Analysis

  • max time kernel
    120s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 14:19

General

  • Target

    d5548231bcd8aa72b541ea173b3e186a14338caae1d74db3649326e9168b7209.exe

  • Size

    1.1MB

  • MD5

    c1dc64e77db822294671750564678439

  • SHA1

    b7f771f4ae0cfabe24f7f1a3386222f9b83937e3

  • SHA256

    d5548231bcd8aa72b541ea173b3e186a14338caae1d74db3649326e9168b7209

  • SHA512

    65d807eb0b1dfdcc47e25eec9afcd47c580bea8dfaca19d8b5ab5ceeae7ffecef7077c70770c8a8ded054820825a7b0e03594b6affa32635bfb585e8583adf73

  • SSDEEP

    12288:9MrZy90E31nsErgH6XYSzufmHSXZdSZ1621NCrb7lUSXQZ15G8gZj/JqMGQvg2WR:4yt1sEf/zufmkEW21NCziSkdg14QRu

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5548231bcd8aa72b541ea173b3e186a14338caae1d74db3649326e9168b7209.exe
    "C:\Users\Admin\AppData\Local\Temp\d5548231bcd8aa72b541ea173b3e186a14338caae1d74db3649326e9168b7209.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6835711.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6835711.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9135664.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9135664.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6358304.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6358304.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:772
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6495956.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6495956.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2828
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5310711.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5310711.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1896
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2524
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1896 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6835711.exe

    Filesize

    984KB

    MD5

    e91e5bdb9155b8503061c122bbf6bf90

    SHA1

    efe09146ad319072244593418836f41c9b4e7662

    SHA256

    bd559264af159fde5d0e5d873b9acea7f42cbc6044fec0085fb6a95466273a7b

    SHA512

    243eff618138056e1a3aa390dee73e5d3383d78b1371528164130cbceedbc405872f9c807b587d7da5a8c6445d3c56aefaa75e958de2afe5acaf514654464237

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6835711.exe

    Filesize

    984KB

    MD5

    e91e5bdb9155b8503061c122bbf6bf90

    SHA1

    efe09146ad319072244593418836f41c9b4e7662

    SHA256

    bd559264af159fde5d0e5d873b9acea7f42cbc6044fec0085fb6a95466273a7b

    SHA512

    243eff618138056e1a3aa390dee73e5d3383d78b1371528164130cbceedbc405872f9c807b587d7da5a8c6445d3c56aefaa75e958de2afe5acaf514654464237

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9135664.exe

    Filesize

    801KB

    MD5

    3e5e3c6f6d4c2c2638628bf310cb6f29

    SHA1

    9aa689b810dda895953a1252e02de5a3f9d40150

    SHA256

    c148104f8e894576ddde000e803dfd9337a9731a915aea5bd76822156a197c05

    SHA512

    0cfa31d6fadeafde35d05a65d8865b341ec3711ae3b4bea51d23fd305fa9f16fb0b6da440c68b70cfdb43cac484f333546371f98aba220461f7ae3d6110a2d65

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9135664.exe

    Filesize

    801KB

    MD5

    3e5e3c6f6d4c2c2638628bf310cb6f29

    SHA1

    9aa689b810dda895953a1252e02de5a3f9d40150

    SHA256

    c148104f8e894576ddde000e803dfd9337a9731a915aea5bd76822156a197c05

    SHA512

    0cfa31d6fadeafde35d05a65d8865b341ec3711ae3b4bea51d23fd305fa9f16fb0b6da440c68b70cfdb43cac484f333546371f98aba220461f7ae3d6110a2d65

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6358304.exe

    Filesize

    618KB

    MD5

    a9c08c9fda29ce38293797a4c95e5968

    SHA1

    087f182d993096deab4f29b9c34031eae086c7f8

    SHA256

    c75db48638e85a9068004c676c61bdced9ee20c6c8046d6619c20b9f21452812

    SHA512

    7c478556f4219fbed303415ee0157988d504507e95e2166f76eb6eb26cde86dba7827dec9a5bd8d21ea7db0be1b43d65f683bfc957f26d3f158e5161bfb084df

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6358304.exe

    Filesize

    618KB

    MD5

    a9c08c9fda29ce38293797a4c95e5968

    SHA1

    087f182d993096deab4f29b9c34031eae086c7f8

    SHA256

    c75db48638e85a9068004c676c61bdced9ee20c6c8046d6619c20b9f21452812

    SHA512

    7c478556f4219fbed303415ee0157988d504507e95e2166f76eb6eb26cde86dba7827dec9a5bd8d21ea7db0be1b43d65f683bfc957f26d3f158e5161bfb084df

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6495956.exe

    Filesize

    348KB

    MD5

    d6af8816336d01f902ee8e25988296bf

    SHA1

    51834785bbf5a9eb6f96d0eac64ce351f42cf874

    SHA256

    61b93da6a3d50d369e989718c050f82b8048b44404edc4c4dfe7e5c0184d23bf

    SHA512

    45e1ecbf0b2d6f4e9d4b87a02b2fb303e301976691db75e781fafcd83f6bd9093de2d9290df36609079c523f39c0b2750321f1ea67351947a95e3ee5e6a90e7e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6495956.exe

    Filesize

    348KB

    MD5

    d6af8816336d01f902ee8e25988296bf

    SHA1

    51834785bbf5a9eb6f96d0eac64ce351f42cf874

    SHA256

    61b93da6a3d50d369e989718c050f82b8048b44404edc4c4dfe7e5c0184d23bf

    SHA512

    45e1ecbf0b2d6f4e9d4b87a02b2fb303e301976691db75e781fafcd83f6bd9093de2d9290df36609079c523f39c0b2750321f1ea67351947a95e3ee5e6a90e7e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5310711.exe

    Filesize

    235KB

    MD5

    736cb427884b25628b6bb89460aac430

    SHA1

    2331917c0cf243a1f678b311c35c4f857a1b6620

    SHA256

    b3f96f294fa99764ac1c5b3566fefcbd215f99b226be9ed870a41d3bdee0e448

    SHA512

    9568feeb09dfe1f84219c25a184eb005d8daa1c0ab35513f420b07057b26369fe7eb02adc1c5aaa0270d71a5dfbee2e7faa7f79ad54f5c7c0bf67c93f8a642b9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5310711.exe

    Filesize

    235KB

    MD5

    736cb427884b25628b6bb89460aac430

    SHA1

    2331917c0cf243a1f678b311c35c4f857a1b6620

    SHA256

    b3f96f294fa99764ac1c5b3566fefcbd215f99b226be9ed870a41d3bdee0e448

    SHA512

    9568feeb09dfe1f84219c25a184eb005d8daa1c0ab35513f420b07057b26369fe7eb02adc1c5aaa0270d71a5dfbee2e7faa7f79ad54f5c7c0bf67c93f8a642b9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5310711.exe

    Filesize

    235KB

    MD5

    736cb427884b25628b6bb89460aac430

    SHA1

    2331917c0cf243a1f678b311c35c4f857a1b6620

    SHA256

    b3f96f294fa99764ac1c5b3566fefcbd215f99b226be9ed870a41d3bdee0e448

    SHA512

    9568feeb09dfe1f84219c25a184eb005d8daa1c0ab35513f420b07057b26369fe7eb02adc1c5aaa0270d71a5dfbee2e7faa7f79ad54f5c7c0bf67c93f8a642b9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6835711.exe

    Filesize

    984KB

    MD5

    e91e5bdb9155b8503061c122bbf6bf90

    SHA1

    efe09146ad319072244593418836f41c9b4e7662

    SHA256

    bd559264af159fde5d0e5d873b9acea7f42cbc6044fec0085fb6a95466273a7b

    SHA512

    243eff618138056e1a3aa390dee73e5d3383d78b1371528164130cbceedbc405872f9c807b587d7da5a8c6445d3c56aefaa75e958de2afe5acaf514654464237

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6835711.exe

    Filesize

    984KB

    MD5

    e91e5bdb9155b8503061c122bbf6bf90

    SHA1

    efe09146ad319072244593418836f41c9b4e7662

    SHA256

    bd559264af159fde5d0e5d873b9acea7f42cbc6044fec0085fb6a95466273a7b

    SHA512

    243eff618138056e1a3aa390dee73e5d3383d78b1371528164130cbceedbc405872f9c807b587d7da5a8c6445d3c56aefaa75e958de2afe5acaf514654464237

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9135664.exe

    Filesize

    801KB

    MD5

    3e5e3c6f6d4c2c2638628bf310cb6f29

    SHA1

    9aa689b810dda895953a1252e02de5a3f9d40150

    SHA256

    c148104f8e894576ddde000e803dfd9337a9731a915aea5bd76822156a197c05

    SHA512

    0cfa31d6fadeafde35d05a65d8865b341ec3711ae3b4bea51d23fd305fa9f16fb0b6da440c68b70cfdb43cac484f333546371f98aba220461f7ae3d6110a2d65

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9135664.exe

    Filesize

    801KB

    MD5

    3e5e3c6f6d4c2c2638628bf310cb6f29

    SHA1

    9aa689b810dda895953a1252e02de5a3f9d40150

    SHA256

    c148104f8e894576ddde000e803dfd9337a9731a915aea5bd76822156a197c05

    SHA512

    0cfa31d6fadeafde35d05a65d8865b341ec3711ae3b4bea51d23fd305fa9f16fb0b6da440c68b70cfdb43cac484f333546371f98aba220461f7ae3d6110a2d65

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6358304.exe

    Filesize

    618KB

    MD5

    a9c08c9fda29ce38293797a4c95e5968

    SHA1

    087f182d993096deab4f29b9c34031eae086c7f8

    SHA256

    c75db48638e85a9068004c676c61bdced9ee20c6c8046d6619c20b9f21452812

    SHA512

    7c478556f4219fbed303415ee0157988d504507e95e2166f76eb6eb26cde86dba7827dec9a5bd8d21ea7db0be1b43d65f683bfc957f26d3f158e5161bfb084df

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6358304.exe

    Filesize

    618KB

    MD5

    a9c08c9fda29ce38293797a4c95e5968

    SHA1

    087f182d993096deab4f29b9c34031eae086c7f8

    SHA256

    c75db48638e85a9068004c676c61bdced9ee20c6c8046d6619c20b9f21452812

    SHA512

    7c478556f4219fbed303415ee0157988d504507e95e2166f76eb6eb26cde86dba7827dec9a5bd8d21ea7db0be1b43d65f683bfc957f26d3f158e5161bfb084df

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6495956.exe

    Filesize

    348KB

    MD5

    d6af8816336d01f902ee8e25988296bf

    SHA1

    51834785bbf5a9eb6f96d0eac64ce351f42cf874

    SHA256

    61b93da6a3d50d369e989718c050f82b8048b44404edc4c4dfe7e5c0184d23bf

    SHA512

    45e1ecbf0b2d6f4e9d4b87a02b2fb303e301976691db75e781fafcd83f6bd9093de2d9290df36609079c523f39c0b2750321f1ea67351947a95e3ee5e6a90e7e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6495956.exe

    Filesize

    348KB

    MD5

    d6af8816336d01f902ee8e25988296bf

    SHA1

    51834785bbf5a9eb6f96d0eac64ce351f42cf874

    SHA256

    61b93da6a3d50d369e989718c050f82b8048b44404edc4c4dfe7e5c0184d23bf

    SHA512

    45e1ecbf0b2d6f4e9d4b87a02b2fb303e301976691db75e781fafcd83f6bd9093de2d9290df36609079c523f39c0b2750321f1ea67351947a95e3ee5e6a90e7e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5310711.exe

    Filesize

    235KB

    MD5

    736cb427884b25628b6bb89460aac430

    SHA1

    2331917c0cf243a1f678b311c35c4f857a1b6620

    SHA256

    b3f96f294fa99764ac1c5b3566fefcbd215f99b226be9ed870a41d3bdee0e448

    SHA512

    9568feeb09dfe1f84219c25a184eb005d8daa1c0ab35513f420b07057b26369fe7eb02adc1c5aaa0270d71a5dfbee2e7faa7f79ad54f5c7c0bf67c93f8a642b9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5310711.exe

    Filesize

    235KB

    MD5

    736cb427884b25628b6bb89460aac430

    SHA1

    2331917c0cf243a1f678b311c35c4f857a1b6620

    SHA256

    b3f96f294fa99764ac1c5b3566fefcbd215f99b226be9ed870a41d3bdee0e448

    SHA512

    9568feeb09dfe1f84219c25a184eb005d8daa1c0ab35513f420b07057b26369fe7eb02adc1c5aaa0270d71a5dfbee2e7faa7f79ad54f5c7c0bf67c93f8a642b9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5310711.exe

    Filesize

    235KB

    MD5

    736cb427884b25628b6bb89460aac430

    SHA1

    2331917c0cf243a1f678b311c35c4f857a1b6620

    SHA256

    b3f96f294fa99764ac1c5b3566fefcbd215f99b226be9ed870a41d3bdee0e448

    SHA512

    9568feeb09dfe1f84219c25a184eb005d8daa1c0ab35513f420b07057b26369fe7eb02adc1c5aaa0270d71a5dfbee2e7faa7f79ad54f5c7c0bf67c93f8a642b9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5310711.exe

    Filesize

    235KB

    MD5

    736cb427884b25628b6bb89460aac430

    SHA1

    2331917c0cf243a1f678b311c35c4f857a1b6620

    SHA256

    b3f96f294fa99764ac1c5b3566fefcbd215f99b226be9ed870a41d3bdee0e448

    SHA512

    9568feeb09dfe1f84219c25a184eb005d8daa1c0ab35513f420b07057b26369fe7eb02adc1c5aaa0270d71a5dfbee2e7faa7f79ad54f5c7c0bf67c93f8a642b9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5310711.exe

    Filesize

    235KB

    MD5

    736cb427884b25628b6bb89460aac430

    SHA1

    2331917c0cf243a1f678b311c35c4f857a1b6620

    SHA256

    b3f96f294fa99764ac1c5b3566fefcbd215f99b226be9ed870a41d3bdee0e448

    SHA512

    9568feeb09dfe1f84219c25a184eb005d8daa1c0ab35513f420b07057b26369fe7eb02adc1c5aaa0270d71a5dfbee2e7faa7f79ad54f5c7c0bf67c93f8a642b9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5310711.exe

    Filesize

    235KB

    MD5

    736cb427884b25628b6bb89460aac430

    SHA1

    2331917c0cf243a1f678b311c35c4f857a1b6620

    SHA256

    b3f96f294fa99764ac1c5b3566fefcbd215f99b226be9ed870a41d3bdee0e448

    SHA512

    9568feeb09dfe1f84219c25a184eb005d8daa1c0ab35513f420b07057b26369fe7eb02adc1c5aaa0270d71a5dfbee2e7faa7f79ad54f5c7c0bf67c93f8a642b9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5310711.exe

    Filesize

    235KB

    MD5

    736cb427884b25628b6bb89460aac430

    SHA1

    2331917c0cf243a1f678b311c35c4f857a1b6620

    SHA256

    b3f96f294fa99764ac1c5b3566fefcbd215f99b226be9ed870a41d3bdee0e448

    SHA512

    9568feeb09dfe1f84219c25a184eb005d8daa1c0ab35513f420b07057b26369fe7eb02adc1c5aaa0270d71a5dfbee2e7faa7f79ad54f5c7c0bf67c93f8a642b9

  • memory/2524-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2524-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2524-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2524-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2524-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2524-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2524-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2524-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB