    784KB

    MD5

    ed6b949ebe6d61b35dbe5b435f092600

    SHA1

    af7ec8e48892318c6c2ffcc2e1f74f520e8560c8

    SHA256

    c7dca1aea4182f8937e262beca0b8a6f9c1755c26c868963c801e697f86974a1

    SHA512

    703f90aed73337f030af8e5e503739d4a1f2766553d2ed86f281c3ef7d8cecde0f929fc9352d0630f4271297d215331a31a9834060a8973ab1d35c6deb4da476

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3384301.exe

    Filesize

    784KB

    MD5

    ed6b949ebe6d61b35dbe5b435f092600

    SHA1

    af7ec8e48892318c6c2ffcc2e1f74f520e8560c8

    SHA256

    c7dca1aea4182f8937e262beca0b8a6f9c1755c26c868963c801e697f86974a1

    SHA512

    703f90aed73337f030af8e5e503739d4a1f2766553d2ed86f281c3ef7d8cecde0f929fc9352d0630f4271297d215331a31a9834060a8973ab1d35c6deb4da476

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1705679.exe

    Filesize

    618KB

    MD5

    c0f7f27d18ba9f87c10fc5c4ea5f9f47

    SHA1

    46948b7b4dd3b62360a029b37b1b2bccd61f4312

    SHA256

    367032d528c98749eeb1b0bf971edee25814de0f85dae196aebf2c4156de4538

    SHA512

    52026713ffcc510dfdcb6cb5f7e8e125adc2d4c4999d9fffea0f0e9f2a24f3fc360143a2991cc3d4cb3207f06c83c793f7f363179e6845811cea15762d028b61

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1705679.exe

    Filesize

    618KB

    MD5

    c0f7f27d18ba9f87c10fc5c4ea5f9f47

    SHA1

    46948b7b4dd3b62360a029b37b1b2bccd61f4312

    SHA256

    367032d528c98749eeb1b0bf971edee25814de0f85dae196aebf2c4156de4538

    SHA512

    52026713ffcc510dfdcb6cb5f7e8e125adc2d4c4999d9fffea0f0e9f2a24f3fc360143a2991cc3d4cb3207f06c83c793f7f363179e6845811cea15762d028b61

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v9655371.exe

    Filesize

    347KB

    MD5

    05d16552e37c455cdf587d8a2587da08

    SHA1

    442c2d85b11db4f10147ffe7166e4a7e7582b2ca

    SHA256

    820e0ea831012d145c2f73176531306c70b58713318e89ab3c3678f811ffe2fa

    SHA512

    8c6b58e681ac2e9ff0f3794f491dac7d35a542d6da5c9289f6c0f142f62111c60c1c181241076c8fd875f91b50e3055cc175e4d4974aceeda676d61b0329954c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v9655371.exe

    Filesize

    347KB

    MD5

    05d16552e37c455cdf587d8a2587da08

    SHA1

    442c2d85b11db4f10147ffe7166e4a7e7582b2ca

    SHA256

    820e0ea831012d145c2f73176531306c70b58713318e89ab3c3678f811ffe2fa

    SHA512

    8c6b58e681ac2e9ff0f3794f491dac7d35a542d6da5c9289f6c0f142f62111c60c1c181241076c8fd875f91b50e3055cc175e4d4974aceeda676d61b0329954c

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a7827126.exe

    Filesize

    235KB

    MD5

    d17580aaa4c373d6373981bc1a18956e

    SHA1

    75b5a52116e810d8aa7d92caad4de8aba4a188a8

    SHA256

    3ab56e67180cc47e7465a2b43ccdf82fd167ec1d9e9b8d08135e4fa14bd84eeb

    SHA512

    64fd894b3308d32895b8aef531265fe4ea52ef066891739d13c64c37a8247c4f613c632e39d403190e361968758886742b4a79e5f50c9955103392f3cfa945ba

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a7827126.exe

    Filesize

    235KB

    MD5

    d17580aaa4c373d6373981bc1a18956e

    SHA1

    75b5a52116e810d8aa7d92caad4de8aba4a188a8

    SHA256

    3ab56e67180cc47e7465a2b43ccdf82fd167ec1d9e9b8d08135e4fa14bd84eeb

    SHA512

    64fd894b3308d32895b8aef531265fe4ea52ef066891739d13c64c37a8247c4f613c632e39d403190e361968758886742b4a79e5f50c9955103392f3cfa945ba

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a7827126.exe

    Filesize

    235KB

    MD5

    d17580aaa4c373d6373981bc1a18956e

    SHA1

    75b5a52116e810d8aa7d92caad4de8aba4a188a8

    SHA256

    3ab56e67180cc47e7465a2b43ccdf82fd167ec1d9e9b8d08135e4fa14bd84eeb

    SHA512

    64fd894b3308d32895b8aef531265fe4ea52ef066891739d13c64c37a8247c4f613c632e39d403190e361968758886742b4a79e5f50c9955103392f3cfa945ba

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v5039434.exe

    Filesize

    1.2MB

    MD5

    4ce4cacf15ae258c734ed57d07fbe62a

    SHA1

    c117217ebfaddf59b89daa018bb3ec9e675fc303

    SHA256

    e1eef62c9c8c6fca83edb9439fb852b6b07c368bc28d0710a9a540084c599c83

    SHA512

    8864bfa1ae6ea18a577ac1266f458158d15c5d481f8ec7d25b1bde280f508549a5170403e6718ef2c9cea5cb92db43dc3024ddeb95afc012513332dd826ebd69

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v5039434.exe

    Filesize

    1.2MB

    MD5

    4ce4cacf15ae258c734ed57d07fbe62a

    SHA1

    c117217ebfaddf59b89daa018bb3ec9e675fc303

    SHA256

    e1eef62c9c8c6fca83edb9439fb852b6b07c368bc28d0710a9a540084c599c83

    SHA512

    8864bfa1ae6ea18a577ac1266f458158d15c5d481f8ec7d25b1bde280f508549a5170403e6718ef2c9cea5cb92db43dc3024ddeb95afc012513332dd826ebd69

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6035552.exe

    Filesize

    941KB

    MD5

    2b88d24314b148930805f36174128fb4

    SHA1

    d4812d572f4323bd710fdfcac72bfe6256bc085e

    SHA256

    24adce888b55b7ac8f65892af26f367f642db4b20725d8a4597f08db1c74ad88

    SHA512

    5a3141b7f0fc68b978ca61b475fcf34151afd7cdf08d38dee5a5adaea44a114a3b56ee3b3f222cabd45f74ccf3263c508f1bf6046cda507eb7122a5fe64f30c8

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6035552.exe

    Filesize

    941KB

    MD5

    2b88d24314b148930805f36174128fb4

    SHA1

    d4812d572f4323bd710fdfcac72bfe6256bc085e

    SHA256

    24adce888b55b7ac8f65892af26f367f642db4b20725d8a4597f08db1c74ad88

    SHA512

    5a3141b7f0fc68b978ca61b475fcf34151afd7cdf08d38dee5a5adaea44a114a3b56ee3b3f222cabd45f74ccf3263c508f1bf6046cda507eb7122a5fe64f30c8

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v3384301.exe

    Filesize

    784KB

    MD5

    ed6b949ebe6d61b35dbe5b435f092600

    SHA1

    af7ec8e48892318c6c2ffcc2e1f74f520e8560c8

    SHA256

    c7dca1aea4182f8937e262beca0b8a6f9c1755c26c868963c801e697f86974a1

    SHA512

    703f90aed73337f030af8e5e503739d4a1f2766553d2ed86f281c3ef7d8cecde0f929fc9352d0630f4271297d215331a31a9834060a8973ab1d35c6deb4da476

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v3384301.exe

    Filesize

    784KB

    MD5

    ed6b949ebe6d61b35dbe5b435f092600

    SHA1

    af7ec8e48892318c6c2ffcc2e1f74f520e8560c8

    SHA256

    c7dca1aea4182f8937e262beca0b8a6f9c1755c26c868963c801e697f86974a1

    SHA512

    703f90aed73337f030af8e5e503739d4a1f2766553d2ed86f281c3ef7d8cecde0f929fc9352d0630f4271297d215331a31a9834060a8973ab1d35c6deb4da476

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v1705679.exe

    Filesize

    618KB

    MD5

    c0f7f27d18ba9f87c10fc5c4ea5f9f47

    SHA1

    46948b7b4dd3b62360a029b37b1b2bccd61f4312

    SHA256

    367032d528c98749eeb1b0bf971edee25814de0f85dae196aebf2c4156de4538

    SHA512

    52026713ffcc510dfdcb6cb5f7e8e125adc2d4c4999d9fffea0f0e9f2a24f3fc360143a2991cc3d4cb3207f06c83c793f7f363179e6845811cea15762d028b61

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v1705679.exe

    Filesize

    618KB

    MD5

    c0f7f27d18ba9f87c10fc5c4ea5f9f47

    SHA1

    46948b7b4dd3b62360a029b37b1b2bccd61f4312

    SHA256

    367032d528c98749eeb1b0bf971edee25814de0f85dae196aebf2c4156de4538

    SHA512

    52026713ffcc510dfdcb6cb5f7e8e125adc2d4c4999d9fffea0f0e9f2a24f3fc360143a2991cc3d4cb3207f06c83c793f7f363179e6845811cea15762d028b61

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v9655371.exe

    Filesize

    347KB

    MD5

    05d16552e37c455cdf587d8a2587da08

    SHA1

    442c2d85b11db4f10147ffe7166e4a7e7582b2ca

    SHA256

    820e0ea831012d145c2f73176531306c70b58713318e89ab3c3678f811ffe2fa

    SHA512

    8c6b58e681ac2e9ff0f3794f491dac7d35a542d6da5c9289f6c0f142f62111c60c1c181241076c8fd875f91b50e3055cc175e4d4974aceeda676d61b0329954c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v9655371.exe

    Filesize

    347KB

    MD5

    05d16552e37c455cdf587d8a2587da08

    SHA1

    442c2d85b11db4f10147ffe7166e4a7e7582b2ca

    SHA256

    820e0ea831012d145c2f73176531306c70b58713318e89ab3c3678f811ffe2fa

    SHA512

    8c6b58e681ac2e9ff0f3794f491dac7d35a542d6da5c9289f6c0f142f62111c60c1c181241076c8fd875f91b50e3055cc175e4d4974aceeda676d61b0329954c

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a7827126.exe

    Filesize

    235KB

    MD5

    d17580aaa4c373d6373981bc1a18956e

    SHA1

    75b5a52116e810d8aa7d92caad4de8aba4a188a8

    SHA256

    3ab56e67180cc47e7465a2b43ccdf82fd167ec1d9e9b8d08135e4fa14bd84eeb

    SHA512

    64fd894b3308d32895b8aef531265fe4ea52ef066891739d13c64c37a8247c4f613c632e39d403190e361968758886742b4a79e5f50c9955103392f3cfa945ba

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a7827126.exe

    Filesize

    235KB

    MD5

    d17580aaa4c373d6373981bc1a18956e

    SHA1

    75b5a52116e810d8aa7d92caad4de8aba4a188a8

    SHA256

    3ab56e67180cc47e7465a2b43ccdf82fd167ec1d9e9b8d08135e4fa14bd84eeb

    SHA512

    64fd894b3308d32895b8aef531265fe4ea52ef066891739d13c64c37a8247c4f613c632e39d403190e361968758886742b4a79e5f50c9955103392f3cfa945ba

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a7827126.exe

    Filesize

    235KB

    MD5

    d17580aaa4c373d6373981bc1a18956e

    SHA1

    75b5a52116e810d8aa7d92caad4de8aba4a188a8

    SHA256

    3ab56e67180cc47e7465a2b43ccdf82fd167ec1d9e9b8d08135e4fa14bd84eeb

    SHA512

    64fd894b3308d32895b8aef531265fe4ea52ef066891739d13c64c37a8247c4f613c632e39d403190e361968758886742b4a79e5f50c9955103392f3cfa945ba

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a7827126.exe

    Filesize

    235KB

    MD5

    d17580aaa4c373d6373981bc1a18956e

    SHA1

    75b5a52116e810d8aa7d92caad4de8aba4a188a8

    SHA256

    3ab56e67180cc47e7465a2b43ccdf82fd167ec1d9e9b8d08135e4fa14bd84eeb

    SHA512

    64fd894b3308d32895b8aef531265fe4ea52ef066891739d13c64c37a8247c4f613c632e39d403190e361968758886742b4a79e5f50c9955103392f3cfa945ba

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a7827126.exe

    Filesize

    235KB

    MD5

    d17580aaa4c373d6373981bc1a18956e

    SHA1

    75b5a52116e810d8aa7d92caad4de8aba4a188a8

    SHA256

    3ab56e67180cc47e7465a2b43ccdf82fd167ec1d9e9b8d08135e4fa14bd84eeb

    SHA512

    64fd894b3308d32895b8aef531265fe4ea52ef066891739d13c64c37a8247c4f613c632e39d403190e361968758886742b4a79e5f50c9955103392f3cfa945ba

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a7827126.exe

    Filesize

    235KB

    MD5

    d17580aaa4c373d6373981bc1a18956e

    SHA1

    75b5a52116e810d8aa7d92caad4de8aba4a188a8

    SHA256

    3ab56e67180cc47e7465a2b43ccdf82fd167ec1d9e9b8d08135e4fa14bd84eeb

    SHA512

    64fd894b3308d32895b8aef531265fe4ea52ef066891739d13c64c37a8247c4f613c632e39d403190e361968758886742b4a79e5f50c9955103392f3cfa945ba

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a7827126.exe

    Filesize

    235KB

    MD5

    d17580aaa4c373d6373981bc1a18956e

    SHA1

    75b5a52116e810d8aa7d92caad4de8aba4a188a8

    SHA256

    3ab56e67180cc47e7465a2b43ccdf82fd167ec1d9e9b8d08135e4fa14bd84eeb

    SHA512

    64fd894b3308d32895b8aef531265fe4ea52ef066891739d13c64c37a8247c4f613c632e39d403190e361968758886742b4a79e5f50c9955103392f3cfa945ba

  • memory/2576-63-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2576-64-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2576-65-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2576-66-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2576-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2576-68-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2576-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2576-72-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB