Analysis

  • max time kernel
    118s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 14:17

General

  • Target

    1d28c2908c806782604e6d6eeb2bd3d9cc0b066586ae93dea32880b55536f989.exe

  • Size

    1.1MB

  • MD5

    643416cd85e862a5a7e8e741af832a24

  • SHA1

    c448efce986fb1e6b059211a55b1866c012761ec

  • SHA256

    1d28c2908c806782604e6d6eeb2bd3d9cc0b066586ae93dea32880b55536f989

  • SHA512

    a7f4d411844800224f8928195eaa2b5f1bd0e73584410f161a91d3c0068556646011fb252a58dbfdd8170680efcb3b0b2e639922b1b46db9a77fdfef5eb1075a

  • SSDEEP

    24576:tyrAm3ygMq1dSRzHuWOLuk97Gy2uwPHCCi3crLR:IrqgMq1dS1HCLboAwPHdi3

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d28c2908c806782604e6d6eeb2bd3d9cc0b066586ae93dea32880b55536f989.exe
    "C:\Users\Admin\AppData\Local\Temp\1d28c2908c806782604e6d6eeb2bd3d9cc0b066586ae93dea32880b55536f989.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5053410.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5053410.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1234527.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1234527.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9982021.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9982021.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2828
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0193229.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0193229.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2812
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9866589.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9866589.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2544
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2560
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5053410.exe

    Filesize

    985KB

    MD5

    c5f2f84e7436a8c4f9c6865fc988b42b

    SHA1

    7027fcbbf8716f1b14155e5d278a34d530a0b5cc

    SHA256

    f6251705c559d8bd0012c1257e7a7c87a33d53eb6bcbca57a361d29433faf312

    SHA512

    1972fa3a50f5064fb399e44418cc7d45f0f649c343e136ccc391cb828119d9cd6e67cf93e3800aaa2bf970cb138ee6733b3f407cacb6b853cfca30cc9d668c16

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5053410.exe

    Filesize

    985KB

    MD5

    c5f2f84e7436a8c4f9c6865fc988b42b

    SHA1

    7027fcbbf8716f1b14155e5d278a34d530a0b5cc

    SHA256

    f6251705c559d8bd0012c1257e7a7c87a33d53eb6bcbca57a361d29433faf312

    SHA512

    1972fa3a50f5064fb399e44418cc7d45f0f649c343e136ccc391cb828119d9cd6e67cf93e3800aaa2bf970cb138ee6733b3f407cacb6b853cfca30cc9d668c16

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1234527.exe

    Filesize

    802KB

    MD5

    cbb4ee2c4d91505e7e61f882789d6c14

    SHA1

    2372ea42de589b158239d97387146a3b7612ee7c

    SHA256

    d62d2cc9c3e6e2b8f4075435c335d5c00bc26078cd491edf2670776aa4638a8b

    SHA512

    f371550c42afe1d375bc23d70deb6e97c9cc474c2c80e905e68d13efe261ba94f73585356bd5e588de262ffca2432221a8e4871373fc09f4fd64552b2bbecdc4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1234527.exe

    Filesize

    802KB

    MD5

    cbb4ee2c4d91505e7e61f882789d6c14

    SHA1

    2372ea42de589b158239d97387146a3b7612ee7c

    SHA256

    d62d2cc9c3e6e2b8f4075435c335d5c00bc26078cd491edf2670776aa4638a8b

    SHA512

    f371550c42afe1d375bc23d70deb6e97c9cc474c2c80e905e68d13efe261ba94f73585356bd5e588de262ffca2432221a8e4871373fc09f4fd64552b2bbecdc4

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9982021.exe

    Filesize

    618KB

    MD5

    084c6c5231d94bd5d14a920792fd61e0

    SHA1

    569899444a713ee53b047f475dd75a1fcef6d3fc

    SHA256

    8d3f3a1c4e95fbf8bfef3d3a3ab7699f6f49d195dddb3beddfde6385c538afb3

    SHA512

    6d9cd3f2dce5069c21b3eb77a0a920a189070d00bc1ee2967ff3ff2d03b006a67e302f02390003e6786c4c5ffdfdd99146157ba95efca7b862f83ca55bb5a9a3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9982021.exe

    Filesize

    618KB

    MD5

    084c6c5231d94bd5d14a920792fd61e0

    SHA1

    569899444a713ee53b047f475dd75a1fcef6d3fc

    SHA256

    8d3f3a1c4e95fbf8bfef3d3a3ab7699f6f49d195dddb3beddfde6385c538afb3

    SHA512

    6d9cd3f2dce5069c21b3eb77a0a920a189070d00bc1ee2967ff3ff2d03b006a67e302f02390003e6786c4c5ffdfdd99146157ba95efca7b862f83ca55bb5a9a3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0193229.exe

    Filesize

    347KB

    MD5

    2c617a1564ba1841c62b6b34d2dae2e1

    SHA1

    dfcaaa9a1ab54c4f5d74c7f9c767cf059f0a0c78

    SHA256

    bdfdb96b8317638b81e509364476b592ff856d97dc43ea3eefabd62cfc7fe857

    SHA512

    757c0945f2d740b10d8f0faf9ddbe6728768c7bc2f97dc1354a1460bf60301a73d19c55aba38ec168f93affa36c047ada2f1a5e4b18fe3b62bbc1ea217cd843c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0193229.exe

    Filesize

    347KB

    MD5

    2c617a1564ba1841c62b6b34d2dae2e1

    SHA1

    dfcaaa9a1ab54c4f5d74c7f9c767cf059f0a0c78

    SHA256

    bdfdb96b8317638b81e509364476b592ff856d97dc43ea3eefabd62cfc7fe857

    SHA512

    757c0945f2d740b10d8f0faf9ddbe6728768c7bc2f97dc1354a1460bf60301a73d19c55aba38ec168f93affa36c047ada2f1a5e4b18fe3b62bbc1ea217cd843c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9866589.exe

    Filesize

    235KB

    MD5

    34138b9172bdb6bc7f881a8692cae931

    SHA1

    24925fe9a3b2f3fb1004da3f3124e481b06f7570

    SHA256

    6396652f5cbf7557b6e99d492f81204a8910dd33589f6538315540ce1e8980d8

    SHA512

    9e3e0b81d17065dd3968351bd25f866b87fe1b35d7484f00d30536fe60531950c00bc905e7b25eda42085576759b438b42b3f8392321471c04b7a73719ffe56e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9866589.exe

    Filesize

    235KB

    MD5

    34138b9172bdb6bc7f881a8692cae931

    SHA1

    24925fe9a3b2f3fb1004da3f3124e481b06f7570

    SHA256

    6396652f5cbf7557b6e99d492f81204a8910dd33589f6538315540ce1e8980d8

    SHA512

    9e3e0b81d17065dd3968351bd25f866b87fe1b35d7484f00d30536fe60531950c00bc905e7b25eda42085576759b438b42b3f8392321471c04b7a73719ffe56e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9866589.exe

    Filesize

    235KB

    MD5

    34138b9172bdb6bc7f881a8692cae931

    SHA1

    24925fe9a3b2f3fb1004da3f3124e481b06f7570

    SHA256

    6396652f5cbf7557b6e99d492f81204a8910dd33589f6538315540ce1e8980d8

    SHA512

    9e3e0b81d17065dd3968351bd25f866b87fe1b35d7484f00d30536fe60531950c00bc905e7b25eda42085576759b438b42b3f8392321471c04b7a73719ffe56e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5053410.exe

    Filesize

    985KB

    MD5

    c5f2f84e7436a8c4f9c6865fc988b42b

    SHA1

    7027fcbbf8716f1b14155e5d278a34d530a0b5cc

    SHA256

    f6251705c559d8bd0012c1257e7a7c87a33d53eb6bcbca57a361d29433faf312

    SHA512

    1972fa3a50f5064fb399e44418cc7d45f0f649c343e136ccc391cb828119d9cd6e67cf93e3800aaa2bf970cb138ee6733b3f407cacb6b853cfca30cc9d668c16

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5053410.exe

    Filesize

    985KB

    MD5

    c5f2f84e7436a8c4f9c6865fc988b42b

    SHA1

    7027fcbbf8716f1b14155e5d278a34d530a0b5cc

    SHA256

    f6251705c559d8bd0012c1257e7a7c87a33d53eb6bcbca57a361d29433faf312

    SHA512

    1972fa3a50f5064fb399e44418cc7d45f0f649c343e136ccc391cb828119d9cd6e67cf93e3800aaa2bf970cb138ee6733b3f407cacb6b853cfca30cc9d668c16

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1234527.exe

    Filesize

    802KB

    MD5

    cbb4ee2c4d91505e7e61f882789d6c14

    SHA1

    2372ea42de589b158239d97387146a3b7612ee7c

    SHA256

    d62d2cc9c3e6e2b8f4075435c335d5c00bc26078cd491edf2670776aa4638a8b

    SHA512

    f371550c42afe1d375bc23d70deb6e97c9cc474c2c80e905e68d13efe261ba94f73585356bd5e588de262ffca2432221a8e4871373fc09f4fd64552b2bbecdc4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1234527.exe

    Filesize

    802KB

    MD5

    cbb4ee2c4d91505e7e61f882789d6c14

    SHA1

    2372ea42de589b158239d97387146a3b7612ee7c

    SHA256

    d62d2cc9c3e6e2b8f4075435c335d5c00bc26078cd491edf2670776aa4638a8b

    SHA512

    f371550c42afe1d375bc23d70deb6e97c9cc474c2c80e905e68d13efe261ba94f73585356bd5e588de262ffca2432221a8e4871373fc09f4fd64552b2bbecdc4

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9982021.exe

    Filesize

    618KB

    MD5

    084c6c5231d94bd5d14a920792fd61e0

    SHA1

    569899444a713ee53b047f475dd75a1fcef6d3fc

    SHA256

    8d3f3a1c4e95fbf8bfef3d3a3ab7699f6f49d195dddb3beddfde6385c538afb3

    SHA512

    6d9cd3f2dce5069c21b3eb77a0a920a189070d00bc1ee2967ff3ff2d03b006a67e302f02390003e6786c4c5ffdfdd99146157ba95efca7b862f83ca55bb5a9a3

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9982021.exe

    Filesize

    618KB

    MD5

    084c6c5231d94bd5d14a920792fd61e0

    SHA1

    569899444a713ee53b047f475dd75a1fcef6d3fc

    SHA256

    8d3f3a1c4e95fbf8bfef3d3a3ab7699f6f49d195dddb3beddfde6385c538afb3

    SHA512

    6d9cd3f2dce5069c21b3eb77a0a920a189070d00bc1ee2967ff3ff2d03b006a67e302f02390003e6786c4c5ffdfdd99146157ba95efca7b862f83ca55bb5a9a3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z0193229.exe

    Filesize

    347KB

    MD5

    2c617a1564ba1841c62b6b34d2dae2e1

    SHA1

    dfcaaa9a1ab54c4f5d74c7f9c767cf059f0a0c78

    SHA256

    bdfdb96b8317638b81e509364476b592ff856d97dc43ea3eefabd62cfc7fe857

    SHA512

    757c0945f2d740b10d8f0faf9ddbe6728768c7bc2f97dc1354a1460bf60301a73d19c55aba38ec168f93affa36c047ada2f1a5e4b18fe3b62bbc1ea217cd843c

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z0193229.exe

    Filesize

    347KB

    MD5

    2c617a1564ba1841c62b6b34d2dae2e1

    SHA1

    dfcaaa9a1ab54c4f5d74c7f9c767cf059f0a0c78

    SHA256

    bdfdb96b8317638b81e509364476b592ff856d97dc43ea3eefabd62cfc7fe857

    SHA512

    757c0945f2d740b10d8f0faf9ddbe6728768c7bc2f97dc1354a1460bf60301a73d19c55aba38ec168f93affa36c047ada2f1a5e4b18fe3b62bbc1ea217cd843c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9866589.exe

    Filesize

    235KB

    MD5

    34138b9172bdb6bc7f881a8692cae931

    SHA1

    24925fe9a3b2f3fb1004da3f3124e481b06f7570

    SHA256

    6396652f5cbf7557b6e99d492f81204a8910dd33589f6538315540ce1e8980d8

    SHA512

    9e3e0b81d17065dd3968351bd25f866b87fe1b35d7484f00d30536fe60531950c00bc905e7b25eda42085576759b438b42b3f8392321471c04b7a73719ffe56e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9866589.exe

    Filesize

    235KB

    MD5

    34138b9172bdb6bc7f881a8692cae931

    SHA1

    24925fe9a3b2f3fb1004da3f3124e481b06f7570

    SHA256

    6396652f5cbf7557b6e99d492f81204a8910dd33589f6538315540ce1e8980d8

    SHA512

    9e3e0b81d17065dd3968351bd25f866b87fe1b35d7484f00d30536fe60531950c00bc905e7b25eda42085576759b438b42b3f8392321471c04b7a73719ffe56e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9866589.exe

    Filesize

    235KB

    MD5

    34138b9172bdb6bc7f881a8692cae931

    SHA1

    24925fe9a3b2f3fb1004da3f3124e481b06f7570

    SHA256

    6396652f5cbf7557b6e99d492f81204a8910dd33589f6538315540ce1e8980d8

    SHA512

    9e3e0b81d17065dd3968351bd25f866b87fe1b35d7484f00d30536fe60531950c00bc905e7b25eda42085576759b438b42b3f8392321471c04b7a73719ffe56e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9866589.exe

    Filesize

    235KB

    MD5

    34138b9172bdb6bc7f881a8692cae931

    SHA1

    24925fe9a3b2f3fb1004da3f3124e481b06f7570

    SHA256

    6396652f5cbf7557b6e99d492f81204a8910dd33589f6538315540ce1e8980d8

    SHA512

    9e3e0b81d17065dd3968351bd25f866b87fe1b35d7484f00d30536fe60531950c00bc905e7b25eda42085576759b438b42b3f8392321471c04b7a73719ffe56e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9866589.exe

    Filesize

    235KB

    MD5

    34138b9172bdb6bc7f881a8692cae931

    SHA1

    24925fe9a3b2f3fb1004da3f3124e481b06f7570

    SHA256

    6396652f5cbf7557b6e99d492f81204a8910dd33589f6538315540ce1e8980d8

    SHA512

    9e3e0b81d17065dd3968351bd25f866b87fe1b35d7484f00d30536fe60531950c00bc905e7b25eda42085576759b438b42b3f8392321471c04b7a73719ffe56e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9866589.exe

    Filesize

    235KB

    MD5

    34138b9172bdb6bc7f881a8692cae931

    SHA1

    24925fe9a3b2f3fb1004da3f3124e481b06f7570

    SHA256

    6396652f5cbf7557b6e99d492f81204a8910dd33589f6538315540ce1e8980d8

    SHA512

    9e3e0b81d17065dd3968351bd25f866b87fe1b35d7484f00d30536fe60531950c00bc905e7b25eda42085576759b438b42b3f8392321471c04b7a73719ffe56e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9866589.exe

    Filesize

    235KB

    MD5

    34138b9172bdb6bc7f881a8692cae931

    SHA1

    24925fe9a3b2f3fb1004da3f3124e481b06f7570

    SHA256

    6396652f5cbf7557b6e99d492f81204a8910dd33589f6538315540ce1e8980d8

    SHA512

    9e3e0b81d17065dd3968351bd25f866b87fe1b35d7484f00d30536fe60531950c00bc905e7b25eda42085576759b438b42b3f8392321471c04b7a73719ffe56e

  • memory/2560-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2560-61-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2560-64-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2560-66-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2560-57-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2560-59-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2560-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2560-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB