Analysis

  • max time kernel
    118s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 14:19

General

  • Target

    16befad06cc212e8a4d3ca595d1a3b8616639d27571a06f382836bc14ae90ae9.exe

  • Size

    1.3MB

  • MD5

    4ec3f8998035945c3e7929a373936df8

  • SHA1

    cca1023eb6569397dcbcc5ef278236363394fc62

  • SHA256

    16befad06cc212e8a4d3ca595d1a3b8616639d27571a06f382836bc14ae90ae9

  • SHA512

    0e2aed9ea98f512158284d1c1e5c98b4e9bf31b6a4407ce378e68598ba5459ffe34caea2cab3c74a5d1d5f3e509928f869a9fac283041cc1452ef85098ca9fdc

  • SSDEEP

    24576:GyPE3zUQ4++Ur5KSn7gKB5qsQzVtF5UNIOSLVMES7Ap8XQ:V2zwgJsKiEleZSb

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 17 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16befad06cc212e8a4d3ca595d1a3b8616639d27571a06f382836bc14ae90ae9.exe
    "C:\Users\Admin\AppData\Local\Temp\16befad06cc212e8a4d3ca595d1a3b8616639d27571a06f382836bc14ae90ae9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1671539.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1671539.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2284
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6413627.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6413627.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2620
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2866374.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2866374.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2776
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7721719.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7721719.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2828
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v4382495.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v4382495.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:2516
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a8940340.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a8940340.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2820
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2568
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 272
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1671539.exe

    Filesize

    1.2MB

    MD5

    3621ed90351c92085a5011c472b169ab

    SHA1

    0bf688f4c56fff67727b0a64cd51478cb0cbbf49

    SHA256

    d72143ddd32942f5af4d73415916b9166bb19c34552696b1e4c69e0bf09916d7

    SHA512

    d5d2f273c765c15a9ead0d238411355689c0fdcd92b51300cf860605a73acee8964e2c945b0e00c04b1495f6c29c1f8714701d3f6602e0f88f1270fdbca8d474

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1671539.exe

    Filesize

    1.2MB

    MD5

    3621ed90351c92085a5011c472b169ab

    SHA1

    0bf688f4c56fff67727b0a64cd51478cb0cbbf49

    SHA256

    d72143ddd32942f5af4d73415916b9166bb19c34552696b1e4c69e0bf09916d7

    SHA512

    d5d2f273c765c15a9ead0d238411355689c0fdcd92b51300cf860605a73acee8964e2c945b0e00c04b1495f6c29c1f8714701d3f6602e0f88f1270fdbca8d474

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6413627.exe

    Filesize

    953KB

    MD5

    52ab6f4c4ab8178a036683c67c534d74

    SHA1

    42efb2efc57bd3b707b97ed61f767a3a0baf224e

    SHA256

    f5c72197ade1e94d07c45891aeebe80cee86d7672307cd5e4961cfffd6d440fd

    SHA512

    577faad9496d213e3ae245c9f8bcbda7927895b4b05a8137d197e87188a2fada310ed3810c76ad4d5f25babe73214aa1419784c735bd3bf8cea14e05da4385c3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6413627.exe

    Filesize

    953KB

    MD5

    52ab6f4c4ab8178a036683c67c534d74

    SHA1

    42efb2efc57bd3b707b97ed61f767a3a0baf224e

    SHA256

    f5c72197ade1e94d07c45891aeebe80cee86d7672307cd5e4961cfffd6d440fd

    SHA512

    577faad9496d213e3ae245c9f8bcbda7927895b4b05a8137d197e87188a2fada310ed3810c76ad4d5f25babe73214aa1419784c735bd3bf8cea14e05da4385c3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2866374.exe

    Filesize

    797KB

    MD5

    beb31f6c3590c7245b53245c3c8c3be1

    SHA1

    dee33a1247dd90f9bfb4e43ea5f37f2998b10f72

    SHA256

    e271c8f1653fc2930f554f3c273d2bdd472d19a6106f47d8e08568dbc3c86c71

    SHA512

    99c65ca071577caf4fda27e3a76029b7f34c57fbe3a4b4fbec91818a0f817f9b5ab6c43e4d25b7538e405f96bafb89ae255468fb0bab4d651bd04d10dc66b3a1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2866374.exe

    Filesize

    797KB

    MD5

    beb31f6c3590c7245b53245c3c8c3be1

    SHA1

    dee33a1247dd90f9bfb4e43ea5f37f2998b10f72

    SHA256

    e271c8f1653fc2930f554f3c273d2bdd472d19a6106f47d8e08568dbc3c86c71

    SHA512

    99c65ca071577caf4fda27e3a76029b7f34c57fbe3a4b4fbec91818a0f817f9b5ab6c43e4d25b7538e405f96bafb89ae255468fb0bab4d651bd04d10dc66b3a1

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7721719.exe

    Filesize

    631KB

    MD5

    127ef2d049cecc35d73bd6019954c652

    SHA1

    d3fc7f2b53d9b1f1a9b2094bba4aa5da470b41ec

    SHA256

    0b31f820d25abd4fd5d7aa20e58d0284c605a1d98bd631a4fdd747e90f74dc00

    SHA512

    cc471d2d4edbd3cba85a9975f556eaf197099cd2cb63a385259c9f9121a6cabf6b259a7ac0cf4228c73aec510578b0e2ab60f070b04f6b68c95038e5d5a3009e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7721719.exe

    Filesize

    631KB

    MD5

    127ef2d049cecc35d73bd6019954c652

    SHA1

    d3fc7f2b53d9b1f1a9b2094bba4aa5da470b41ec

    SHA256

    0b31f820d25abd4fd5d7aa20e58d0284c605a1d98bd631a4fdd747e90f74dc00

    SHA512

    cc471d2d4edbd3cba85a9975f556eaf197099cd2cb63a385259c9f9121a6cabf6b259a7ac0cf4228c73aec510578b0e2ab60f070b04f6b68c95038e5d5a3009e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v4382495.exe

    Filesize

    354KB

    MD5

    97b59fee4392cd9aa67deb751c166e03

    SHA1

    9b59345fb6972dd92b6a54e84089c4ce86bc4754

    SHA256

    076db31636182ff7196dc05aeadd894bc1882f0a810ebbdeb9f949cceb37f3e7

    SHA512

    90de89b66100c60c77b835ff9bfaecaf1dd89f0661117d82a7c87c4cb8c228b24bc7eba197594c3f5ec84eaa170c6c70c7ff6204fd4b4e15972b20927421e093

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v4382495.exe

    Filesize

    354KB

    MD5

    97b59fee4392cd9aa67deb751c166e03

    SHA1

    9b59345fb6972dd92b6a54e84089c4ce86bc4754

    SHA256

    076db31636182ff7196dc05aeadd894bc1882f0a810ebbdeb9f949cceb37f3e7

    SHA512

    90de89b66100c60c77b835ff9bfaecaf1dd89f0661117d82a7c87c4cb8c228b24bc7eba197594c3f5ec84eaa170c6c70c7ff6204fd4b4e15972b20927421e093

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a8940340.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a8940340.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a8940340.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v1671539.exe

    Filesize

    1.2MB

    MD5

    3621ed90351c92085a5011c472b169ab

    SHA1

    0bf688f4c56fff67727b0a64cd51478cb0cbbf49

    SHA256

    d72143ddd32942f5af4d73415916b9166bb19c34552696b1e4c69e0bf09916d7

    SHA512

    d5d2f273c765c15a9ead0d238411355689c0fdcd92b51300cf860605a73acee8964e2c945b0e00c04b1495f6c29c1f8714701d3f6602e0f88f1270fdbca8d474

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v1671539.exe

    Filesize

    1.2MB

    MD5

    3621ed90351c92085a5011c472b169ab

    SHA1

    0bf688f4c56fff67727b0a64cd51478cb0cbbf49

    SHA256

    d72143ddd32942f5af4d73415916b9166bb19c34552696b1e4c69e0bf09916d7

    SHA512

    d5d2f273c765c15a9ead0d238411355689c0fdcd92b51300cf860605a73acee8964e2c945b0e00c04b1495f6c29c1f8714701d3f6602e0f88f1270fdbca8d474

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6413627.exe

    Filesize

    953KB

    MD5

    52ab6f4c4ab8178a036683c67c534d74

    SHA1

    42efb2efc57bd3b707b97ed61f767a3a0baf224e

    SHA256

    f5c72197ade1e94d07c45891aeebe80cee86d7672307cd5e4961cfffd6d440fd

    SHA512

    577faad9496d213e3ae245c9f8bcbda7927895b4b05a8137d197e87188a2fada310ed3810c76ad4d5f25babe73214aa1419784c735bd3bf8cea14e05da4385c3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6413627.exe

    Filesize

    953KB

    MD5

    52ab6f4c4ab8178a036683c67c534d74

    SHA1

    42efb2efc57bd3b707b97ed61f767a3a0baf224e

    SHA256

    f5c72197ade1e94d07c45891aeebe80cee86d7672307cd5e4961cfffd6d440fd

    SHA512

    577faad9496d213e3ae245c9f8bcbda7927895b4b05a8137d197e87188a2fada310ed3810c76ad4d5f25babe73214aa1419784c735bd3bf8cea14e05da4385c3

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v2866374.exe

    Filesize

    797KB

    MD5

    beb31f6c3590c7245b53245c3c8c3be1

    SHA1

    dee33a1247dd90f9bfb4e43ea5f37f2998b10f72

    SHA256

    e271c8f1653fc2930f554f3c273d2bdd472d19a6106f47d8e08568dbc3c86c71

    SHA512

    99c65ca071577caf4fda27e3a76029b7f34c57fbe3a4b4fbec91818a0f817f9b5ab6c43e4d25b7538e405f96bafb89ae255468fb0bab4d651bd04d10dc66b3a1

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v2866374.exe

    Filesize

    797KB

    MD5

    beb31f6c3590c7245b53245c3c8c3be1

    SHA1

    dee33a1247dd90f9bfb4e43ea5f37f2998b10f72

    SHA256

    e271c8f1653fc2930f554f3c273d2bdd472d19a6106f47d8e08568dbc3c86c71

    SHA512

    99c65ca071577caf4fda27e3a76029b7f34c57fbe3a4b4fbec91818a0f817f9b5ab6c43e4d25b7538e405f96bafb89ae255468fb0bab4d651bd04d10dc66b3a1

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v7721719.exe

    Filesize

    631KB

    MD5

    127ef2d049cecc35d73bd6019954c652

    SHA1

    d3fc7f2b53d9b1f1a9b2094bba4aa5da470b41ec

    SHA256

    0b31f820d25abd4fd5d7aa20e58d0284c605a1d98bd631a4fdd747e90f74dc00

    SHA512

    cc471d2d4edbd3cba85a9975f556eaf197099cd2cb63a385259c9f9121a6cabf6b259a7ac0cf4228c73aec510578b0e2ab60f070b04f6b68c95038e5d5a3009e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v7721719.exe

    Filesize

    631KB

    MD5

    127ef2d049cecc35d73bd6019954c652

    SHA1

    d3fc7f2b53d9b1f1a9b2094bba4aa5da470b41ec

    SHA256

    0b31f820d25abd4fd5d7aa20e58d0284c605a1d98bd631a4fdd747e90f74dc00

    SHA512

    cc471d2d4edbd3cba85a9975f556eaf197099cd2cb63a385259c9f9121a6cabf6b259a7ac0cf4228c73aec510578b0e2ab60f070b04f6b68c95038e5d5a3009e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v4382495.exe

    Filesize

    354KB

    MD5

    97b59fee4392cd9aa67deb751c166e03

    SHA1

    9b59345fb6972dd92b6a54e84089c4ce86bc4754

    SHA256

    076db31636182ff7196dc05aeadd894bc1882f0a810ebbdeb9f949cceb37f3e7

    SHA512

    90de89b66100c60c77b835ff9bfaecaf1dd89f0661117d82a7c87c4cb8c228b24bc7eba197594c3f5ec84eaa170c6c70c7ff6204fd4b4e15972b20927421e093

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v4382495.exe

    Filesize

    354KB

    MD5

    97b59fee4392cd9aa67deb751c166e03

    SHA1

    9b59345fb6972dd92b6a54e84089c4ce86bc4754

    SHA256

    076db31636182ff7196dc05aeadd894bc1882f0a810ebbdeb9f949cceb37f3e7

    SHA512

    90de89b66100c60c77b835ff9bfaecaf1dd89f0661117d82a7c87c4cb8c228b24bc7eba197594c3f5ec84eaa170c6c70c7ff6204fd4b4e15972b20927421e093

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a8940340.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a8940340.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a8940340.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a8940340.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a8940340.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a8940340.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a8940340.exe

    Filesize

    250KB

    MD5

    f95d4f9e01fd938ebce691a35ab368ad

    SHA1

    1351232decbbc30ccc639d08cd87d948d0051b44

    SHA256

    92fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab

    SHA512

    c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1

  • memory/2568-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2568-65-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2568-64-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2568-63-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2568-66-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2568-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2568-72-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2568-68-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB