Analysis

  • max time kernel
    117s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 15:22

General

  • Target

    0df316a92d290f75d5514aac98f103fd50488c4fddea761f5e15711ae292caea.exe

  • Size

    1.1MB

  • MD5

    8340cbf4ef9057869a36252052ffc8e1

  • SHA1

    8c73e711ccf9318d092c507dd7b71b1690260830

  • SHA256

    0df316a92d290f75d5514aac98f103fd50488c4fddea761f5e15711ae292caea

  • SHA512

    3ee36fca63968ffa9cd5a2d8452c7e212474b89b99551a0637b9159dbe7ada921fc120678bcc765c34acf675fbec065a037a94186418255ef4ff52427e5fb442

  • SSDEEP

    24576:cyKQNVM5Q9PsZC6WxKCsMW3Mu5ZniHk8XTlXzioihKJ6:LhNqQpLJx23hiHkodmjE

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0df316a92d290f75d5514aac98f103fd50488c4fddea761f5e15711ae292caea.exe
    "C:\Users\Admin\AppData\Local\Temp\0df316a92d290f75d5514aac98f103fd50488c4fddea761f5e15711ae292caea.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2168539.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2168539.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9539115.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9539115.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2736
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7948356.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7948356.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2780
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2912715.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2912715.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2792
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2648
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2516
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2168539.exe

    Filesize

    982KB

    MD5

    ff0c13d57bbe76da4c6090096d05e217

    SHA1

    0496ee4663ab99de6ad4a7eb8dc7ab9ea205ffb7

    SHA256

    d2bc425aeb954f7281ab3e6b427579711c901f0ec518f42ad5e6c2a277c877b4

    SHA512

    280ecbc8d3b9cbe0582a25fdac4a07a2001d054a5b628486585f4e04e03cd1062ae5254332224ef64f2e4ed907a8022db2aae2753892bc7297a42457769860b4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2168539.exe

    Filesize

    982KB

    MD5

    ff0c13d57bbe76da4c6090096d05e217

    SHA1

    0496ee4663ab99de6ad4a7eb8dc7ab9ea205ffb7

    SHA256

    d2bc425aeb954f7281ab3e6b427579711c901f0ec518f42ad5e6c2a277c877b4

    SHA512

    280ecbc8d3b9cbe0582a25fdac4a07a2001d054a5b628486585f4e04e03cd1062ae5254332224ef64f2e4ed907a8022db2aae2753892bc7297a42457769860b4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9539115.exe

    Filesize

    799KB

    MD5

    05ca183502e77cb03d308ed5a252d7b7

    SHA1

    142e93422683251292f37173ab02e8c5266a0fbb

    SHA256

    6997ab781b7e2c9d4c9130595512df3693fead2bc3f320c88f22e26df939dd3c

    SHA512

    72deb7cf6871fc61069cd495079b507edaa698ebc111ee65a26a33ce3b1ebc279c67192bb1d1291c4a984295408737387a150dbe4f499c11ac37433134e78b90

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9539115.exe

    Filesize

    799KB

    MD5

    05ca183502e77cb03d308ed5a252d7b7

    SHA1

    142e93422683251292f37173ab02e8c5266a0fbb

    SHA256

    6997ab781b7e2c9d4c9130595512df3693fead2bc3f320c88f22e26df939dd3c

    SHA512

    72deb7cf6871fc61069cd495079b507edaa698ebc111ee65a26a33ce3b1ebc279c67192bb1d1291c4a984295408737387a150dbe4f499c11ac37433134e78b90

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7948356.exe

    Filesize

    616KB

    MD5

    f56d1aa329cb0f3e678927e129293656

    SHA1

    d4b17f3b6c7af6f169bf48169ddd8fa1e9ad0e7f

    SHA256

    146d8b55de758a585a1914d140b05ad6f6d17004be2cf603fea063bd981b9a95

    SHA512

    ec713227e9fa55e01a9710c4fc4ffec728fcb7fd79c2a404dd19d8a0d26d1d8beb1eea483cd401f2376e97b338c810909b24fe697b131b59efeb6b1a4cfdde2c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7948356.exe

    Filesize

    616KB

    MD5

    f56d1aa329cb0f3e678927e129293656

    SHA1

    d4b17f3b6c7af6f169bf48169ddd8fa1e9ad0e7f

    SHA256

    146d8b55de758a585a1914d140b05ad6f6d17004be2cf603fea063bd981b9a95

    SHA512

    ec713227e9fa55e01a9710c4fc4ffec728fcb7fd79c2a404dd19d8a0d26d1d8beb1eea483cd401f2376e97b338c810909b24fe697b131b59efeb6b1a4cfdde2c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2912715.exe

    Filesize

    346KB

    MD5

    eae3cda76bc73efa7aeeebd088f13468

    SHA1

    9ed11a7af120527f553dc326767cefe67673fd7b

    SHA256

    924ee5df65f796ff8df3b1fbf92f76cb004f955ac9b522016abe0eec41d80c3f

    SHA512

    7e349dec2fa11fec6c7297e424a68cbf02b6251884c23979451b26e4dc582c20cc17e9c1f956d117c0c55b58d23003ec8846bff700f956ff2735fa8b1c3641db

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2912715.exe

    Filesize

    346KB

    MD5

    eae3cda76bc73efa7aeeebd088f13468

    SHA1

    9ed11a7af120527f553dc326767cefe67673fd7b

    SHA256

    924ee5df65f796ff8df3b1fbf92f76cb004f955ac9b522016abe0eec41d80c3f

    SHA512

    7e349dec2fa11fec6c7297e424a68cbf02b6251884c23979451b26e4dc582c20cc17e9c1f956d117c0c55b58d23003ec8846bff700f956ff2735fa8b1c3641db

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

    Filesize

    235KB

    MD5

    3dc564499bd26115b2abd40f33137643

    SHA1

    4dd3e2712c266e499c97922e3e31e1f6b283864c

    SHA256

    a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

    SHA512

    6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

    Filesize

    235KB

    MD5

    3dc564499bd26115b2abd40f33137643

    SHA1

    4dd3e2712c266e499c97922e3e31e1f6b283864c

    SHA256

    a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

    SHA512

    6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

    Filesize

    235KB

    MD5

    3dc564499bd26115b2abd40f33137643

    SHA1

    4dd3e2712c266e499c97922e3e31e1f6b283864c

    SHA256

    a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

    SHA512

    6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z2168539.exe

    Filesize

    982KB

    MD5

    ff0c13d57bbe76da4c6090096d05e217

    SHA1

    0496ee4663ab99de6ad4a7eb8dc7ab9ea205ffb7

    SHA256

    d2bc425aeb954f7281ab3e6b427579711c901f0ec518f42ad5e6c2a277c877b4

    SHA512

    280ecbc8d3b9cbe0582a25fdac4a07a2001d054a5b628486585f4e04e03cd1062ae5254332224ef64f2e4ed907a8022db2aae2753892bc7297a42457769860b4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z2168539.exe

    Filesize

    982KB

    MD5

    ff0c13d57bbe76da4c6090096d05e217

    SHA1

    0496ee4663ab99de6ad4a7eb8dc7ab9ea205ffb7

    SHA256

    d2bc425aeb954f7281ab3e6b427579711c901f0ec518f42ad5e6c2a277c877b4

    SHA512

    280ecbc8d3b9cbe0582a25fdac4a07a2001d054a5b628486585f4e04e03cd1062ae5254332224ef64f2e4ed907a8022db2aae2753892bc7297a42457769860b4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9539115.exe

    Filesize

    799KB

    MD5

    05ca183502e77cb03d308ed5a252d7b7

    SHA1

    142e93422683251292f37173ab02e8c5266a0fbb

    SHA256

    6997ab781b7e2c9d4c9130595512df3693fead2bc3f320c88f22e26df939dd3c

    SHA512

    72deb7cf6871fc61069cd495079b507edaa698ebc111ee65a26a33ce3b1ebc279c67192bb1d1291c4a984295408737387a150dbe4f499c11ac37433134e78b90

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9539115.exe

    Filesize

    799KB

    MD5

    05ca183502e77cb03d308ed5a252d7b7

    SHA1

    142e93422683251292f37173ab02e8c5266a0fbb

    SHA256

    6997ab781b7e2c9d4c9130595512df3693fead2bc3f320c88f22e26df939dd3c

    SHA512

    72deb7cf6871fc61069cd495079b507edaa698ebc111ee65a26a33ce3b1ebc279c67192bb1d1291c4a984295408737387a150dbe4f499c11ac37433134e78b90

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7948356.exe

    Filesize

    616KB

    MD5

    f56d1aa329cb0f3e678927e129293656

    SHA1

    d4b17f3b6c7af6f169bf48169ddd8fa1e9ad0e7f

    SHA256

    146d8b55de758a585a1914d140b05ad6f6d17004be2cf603fea063bd981b9a95

    SHA512

    ec713227e9fa55e01a9710c4fc4ffec728fcb7fd79c2a404dd19d8a0d26d1d8beb1eea483cd401f2376e97b338c810909b24fe697b131b59efeb6b1a4cfdde2c

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7948356.exe

    Filesize

    616KB

    MD5

    f56d1aa329cb0f3e678927e129293656

    SHA1

    d4b17f3b6c7af6f169bf48169ddd8fa1e9ad0e7f

    SHA256

    146d8b55de758a585a1914d140b05ad6f6d17004be2cf603fea063bd981b9a95

    SHA512

    ec713227e9fa55e01a9710c4fc4ffec728fcb7fd79c2a404dd19d8a0d26d1d8beb1eea483cd401f2376e97b338c810909b24fe697b131b59efeb6b1a4cfdde2c

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2912715.exe

    Filesize

    346KB

    MD5

    eae3cda76bc73efa7aeeebd088f13468

    SHA1

    9ed11a7af120527f553dc326767cefe67673fd7b

    SHA256

    924ee5df65f796ff8df3b1fbf92f76cb004f955ac9b522016abe0eec41d80c3f

    SHA512

    7e349dec2fa11fec6c7297e424a68cbf02b6251884c23979451b26e4dc582c20cc17e9c1f956d117c0c55b58d23003ec8846bff700f956ff2735fa8b1c3641db

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2912715.exe

    Filesize

    346KB

    MD5

    eae3cda76bc73efa7aeeebd088f13468

    SHA1

    9ed11a7af120527f553dc326767cefe67673fd7b

    SHA256

    924ee5df65f796ff8df3b1fbf92f76cb004f955ac9b522016abe0eec41d80c3f

    SHA512

    7e349dec2fa11fec6c7297e424a68cbf02b6251884c23979451b26e4dc582c20cc17e9c1f956d117c0c55b58d23003ec8846bff700f956ff2735fa8b1c3641db

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

    Filesize

    235KB

    MD5

    3dc564499bd26115b2abd40f33137643

    SHA1

    4dd3e2712c266e499c97922e3e31e1f6b283864c

    SHA256

    a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

    SHA512

    6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

    Filesize

    235KB

    MD5

    3dc564499bd26115b2abd40f33137643

    SHA1

    4dd3e2712c266e499c97922e3e31e1f6b283864c

    SHA256

    a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

    SHA512

    6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

    Filesize

    235KB

    MD5

    3dc564499bd26115b2abd40f33137643

    SHA1

    4dd3e2712c266e499c97922e3e31e1f6b283864c

    SHA256

    a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

    SHA512

    6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

    Filesize

    235KB

    MD5

    3dc564499bd26115b2abd40f33137643

    SHA1

    4dd3e2712c266e499c97922e3e31e1f6b283864c

    SHA256

    a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

    SHA512

    6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

    Filesize

    235KB

    MD5

    3dc564499bd26115b2abd40f33137643

    SHA1

    4dd3e2712c266e499c97922e3e31e1f6b283864c

    SHA256

    a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

    SHA512

    6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

    Filesize

    235KB

    MD5

    3dc564499bd26115b2abd40f33137643

    SHA1

    4dd3e2712c266e499c97922e3e31e1f6b283864c

    SHA256

    a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

    SHA512

    6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7689353.exe

    Filesize

    235KB

    MD5

    3dc564499bd26115b2abd40f33137643

    SHA1

    4dd3e2712c266e499c97922e3e31e1f6b283864c

    SHA256

    a21d479e84c9ab061a6aeb232bfe5f0e966cd39c0b789e672de907fe79a5528d

    SHA512

    6e8835e66e40232aef7296b2a6368939256b4e8708e1398b39b426af033f0a550bf6d69f899cf0cf98ceed1c86aced94409e5640a7edc8c5985991fc35c2e1e6

  • memory/2516-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2516-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2516-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2516-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2516-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2516-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2516-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2516-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB