Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 14:32

General

  • Target

    eed5fb3aa6bc31327e11bcfa899e734fdc257f407c584fa611ea2e873de2b876.exe

  • Size

    1.3MB

  • MD5

    0285099e04dfce85b9c6b52eaef30412

  • SHA1

    155e4ac3b370b2f12a69b4f596eabcaef61e0bd2

  • SHA256

    eed5fb3aa6bc31327e11bcfa899e734fdc257f407c584fa611ea2e873de2b876

  • SHA512

    8f912b80cb2ca060cbf4696348f0c60fab90425b176404c3ea1db033059075e6b029e3bf20cdb296b82e1b76525d57e05f2156aac0cbfe6da6fc6f5695b582c7

  • SSDEEP

    24576:ayFJtD5rTiCkB4ACUCLgKC4ayvPLlRFWC8iLcAxpG3d/IOJpp1uU5Rhab:hHrTagUCc4ayXLlHWtacU2d/TNb5Rh

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 17 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eed5fb3aa6bc31327e11bcfa899e734fdc257f407c584fa611ea2e873de2b876.exe
    "C:\Users\Admin\AppData\Local\Temp\eed5fb3aa6bc31327e11bcfa899e734fdc257f407c584fa611ea2e873de2b876.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3425907.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3425907.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3729170.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3729170.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2120
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8586764.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8586764.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2656
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4020067.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4020067.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2620
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v0946035.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v0946035.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:2296
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a3145084.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a3145084.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2740
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2576
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 272
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3425907.exe

    Filesize

    1.2MB

    MD5

    e4d84f91c1afd6b53c04624613c180b7

    SHA1

    cec4d0a7f475df99494c98fb5d10518bdfbfb7f5

    SHA256

    d61141fde599e87f81fe61d0b444edaa494b8dd546f1b51b24827bcbb3abc879

    SHA512

    b1af9df55ab797117382e69aee12644551c501d654e8f769aa0de9784df3fa4fece8e47267d8e62502a2c27290b3b3a0f540b2e53b167524913013686bb36964

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3425907.exe

    Filesize

    1.2MB

    MD5

    e4d84f91c1afd6b53c04624613c180b7

    SHA1

    cec4d0a7f475df99494c98fb5d10518bdfbfb7f5

    SHA256

    d61141fde599e87f81fe61d0b444edaa494b8dd546f1b51b24827bcbb3abc879

    SHA512

    b1af9df55ab797117382e69aee12644551c501d654e8f769aa0de9784df3fa4fece8e47267d8e62502a2c27290b3b3a0f540b2e53b167524913013686bb36964

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3729170.exe

    Filesize

    953KB

    MD5

    cc3fc15840abedd55224d33ad35fccaa

    SHA1

    46a778eecd246902650d39e0677ce2a6efe15814

    SHA256

    c9a307824bb0da3518e4e97e86147e85bae3ca8879d3ad75ba07241645f2f7bd

    SHA512

    a67a577f29ac1e66ef601e3820642f104fe273bdd224146d4df76e3d210ff0a741ce174af33496a50eb07b407622e22a0c337b39ecb9444282821cc1901d083b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3729170.exe

    Filesize

    953KB

    MD5

    cc3fc15840abedd55224d33ad35fccaa

    SHA1

    46a778eecd246902650d39e0677ce2a6efe15814

    SHA256

    c9a307824bb0da3518e4e97e86147e85bae3ca8879d3ad75ba07241645f2f7bd

    SHA512

    a67a577f29ac1e66ef601e3820642f104fe273bdd224146d4df76e3d210ff0a741ce174af33496a50eb07b407622e22a0c337b39ecb9444282821cc1901d083b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8586764.exe

    Filesize

    797KB

    MD5

    6867b1d2ce8f8d79d03dfb9377bb0392

    SHA1

    fd9dd081ee1c65eb0aa69421db87c75cd152d8d5

    SHA256

    9bcf74dff57f71bcc89a3b864a0dbad15a3472a44f9513a5196c8e3aaef638d6

    SHA512

    2e62ab11c57a9ac934ba7f6344206ae6f925ade5a1a758dfda006c06007d0ea6473c03b902916a869b6d8dd85c2f7236f43a17b931df0752b0bbdd28fad8eb29

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8586764.exe

    Filesize

    797KB

    MD5

    6867b1d2ce8f8d79d03dfb9377bb0392

    SHA1

    fd9dd081ee1c65eb0aa69421db87c75cd152d8d5

    SHA256

    9bcf74dff57f71bcc89a3b864a0dbad15a3472a44f9513a5196c8e3aaef638d6

    SHA512

    2e62ab11c57a9ac934ba7f6344206ae6f925ade5a1a758dfda006c06007d0ea6473c03b902916a869b6d8dd85c2f7236f43a17b931df0752b0bbdd28fad8eb29

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4020067.exe

    Filesize

    631KB

    MD5

    057521f461888c00d0c73a52242a3807

    SHA1

    a00aefab57772bebf9c200ff62e1c64e46e90f0f

    SHA256

    37bbf62c333a680ecc9f6b4f7066de0c96dae4e0830e8ed7ac21cb69759134f8

    SHA512

    62350c745a9c4701aa1ce5ba271d952e0207f603b4d34318e2ef68e13e4c9ea74622af62f900092679b50a54bcf588b04b0b8ac626fdbe84d08729e26217d34e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4020067.exe

    Filesize

    631KB

    MD5

    057521f461888c00d0c73a52242a3807

    SHA1

    a00aefab57772bebf9c200ff62e1c64e46e90f0f

    SHA256

    37bbf62c333a680ecc9f6b4f7066de0c96dae4e0830e8ed7ac21cb69759134f8

    SHA512

    62350c745a9c4701aa1ce5ba271d952e0207f603b4d34318e2ef68e13e4c9ea74622af62f900092679b50a54bcf588b04b0b8ac626fdbe84d08729e26217d34e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v0946035.exe

    Filesize

    354KB

    MD5

    9f35a310e3140939064988807eaedb3d

    SHA1

    cd48c3c923c35f94586e76cf6ef85e928a7a36ed

    SHA256

    abfe1294861fa2d1f8fa63afc8e94449227d3da4ffd03dadf51bce9f39183539

    SHA512

    8a0511d113f83361d9e52156bf46c3f66c530e10f99c0443004ee62a33d7bde9eea382ec682766bbda8ecab01b9762459292c18f3accd36475d81164250309b5

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v0946035.exe

    Filesize

    354KB

    MD5

    9f35a310e3140939064988807eaedb3d

    SHA1

    cd48c3c923c35f94586e76cf6ef85e928a7a36ed

    SHA256

    abfe1294861fa2d1f8fa63afc8e94449227d3da4ffd03dadf51bce9f39183539

    SHA512

    8a0511d113f83361d9e52156bf46c3f66c530e10f99c0443004ee62a33d7bde9eea382ec682766bbda8ecab01b9762459292c18f3accd36475d81164250309b5

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a3145084.exe

    Filesize

    250KB

    MD5

    40162b40e9230c8bc4b07a6531fbdb61

    SHA1

    559a5b73fb503006e4a0d965e3f83f612f904308

    SHA256

    f48fcc8360000cf9abe2fce43d2674bb50f01b53a74c45ba34d02681f7e857a9

    SHA512

    53a4d100c8bd6da1df30ea78da40931eaf7ecd100a0aa8eedb90c2efe1577fe46019f51706fd6c391d221f0499c1edf5ab06fc3e6d881c2da311ffa1b0601573

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a3145084.exe

    Filesize

    250KB

    MD5

    40162b40e9230c8bc4b07a6531fbdb61

    SHA1

    559a5b73fb503006e4a0d965e3f83f612f904308

    SHA256

    f48fcc8360000cf9abe2fce43d2674bb50f01b53a74c45ba34d02681f7e857a9

    SHA512

    53a4d100c8bd6da1df30ea78da40931eaf7ecd100a0aa8eedb90c2efe1577fe46019f51706fd6c391d221f0499c1edf5ab06fc3e6d881c2da311ffa1b0601573

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a3145084.exe

    Filesize

    250KB

    MD5

    40162b40e9230c8bc4b07a6531fbdb61

    SHA1

    559a5b73fb503006e4a0d965e3f83f612f904308

    SHA256

    f48fcc8360000cf9abe2fce43d2674bb50f01b53a74c45ba34d02681f7e857a9

    SHA512

    53a4d100c8bd6da1df30ea78da40931eaf7ecd100a0aa8eedb90c2efe1577fe46019f51706fd6c391d221f0499c1edf5ab06fc3e6d881c2da311ffa1b0601573

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v3425907.exe

    Filesize

    1.2MB

    MD5

    e4d84f91c1afd6b53c04624613c180b7

    SHA1

    cec4d0a7f475df99494c98fb5d10518bdfbfb7f5

    SHA256

    d61141fde599e87f81fe61d0b444edaa494b8dd546f1b51b24827bcbb3abc879

    SHA512

    b1af9df55ab797117382e69aee12644551c501d654e8f769aa0de9784df3fa4fece8e47267d8e62502a2c27290b3b3a0f540b2e53b167524913013686bb36964

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v3425907.exe

    Filesize

    1.2MB

    MD5

    e4d84f91c1afd6b53c04624613c180b7

    SHA1

    cec4d0a7f475df99494c98fb5d10518bdfbfb7f5

    SHA256

    d61141fde599e87f81fe61d0b444edaa494b8dd546f1b51b24827bcbb3abc879

    SHA512

    b1af9df55ab797117382e69aee12644551c501d654e8f769aa0de9784df3fa4fece8e47267d8e62502a2c27290b3b3a0f540b2e53b167524913013686bb36964

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v3729170.exe

    Filesize

    953KB

    MD5

    cc3fc15840abedd55224d33ad35fccaa

    SHA1

    46a778eecd246902650d39e0677ce2a6efe15814

    SHA256

    c9a307824bb0da3518e4e97e86147e85bae3ca8879d3ad75ba07241645f2f7bd

    SHA512

    a67a577f29ac1e66ef601e3820642f104fe273bdd224146d4df76e3d210ff0a741ce174af33496a50eb07b407622e22a0c337b39ecb9444282821cc1901d083b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v3729170.exe

    Filesize

    953KB

    MD5

    cc3fc15840abedd55224d33ad35fccaa

    SHA1

    46a778eecd246902650d39e0677ce2a6efe15814

    SHA256

    c9a307824bb0da3518e4e97e86147e85bae3ca8879d3ad75ba07241645f2f7bd

    SHA512

    a67a577f29ac1e66ef601e3820642f104fe273bdd224146d4df76e3d210ff0a741ce174af33496a50eb07b407622e22a0c337b39ecb9444282821cc1901d083b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v8586764.exe

    Filesize

    797KB

    MD5

    6867b1d2ce8f8d79d03dfb9377bb0392

    SHA1

    fd9dd081ee1c65eb0aa69421db87c75cd152d8d5

    SHA256

    9bcf74dff57f71bcc89a3b864a0dbad15a3472a44f9513a5196c8e3aaef638d6

    SHA512

    2e62ab11c57a9ac934ba7f6344206ae6f925ade5a1a758dfda006c06007d0ea6473c03b902916a869b6d8dd85c2f7236f43a17b931df0752b0bbdd28fad8eb29

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v8586764.exe

    Filesize

    797KB

    MD5

    6867b1d2ce8f8d79d03dfb9377bb0392

    SHA1

    fd9dd081ee1c65eb0aa69421db87c75cd152d8d5

    SHA256

    9bcf74dff57f71bcc89a3b864a0dbad15a3472a44f9513a5196c8e3aaef638d6

    SHA512

    2e62ab11c57a9ac934ba7f6344206ae6f925ade5a1a758dfda006c06007d0ea6473c03b902916a869b6d8dd85c2f7236f43a17b931df0752b0bbdd28fad8eb29

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v4020067.exe

    Filesize

    631KB

    MD5

    057521f461888c00d0c73a52242a3807

    SHA1

    a00aefab57772bebf9c200ff62e1c64e46e90f0f

    SHA256

    37bbf62c333a680ecc9f6b4f7066de0c96dae4e0830e8ed7ac21cb69759134f8

    SHA512

    62350c745a9c4701aa1ce5ba271d952e0207f603b4d34318e2ef68e13e4c9ea74622af62f900092679b50a54bcf588b04b0b8ac626fdbe84d08729e26217d34e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v4020067.exe

    Filesize

    631KB

    MD5

    057521f461888c00d0c73a52242a3807

    SHA1

    a00aefab57772bebf9c200ff62e1c64e46e90f0f

    SHA256

    37bbf62c333a680ecc9f6b4f7066de0c96dae4e0830e8ed7ac21cb69759134f8

    SHA512

    62350c745a9c4701aa1ce5ba271d952e0207f603b4d34318e2ef68e13e4c9ea74622af62f900092679b50a54bcf588b04b0b8ac626fdbe84d08729e26217d34e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v0946035.exe

    Filesize

    354KB

    MD5

    9f35a310e3140939064988807eaedb3d

    SHA1

    cd48c3c923c35f94586e76cf6ef85e928a7a36ed

    SHA256

    abfe1294861fa2d1f8fa63afc8e94449227d3da4ffd03dadf51bce9f39183539

    SHA512

    8a0511d113f83361d9e52156bf46c3f66c530e10f99c0443004ee62a33d7bde9eea382ec682766bbda8ecab01b9762459292c18f3accd36475d81164250309b5

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v0946035.exe

    Filesize

    354KB

    MD5

    9f35a310e3140939064988807eaedb3d

    SHA1

    cd48c3c923c35f94586e76cf6ef85e928a7a36ed

    SHA256

    abfe1294861fa2d1f8fa63afc8e94449227d3da4ffd03dadf51bce9f39183539

    SHA512

    8a0511d113f83361d9e52156bf46c3f66c530e10f99c0443004ee62a33d7bde9eea382ec682766bbda8ecab01b9762459292c18f3accd36475d81164250309b5

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a3145084.exe

    Filesize

    250KB

    MD5

    40162b40e9230c8bc4b07a6531fbdb61

    SHA1

    559a5b73fb503006e4a0d965e3f83f612f904308

    SHA256

    f48fcc8360000cf9abe2fce43d2674bb50f01b53a74c45ba34d02681f7e857a9

    SHA512

    53a4d100c8bd6da1df30ea78da40931eaf7ecd100a0aa8eedb90c2efe1577fe46019f51706fd6c391d221f0499c1edf5ab06fc3e6d881c2da311ffa1b0601573

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a3145084.exe

    Filesize

    250KB

    MD5

    40162b40e9230c8bc4b07a6531fbdb61

    SHA1

    559a5b73fb503006e4a0d965e3f83f612f904308

    SHA256

    f48fcc8360000cf9abe2fce43d2674bb50f01b53a74c45ba34d02681f7e857a9

    SHA512

    53a4d100c8bd6da1df30ea78da40931eaf7ecd100a0aa8eedb90c2efe1577fe46019f51706fd6c391d221f0499c1edf5ab06fc3e6d881c2da311ffa1b0601573

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a3145084.exe

    Filesize

    250KB

    MD5

    40162b40e9230c8bc4b07a6531fbdb61

    SHA1

    559a5b73fb503006e4a0d965e3f83f612f904308

    SHA256

    f48fcc8360000cf9abe2fce43d2674bb50f01b53a74c45ba34d02681f7e857a9

    SHA512

    53a4d100c8bd6da1df30ea78da40931eaf7ecd100a0aa8eedb90c2efe1577fe46019f51706fd6c391d221f0499c1edf5ab06fc3e6d881c2da311ffa1b0601573

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a3145084.exe

    Filesize

    250KB

    MD5

    40162b40e9230c8bc4b07a6531fbdb61

    SHA1

    559a5b73fb503006e4a0d965e3f83f612f904308

    SHA256

    f48fcc8360000cf9abe2fce43d2674bb50f01b53a74c45ba34d02681f7e857a9

    SHA512

    53a4d100c8bd6da1df30ea78da40931eaf7ecd100a0aa8eedb90c2efe1577fe46019f51706fd6c391d221f0499c1edf5ab06fc3e6d881c2da311ffa1b0601573

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a3145084.exe

    Filesize

    250KB

    MD5

    40162b40e9230c8bc4b07a6531fbdb61

    SHA1

    559a5b73fb503006e4a0d965e3f83f612f904308

    SHA256

    f48fcc8360000cf9abe2fce43d2674bb50f01b53a74c45ba34d02681f7e857a9

    SHA512

    53a4d100c8bd6da1df30ea78da40931eaf7ecd100a0aa8eedb90c2efe1577fe46019f51706fd6c391d221f0499c1edf5ab06fc3e6d881c2da311ffa1b0601573

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a3145084.exe

    Filesize

    250KB

    MD5

    40162b40e9230c8bc4b07a6531fbdb61

    SHA1

    559a5b73fb503006e4a0d965e3f83f612f904308

    SHA256

    f48fcc8360000cf9abe2fce43d2674bb50f01b53a74c45ba34d02681f7e857a9

    SHA512

    53a4d100c8bd6da1df30ea78da40931eaf7ecd100a0aa8eedb90c2efe1577fe46019f51706fd6c391d221f0499c1edf5ab06fc3e6d881c2da311ffa1b0601573

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a3145084.exe

    Filesize

    250KB

    MD5

    40162b40e9230c8bc4b07a6531fbdb61

    SHA1

    559a5b73fb503006e4a0d965e3f83f612f904308

    SHA256

    f48fcc8360000cf9abe2fce43d2674bb50f01b53a74c45ba34d02681f7e857a9

    SHA512

    53a4d100c8bd6da1df30ea78da40931eaf7ecd100a0aa8eedb90c2efe1577fe46019f51706fd6c391d221f0499c1edf5ab06fc3e6d881c2da311ffa1b0601573

  • memory/2576-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2576-68-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2576-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2576-72-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2576-66-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2576-65-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2576-64-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2576-63-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB