Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 14:15

General

  • Target

    147b3ac44d86890c7877c980a0db4fe6df1a098191f49e98f81e2d7c241dc07a.exe

  • Size

    1.1MB

  • MD5

    2d973a5dc14ffb7db6a5a284493ae208

  • SHA1

    4f50d7ff43ab24b3ab2aae9b720023a622dda069

  • SHA256

    147b3ac44d86890c7877c980a0db4fe6df1a098191f49e98f81e2d7c241dc07a

  • SHA512

    63fdd99cf41466ce672735a7e9c478517ef2dfd6d8d0410756aaf83ba37ddfaf9aeca701f0216dbbbed65b0605d2e34c146a11da2bc3fe955b9357bb20130aa3

  • SSDEEP

    24576:Fy2EZa15VZb9a0EcIrVJyaJjS2U7CO9dt9bjbRAs185:g2E815HBYraaJj4GO9dt9Tpy

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\147b3ac44d86890c7877c980a0db4fe6df1a098191f49e98f81e2d7c241dc07a.exe
    "C:\Users\Admin\AppData\Local\Temp\147b3ac44d86890c7877c980a0db4fe6df1a098191f49e98f81e2d7c241dc07a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3933847.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3933847.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1612
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7660176.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7660176.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3024
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1731495.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1731495.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2688
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8774893.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8774893.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2624
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6528161.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6528161.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2680
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2496
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2820
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 280
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2580

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3933847.exe

      Filesize

      982KB

      MD5

      ae7690868f940c5ab5eccc14bb588dee

      SHA1

      9c741379330ff2a5c85950359bb165c8217a1c2f

      SHA256

      bc6df00fc5fa36afa250397f38fc795b55f3f4758dfa616fecbc81001c63d56a

      SHA512

      56411c0a7a5c9c9683475aadd30397ecda0866f0dca8c9666faea2d31dcc443f205d96758ffbb295c7dd9294c666f0d56803ff6f449763ab296efce728c4ead6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3933847.exe

      Filesize

      982KB

      MD5

      ae7690868f940c5ab5eccc14bb588dee

      SHA1

      9c741379330ff2a5c85950359bb165c8217a1c2f

      SHA256

      bc6df00fc5fa36afa250397f38fc795b55f3f4758dfa616fecbc81001c63d56a

      SHA512

      56411c0a7a5c9c9683475aadd30397ecda0866f0dca8c9666faea2d31dcc443f205d96758ffbb295c7dd9294c666f0d56803ff6f449763ab296efce728c4ead6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7660176.exe

      Filesize

      802KB

      MD5

      789b4b7c1609e9a23a4ee140acd4741e

      SHA1

      c10b88a86171b511e6d5c813d0f00333da42e881

      SHA256

      80c3bb3a898c98dd51442e01ee766ac0f6ca53d737c57b37fc9e81171a42b9c5

      SHA512

      b450fef952b6dc3ea991d41fe15bf3bed71660ada7781b7a10b69f1b33cb45d63066ccc0cc91ef0167896856cafcb670502c21bb8dc211efe21328839ecb1647

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7660176.exe

      Filesize

      802KB

      MD5

      789b4b7c1609e9a23a4ee140acd4741e

      SHA1

      c10b88a86171b511e6d5c813d0f00333da42e881

      SHA256

      80c3bb3a898c98dd51442e01ee766ac0f6ca53d737c57b37fc9e81171a42b9c5

      SHA512

      b450fef952b6dc3ea991d41fe15bf3bed71660ada7781b7a10b69f1b33cb45d63066ccc0cc91ef0167896856cafcb670502c21bb8dc211efe21328839ecb1647

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1731495.exe

      Filesize

      619KB

      MD5

      bc7cd15b97ddc8211c4e1653a138c1b3

      SHA1

      6d804b3f45b989ba07b5c986ea00a1e8b84f7b9f

      SHA256

      cf07012d0c2278cea7ca60f4ca721bf183b4766490d95f61d977a066f017cbc9

      SHA512

      8b04448d63456824f6396d9c46e9485ac4bdf923ba0c234ec491572b60e8e253250d750c91cace66f202d49627102310e4840559d5ec5b74ad30aec879f70707

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1731495.exe

      Filesize

      619KB

      MD5

      bc7cd15b97ddc8211c4e1653a138c1b3

      SHA1

      6d804b3f45b989ba07b5c986ea00a1e8b84f7b9f

      SHA256

      cf07012d0c2278cea7ca60f4ca721bf183b4766490d95f61d977a066f017cbc9

      SHA512

      8b04448d63456824f6396d9c46e9485ac4bdf923ba0c234ec491572b60e8e253250d750c91cace66f202d49627102310e4840559d5ec5b74ad30aec879f70707

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8774893.exe

      Filesize

      347KB

      MD5

      861b98671324cfc81dd47d8478710c92

      SHA1

      f57425bfbafbf9e236e2e31153c4a54ff17a56ac

      SHA256

      bd2f83f46c5a4271ec805f09cfcebc88afb0bb961799d7040c61bc2028d1b8fa

      SHA512

      9e6e8c88995b65e84a430aa6b39d5907f1b105daaf6bdfb38e6862c66b1fd5f54b882343520d152f729121134c3ae76cfceb310a1ccf9666c75f6f2e220f4c45

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8774893.exe

      Filesize

      347KB

      MD5

      861b98671324cfc81dd47d8478710c92

      SHA1

      f57425bfbafbf9e236e2e31153c4a54ff17a56ac

      SHA256

      bd2f83f46c5a4271ec805f09cfcebc88afb0bb961799d7040c61bc2028d1b8fa

      SHA512

      9e6e8c88995b65e84a430aa6b39d5907f1b105daaf6bdfb38e6862c66b1fd5f54b882343520d152f729121134c3ae76cfceb310a1ccf9666c75f6f2e220f4c45

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6528161.exe

      Filesize

      235KB

      MD5

      2fde23daa297d3a71ba3f1881d87b64e

      SHA1

      5367640e368100197508d549e23c6f7554cd20e1

      SHA256

      1182678a53b2a6095f38f25dc981589c68232972b667bd0701ef0587f4c1a18a

      SHA512

      a6bde29f4b5c19b755df2de74863e30f8525a51fd5c24a65ee9cd0256d091a5bb521586b8132b5b967582a04fa3279f42eaebd888032694577382134eb2908ca

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6528161.exe

      Filesize

      235KB

      MD5

      2fde23daa297d3a71ba3f1881d87b64e

      SHA1

      5367640e368100197508d549e23c6f7554cd20e1

      SHA256

      1182678a53b2a6095f38f25dc981589c68232972b667bd0701ef0587f4c1a18a

      SHA512

      a6bde29f4b5c19b755df2de74863e30f8525a51fd5c24a65ee9cd0256d091a5bb521586b8132b5b967582a04fa3279f42eaebd888032694577382134eb2908ca

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6528161.exe

      Filesize

      235KB

      MD5

      2fde23daa297d3a71ba3f1881d87b64e

      SHA1

      5367640e368100197508d549e23c6f7554cd20e1

      SHA256

      1182678a53b2a6095f38f25dc981589c68232972b667bd0701ef0587f4c1a18a

      SHA512

      a6bde29f4b5c19b755df2de74863e30f8525a51fd5c24a65ee9cd0256d091a5bb521586b8132b5b967582a04fa3279f42eaebd888032694577382134eb2908ca

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3933847.exe

      Filesize

      982KB

      MD5

      ae7690868f940c5ab5eccc14bb588dee

      SHA1

      9c741379330ff2a5c85950359bb165c8217a1c2f

      SHA256

      bc6df00fc5fa36afa250397f38fc795b55f3f4758dfa616fecbc81001c63d56a

      SHA512

      56411c0a7a5c9c9683475aadd30397ecda0866f0dca8c9666faea2d31dcc443f205d96758ffbb295c7dd9294c666f0d56803ff6f449763ab296efce728c4ead6

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3933847.exe

      Filesize

      982KB

      MD5

      ae7690868f940c5ab5eccc14bb588dee

      SHA1

      9c741379330ff2a5c85950359bb165c8217a1c2f

      SHA256

      bc6df00fc5fa36afa250397f38fc795b55f3f4758dfa616fecbc81001c63d56a

      SHA512

      56411c0a7a5c9c9683475aadd30397ecda0866f0dca8c9666faea2d31dcc443f205d96758ffbb295c7dd9294c666f0d56803ff6f449763ab296efce728c4ead6

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7660176.exe

      Filesize

      802KB

      MD5

      789b4b7c1609e9a23a4ee140acd4741e

      SHA1

      c10b88a86171b511e6d5c813d0f00333da42e881

      SHA256

      80c3bb3a898c98dd51442e01ee766ac0f6ca53d737c57b37fc9e81171a42b9c5

      SHA512

      b450fef952b6dc3ea991d41fe15bf3bed71660ada7781b7a10b69f1b33cb45d63066ccc0cc91ef0167896856cafcb670502c21bb8dc211efe21328839ecb1647

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7660176.exe

      Filesize

      802KB

      MD5

      789b4b7c1609e9a23a4ee140acd4741e

      SHA1

      c10b88a86171b511e6d5c813d0f00333da42e881

      SHA256

      80c3bb3a898c98dd51442e01ee766ac0f6ca53d737c57b37fc9e81171a42b9c5

      SHA512

      b450fef952b6dc3ea991d41fe15bf3bed71660ada7781b7a10b69f1b33cb45d63066ccc0cc91ef0167896856cafcb670502c21bb8dc211efe21328839ecb1647

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1731495.exe

      Filesize

      619KB

      MD5

      bc7cd15b97ddc8211c4e1653a138c1b3

      SHA1

      6d804b3f45b989ba07b5c986ea00a1e8b84f7b9f

      SHA256

      cf07012d0c2278cea7ca60f4ca721bf183b4766490d95f61d977a066f017cbc9

      SHA512

      8b04448d63456824f6396d9c46e9485ac4bdf923ba0c234ec491572b60e8e253250d750c91cace66f202d49627102310e4840559d5ec5b74ad30aec879f70707

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1731495.exe

      Filesize

      619KB

      MD5

      bc7cd15b97ddc8211c4e1653a138c1b3

      SHA1

      6d804b3f45b989ba07b5c986ea00a1e8b84f7b9f

      SHA256

      cf07012d0c2278cea7ca60f4ca721bf183b4766490d95f61d977a066f017cbc9

      SHA512

      8b04448d63456824f6396d9c46e9485ac4bdf923ba0c234ec491572b60e8e253250d750c91cace66f202d49627102310e4840559d5ec5b74ad30aec879f70707

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8774893.exe

      Filesize

      347KB

      MD5

      861b98671324cfc81dd47d8478710c92

      SHA1

      f57425bfbafbf9e236e2e31153c4a54ff17a56ac

      SHA256

      bd2f83f46c5a4271ec805f09cfcebc88afb0bb961799d7040c61bc2028d1b8fa

      SHA512

      9e6e8c88995b65e84a430aa6b39d5907f1b105daaf6bdfb38e6862c66b1fd5f54b882343520d152f729121134c3ae76cfceb310a1ccf9666c75f6f2e220f4c45

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8774893.exe

      Filesize

      347KB

      MD5

      861b98671324cfc81dd47d8478710c92

      SHA1

      f57425bfbafbf9e236e2e31153c4a54ff17a56ac

      SHA256

      bd2f83f46c5a4271ec805f09cfcebc88afb0bb961799d7040c61bc2028d1b8fa

      SHA512

      9e6e8c88995b65e84a430aa6b39d5907f1b105daaf6bdfb38e6862c66b1fd5f54b882343520d152f729121134c3ae76cfceb310a1ccf9666c75f6f2e220f4c45

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6528161.exe

      Filesize

      235KB

      MD5

      2fde23daa297d3a71ba3f1881d87b64e

      SHA1

      5367640e368100197508d549e23c6f7554cd20e1

      SHA256

      1182678a53b2a6095f38f25dc981589c68232972b667bd0701ef0587f4c1a18a

      SHA512

      a6bde29f4b5c19b755df2de74863e30f8525a51fd5c24a65ee9cd0256d091a5bb521586b8132b5b967582a04fa3279f42eaebd888032694577382134eb2908ca

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6528161.exe

      Filesize

      235KB

      MD5

      2fde23daa297d3a71ba3f1881d87b64e

      SHA1

      5367640e368100197508d549e23c6f7554cd20e1

      SHA256

      1182678a53b2a6095f38f25dc981589c68232972b667bd0701ef0587f4c1a18a

      SHA512

      a6bde29f4b5c19b755df2de74863e30f8525a51fd5c24a65ee9cd0256d091a5bb521586b8132b5b967582a04fa3279f42eaebd888032694577382134eb2908ca

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6528161.exe

      Filesize

      235KB

      MD5

      2fde23daa297d3a71ba3f1881d87b64e

      SHA1

      5367640e368100197508d549e23c6f7554cd20e1

      SHA256

      1182678a53b2a6095f38f25dc981589c68232972b667bd0701ef0587f4c1a18a

      SHA512

      a6bde29f4b5c19b755df2de74863e30f8525a51fd5c24a65ee9cd0256d091a5bb521586b8132b5b967582a04fa3279f42eaebd888032694577382134eb2908ca

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6528161.exe

      Filesize

      235KB

      MD5

      2fde23daa297d3a71ba3f1881d87b64e

      SHA1

      5367640e368100197508d549e23c6f7554cd20e1

      SHA256

      1182678a53b2a6095f38f25dc981589c68232972b667bd0701ef0587f4c1a18a

      SHA512

      a6bde29f4b5c19b755df2de74863e30f8525a51fd5c24a65ee9cd0256d091a5bb521586b8132b5b967582a04fa3279f42eaebd888032694577382134eb2908ca

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6528161.exe

      Filesize

      235KB

      MD5

      2fde23daa297d3a71ba3f1881d87b64e

      SHA1

      5367640e368100197508d549e23c6f7554cd20e1

      SHA256

      1182678a53b2a6095f38f25dc981589c68232972b667bd0701ef0587f4c1a18a

      SHA512

      a6bde29f4b5c19b755df2de74863e30f8525a51fd5c24a65ee9cd0256d091a5bb521586b8132b5b967582a04fa3279f42eaebd888032694577382134eb2908ca

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6528161.exe

      Filesize

      235KB

      MD5

      2fde23daa297d3a71ba3f1881d87b64e

      SHA1

      5367640e368100197508d549e23c6f7554cd20e1

      SHA256

      1182678a53b2a6095f38f25dc981589c68232972b667bd0701ef0587f4c1a18a

      SHA512

      a6bde29f4b5c19b755df2de74863e30f8525a51fd5c24a65ee9cd0256d091a5bb521586b8132b5b967582a04fa3279f42eaebd888032694577382134eb2908ca

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6528161.exe

      Filesize

      235KB

      MD5

      2fde23daa297d3a71ba3f1881d87b64e

      SHA1

      5367640e368100197508d549e23c6f7554cd20e1

      SHA256

      1182678a53b2a6095f38f25dc981589c68232972b667bd0701ef0587f4c1a18a

      SHA512

      a6bde29f4b5c19b755df2de74863e30f8525a51fd5c24a65ee9cd0256d091a5bb521586b8132b5b967582a04fa3279f42eaebd888032694577382134eb2908ca

    • memory/2820-56-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2820-58-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2820-62-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2820-60-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2820-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2820-55-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2820-54-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2820-53-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB