Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 14:16

General

  • Target

    86e51ae159678e7f44444ac6632fdb3a5ae3cab29904340fa30f27a7a061f542.exe

  • Size

    1.1MB

  • MD5

    81e4f3c1d777b459d032c70025768e67

  • SHA1

    95204e1f301320603cbbec22caf56065044b9317

  • SHA256

    86e51ae159678e7f44444ac6632fdb3a5ae3cab29904340fa30f27a7a061f542

  • SHA512

    18d62da05813f8b96ef7fa7394f58f98cedddf410db372fef23c9ee2ca7577f02101ae33ff6917f50e182dcbc8bc9ac6e9ebcc5adcc337029aac81976fdf2d86

  • SSDEEP

    24576:JypikditgQk9LGXZOpCE0nHc8kM9WMiWi8W7/PrK/MPiKGhPnW:8pktU9GZOp6HZvkMiWDW7nG/MPiKGhn

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86e51ae159678e7f44444ac6632fdb3a5ae3cab29904340fa30f27a7a061f542.exe
    "C:\Users\Admin\AppData\Local\Temp\86e51ae159678e7f44444ac6632fdb3a5ae3cab29904340fa30f27a7a061f542.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6997292.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6997292.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1964
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1804124.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1804124.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2604
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7757408.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7757408.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2668
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5217915.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5217915.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2928
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5465226.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5465226.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2692
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2548
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6997292.exe

    Filesize

    984KB

    MD5

    f12a4295c5142bcbf25737c1ad3eccd2

    SHA1

    04b674914d52135df8a86e115d2e5e274fd77b2b

    SHA256

    380391ace0f83df46ea676c59e1e3a57c9a0555a97826841272fc77baea5b49e

    SHA512

    2836083fb81302e320effd6255543f65cc10a775c9bd9f6344e33edbf9dc846a95aa88f81f0c6b3bdb2efad566c9d43720016e828c4a7708c1cd90f6b1aa5938

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6997292.exe

    Filesize

    984KB

    MD5

    f12a4295c5142bcbf25737c1ad3eccd2

    SHA1

    04b674914d52135df8a86e115d2e5e274fd77b2b

    SHA256

    380391ace0f83df46ea676c59e1e3a57c9a0555a97826841272fc77baea5b49e

    SHA512

    2836083fb81302e320effd6255543f65cc10a775c9bd9f6344e33edbf9dc846a95aa88f81f0c6b3bdb2efad566c9d43720016e828c4a7708c1cd90f6b1aa5938

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1804124.exe

    Filesize

    802KB

    MD5

    6e6c1129a9634b77e68db12d94abd302

    SHA1

    6bc435eed674355f78c257eea022c5388195c20c

    SHA256

    62eda428510e70845f61c635a66173fc01e51cc353519a8792c034373e0ef000

    SHA512

    d3b086b0caf3f76f628d8f5319792ad8c95edf7793581dba63d9ef791b80a9a7e94b5fdf5e094ced2d42bb7d1d3381018abed46f1c32f78a8d30a85ee31e048d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1804124.exe

    Filesize

    802KB

    MD5

    6e6c1129a9634b77e68db12d94abd302

    SHA1

    6bc435eed674355f78c257eea022c5388195c20c

    SHA256

    62eda428510e70845f61c635a66173fc01e51cc353519a8792c034373e0ef000

    SHA512

    d3b086b0caf3f76f628d8f5319792ad8c95edf7793581dba63d9ef791b80a9a7e94b5fdf5e094ced2d42bb7d1d3381018abed46f1c32f78a8d30a85ee31e048d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7757408.exe

    Filesize

    619KB

    MD5

    d07084b2058a272d47cb015d4bc8ab98

    SHA1

    ff52052d56a7fd69b2ddf61eb7e5c62b62e5cda5

    SHA256

    579a8eb0ef96c65322ab2d5591fd304b3794bc2d569f9259c19c1d4183d61bd0

    SHA512

    2c1b9ae1231e09451eea669572a7ff1751c9366f6e0e5b685884a111ea782379a2c0447dd93189cd3dbf68f7e4657b8c27e4194d95a754663c2cbade2cdaa4a3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7757408.exe

    Filesize

    619KB

    MD5

    d07084b2058a272d47cb015d4bc8ab98

    SHA1

    ff52052d56a7fd69b2ddf61eb7e5c62b62e5cda5

    SHA256

    579a8eb0ef96c65322ab2d5591fd304b3794bc2d569f9259c19c1d4183d61bd0

    SHA512

    2c1b9ae1231e09451eea669572a7ff1751c9366f6e0e5b685884a111ea782379a2c0447dd93189cd3dbf68f7e4657b8c27e4194d95a754663c2cbade2cdaa4a3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5217915.exe

    Filesize

    347KB

    MD5

    cd0a057b1cdf31af2e81fa26fa03ec50

    SHA1

    015095d967fcbf2dd081b08ee794aa9adc12d5f1

    SHA256

    083b38f533ae4454cfa3adf387c99cb461badd42198a8f87a44639c8e3b53486

    SHA512

    f0bdd596d9522af556d2468cd61e91d52eece9738e9489480eb6cb448d74f6bce169ab38db21ad38a003d68d559a6d6ec64a936af310d10456015a441a71b721

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5217915.exe

    Filesize

    347KB

    MD5

    cd0a057b1cdf31af2e81fa26fa03ec50

    SHA1

    015095d967fcbf2dd081b08ee794aa9adc12d5f1

    SHA256

    083b38f533ae4454cfa3adf387c99cb461badd42198a8f87a44639c8e3b53486

    SHA512

    f0bdd596d9522af556d2468cd61e91d52eece9738e9489480eb6cb448d74f6bce169ab38db21ad38a003d68d559a6d6ec64a936af310d10456015a441a71b721

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5465226.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5465226.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5465226.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6997292.exe

    Filesize

    984KB

    MD5

    f12a4295c5142bcbf25737c1ad3eccd2

    SHA1

    04b674914d52135df8a86e115d2e5e274fd77b2b

    SHA256

    380391ace0f83df46ea676c59e1e3a57c9a0555a97826841272fc77baea5b49e

    SHA512

    2836083fb81302e320effd6255543f65cc10a775c9bd9f6344e33edbf9dc846a95aa88f81f0c6b3bdb2efad566c9d43720016e828c4a7708c1cd90f6b1aa5938

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6997292.exe

    Filesize

    984KB

    MD5

    f12a4295c5142bcbf25737c1ad3eccd2

    SHA1

    04b674914d52135df8a86e115d2e5e274fd77b2b

    SHA256

    380391ace0f83df46ea676c59e1e3a57c9a0555a97826841272fc77baea5b49e

    SHA512

    2836083fb81302e320effd6255543f65cc10a775c9bd9f6344e33edbf9dc846a95aa88f81f0c6b3bdb2efad566c9d43720016e828c4a7708c1cd90f6b1aa5938

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1804124.exe

    Filesize

    802KB

    MD5

    6e6c1129a9634b77e68db12d94abd302

    SHA1

    6bc435eed674355f78c257eea022c5388195c20c

    SHA256

    62eda428510e70845f61c635a66173fc01e51cc353519a8792c034373e0ef000

    SHA512

    d3b086b0caf3f76f628d8f5319792ad8c95edf7793581dba63d9ef791b80a9a7e94b5fdf5e094ced2d42bb7d1d3381018abed46f1c32f78a8d30a85ee31e048d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1804124.exe

    Filesize

    802KB

    MD5

    6e6c1129a9634b77e68db12d94abd302

    SHA1

    6bc435eed674355f78c257eea022c5388195c20c

    SHA256

    62eda428510e70845f61c635a66173fc01e51cc353519a8792c034373e0ef000

    SHA512

    d3b086b0caf3f76f628d8f5319792ad8c95edf7793581dba63d9ef791b80a9a7e94b5fdf5e094ced2d42bb7d1d3381018abed46f1c32f78a8d30a85ee31e048d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7757408.exe

    Filesize

    619KB

    MD5

    d07084b2058a272d47cb015d4bc8ab98

    SHA1

    ff52052d56a7fd69b2ddf61eb7e5c62b62e5cda5

    SHA256

    579a8eb0ef96c65322ab2d5591fd304b3794bc2d569f9259c19c1d4183d61bd0

    SHA512

    2c1b9ae1231e09451eea669572a7ff1751c9366f6e0e5b685884a111ea782379a2c0447dd93189cd3dbf68f7e4657b8c27e4194d95a754663c2cbade2cdaa4a3

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7757408.exe

    Filesize

    619KB

    MD5

    d07084b2058a272d47cb015d4bc8ab98

    SHA1

    ff52052d56a7fd69b2ddf61eb7e5c62b62e5cda5

    SHA256

    579a8eb0ef96c65322ab2d5591fd304b3794bc2d569f9259c19c1d4183d61bd0

    SHA512

    2c1b9ae1231e09451eea669572a7ff1751c9366f6e0e5b685884a111ea782379a2c0447dd93189cd3dbf68f7e4657b8c27e4194d95a754663c2cbade2cdaa4a3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z5217915.exe

    Filesize

    347KB

    MD5

    cd0a057b1cdf31af2e81fa26fa03ec50

    SHA1

    015095d967fcbf2dd081b08ee794aa9adc12d5f1

    SHA256

    083b38f533ae4454cfa3adf387c99cb461badd42198a8f87a44639c8e3b53486

    SHA512

    f0bdd596d9522af556d2468cd61e91d52eece9738e9489480eb6cb448d74f6bce169ab38db21ad38a003d68d559a6d6ec64a936af310d10456015a441a71b721

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z5217915.exe

    Filesize

    347KB

    MD5

    cd0a057b1cdf31af2e81fa26fa03ec50

    SHA1

    015095d967fcbf2dd081b08ee794aa9adc12d5f1

    SHA256

    083b38f533ae4454cfa3adf387c99cb461badd42198a8f87a44639c8e3b53486

    SHA512

    f0bdd596d9522af556d2468cd61e91d52eece9738e9489480eb6cb448d74f6bce169ab38db21ad38a003d68d559a6d6ec64a936af310d10456015a441a71b721

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5465226.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5465226.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5465226.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5465226.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5465226.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5465226.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5465226.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • memory/2548-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2548-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2548-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2548-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2548-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2548-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2548-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2548-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB