Analysis

  • max time kernel
    118s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 14:17

General

  • Target

    f36a6110d9d954ecfdd82a7652265ba5f202ad732e1bddf315a41193487fcb27.exe

  • Size

    1.1MB

  • MD5

    a2865d771c5caf84f9f5b59a15935ea4

  • SHA1

    c584d8e575d42b57a1f3a2ed7871d4bd5ca30610

  • SHA256

    f36a6110d9d954ecfdd82a7652265ba5f202ad732e1bddf315a41193487fcb27

  • SHA512

    ebfd8ca97038333099f3ae00e38b5af4a06bbaaa39324c303901a831254c6974ba5f1071095a2978cfb2097b436ba71e8def861e055202d3ea8d5c78dfe0071a

  • SSDEEP

    24576:DyoDRkY1x+z6K1rv15kU1Hh2AmEcg7w6ENUQrX82Uzq4ZJ0j:WoDBmLJPk6QAmEn7wjnT8xzt/0

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f36a6110d9d954ecfdd82a7652265ba5f202ad732e1bddf315a41193487fcb27.exe
    "C:\Users\Admin\AppData\Local\Temp\f36a6110d9d954ecfdd82a7652265ba5f202ad732e1bddf315a41193487fcb27.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3086795.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3086795.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5239139.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5239139.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4180472.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4180472.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2476
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9946242.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9946242.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2608
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1270337.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1270337.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2472
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2484
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3086795.exe

    Filesize

    990KB

    MD5

    dfbd3a99f80609d15eb5d84613e41d18

    SHA1

    f54d5c3029db1e347efe2ff7e2b85481cf7a62bc

    SHA256

    08dab85e7f4c3c65319847301db6690f72bdab7eb9583055243552bc56549757

    SHA512

    bfd4974bfab694b5effb14e6db6a01a580ac1f0d0d9073a25be14c7e98265abd38a96ee69855a9288c25bb3c68d50b8be73a4b92836401e3a2c23b5cad93dff7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3086795.exe

    Filesize

    990KB

    MD5

    dfbd3a99f80609d15eb5d84613e41d18

    SHA1

    f54d5c3029db1e347efe2ff7e2b85481cf7a62bc

    SHA256

    08dab85e7f4c3c65319847301db6690f72bdab7eb9583055243552bc56549757

    SHA512

    bfd4974bfab694b5effb14e6db6a01a580ac1f0d0d9073a25be14c7e98265abd38a96ee69855a9288c25bb3c68d50b8be73a4b92836401e3a2c23b5cad93dff7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5239139.exe

    Filesize

    807KB

    MD5

    7efc0f5006e4cab5ddd982540087664a

    SHA1

    3d304fa8dd3d79215f972feea9f6d04211e72f3f

    SHA256

    305a13f32ffbcd432bcefc231965034e58cdfb51d8cff3a25f68e993b311f918

    SHA512

    27cdfa871b86c360b92617674a4a64360b35578b8bc4e40d1b8d70b6e752817a086623cc453b902934065267ed7ef0a0497990febc4fe1759c2a66583e35ea07

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5239139.exe

    Filesize

    807KB

    MD5

    7efc0f5006e4cab5ddd982540087664a

    SHA1

    3d304fa8dd3d79215f972feea9f6d04211e72f3f

    SHA256

    305a13f32ffbcd432bcefc231965034e58cdfb51d8cff3a25f68e993b311f918

    SHA512

    27cdfa871b86c360b92617674a4a64360b35578b8bc4e40d1b8d70b6e752817a086623cc453b902934065267ed7ef0a0497990febc4fe1759c2a66583e35ea07

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4180472.exe

    Filesize

    625KB

    MD5

    2cf19834ad100067b4a8ff6e97df4c95

    SHA1

    deb244a586a497e1af2c7edfabea20e831819975

    SHA256

    2aef4a3f6aeb38200bbe032429a1dee8752b00a8eb033abf2d611ff7a3603dad

    SHA512

    f14714ad02a4f486c7b45c4510bb34d73294c9cef385fea3cecd89354bfcf22763aa711eae422cb5eb29774094360b9cda25dcc7f5acb54a1f8b495172ba62a2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4180472.exe

    Filesize

    625KB

    MD5

    2cf19834ad100067b4a8ff6e97df4c95

    SHA1

    deb244a586a497e1af2c7edfabea20e831819975

    SHA256

    2aef4a3f6aeb38200bbe032429a1dee8752b00a8eb033abf2d611ff7a3603dad

    SHA512

    f14714ad02a4f486c7b45c4510bb34d73294c9cef385fea3cecd89354bfcf22763aa711eae422cb5eb29774094360b9cda25dcc7f5acb54a1f8b495172ba62a2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9946242.exe

    Filesize

    353KB

    MD5

    5731b72a3aad7d5657952261d394937e

    SHA1

    0ce6739b42306b2d854e296bdad302393eecb292

    SHA256

    acbe681ab073ccc5bb79c29176e27adbd488d219377592e6895fb9407ad1caa3

    SHA512

    9c91a5f32bbe49ad8a2b427db4e70be5fc0ca22721e90616b8ee2667092e02153ef37b1dd93e88cb36a6aa4e2685744ec7f7d3f63a9acaa071e1f828ef829869

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9946242.exe

    Filesize

    353KB

    MD5

    5731b72a3aad7d5657952261d394937e

    SHA1

    0ce6739b42306b2d854e296bdad302393eecb292

    SHA256

    acbe681ab073ccc5bb79c29176e27adbd488d219377592e6895fb9407ad1caa3

    SHA512

    9c91a5f32bbe49ad8a2b427db4e70be5fc0ca22721e90616b8ee2667092e02153ef37b1dd93e88cb36a6aa4e2685744ec7f7d3f63a9acaa071e1f828ef829869

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1270337.exe

    Filesize

    235KB

    MD5

    1fe01755195bcbd722f6eba915881238

    SHA1

    c2b9e85ca540404cfb71e7f0e6c29777f3b90db4

    SHA256

    6d526d4ff334c028035dec953024a3894f1ec88d6da961b53b9cfc4205cb6f5b

    SHA512

    505f0038a93ac433884ca679201f477c9dcab79ea2f558d2c3cc35397bfa232526f4d71ca021e8eeba40e90a182285f062a6d6ecb4ff4affba72c4c2b0b600d3

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1270337.exe

    Filesize

    235KB

    MD5

    1fe01755195bcbd722f6eba915881238

    SHA1

    c2b9e85ca540404cfb71e7f0e6c29777f3b90db4

    SHA256

    6d526d4ff334c028035dec953024a3894f1ec88d6da961b53b9cfc4205cb6f5b

    SHA512

    505f0038a93ac433884ca679201f477c9dcab79ea2f558d2c3cc35397bfa232526f4d71ca021e8eeba40e90a182285f062a6d6ecb4ff4affba72c4c2b0b600d3

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1270337.exe

    Filesize

    235KB

    MD5

    1fe01755195bcbd722f6eba915881238

    SHA1

    c2b9e85ca540404cfb71e7f0e6c29777f3b90db4

    SHA256

    6d526d4ff334c028035dec953024a3894f1ec88d6da961b53b9cfc4205cb6f5b

    SHA512

    505f0038a93ac433884ca679201f477c9dcab79ea2f558d2c3cc35397bfa232526f4d71ca021e8eeba40e90a182285f062a6d6ecb4ff4affba72c4c2b0b600d3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3086795.exe

    Filesize

    990KB

    MD5

    dfbd3a99f80609d15eb5d84613e41d18

    SHA1

    f54d5c3029db1e347efe2ff7e2b85481cf7a62bc

    SHA256

    08dab85e7f4c3c65319847301db6690f72bdab7eb9583055243552bc56549757

    SHA512

    bfd4974bfab694b5effb14e6db6a01a580ac1f0d0d9073a25be14c7e98265abd38a96ee69855a9288c25bb3c68d50b8be73a4b92836401e3a2c23b5cad93dff7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3086795.exe

    Filesize

    990KB

    MD5

    dfbd3a99f80609d15eb5d84613e41d18

    SHA1

    f54d5c3029db1e347efe2ff7e2b85481cf7a62bc

    SHA256

    08dab85e7f4c3c65319847301db6690f72bdab7eb9583055243552bc56549757

    SHA512

    bfd4974bfab694b5effb14e6db6a01a580ac1f0d0d9073a25be14c7e98265abd38a96ee69855a9288c25bb3c68d50b8be73a4b92836401e3a2c23b5cad93dff7

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5239139.exe

    Filesize

    807KB

    MD5

    7efc0f5006e4cab5ddd982540087664a

    SHA1

    3d304fa8dd3d79215f972feea9f6d04211e72f3f

    SHA256

    305a13f32ffbcd432bcefc231965034e58cdfb51d8cff3a25f68e993b311f918

    SHA512

    27cdfa871b86c360b92617674a4a64360b35578b8bc4e40d1b8d70b6e752817a086623cc453b902934065267ed7ef0a0497990febc4fe1759c2a66583e35ea07

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5239139.exe

    Filesize

    807KB

    MD5

    7efc0f5006e4cab5ddd982540087664a

    SHA1

    3d304fa8dd3d79215f972feea9f6d04211e72f3f

    SHA256

    305a13f32ffbcd432bcefc231965034e58cdfb51d8cff3a25f68e993b311f918

    SHA512

    27cdfa871b86c360b92617674a4a64360b35578b8bc4e40d1b8d70b6e752817a086623cc453b902934065267ed7ef0a0497990febc4fe1759c2a66583e35ea07

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4180472.exe

    Filesize

    625KB

    MD5

    2cf19834ad100067b4a8ff6e97df4c95

    SHA1

    deb244a586a497e1af2c7edfabea20e831819975

    SHA256

    2aef4a3f6aeb38200bbe032429a1dee8752b00a8eb033abf2d611ff7a3603dad

    SHA512

    f14714ad02a4f486c7b45c4510bb34d73294c9cef385fea3cecd89354bfcf22763aa711eae422cb5eb29774094360b9cda25dcc7f5acb54a1f8b495172ba62a2

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4180472.exe

    Filesize

    625KB

    MD5

    2cf19834ad100067b4a8ff6e97df4c95

    SHA1

    deb244a586a497e1af2c7edfabea20e831819975

    SHA256

    2aef4a3f6aeb38200bbe032429a1dee8752b00a8eb033abf2d611ff7a3603dad

    SHA512

    f14714ad02a4f486c7b45c4510bb34d73294c9cef385fea3cecd89354bfcf22763aa711eae422cb5eb29774094360b9cda25dcc7f5acb54a1f8b495172ba62a2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9946242.exe

    Filesize

    353KB

    MD5

    5731b72a3aad7d5657952261d394937e

    SHA1

    0ce6739b42306b2d854e296bdad302393eecb292

    SHA256

    acbe681ab073ccc5bb79c29176e27adbd488d219377592e6895fb9407ad1caa3

    SHA512

    9c91a5f32bbe49ad8a2b427db4e70be5fc0ca22721e90616b8ee2667092e02153ef37b1dd93e88cb36a6aa4e2685744ec7f7d3f63a9acaa071e1f828ef829869

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9946242.exe

    Filesize

    353KB

    MD5

    5731b72a3aad7d5657952261d394937e

    SHA1

    0ce6739b42306b2d854e296bdad302393eecb292

    SHA256

    acbe681ab073ccc5bb79c29176e27adbd488d219377592e6895fb9407ad1caa3

    SHA512

    9c91a5f32bbe49ad8a2b427db4e70be5fc0ca22721e90616b8ee2667092e02153ef37b1dd93e88cb36a6aa4e2685744ec7f7d3f63a9acaa071e1f828ef829869

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1270337.exe

    Filesize

    235KB

    MD5

    1fe01755195bcbd722f6eba915881238

    SHA1

    c2b9e85ca540404cfb71e7f0e6c29777f3b90db4

    SHA256

    6d526d4ff334c028035dec953024a3894f1ec88d6da961b53b9cfc4205cb6f5b

    SHA512

    505f0038a93ac433884ca679201f477c9dcab79ea2f558d2c3cc35397bfa232526f4d71ca021e8eeba40e90a182285f062a6d6ecb4ff4affba72c4c2b0b600d3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1270337.exe

    Filesize

    235KB

    MD5

    1fe01755195bcbd722f6eba915881238

    SHA1

    c2b9e85ca540404cfb71e7f0e6c29777f3b90db4

    SHA256

    6d526d4ff334c028035dec953024a3894f1ec88d6da961b53b9cfc4205cb6f5b

    SHA512

    505f0038a93ac433884ca679201f477c9dcab79ea2f558d2c3cc35397bfa232526f4d71ca021e8eeba40e90a182285f062a6d6ecb4ff4affba72c4c2b0b600d3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1270337.exe

    Filesize

    235KB

    MD5

    1fe01755195bcbd722f6eba915881238

    SHA1

    c2b9e85ca540404cfb71e7f0e6c29777f3b90db4

    SHA256

    6d526d4ff334c028035dec953024a3894f1ec88d6da961b53b9cfc4205cb6f5b

    SHA512

    505f0038a93ac433884ca679201f477c9dcab79ea2f558d2c3cc35397bfa232526f4d71ca021e8eeba40e90a182285f062a6d6ecb4ff4affba72c4c2b0b600d3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1270337.exe

    Filesize

    235KB

    MD5

    1fe01755195bcbd722f6eba915881238

    SHA1

    c2b9e85ca540404cfb71e7f0e6c29777f3b90db4

    SHA256

    6d526d4ff334c028035dec953024a3894f1ec88d6da961b53b9cfc4205cb6f5b

    SHA512

    505f0038a93ac433884ca679201f477c9dcab79ea2f558d2c3cc35397bfa232526f4d71ca021e8eeba40e90a182285f062a6d6ecb4ff4affba72c4c2b0b600d3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1270337.exe

    Filesize

    235KB

    MD5

    1fe01755195bcbd722f6eba915881238

    SHA1

    c2b9e85ca540404cfb71e7f0e6c29777f3b90db4

    SHA256

    6d526d4ff334c028035dec953024a3894f1ec88d6da961b53b9cfc4205cb6f5b

    SHA512

    505f0038a93ac433884ca679201f477c9dcab79ea2f558d2c3cc35397bfa232526f4d71ca021e8eeba40e90a182285f062a6d6ecb4ff4affba72c4c2b0b600d3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1270337.exe

    Filesize

    235KB

    MD5

    1fe01755195bcbd722f6eba915881238

    SHA1

    c2b9e85ca540404cfb71e7f0e6c29777f3b90db4

    SHA256

    6d526d4ff334c028035dec953024a3894f1ec88d6da961b53b9cfc4205cb6f5b

    SHA512

    505f0038a93ac433884ca679201f477c9dcab79ea2f558d2c3cc35397bfa232526f4d71ca021e8eeba40e90a182285f062a6d6ecb4ff4affba72c4c2b0b600d3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1270337.exe

    Filesize

    235KB

    MD5

    1fe01755195bcbd722f6eba915881238

    SHA1

    c2b9e85ca540404cfb71e7f0e6c29777f3b90db4

    SHA256

    6d526d4ff334c028035dec953024a3894f1ec88d6da961b53b9cfc4205cb6f5b

    SHA512

    505f0038a93ac433884ca679201f477c9dcab79ea2f558d2c3cc35397bfa232526f4d71ca021e8eeba40e90a182285f062a6d6ecb4ff4affba72c4c2b0b600d3

  • memory/2484-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2484-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2484-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2484-63-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2484-65-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2484-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2484-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2484-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB