Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 15:01

General

  • Target

    fa96f32dffc26c286f041c805998e70bb94f3ece02d1e791b5b604880aba297c.exe

  • Size

    1.3MB

  • MD5

    813b11893d5e6eba84f93dfac75647bf

  • SHA1

    00acdd2bcc7f5e9c43e53ac3f98e9679a721a125

  • SHA256

    fa96f32dffc26c286f041c805998e70bb94f3ece02d1e791b5b604880aba297c

  • SHA512

    1f3e18ed8d87245a55836d17e454022133b660eb69c055b2ecc8e72dbcec30efb763f8be02cda56c4fedb735b91192955f0ca2c219dfd5e9faa18ac421b5e1fc

  • SSDEEP

    24576:7ytr9PzrKs/ETwpimtsA6ewpI/n65hnL/xFkcgUQxRhpcIAdvLa4iZzyr2H8Syss:ussiKaeF/S5yUYXi+4iAr2cSys

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 17 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa96f32dffc26c286f041c805998e70bb94f3ece02d1e791b5b604880aba297c.exe
    "C:\Users\Admin\AppData\Local\Temp\fa96f32dffc26c286f041c805998e70bb94f3ece02d1e791b5b604880aba297c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7878794.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7878794.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8880905.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8880905.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2212635.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2212635.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2332
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8976906.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8976906.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2732
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v3563900.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v3563900.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:2584
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2700
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2640
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 272
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7878794.exe

    Filesize

    1.2MB

    MD5

    7737e80b017cd71e83b1b925710e4605

    SHA1

    14b816f7fa9e5dce7a4d8175f76d2d435778068d

    SHA256

    06c09be6dd27c6b40e7ce307aa2266476b9e2c04989b7f03da24d588cc49d7c4

    SHA512

    5a9134f795d741ac43a9d799264101d44e6e7ad4f3b5594f5b2f893463d216000b37697f658340d022b172213541e0f9d020fe98b3ba5a40113dd18440efdc77

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7878794.exe

    Filesize

    1.2MB

    MD5

    7737e80b017cd71e83b1b925710e4605

    SHA1

    14b816f7fa9e5dce7a4d8175f76d2d435778068d

    SHA256

    06c09be6dd27c6b40e7ce307aa2266476b9e2c04989b7f03da24d588cc49d7c4

    SHA512

    5a9134f795d741ac43a9d799264101d44e6e7ad4f3b5594f5b2f893463d216000b37697f658340d022b172213541e0f9d020fe98b3ba5a40113dd18440efdc77

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8880905.exe

    Filesize

    939KB

    MD5

    f124481a40d388571d1da8596e520f1b

    SHA1

    7ecbc6c502d2c4074636cd4e15c1df3a28532516

    SHA256

    584688f84074c2d0d9398648a91153b79c4a853d3800b8f1dbd48a4fc8d11842

    SHA512

    e4d8fd9e4ffbfbf925be569f12443b732d1d2040069c02364ec37bce987720089db8b9c2292ac32f575061fb082556b76a9761f45b5fc82e9f5bdb84496a2bdf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8880905.exe

    Filesize

    939KB

    MD5

    f124481a40d388571d1da8596e520f1b

    SHA1

    7ecbc6c502d2c4074636cd4e15c1df3a28532516

    SHA256

    584688f84074c2d0d9398648a91153b79c4a853d3800b8f1dbd48a4fc8d11842

    SHA512

    e4d8fd9e4ffbfbf925be569f12443b732d1d2040069c02364ec37bce987720089db8b9c2292ac32f575061fb082556b76a9761f45b5fc82e9f5bdb84496a2bdf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2212635.exe

    Filesize

    783KB

    MD5

    670fbb95b400bd7c7db58303914c0c26

    SHA1

    f327763c8223a1d3e3c899d98c101b317cd64b0c

    SHA256

    f885d06dcaa54a34f6413c44332b73351c07cd3a137f09592067921e49a78562

    SHA512

    3230c5776e42f56c0977319b29f47c2e5c5e2581e32fff5727349e9b3c1c91c7c27dad98a92daf2de9de1949b10e83c3af79cccc6c4b329c9a296d11e1cec195

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2212635.exe

    Filesize

    783KB

    MD5

    670fbb95b400bd7c7db58303914c0c26

    SHA1

    f327763c8223a1d3e3c899d98c101b317cd64b0c

    SHA256

    f885d06dcaa54a34f6413c44332b73351c07cd3a137f09592067921e49a78562

    SHA512

    3230c5776e42f56c0977319b29f47c2e5c5e2581e32fff5727349e9b3c1c91c7c27dad98a92daf2de9de1949b10e83c3af79cccc6c4b329c9a296d11e1cec195

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8976906.exe

    Filesize

    617KB

    MD5

    6c0f76b729260b1b679eda22b9ccc6b2

    SHA1

    91755ccc984a0cd9fcfcd37e8267f6f09e9c882b

    SHA256

    9c33a9f2410742cfd3d4c678ea0f57a29fc6aa324db7f3c2c9285e84f3bee67a

    SHA512

    8e4267a94a6a6071c64586e05e1c159c7404b85c8b1d6285e1ff072709ae30c8b98c5479bc567e71c741fcb881ae93bff9c68150c34ee01c6c73d12e8672c4e8

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8976906.exe

    Filesize

    617KB

    MD5

    6c0f76b729260b1b679eda22b9ccc6b2

    SHA1

    91755ccc984a0cd9fcfcd37e8267f6f09e9c882b

    SHA256

    9c33a9f2410742cfd3d4c678ea0f57a29fc6aa324db7f3c2c9285e84f3bee67a

    SHA512

    8e4267a94a6a6071c64586e05e1c159c7404b85c8b1d6285e1ff072709ae30c8b98c5479bc567e71c741fcb881ae93bff9c68150c34ee01c6c73d12e8672c4e8

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v3563900.exe

    Filesize

    346KB

    MD5

    56b6f992cec1c8126e84cd956393b7d1

    SHA1

    930def526998a662268dc726d73462ce2f5ec285

    SHA256

    ea4495fbb1ce8bbd4a5666d28153701708e57b276befb3425d6b845400e7809c

    SHA512

    6c5ebeb7cfd1e3f13640385955f411521bc7ae4fac94eeb185f3a705d9a141f353dbba4a36e6e3c69095c32527a5dc5666f163daa35471f00b7af97203f51367

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v3563900.exe

    Filesize

    346KB

    MD5

    56b6f992cec1c8126e84cd956393b7d1

    SHA1

    930def526998a662268dc726d73462ce2f5ec285

    SHA256

    ea4495fbb1ce8bbd4a5666d28153701708e57b276befb3425d6b845400e7809c

    SHA512

    6c5ebeb7cfd1e3f13640385955f411521bc7ae4fac94eeb185f3a705d9a141f353dbba4a36e6e3c69095c32527a5dc5666f163daa35471f00b7af97203f51367

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7878794.exe

    Filesize

    1.2MB

    MD5

    7737e80b017cd71e83b1b925710e4605

    SHA1

    14b816f7fa9e5dce7a4d8175f76d2d435778068d

    SHA256

    06c09be6dd27c6b40e7ce307aa2266476b9e2c04989b7f03da24d588cc49d7c4

    SHA512

    5a9134f795d741ac43a9d799264101d44e6e7ad4f3b5594f5b2f893463d216000b37697f658340d022b172213541e0f9d020fe98b3ba5a40113dd18440efdc77

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7878794.exe

    Filesize

    1.2MB

    MD5

    7737e80b017cd71e83b1b925710e4605

    SHA1

    14b816f7fa9e5dce7a4d8175f76d2d435778068d

    SHA256

    06c09be6dd27c6b40e7ce307aa2266476b9e2c04989b7f03da24d588cc49d7c4

    SHA512

    5a9134f795d741ac43a9d799264101d44e6e7ad4f3b5594f5b2f893463d216000b37697f658340d022b172213541e0f9d020fe98b3ba5a40113dd18440efdc77

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8880905.exe

    Filesize

    939KB

    MD5

    f124481a40d388571d1da8596e520f1b

    SHA1

    7ecbc6c502d2c4074636cd4e15c1df3a28532516

    SHA256

    584688f84074c2d0d9398648a91153b79c4a853d3800b8f1dbd48a4fc8d11842

    SHA512

    e4d8fd9e4ffbfbf925be569f12443b732d1d2040069c02364ec37bce987720089db8b9c2292ac32f575061fb082556b76a9761f45b5fc82e9f5bdb84496a2bdf

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8880905.exe

    Filesize

    939KB

    MD5

    f124481a40d388571d1da8596e520f1b

    SHA1

    7ecbc6c502d2c4074636cd4e15c1df3a28532516

    SHA256

    584688f84074c2d0d9398648a91153b79c4a853d3800b8f1dbd48a4fc8d11842

    SHA512

    e4d8fd9e4ffbfbf925be569f12443b732d1d2040069c02364ec37bce987720089db8b9c2292ac32f575061fb082556b76a9761f45b5fc82e9f5bdb84496a2bdf

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v2212635.exe

    Filesize

    783KB

    MD5

    670fbb95b400bd7c7db58303914c0c26

    SHA1

    f327763c8223a1d3e3c899d98c101b317cd64b0c

    SHA256

    f885d06dcaa54a34f6413c44332b73351c07cd3a137f09592067921e49a78562

    SHA512

    3230c5776e42f56c0977319b29f47c2e5c5e2581e32fff5727349e9b3c1c91c7c27dad98a92daf2de9de1949b10e83c3af79cccc6c4b329c9a296d11e1cec195

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v2212635.exe

    Filesize

    783KB

    MD5

    670fbb95b400bd7c7db58303914c0c26

    SHA1

    f327763c8223a1d3e3c899d98c101b317cd64b0c

    SHA256

    f885d06dcaa54a34f6413c44332b73351c07cd3a137f09592067921e49a78562

    SHA512

    3230c5776e42f56c0977319b29f47c2e5c5e2581e32fff5727349e9b3c1c91c7c27dad98a92daf2de9de1949b10e83c3af79cccc6c4b329c9a296d11e1cec195

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v8976906.exe

    Filesize

    617KB

    MD5

    6c0f76b729260b1b679eda22b9ccc6b2

    SHA1

    91755ccc984a0cd9fcfcd37e8267f6f09e9c882b

    SHA256

    9c33a9f2410742cfd3d4c678ea0f57a29fc6aa324db7f3c2c9285e84f3bee67a

    SHA512

    8e4267a94a6a6071c64586e05e1c159c7404b85c8b1d6285e1ff072709ae30c8b98c5479bc567e71c741fcb881ae93bff9c68150c34ee01c6c73d12e8672c4e8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v8976906.exe

    Filesize

    617KB

    MD5

    6c0f76b729260b1b679eda22b9ccc6b2

    SHA1

    91755ccc984a0cd9fcfcd37e8267f6f09e9c882b

    SHA256

    9c33a9f2410742cfd3d4c678ea0f57a29fc6aa324db7f3c2c9285e84f3bee67a

    SHA512

    8e4267a94a6a6071c64586e05e1c159c7404b85c8b1d6285e1ff072709ae30c8b98c5479bc567e71c741fcb881ae93bff9c68150c34ee01c6c73d12e8672c4e8

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v3563900.exe

    Filesize

    346KB

    MD5

    56b6f992cec1c8126e84cd956393b7d1

    SHA1

    930def526998a662268dc726d73462ce2f5ec285

    SHA256

    ea4495fbb1ce8bbd4a5666d28153701708e57b276befb3425d6b845400e7809c

    SHA512

    6c5ebeb7cfd1e3f13640385955f411521bc7ae4fac94eeb185f3a705d9a141f353dbba4a36e6e3c69095c32527a5dc5666f163daa35471f00b7af97203f51367

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v3563900.exe

    Filesize

    346KB

    MD5

    56b6f992cec1c8126e84cd956393b7d1

    SHA1

    930def526998a662268dc726d73462ce2f5ec285

    SHA256

    ea4495fbb1ce8bbd4a5666d28153701708e57b276befb3425d6b845400e7809c

    SHA512

    6c5ebeb7cfd1e3f13640385955f411521bc7ae4fac94eeb185f3a705d9a141f353dbba4a36e6e3c69095c32527a5dc5666f163daa35471f00b7af97203f51367

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe

    Filesize

    235KB

    MD5

    fba4fb38f3cbf2260b62a4e604f66082

    SHA1

    b2de378967c375b186cafa796f371241a47c5936

    SHA256

    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

    SHA512

    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

  • memory/2640-66-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2640-63-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2640-72-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2640-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2640-64-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2640-65-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2640-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2640-68-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB