Analysis

  • max time kernel
    119s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 14:16

General

  • Target

    92d883e6b554ee3a381d909a21ae39505bde56be31815868a216c3b34ff85019.exe

  • Size

    1.1MB

  • MD5

    4f3c9dc0fd9a378f03852d291e106527

  • SHA1

    59f57af34e6bb9bd3f521b0db2ce08c3a868acdb

  • SHA256

    92d883e6b554ee3a381d909a21ae39505bde56be31815868a216c3b34ff85019

  • SHA512

    bc7709b28c510ece5b61b8e45b818dc25c3ad52af7db60300234505c3bea94f5e4f7fafcb9d1deb68ac12deca8ad114f2366cfed1f81e8e9da8c92dfd3a7f145

  • SSDEEP

    12288:4MrJy90TzB2vju6tAj7cy20hfU4XhMK6DuLvuKSb/2lyF70MIgrepDuuCGZdVHuI:hyXuTvfJFMKguL2K4cUEgrepuuH9H7X

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92d883e6b554ee3a381d909a21ae39505bde56be31815868a216c3b34ff85019.exe
    "C:\Users\Admin\AppData\Local\Temp\92d883e6b554ee3a381d909a21ae39505bde56be31815868a216c3b34ff85019.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8219061.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8219061.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8096448.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8096448.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2644
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6405307.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6405307.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2648
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9980637.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9980637.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2144
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0622782.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0622782.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2908
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2664
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2548
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 280
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2572

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8219061.exe

      Filesize

      983KB

      MD5

      63a3f7738cf4b847be3f83effb8bf63d

      SHA1

      fa04635ab9ca9a90bc28a5500f552d34189cb30c

      SHA256

      ce37c6be23ab052ba6b0d53ffbca8c05b3680e7987d96ba61fc3daf29d08dab0

      SHA512

      b5e29345510dfcbdd8d04f345d958e570667ab012617af8afc4613fff9c2fe638c39593f8c260a5042b1d2c41f98f36a71f3c509fc43f4ba104c2c146844e70c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8219061.exe

      Filesize

      983KB

      MD5

      63a3f7738cf4b847be3f83effb8bf63d

      SHA1

      fa04635ab9ca9a90bc28a5500f552d34189cb30c

      SHA256

      ce37c6be23ab052ba6b0d53ffbca8c05b3680e7987d96ba61fc3daf29d08dab0

      SHA512

      b5e29345510dfcbdd8d04f345d958e570667ab012617af8afc4613fff9c2fe638c39593f8c260a5042b1d2c41f98f36a71f3c509fc43f4ba104c2c146844e70c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8096448.exe

      Filesize

      800KB

      MD5

      39ddb23b1caac45325917bf70b540598

      SHA1

      29fc8b5ff32c72ffe87aff0b3ff2de11ec9094f8

      SHA256

      7b5c611d421472bbf810666adb7dfe30a859505f1c521130979e772219090dcc

      SHA512

      7a1ba4827370fc0cb2653a41c846617f1b140f07c70bb7c9413e236149805231c8ac492714ff0c4e768ced51cfdf5289e9f5a2a6d4bd2d395c35eeca731c7271

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8096448.exe

      Filesize

      800KB

      MD5

      39ddb23b1caac45325917bf70b540598

      SHA1

      29fc8b5ff32c72ffe87aff0b3ff2de11ec9094f8

      SHA256

      7b5c611d421472bbf810666adb7dfe30a859505f1c521130979e772219090dcc

      SHA512

      7a1ba4827370fc0cb2653a41c846617f1b140f07c70bb7c9413e236149805231c8ac492714ff0c4e768ced51cfdf5289e9f5a2a6d4bd2d395c35eeca731c7271

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6405307.exe

      Filesize

      618KB

      MD5

      e02ab0926f251eafefcca9f037c0e444

      SHA1

      8346bb8b22d83b861a55033b7b298048788ea8a9

      SHA256

      320caef75dac23e7263c25f2ddf03afcf249b3a5137bc66a0a1b0386d4069fbe

      SHA512

      0a6f6436f5b8d2ac56fd4cde81f1f2fb87e9b213bb257606a051f2b138b83d4732c0196a22ff77fc28f8cf3048a7b5e17298894249e4869f141dc035beca4b81

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6405307.exe

      Filesize

      618KB

      MD5

      e02ab0926f251eafefcca9f037c0e444

      SHA1

      8346bb8b22d83b861a55033b7b298048788ea8a9

      SHA256

      320caef75dac23e7263c25f2ddf03afcf249b3a5137bc66a0a1b0386d4069fbe

      SHA512

      0a6f6436f5b8d2ac56fd4cde81f1f2fb87e9b213bb257606a051f2b138b83d4732c0196a22ff77fc28f8cf3048a7b5e17298894249e4869f141dc035beca4b81

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9980637.exe

      Filesize

      347KB

      MD5

      9d02944d61649e8a938630f809f8b85c

      SHA1

      e6d4f93ad79a6a307f95979a36a95c27b23d5808

      SHA256

      4e506686a573d726d2622e8f171e8afdd488a0b9a6edfae800f43ac9b5d4c057

      SHA512

      dd06501898a64f94d44f59cc35b1314ea823461fd3b1a264227b6fa837be508b102e6a0b275511fca91db3d3c4fd9105522106af32076e3509371cf9677fa401

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9980637.exe

      Filesize

      347KB

      MD5

      9d02944d61649e8a938630f809f8b85c

      SHA1

      e6d4f93ad79a6a307f95979a36a95c27b23d5808

      SHA256

      4e506686a573d726d2622e8f171e8afdd488a0b9a6edfae800f43ac9b5d4c057

      SHA512

      dd06501898a64f94d44f59cc35b1314ea823461fd3b1a264227b6fa837be508b102e6a0b275511fca91db3d3c4fd9105522106af32076e3509371cf9677fa401

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0622782.exe

      Filesize

      235KB

      MD5

      46be44d90dce2e92028fa70abe0598e0

      SHA1

      c6c5555bb666c202c25262a71c6f126469470215

      SHA256

      3d09c6c1507f991ec0438adc4698e4043a243f89b87f9b1d5234fb32ffc3521f

      SHA512

      e866df7456c5c5202f10d25782a713b59d661c3bcb48456fd2c7b951016982bcb17ad1436ce407e3422b0b32dce21870f3b2e67969ba3b153134a8c7d5554d0e

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0622782.exe

      Filesize

      235KB

      MD5

      46be44d90dce2e92028fa70abe0598e0

      SHA1

      c6c5555bb666c202c25262a71c6f126469470215

      SHA256

      3d09c6c1507f991ec0438adc4698e4043a243f89b87f9b1d5234fb32ffc3521f

      SHA512

      e866df7456c5c5202f10d25782a713b59d661c3bcb48456fd2c7b951016982bcb17ad1436ce407e3422b0b32dce21870f3b2e67969ba3b153134a8c7d5554d0e

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0622782.exe

      Filesize

      235KB

      MD5

      46be44d90dce2e92028fa70abe0598e0

      SHA1

      c6c5555bb666c202c25262a71c6f126469470215

      SHA256

      3d09c6c1507f991ec0438adc4698e4043a243f89b87f9b1d5234fb32ffc3521f

      SHA512

      e866df7456c5c5202f10d25782a713b59d661c3bcb48456fd2c7b951016982bcb17ad1436ce407e3422b0b32dce21870f3b2e67969ba3b153134a8c7d5554d0e

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8219061.exe

      Filesize

      983KB

      MD5

      63a3f7738cf4b847be3f83effb8bf63d

      SHA1

      fa04635ab9ca9a90bc28a5500f552d34189cb30c

      SHA256

      ce37c6be23ab052ba6b0d53ffbca8c05b3680e7987d96ba61fc3daf29d08dab0

      SHA512

      b5e29345510dfcbdd8d04f345d958e570667ab012617af8afc4613fff9c2fe638c39593f8c260a5042b1d2c41f98f36a71f3c509fc43f4ba104c2c146844e70c

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8219061.exe

      Filesize

      983KB

      MD5

      63a3f7738cf4b847be3f83effb8bf63d

      SHA1

      fa04635ab9ca9a90bc28a5500f552d34189cb30c

      SHA256

      ce37c6be23ab052ba6b0d53ffbca8c05b3680e7987d96ba61fc3daf29d08dab0

      SHA512

      b5e29345510dfcbdd8d04f345d958e570667ab012617af8afc4613fff9c2fe638c39593f8c260a5042b1d2c41f98f36a71f3c509fc43f4ba104c2c146844e70c

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8096448.exe

      Filesize

      800KB

      MD5

      39ddb23b1caac45325917bf70b540598

      SHA1

      29fc8b5ff32c72ffe87aff0b3ff2de11ec9094f8

      SHA256

      7b5c611d421472bbf810666adb7dfe30a859505f1c521130979e772219090dcc

      SHA512

      7a1ba4827370fc0cb2653a41c846617f1b140f07c70bb7c9413e236149805231c8ac492714ff0c4e768ced51cfdf5289e9f5a2a6d4bd2d395c35eeca731c7271

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8096448.exe

      Filesize

      800KB

      MD5

      39ddb23b1caac45325917bf70b540598

      SHA1

      29fc8b5ff32c72ffe87aff0b3ff2de11ec9094f8

      SHA256

      7b5c611d421472bbf810666adb7dfe30a859505f1c521130979e772219090dcc

      SHA512

      7a1ba4827370fc0cb2653a41c846617f1b140f07c70bb7c9413e236149805231c8ac492714ff0c4e768ced51cfdf5289e9f5a2a6d4bd2d395c35eeca731c7271

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6405307.exe

      Filesize

      618KB

      MD5

      e02ab0926f251eafefcca9f037c0e444

      SHA1

      8346bb8b22d83b861a55033b7b298048788ea8a9

      SHA256

      320caef75dac23e7263c25f2ddf03afcf249b3a5137bc66a0a1b0386d4069fbe

      SHA512

      0a6f6436f5b8d2ac56fd4cde81f1f2fb87e9b213bb257606a051f2b138b83d4732c0196a22ff77fc28f8cf3048a7b5e17298894249e4869f141dc035beca4b81

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6405307.exe

      Filesize

      618KB

      MD5

      e02ab0926f251eafefcca9f037c0e444

      SHA1

      8346bb8b22d83b861a55033b7b298048788ea8a9

      SHA256

      320caef75dac23e7263c25f2ddf03afcf249b3a5137bc66a0a1b0386d4069fbe

      SHA512

      0a6f6436f5b8d2ac56fd4cde81f1f2fb87e9b213bb257606a051f2b138b83d4732c0196a22ff77fc28f8cf3048a7b5e17298894249e4869f141dc035beca4b81

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9980637.exe

      Filesize

      347KB

      MD5

      9d02944d61649e8a938630f809f8b85c

      SHA1

      e6d4f93ad79a6a307f95979a36a95c27b23d5808

      SHA256

      4e506686a573d726d2622e8f171e8afdd488a0b9a6edfae800f43ac9b5d4c057

      SHA512

      dd06501898a64f94d44f59cc35b1314ea823461fd3b1a264227b6fa837be508b102e6a0b275511fca91db3d3c4fd9105522106af32076e3509371cf9677fa401

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9980637.exe

      Filesize

      347KB

      MD5

      9d02944d61649e8a938630f809f8b85c

      SHA1

      e6d4f93ad79a6a307f95979a36a95c27b23d5808

      SHA256

      4e506686a573d726d2622e8f171e8afdd488a0b9a6edfae800f43ac9b5d4c057

      SHA512

      dd06501898a64f94d44f59cc35b1314ea823461fd3b1a264227b6fa837be508b102e6a0b275511fca91db3d3c4fd9105522106af32076e3509371cf9677fa401

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0622782.exe

      Filesize

      235KB

      MD5

      46be44d90dce2e92028fa70abe0598e0

      SHA1

      c6c5555bb666c202c25262a71c6f126469470215

      SHA256

      3d09c6c1507f991ec0438adc4698e4043a243f89b87f9b1d5234fb32ffc3521f

      SHA512

      e866df7456c5c5202f10d25782a713b59d661c3bcb48456fd2c7b951016982bcb17ad1436ce407e3422b0b32dce21870f3b2e67969ba3b153134a8c7d5554d0e

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0622782.exe

      Filesize

      235KB

      MD5

      46be44d90dce2e92028fa70abe0598e0

      SHA1

      c6c5555bb666c202c25262a71c6f126469470215

      SHA256

      3d09c6c1507f991ec0438adc4698e4043a243f89b87f9b1d5234fb32ffc3521f

      SHA512

      e866df7456c5c5202f10d25782a713b59d661c3bcb48456fd2c7b951016982bcb17ad1436ce407e3422b0b32dce21870f3b2e67969ba3b153134a8c7d5554d0e

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0622782.exe

      Filesize

      235KB

      MD5

      46be44d90dce2e92028fa70abe0598e0

      SHA1

      c6c5555bb666c202c25262a71c6f126469470215

      SHA256

      3d09c6c1507f991ec0438adc4698e4043a243f89b87f9b1d5234fb32ffc3521f

      SHA512

      e866df7456c5c5202f10d25782a713b59d661c3bcb48456fd2c7b951016982bcb17ad1436ce407e3422b0b32dce21870f3b2e67969ba3b153134a8c7d5554d0e

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0622782.exe

      Filesize

      235KB

      MD5

      46be44d90dce2e92028fa70abe0598e0

      SHA1

      c6c5555bb666c202c25262a71c6f126469470215

      SHA256

      3d09c6c1507f991ec0438adc4698e4043a243f89b87f9b1d5234fb32ffc3521f

      SHA512

      e866df7456c5c5202f10d25782a713b59d661c3bcb48456fd2c7b951016982bcb17ad1436ce407e3422b0b32dce21870f3b2e67969ba3b153134a8c7d5554d0e

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0622782.exe

      Filesize

      235KB

      MD5

      46be44d90dce2e92028fa70abe0598e0

      SHA1

      c6c5555bb666c202c25262a71c6f126469470215

      SHA256

      3d09c6c1507f991ec0438adc4698e4043a243f89b87f9b1d5234fb32ffc3521f

      SHA512

      e866df7456c5c5202f10d25782a713b59d661c3bcb48456fd2c7b951016982bcb17ad1436ce407e3422b0b32dce21870f3b2e67969ba3b153134a8c7d5554d0e

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0622782.exe

      Filesize

      235KB

      MD5

      46be44d90dce2e92028fa70abe0598e0

      SHA1

      c6c5555bb666c202c25262a71c6f126469470215

      SHA256

      3d09c6c1507f991ec0438adc4698e4043a243f89b87f9b1d5234fb32ffc3521f

      SHA512

      e866df7456c5c5202f10d25782a713b59d661c3bcb48456fd2c7b951016982bcb17ad1436ce407e3422b0b32dce21870f3b2e67969ba3b153134a8c7d5554d0e

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0622782.exe

      Filesize

      235KB

      MD5

      46be44d90dce2e92028fa70abe0598e0

      SHA1

      c6c5555bb666c202c25262a71c6f126469470215

      SHA256

      3d09c6c1507f991ec0438adc4698e4043a243f89b87f9b1d5234fb32ffc3521f

      SHA512

      e866df7456c5c5202f10d25782a713b59d661c3bcb48456fd2c7b951016982bcb17ad1436ce407e3422b0b32dce21870f3b2e67969ba3b153134a8c7d5554d0e

    • memory/2548-57-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2548-59-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2548-64-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2548-66-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2548-62-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2548-61-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2548-55-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2548-53-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB