Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 14:23

General

  • Target

    1f969ae134d79f93ac51d7c520c1d6f7c7f514e428710abed527d49edf2c918c.exe

  • Size

    1.1MB

  • MD5

    8735a1a9212fe85f7c868b23e52131c5

  • SHA1

    3b824d40d28ffbbe67fa286444080b542fcaab67

  • SHA256

    1f969ae134d79f93ac51d7c520c1d6f7c7f514e428710abed527d49edf2c918c

  • SHA512

    0359f37e1df8c11e1133e11f5b16fc0c6d6a326c5813bc3ed7262f3d955a04f6a229f1c45176ecded9cbc867650c3009f87182740c1e3ceffaec1e4fc0f9edb9

  • SSDEEP

    24576:byTtBdhR7faum50eqNv4qQj6YdUDh2qIeP/zFOSsn:OT9hxfaum50C6YdUDh2A/k

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f969ae134d79f93ac51d7c520c1d6f7c7f514e428710abed527d49edf2c918c.exe
    "C:\Users\Admin\AppData\Local\Temp\1f969ae134d79f93ac51d7c520c1d6f7c7f514e428710abed527d49edf2c918c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0463322.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0463322.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0557947.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0557947.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3068
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6208471.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6208471.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2676
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7152440.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7152440.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2028
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6215013.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6215013.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2552
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2800
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:2768
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2792
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 288
                    7⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:2548

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0463322.exe

        Filesize

        998KB

        MD5

        6e2947ccf8700b60d7e46b1134064591

        SHA1

        b6fed57f5ce0adafc3e32740fde4d893092e1686

        SHA256

        70fc0ff30c6d9a02bd10dcaca57443c55a1f58ecfb3f0b2e7a04effbe030f925

        SHA512

        d4b4a6d6d1c6e71f39ae1f0fea2a590b67966163b3dca0f553eb228ab79462841a68f33913fc2fdaed1c2cdd36a97f38f0e9f4ca9ed6c804042ef328a6f78c74

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0463322.exe

        Filesize

        998KB

        MD5

        6e2947ccf8700b60d7e46b1134064591

        SHA1

        b6fed57f5ce0adafc3e32740fde4d893092e1686

        SHA256

        70fc0ff30c6d9a02bd10dcaca57443c55a1f58ecfb3f0b2e7a04effbe030f925

        SHA512

        d4b4a6d6d1c6e71f39ae1f0fea2a590b67966163b3dca0f553eb228ab79462841a68f33913fc2fdaed1c2cdd36a97f38f0e9f4ca9ed6c804042ef328a6f78c74

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0557947.exe

        Filesize

        815KB

        MD5

        5610294f524baa1e38c9313f5b75cdaf

        SHA1

        98a6c13299ea5f522b57ca1d56d6f59942774e0c

        SHA256

        b7699aaf6e9aac9f2debbf4440f9482dc29aceee0cabf80f80cf53f8854593de

        SHA512

        5d57fc8dad02ec0ec953547f642db3175117b24dd7cb11efdbf74e473c8f7e3ec1ae9ec71f01624ce6735916eae9f5e0b4d0376698c16ecfec27edf908978f33

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0557947.exe

        Filesize

        815KB

        MD5

        5610294f524baa1e38c9313f5b75cdaf

        SHA1

        98a6c13299ea5f522b57ca1d56d6f59942774e0c

        SHA256

        b7699aaf6e9aac9f2debbf4440f9482dc29aceee0cabf80f80cf53f8854593de

        SHA512

        5d57fc8dad02ec0ec953547f642db3175117b24dd7cb11efdbf74e473c8f7e3ec1ae9ec71f01624ce6735916eae9f5e0b4d0376698c16ecfec27edf908978f33

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6208471.exe

        Filesize

        632KB

        MD5

        110182264e3f784634970d4ed507c035

        SHA1

        65cc8088343bd80550d268a9a738b7f0edb37d58

        SHA256

        bd1f57e9278b1c4ba46dfedc17740f6c0b6a9b3d7ff4531396ae44084f29dcde

        SHA512

        05b15d674e251cd5ce7bedb59b1eaa32c536a3b23b95e362e558c776a9e387d65ffd24f6b0a19fd4f6959867531999956488fa0b289469ba3759cf435627444d

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6208471.exe

        Filesize

        632KB

        MD5

        110182264e3f784634970d4ed507c035

        SHA1

        65cc8088343bd80550d268a9a738b7f0edb37d58

        SHA256

        bd1f57e9278b1c4ba46dfedc17740f6c0b6a9b3d7ff4531396ae44084f29dcde

        SHA512

        05b15d674e251cd5ce7bedb59b1eaa32c536a3b23b95e362e558c776a9e387d65ffd24f6b0a19fd4f6959867531999956488fa0b289469ba3759cf435627444d

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7152440.exe

        Filesize

        354KB

        MD5

        6f770987f819c1b8b94b3c6b08ff623d

        SHA1

        03c2f0fe347fb1bcb8f2b190ff496c92ff5bd1e0

        SHA256

        645d938c1643586f36ba3e253c0f44062aaa915daf7ceb0f7fc7fe6dfcb54937

        SHA512

        6f3ec36d2e83a3de14acfab8c73e81d5e3023bffa184bbb0ee3793de4887b401f6de38a48c1228470482891cd8d212e911fb302b76a7770370518fc022f2c541

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7152440.exe

        Filesize

        354KB

        MD5

        6f770987f819c1b8b94b3c6b08ff623d

        SHA1

        03c2f0fe347fb1bcb8f2b190ff496c92ff5bd1e0

        SHA256

        645d938c1643586f36ba3e253c0f44062aaa915daf7ceb0f7fc7fe6dfcb54937

        SHA512

        6f3ec36d2e83a3de14acfab8c73e81d5e3023bffa184bbb0ee3793de4887b401f6de38a48c1228470482891cd8d212e911fb302b76a7770370518fc022f2c541

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6215013.exe

        Filesize

        250KB

        MD5

        11aa5698beed010b6722f011452fc2ed

        SHA1

        5e3afae884746b4ef9ea364817f7673b495acb8b

        SHA256

        e475249bc4a8b5f97705ab2c45b34974d2b7393b5a61f211f529556455757213

        SHA512

        6ff4a102ac01f447808902e0ec95f1f8fc2b21057a65a1c287a91a2d003ae2f1f2f10eaebc3ae6bfd05cb895d8909112bf1e624a8ee08c8976fe3e17c865e3c1

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6215013.exe

        Filesize

        250KB

        MD5

        11aa5698beed010b6722f011452fc2ed

        SHA1

        5e3afae884746b4ef9ea364817f7673b495acb8b

        SHA256

        e475249bc4a8b5f97705ab2c45b34974d2b7393b5a61f211f529556455757213

        SHA512

        6ff4a102ac01f447808902e0ec95f1f8fc2b21057a65a1c287a91a2d003ae2f1f2f10eaebc3ae6bfd05cb895d8909112bf1e624a8ee08c8976fe3e17c865e3c1

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6215013.exe

        Filesize

        250KB

        MD5

        11aa5698beed010b6722f011452fc2ed

        SHA1

        5e3afae884746b4ef9ea364817f7673b495acb8b

        SHA256

        e475249bc4a8b5f97705ab2c45b34974d2b7393b5a61f211f529556455757213

        SHA512

        6ff4a102ac01f447808902e0ec95f1f8fc2b21057a65a1c287a91a2d003ae2f1f2f10eaebc3ae6bfd05cb895d8909112bf1e624a8ee08c8976fe3e17c865e3c1

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0463322.exe

        Filesize

        998KB

        MD5

        6e2947ccf8700b60d7e46b1134064591

        SHA1

        b6fed57f5ce0adafc3e32740fde4d893092e1686

        SHA256

        70fc0ff30c6d9a02bd10dcaca57443c55a1f58ecfb3f0b2e7a04effbe030f925

        SHA512

        d4b4a6d6d1c6e71f39ae1f0fea2a590b67966163b3dca0f553eb228ab79462841a68f33913fc2fdaed1c2cdd36a97f38f0e9f4ca9ed6c804042ef328a6f78c74

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0463322.exe

        Filesize

        998KB

        MD5

        6e2947ccf8700b60d7e46b1134064591

        SHA1

        b6fed57f5ce0adafc3e32740fde4d893092e1686

        SHA256

        70fc0ff30c6d9a02bd10dcaca57443c55a1f58ecfb3f0b2e7a04effbe030f925

        SHA512

        d4b4a6d6d1c6e71f39ae1f0fea2a590b67966163b3dca0f553eb228ab79462841a68f33913fc2fdaed1c2cdd36a97f38f0e9f4ca9ed6c804042ef328a6f78c74

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z0557947.exe

        Filesize

        815KB

        MD5

        5610294f524baa1e38c9313f5b75cdaf

        SHA1

        98a6c13299ea5f522b57ca1d56d6f59942774e0c

        SHA256

        b7699aaf6e9aac9f2debbf4440f9482dc29aceee0cabf80f80cf53f8854593de

        SHA512

        5d57fc8dad02ec0ec953547f642db3175117b24dd7cb11efdbf74e473c8f7e3ec1ae9ec71f01624ce6735916eae9f5e0b4d0376698c16ecfec27edf908978f33

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z0557947.exe

        Filesize

        815KB

        MD5

        5610294f524baa1e38c9313f5b75cdaf

        SHA1

        98a6c13299ea5f522b57ca1d56d6f59942774e0c

        SHA256

        b7699aaf6e9aac9f2debbf4440f9482dc29aceee0cabf80f80cf53f8854593de

        SHA512

        5d57fc8dad02ec0ec953547f642db3175117b24dd7cb11efdbf74e473c8f7e3ec1ae9ec71f01624ce6735916eae9f5e0b4d0376698c16ecfec27edf908978f33

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6208471.exe

        Filesize

        632KB

        MD5

        110182264e3f784634970d4ed507c035

        SHA1

        65cc8088343bd80550d268a9a738b7f0edb37d58

        SHA256

        bd1f57e9278b1c4ba46dfedc17740f6c0b6a9b3d7ff4531396ae44084f29dcde

        SHA512

        05b15d674e251cd5ce7bedb59b1eaa32c536a3b23b95e362e558c776a9e387d65ffd24f6b0a19fd4f6959867531999956488fa0b289469ba3759cf435627444d

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6208471.exe

        Filesize

        632KB

        MD5

        110182264e3f784634970d4ed507c035

        SHA1

        65cc8088343bd80550d268a9a738b7f0edb37d58

        SHA256

        bd1f57e9278b1c4ba46dfedc17740f6c0b6a9b3d7ff4531396ae44084f29dcde

        SHA512

        05b15d674e251cd5ce7bedb59b1eaa32c536a3b23b95e362e558c776a9e387d65ffd24f6b0a19fd4f6959867531999956488fa0b289469ba3759cf435627444d

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7152440.exe

        Filesize

        354KB

        MD5

        6f770987f819c1b8b94b3c6b08ff623d

        SHA1

        03c2f0fe347fb1bcb8f2b190ff496c92ff5bd1e0

        SHA256

        645d938c1643586f36ba3e253c0f44062aaa915daf7ceb0f7fc7fe6dfcb54937

        SHA512

        6f3ec36d2e83a3de14acfab8c73e81d5e3023bffa184bbb0ee3793de4887b401f6de38a48c1228470482891cd8d212e911fb302b76a7770370518fc022f2c541

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7152440.exe

        Filesize

        354KB

        MD5

        6f770987f819c1b8b94b3c6b08ff623d

        SHA1

        03c2f0fe347fb1bcb8f2b190ff496c92ff5bd1e0

        SHA256

        645d938c1643586f36ba3e253c0f44062aaa915daf7ceb0f7fc7fe6dfcb54937

        SHA512

        6f3ec36d2e83a3de14acfab8c73e81d5e3023bffa184bbb0ee3793de4887b401f6de38a48c1228470482891cd8d212e911fb302b76a7770370518fc022f2c541

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6215013.exe

        Filesize

        250KB

        MD5

        11aa5698beed010b6722f011452fc2ed

        SHA1

        5e3afae884746b4ef9ea364817f7673b495acb8b

        SHA256

        e475249bc4a8b5f97705ab2c45b34974d2b7393b5a61f211f529556455757213

        SHA512

        6ff4a102ac01f447808902e0ec95f1f8fc2b21057a65a1c287a91a2d003ae2f1f2f10eaebc3ae6bfd05cb895d8909112bf1e624a8ee08c8976fe3e17c865e3c1

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6215013.exe

        Filesize

        250KB

        MD5

        11aa5698beed010b6722f011452fc2ed

        SHA1

        5e3afae884746b4ef9ea364817f7673b495acb8b

        SHA256

        e475249bc4a8b5f97705ab2c45b34974d2b7393b5a61f211f529556455757213

        SHA512

        6ff4a102ac01f447808902e0ec95f1f8fc2b21057a65a1c287a91a2d003ae2f1f2f10eaebc3ae6bfd05cb895d8909112bf1e624a8ee08c8976fe3e17c865e3c1

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6215013.exe

        Filesize

        250KB

        MD5

        11aa5698beed010b6722f011452fc2ed

        SHA1

        5e3afae884746b4ef9ea364817f7673b495acb8b

        SHA256

        e475249bc4a8b5f97705ab2c45b34974d2b7393b5a61f211f529556455757213

        SHA512

        6ff4a102ac01f447808902e0ec95f1f8fc2b21057a65a1c287a91a2d003ae2f1f2f10eaebc3ae6bfd05cb895d8909112bf1e624a8ee08c8976fe3e17c865e3c1

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6215013.exe

        Filesize

        250KB

        MD5

        11aa5698beed010b6722f011452fc2ed

        SHA1

        5e3afae884746b4ef9ea364817f7673b495acb8b

        SHA256

        e475249bc4a8b5f97705ab2c45b34974d2b7393b5a61f211f529556455757213

        SHA512

        6ff4a102ac01f447808902e0ec95f1f8fc2b21057a65a1c287a91a2d003ae2f1f2f10eaebc3ae6bfd05cb895d8909112bf1e624a8ee08c8976fe3e17c865e3c1

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6215013.exe

        Filesize

        250KB

        MD5

        11aa5698beed010b6722f011452fc2ed

        SHA1

        5e3afae884746b4ef9ea364817f7673b495acb8b

        SHA256

        e475249bc4a8b5f97705ab2c45b34974d2b7393b5a61f211f529556455757213

        SHA512

        6ff4a102ac01f447808902e0ec95f1f8fc2b21057a65a1c287a91a2d003ae2f1f2f10eaebc3ae6bfd05cb895d8909112bf1e624a8ee08c8976fe3e17c865e3c1

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6215013.exe

        Filesize

        250KB

        MD5

        11aa5698beed010b6722f011452fc2ed

        SHA1

        5e3afae884746b4ef9ea364817f7673b495acb8b

        SHA256

        e475249bc4a8b5f97705ab2c45b34974d2b7393b5a61f211f529556455757213

        SHA512

        6ff4a102ac01f447808902e0ec95f1f8fc2b21057a65a1c287a91a2d003ae2f1f2f10eaebc3ae6bfd05cb895d8909112bf1e624a8ee08c8976fe3e17c865e3c1

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6215013.exe

        Filesize

        250KB

        MD5

        11aa5698beed010b6722f011452fc2ed

        SHA1

        5e3afae884746b4ef9ea364817f7673b495acb8b

        SHA256

        e475249bc4a8b5f97705ab2c45b34974d2b7393b5a61f211f529556455757213

        SHA512

        6ff4a102ac01f447808902e0ec95f1f8fc2b21057a65a1c287a91a2d003ae2f1f2f10eaebc3ae6bfd05cb895d8909112bf1e624a8ee08c8976fe3e17c865e3c1

      • memory/2792-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

        Filesize

        4KB

      • memory/2792-58-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2792-60-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2792-62-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2792-56-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2792-55-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2792-54-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2792-53-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB