Analysis

  • max time kernel
    109s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 14:19

General

  • Target

    f419c343298df025683321e3d987f93298d1fb038245f6c69d3bb19a7016db91.exe

  • Size

    1.1MB

  • MD5

    3f94676e00374ae781e69b04049d1ff4

  • SHA1

    a6282217b7e5bb1efe1c673a0f18b911fb80abe7

  • SHA256

    f419c343298df025683321e3d987f93298d1fb038245f6c69d3bb19a7016db91

  • SHA512

    b8064916a0546f6284590e82b22877ea83a20a40fe05f19e87c19641e9579af6cec0570a20275421418c76ed33f3c6669c27f0189f92adc848ec92b71373b03e

  • SSDEEP

    24576:oyfcMwX/ay+dJgltkV4LRZ1iji0SxU6Y69e9x75:vfPncWGnW4d4

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f419c343298df025683321e3d987f93298d1fb038245f6c69d3bb19a7016db91.exe
    "C:\Users\Admin\AppData\Local\Temp\f419c343298df025683321e3d987f93298d1fb038245f6c69d3bb19a7016db91.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6073791.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6073791.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4702916.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4702916.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5928004.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5928004.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2628
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3480721.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3480721.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2508
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1965363.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1965363.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3064
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1260
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3064 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6073791.exe

    Filesize

    998KB

    MD5

    13e90dafab3e28efc838e4b44f54e928

    SHA1

    fb6f79e12b45765dbb4fe1ea288bb220a8291477

    SHA256

    26fc7f415f67423fa9dc5d72b9ac50ca1ccfc90d5a26732eae248ff35f5ea403

    SHA512

    2ff628290ad8b88dea3412394f3c1ab91e276bc9952efb01deaa64fd841968dfd71baa0b8b278585ea1361f426a218d71e6be40193519222ef17407b1dbb941a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6073791.exe

    Filesize

    998KB

    MD5

    13e90dafab3e28efc838e4b44f54e928

    SHA1

    fb6f79e12b45765dbb4fe1ea288bb220a8291477

    SHA256

    26fc7f415f67423fa9dc5d72b9ac50ca1ccfc90d5a26732eae248ff35f5ea403

    SHA512

    2ff628290ad8b88dea3412394f3c1ab91e276bc9952efb01deaa64fd841968dfd71baa0b8b278585ea1361f426a218d71e6be40193519222ef17407b1dbb941a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4702916.exe

    Filesize

    815KB

    MD5

    ad3fe513a7375c4a17c843d5dec64d3f

    SHA1

    9da6c6a193270dedc454ed1f6873d77efb21345f

    SHA256

    dd425ed82bc05bbe310484edae71463c1b0b6b3f4c1a980a479468fafef1f58f

    SHA512

    cd3330e00370fced2948bb174a8d8c13d8420018f817e318426f985de16acf23e2a3d0df3869118b3fcfaf266cfae4bf25cda31ed387fe6ae220378136dc6515

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4702916.exe

    Filesize

    815KB

    MD5

    ad3fe513a7375c4a17c843d5dec64d3f

    SHA1

    9da6c6a193270dedc454ed1f6873d77efb21345f

    SHA256

    dd425ed82bc05bbe310484edae71463c1b0b6b3f4c1a980a479468fafef1f58f

    SHA512

    cd3330e00370fced2948bb174a8d8c13d8420018f817e318426f985de16acf23e2a3d0df3869118b3fcfaf266cfae4bf25cda31ed387fe6ae220378136dc6515

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5928004.exe

    Filesize

    632KB

    MD5

    31d4362b4a30ea8a45f8df38fde96d01

    SHA1

    fa87ad7b8204eee8eb6067836ee7a4a526b76b2f

    SHA256

    c2322f2cb69d6f5545d07dfabd79eedf9ba1af7c712aa33c0db41a990ea38451

    SHA512

    2bf806e9eabae21e032a215706066e7966633f1f574aee75b3f5e635983a5bef3b93438580cf76a76707b634ef57bde6bea818f66093e57cd0eaf1d57a944525

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5928004.exe

    Filesize

    632KB

    MD5

    31d4362b4a30ea8a45f8df38fde96d01

    SHA1

    fa87ad7b8204eee8eb6067836ee7a4a526b76b2f

    SHA256

    c2322f2cb69d6f5545d07dfabd79eedf9ba1af7c712aa33c0db41a990ea38451

    SHA512

    2bf806e9eabae21e032a215706066e7966633f1f574aee75b3f5e635983a5bef3b93438580cf76a76707b634ef57bde6bea818f66093e57cd0eaf1d57a944525

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3480721.exe

    Filesize

    354KB

    MD5

    0dbd17e665dbe7817d8869f09e6051fa

    SHA1

    7c479f5fb921f18cfd66be52a64ea253d6b4c9b8

    SHA256

    3103ad5b37fd56700607510a0ea673d58d610d53494b9a25e0bcb3ec1826d001

    SHA512

    21a831efc351bef650289fc61f43a2747dfa8eea9670359f059ff4fff27dfa97b325d5c7ff6640569dfb4fbfe1f40e5081ab752015da0772bd0eb7b0a0ab0651

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3480721.exe

    Filesize

    354KB

    MD5

    0dbd17e665dbe7817d8869f09e6051fa

    SHA1

    7c479f5fb921f18cfd66be52a64ea253d6b4c9b8

    SHA256

    3103ad5b37fd56700607510a0ea673d58d610d53494b9a25e0bcb3ec1826d001

    SHA512

    21a831efc351bef650289fc61f43a2747dfa8eea9670359f059ff4fff27dfa97b325d5c7ff6640569dfb4fbfe1f40e5081ab752015da0772bd0eb7b0a0ab0651

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1965363.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1965363.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1965363.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6073791.exe

    Filesize

    998KB

    MD5

    13e90dafab3e28efc838e4b44f54e928

    SHA1

    fb6f79e12b45765dbb4fe1ea288bb220a8291477

    SHA256

    26fc7f415f67423fa9dc5d72b9ac50ca1ccfc90d5a26732eae248ff35f5ea403

    SHA512

    2ff628290ad8b88dea3412394f3c1ab91e276bc9952efb01deaa64fd841968dfd71baa0b8b278585ea1361f426a218d71e6be40193519222ef17407b1dbb941a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6073791.exe

    Filesize

    998KB

    MD5

    13e90dafab3e28efc838e4b44f54e928

    SHA1

    fb6f79e12b45765dbb4fe1ea288bb220a8291477

    SHA256

    26fc7f415f67423fa9dc5d72b9ac50ca1ccfc90d5a26732eae248ff35f5ea403

    SHA512

    2ff628290ad8b88dea3412394f3c1ab91e276bc9952efb01deaa64fd841968dfd71baa0b8b278585ea1361f426a218d71e6be40193519222ef17407b1dbb941a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z4702916.exe

    Filesize

    815KB

    MD5

    ad3fe513a7375c4a17c843d5dec64d3f

    SHA1

    9da6c6a193270dedc454ed1f6873d77efb21345f

    SHA256

    dd425ed82bc05bbe310484edae71463c1b0b6b3f4c1a980a479468fafef1f58f

    SHA512

    cd3330e00370fced2948bb174a8d8c13d8420018f817e318426f985de16acf23e2a3d0df3869118b3fcfaf266cfae4bf25cda31ed387fe6ae220378136dc6515

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z4702916.exe

    Filesize

    815KB

    MD5

    ad3fe513a7375c4a17c843d5dec64d3f

    SHA1

    9da6c6a193270dedc454ed1f6873d77efb21345f

    SHA256

    dd425ed82bc05bbe310484edae71463c1b0b6b3f4c1a980a479468fafef1f58f

    SHA512

    cd3330e00370fced2948bb174a8d8c13d8420018f817e318426f985de16acf23e2a3d0df3869118b3fcfaf266cfae4bf25cda31ed387fe6ae220378136dc6515

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5928004.exe

    Filesize

    632KB

    MD5

    31d4362b4a30ea8a45f8df38fde96d01

    SHA1

    fa87ad7b8204eee8eb6067836ee7a4a526b76b2f

    SHA256

    c2322f2cb69d6f5545d07dfabd79eedf9ba1af7c712aa33c0db41a990ea38451

    SHA512

    2bf806e9eabae21e032a215706066e7966633f1f574aee75b3f5e635983a5bef3b93438580cf76a76707b634ef57bde6bea818f66093e57cd0eaf1d57a944525

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5928004.exe

    Filesize

    632KB

    MD5

    31d4362b4a30ea8a45f8df38fde96d01

    SHA1

    fa87ad7b8204eee8eb6067836ee7a4a526b76b2f

    SHA256

    c2322f2cb69d6f5545d07dfabd79eedf9ba1af7c712aa33c0db41a990ea38451

    SHA512

    2bf806e9eabae21e032a215706066e7966633f1f574aee75b3f5e635983a5bef3b93438580cf76a76707b634ef57bde6bea818f66093e57cd0eaf1d57a944525

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z3480721.exe

    Filesize

    354KB

    MD5

    0dbd17e665dbe7817d8869f09e6051fa

    SHA1

    7c479f5fb921f18cfd66be52a64ea253d6b4c9b8

    SHA256

    3103ad5b37fd56700607510a0ea673d58d610d53494b9a25e0bcb3ec1826d001

    SHA512

    21a831efc351bef650289fc61f43a2747dfa8eea9670359f059ff4fff27dfa97b325d5c7ff6640569dfb4fbfe1f40e5081ab752015da0772bd0eb7b0a0ab0651

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z3480721.exe

    Filesize

    354KB

    MD5

    0dbd17e665dbe7817d8869f09e6051fa

    SHA1

    7c479f5fb921f18cfd66be52a64ea253d6b4c9b8

    SHA256

    3103ad5b37fd56700607510a0ea673d58d610d53494b9a25e0bcb3ec1826d001

    SHA512

    21a831efc351bef650289fc61f43a2747dfa8eea9670359f059ff4fff27dfa97b325d5c7ff6640569dfb4fbfe1f40e5081ab752015da0772bd0eb7b0a0ab0651

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1965363.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1965363.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1965363.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1965363.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1965363.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1965363.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1965363.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • memory/1260-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1260-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1260-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1260-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1260-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1260-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1260-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1260-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB