Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 15:47

General

  • Target

    825eda6b4b6f8727e501255ec4ab3408d0333178dfde0154d6065ed463707354.exe

  • Size

    1.1MB

  • MD5

    3976bf747a4e5e082caed947793d6819

  • SHA1

    4c682abacd529a98bcfb8938970e24f3473e795f

  • SHA256

    825eda6b4b6f8727e501255ec4ab3408d0333178dfde0154d6065ed463707354

  • SHA512

    7996a89ed3c070cafd19581fb417ba21de780ce1ce8fe1fea52ec1dc2591d2b116fd9b5061db1479ce3f449ca6d3fa769303ee060aaad41d06e96cfa116c6df4

  • SSDEEP

    24576:yyzkMdbcixPdpXdRxkqEblBNppYUpy+amiYHD:ZtVcsND6B6OJamiy

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\825eda6b4b6f8727e501255ec4ab3408d0333178dfde0154d6065ed463707354.exe
    "C:\Users\Admin\AppData\Local\Temp\825eda6b4b6f8727e501255ec4ab3408d0333178dfde0154d6065ed463707354.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8747704.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8747704.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3618538.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3618538.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:824
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9242169.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9242169.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1876
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2291077.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2291077.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:660
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4855603.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4855603.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2892
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:1464
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2676
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2892 -s 280
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8747704.exe

      Filesize

      982KB

      MD5

      0f03ebcc93f7819e4086c853cfa00821

      SHA1

      36eebf8cf07c100d09b27112c800e18ff622e054

      SHA256

      fb8d2865b72d1dd215581208caaeacb86fa4cfc5194330478b8d068e986dd8ab

      SHA512

      7957e50d33eb993f11dba94d36ca78df59f34a97c833867f8db3a23e22781d1ad6abb17e464639e9bbd25045a1cc73f2781be209bc23b44be499c41512ba9634

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8747704.exe

      Filesize

      982KB

      MD5

      0f03ebcc93f7819e4086c853cfa00821

      SHA1

      36eebf8cf07c100d09b27112c800e18ff622e054

      SHA256

      fb8d2865b72d1dd215581208caaeacb86fa4cfc5194330478b8d068e986dd8ab

      SHA512

      7957e50d33eb993f11dba94d36ca78df59f34a97c833867f8db3a23e22781d1ad6abb17e464639e9bbd25045a1cc73f2781be209bc23b44be499c41512ba9634

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3618538.exe

      Filesize

      801KB

      MD5

      1d4b41b634c4a57e8fbca1eb12631463

      SHA1

      7afab611c2697e50cf04b60e0e97fa5c462600e0

      SHA256

      16e8de159ec837ce4bd8d4a13aa29255db0bb33dcaa5df581dfc8df8e4f913c8

      SHA512

      dfdc4513ad10e6a98dfb381db1d6153dcc94313c37478afc81e9ab66ba7835116fc9aa15c76f949693ce57a0d87aa18ecd11790482e20bc11a2cfb5dbea87b1d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3618538.exe

      Filesize

      801KB

      MD5

      1d4b41b634c4a57e8fbca1eb12631463

      SHA1

      7afab611c2697e50cf04b60e0e97fa5c462600e0

      SHA256

      16e8de159ec837ce4bd8d4a13aa29255db0bb33dcaa5df581dfc8df8e4f913c8

      SHA512

      dfdc4513ad10e6a98dfb381db1d6153dcc94313c37478afc81e9ab66ba7835116fc9aa15c76f949693ce57a0d87aa18ecd11790482e20bc11a2cfb5dbea87b1d

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9242169.exe

      Filesize

      618KB

      MD5

      ff1a9f9452344b861898615e7162ca85

      SHA1

      b8462ac2d0d5659a027277aca3afaa6b5d7fc5b5

      SHA256

      ab6298f9930d06791928280baab1efe1bc1fdead5fbdbe6937b40e66351105ae

      SHA512

      7ba4a1b759ca4784e964b8ecf5288c4165a055f7deae777aa2accbe8b96608e0dc7b10a231efd971bb3410dd532881793a4af998e2c22373f33a2c24a0474485

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9242169.exe

      Filesize

      618KB

      MD5

      ff1a9f9452344b861898615e7162ca85

      SHA1

      b8462ac2d0d5659a027277aca3afaa6b5d7fc5b5

      SHA256

      ab6298f9930d06791928280baab1efe1bc1fdead5fbdbe6937b40e66351105ae

      SHA512

      7ba4a1b759ca4784e964b8ecf5288c4165a055f7deae777aa2accbe8b96608e0dc7b10a231efd971bb3410dd532881793a4af998e2c22373f33a2c24a0474485

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2291077.exe

      Filesize

      347KB

      MD5

      c8a9178a6bfd0d7d1ba0bdb9a8dcd86b

      SHA1

      a14737d2567d27aa0c95945935f92dd49c50617f

      SHA256

      8a66e38aa4a1d526b0533bfa1b486f9df472479b654deff3dc9a97f966c113d5

      SHA512

      51dd09a14156be64cd59ea169e75b91af0cabb2ae3ef1c9c8bcf0e21df548f94e15c268d9160ffead4b3b1443c8ad8a7292e9082e71fbe2c1d65c0fbdf342b0e

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2291077.exe

      Filesize

      347KB

      MD5

      c8a9178a6bfd0d7d1ba0bdb9a8dcd86b

      SHA1

      a14737d2567d27aa0c95945935f92dd49c50617f

      SHA256

      8a66e38aa4a1d526b0533bfa1b486f9df472479b654deff3dc9a97f966c113d5

      SHA512

      51dd09a14156be64cd59ea169e75b91af0cabb2ae3ef1c9c8bcf0e21df548f94e15c268d9160ffead4b3b1443c8ad8a7292e9082e71fbe2c1d65c0fbdf342b0e

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4855603.exe

      Filesize

      235KB

      MD5

      4b0f7048d7ddb60c01c8f535af61a40c

      SHA1

      f41e518d5d633b69030cef5458e6291b2ee905ef

      SHA256

      78920e14bf84c7789f83ab9866939fd661a2f5a14b3d5eaa6330e6c45f60dff9

      SHA512

      d7284ed511c7f426da66871507d6120d86dfb0edd13af81fec6f5e98b0a256d7995a8c7933338975470a3e9795fe8965424392b052184bf0a769a4b9e176a0b4

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4855603.exe

      Filesize

      235KB

      MD5

      4b0f7048d7ddb60c01c8f535af61a40c

      SHA1

      f41e518d5d633b69030cef5458e6291b2ee905ef

      SHA256

      78920e14bf84c7789f83ab9866939fd661a2f5a14b3d5eaa6330e6c45f60dff9

      SHA512

      d7284ed511c7f426da66871507d6120d86dfb0edd13af81fec6f5e98b0a256d7995a8c7933338975470a3e9795fe8965424392b052184bf0a769a4b9e176a0b4

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4855603.exe

      Filesize

      235KB

      MD5

      4b0f7048d7ddb60c01c8f535af61a40c

      SHA1

      f41e518d5d633b69030cef5458e6291b2ee905ef

      SHA256

      78920e14bf84c7789f83ab9866939fd661a2f5a14b3d5eaa6330e6c45f60dff9

      SHA512

      d7284ed511c7f426da66871507d6120d86dfb0edd13af81fec6f5e98b0a256d7995a8c7933338975470a3e9795fe8965424392b052184bf0a769a4b9e176a0b4

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8747704.exe

      Filesize

      982KB

      MD5

      0f03ebcc93f7819e4086c853cfa00821

      SHA1

      36eebf8cf07c100d09b27112c800e18ff622e054

      SHA256

      fb8d2865b72d1dd215581208caaeacb86fa4cfc5194330478b8d068e986dd8ab

      SHA512

      7957e50d33eb993f11dba94d36ca78df59f34a97c833867f8db3a23e22781d1ad6abb17e464639e9bbd25045a1cc73f2781be209bc23b44be499c41512ba9634

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8747704.exe

      Filesize

      982KB

      MD5

      0f03ebcc93f7819e4086c853cfa00821

      SHA1

      36eebf8cf07c100d09b27112c800e18ff622e054

      SHA256

      fb8d2865b72d1dd215581208caaeacb86fa4cfc5194330478b8d068e986dd8ab

      SHA512

      7957e50d33eb993f11dba94d36ca78df59f34a97c833867f8db3a23e22781d1ad6abb17e464639e9bbd25045a1cc73f2781be209bc23b44be499c41512ba9634

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3618538.exe

      Filesize

      801KB

      MD5

      1d4b41b634c4a57e8fbca1eb12631463

      SHA1

      7afab611c2697e50cf04b60e0e97fa5c462600e0

      SHA256

      16e8de159ec837ce4bd8d4a13aa29255db0bb33dcaa5df581dfc8df8e4f913c8

      SHA512

      dfdc4513ad10e6a98dfb381db1d6153dcc94313c37478afc81e9ab66ba7835116fc9aa15c76f949693ce57a0d87aa18ecd11790482e20bc11a2cfb5dbea87b1d

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z3618538.exe

      Filesize

      801KB

      MD5

      1d4b41b634c4a57e8fbca1eb12631463

      SHA1

      7afab611c2697e50cf04b60e0e97fa5c462600e0

      SHA256

      16e8de159ec837ce4bd8d4a13aa29255db0bb33dcaa5df581dfc8df8e4f913c8

      SHA512

      dfdc4513ad10e6a98dfb381db1d6153dcc94313c37478afc81e9ab66ba7835116fc9aa15c76f949693ce57a0d87aa18ecd11790482e20bc11a2cfb5dbea87b1d

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9242169.exe

      Filesize

      618KB

      MD5

      ff1a9f9452344b861898615e7162ca85

      SHA1

      b8462ac2d0d5659a027277aca3afaa6b5d7fc5b5

      SHA256

      ab6298f9930d06791928280baab1efe1bc1fdead5fbdbe6937b40e66351105ae

      SHA512

      7ba4a1b759ca4784e964b8ecf5288c4165a055f7deae777aa2accbe8b96608e0dc7b10a231efd971bb3410dd532881793a4af998e2c22373f33a2c24a0474485

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9242169.exe

      Filesize

      618KB

      MD5

      ff1a9f9452344b861898615e7162ca85

      SHA1

      b8462ac2d0d5659a027277aca3afaa6b5d7fc5b5

      SHA256

      ab6298f9930d06791928280baab1efe1bc1fdead5fbdbe6937b40e66351105ae

      SHA512

      7ba4a1b759ca4784e964b8ecf5288c4165a055f7deae777aa2accbe8b96608e0dc7b10a231efd971bb3410dd532881793a4af998e2c22373f33a2c24a0474485

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2291077.exe

      Filesize

      347KB

      MD5

      c8a9178a6bfd0d7d1ba0bdb9a8dcd86b

      SHA1

      a14737d2567d27aa0c95945935f92dd49c50617f

      SHA256

      8a66e38aa4a1d526b0533bfa1b486f9df472479b654deff3dc9a97f966c113d5

      SHA512

      51dd09a14156be64cd59ea169e75b91af0cabb2ae3ef1c9c8bcf0e21df548f94e15c268d9160ffead4b3b1443c8ad8a7292e9082e71fbe2c1d65c0fbdf342b0e

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2291077.exe

      Filesize

      347KB

      MD5

      c8a9178a6bfd0d7d1ba0bdb9a8dcd86b

      SHA1

      a14737d2567d27aa0c95945935f92dd49c50617f

      SHA256

      8a66e38aa4a1d526b0533bfa1b486f9df472479b654deff3dc9a97f966c113d5

      SHA512

      51dd09a14156be64cd59ea169e75b91af0cabb2ae3ef1c9c8bcf0e21df548f94e15c268d9160ffead4b3b1443c8ad8a7292e9082e71fbe2c1d65c0fbdf342b0e

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4855603.exe

      Filesize

      235KB

      MD5

      4b0f7048d7ddb60c01c8f535af61a40c

      SHA1

      f41e518d5d633b69030cef5458e6291b2ee905ef

      SHA256

      78920e14bf84c7789f83ab9866939fd661a2f5a14b3d5eaa6330e6c45f60dff9

      SHA512

      d7284ed511c7f426da66871507d6120d86dfb0edd13af81fec6f5e98b0a256d7995a8c7933338975470a3e9795fe8965424392b052184bf0a769a4b9e176a0b4

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4855603.exe

      Filesize

      235KB

      MD5

      4b0f7048d7ddb60c01c8f535af61a40c

      SHA1

      f41e518d5d633b69030cef5458e6291b2ee905ef

      SHA256

      78920e14bf84c7789f83ab9866939fd661a2f5a14b3d5eaa6330e6c45f60dff9

      SHA512

      d7284ed511c7f426da66871507d6120d86dfb0edd13af81fec6f5e98b0a256d7995a8c7933338975470a3e9795fe8965424392b052184bf0a769a4b9e176a0b4

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4855603.exe

      Filesize

      235KB

      MD5

      4b0f7048d7ddb60c01c8f535af61a40c

      SHA1

      f41e518d5d633b69030cef5458e6291b2ee905ef

      SHA256

      78920e14bf84c7789f83ab9866939fd661a2f5a14b3d5eaa6330e6c45f60dff9

      SHA512

      d7284ed511c7f426da66871507d6120d86dfb0edd13af81fec6f5e98b0a256d7995a8c7933338975470a3e9795fe8965424392b052184bf0a769a4b9e176a0b4

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4855603.exe

      Filesize

      235KB

      MD5

      4b0f7048d7ddb60c01c8f535af61a40c

      SHA1

      f41e518d5d633b69030cef5458e6291b2ee905ef

      SHA256

      78920e14bf84c7789f83ab9866939fd661a2f5a14b3d5eaa6330e6c45f60dff9

      SHA512

      d7284ed511c7f426da66871507d6120d86dfb0edd13af81fec6f5e98b0a256d7995a8c7933338975470a3e9795fe8965424392b052184bf0a769a4b9e176a0b4

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4855603.exe

      Filesize

      235KB

      MD5

      4b0f7048d7ddb60c01c8f535af61a40c

      SHA1

      f41e518d5d633b69030cef5458e6291b2ee905ef

      SHA256

      78920e14bf84c7789f83ab9866939fd661a2f5a14b3d5eaa6330e6c45f60dff9

      SHA512

      d7284ed511c7f426da66871507d6120d86dfb0edd13af81fec6f5e98b0a256d7995a8c7933338975470a3e9795fe8965424392b052184bf0a769a4b9e176a0b4

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4855603.exe

      Filesize

      235KB

      MD5

      4b0f7048d7ddb60c01c8f535af61a40c

      SHA1

      f41e518d5d633b69030cef5458e6291b2ee905ef

      SHA256

      78920e14bf84c7789f83ab9866939fd661a2f5a14b3d5eaa6330e6c45f60dff9

      SHA512

      d7284ed511c7f426da66871507d6120d86dfb0edd13af81fec6f5e98b0a256d7995a8c7933338975470a3e9795fe8965424392b052184bf0a769a4b9e176a0b4

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4855603.exe

      Filesize

      235KB

      MD5

      4b0f7048d7ddb60c01c8f535af61a40c

      SHA1

      f41e518d5d633b69030cef5458e6291b2ee905ef

      SHA256

      78920e14bf84c7789f83ab9866939fd661a2f5a14b3d5eaa6330e6c45f60dff9

      SHA512

      d7284ed511c7f426da66871507d6120d86dfb0edd13af81fec6f5e98b0a256d7995a8c7933338975470a3e9795fe8965424392b052184bf0a769a4b9e176a0b4

    • memory/2676-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2676-58-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2676-60-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2676-62-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2676-56-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2676-55-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2676-54-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2676-53-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB