Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 15:28

General

  • Target

    2ecb39f7924c73626b533601015860660e7908da9f2cbd40a61292c83bfa515b.exe

  • Size

    1.2MB

  • MD5

    bb18481b5ab274209279b66177f4ac87

  • SHA1

    81e37a7b6a73fb9156f8bf6af69f5db49d433d5d

  • SHA256

    2ecb39f7924c73626b533601015860660e7908da9f2cbd40a61292c83bfa515b

  • SHA512

    f5f13ae379fa2e83eae4fdb6cf346c576f12883a4aff9790c1971579245cd9ffce7ac374f82cb6a999729800b7cdebabe951b9c1a34bcd1f6fbeed4f4d0ed370

  • SSDEEP

    24576:IyEFn8VoBPJCgEhfql6eq/hq7M7Y2s+ZgoAHLasXhcaE:PEFlV8Pf5b/hq47YEZgvHLaYh

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 17 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ecb39f7924c73626b533601015860660e7908da9f2cbd40a61292c83bfa515b.exe
    "C:\Users\Admin\AppData\Local\Temp\2ecb39f7924c73626b533601015860660e7908da9f2cbd40a61292c83bfa515b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7954251.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7954251.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1528
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6806240.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6806240.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2208
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4872136.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4872136.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7889926.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7889926.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2796
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v5051568.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v5051568.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:856
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a4489165.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a4489165.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2528
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2668
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 272
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:1068

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7954251.exe

          Filesize

          1.2MB

          MD5

          ea4ee8c0078786fee5aa15d4f15fd590

          SHA1

          141bac5ea04c470cf2d6bec1066d548bdd7b3875

          SHA256

          dbb24cf5c472fa3f33b8e6930d0701537c5127db79be3b919edb9f7a4eb62ace

          SHA512

          4b3f0aa172e6a9aa784035e863de1bfbdbfc88401e8fc06c0148e2d1d2ce88fa9c3a5355355ea6538c41975aa2c1d77b95224385016a34fe9182d0fe05b7eeea

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7954251.exe

          Filesize

          1.2MB

          MD5

          ea4ee8c0078786fee5aa15d4f15fd590

          SHA1

          141bac5ea04c470cf2d6bec1066d548bdd7b3875

          SHA256

          dbb24cf5c472fa3f33b8e6930d0701537c5127db79be3b919edb9f7a4eb62ace

          SHA512

          4b3f0aa172e6a9aa784035e863de1bfbdbfc88401e8fc06c0148e2d1d2ce88fa9c3a5355355ea6538c41975aa2c1d77b95224385016a34fe9182d0fe05b7eeea

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6806240.exe

          Filesize

          940KB

          MD5

          88a798ecee1ef7648a11af8f383f925d

          SHA1

          70d4e201c5e4e39e5b9cbe4232e73ac5cf27a05e

          SHA256

          f6d66cf04a635ef2140999d0dc211201aafa2e79c6ce2bd21222b16751c6cbed

          SHA512

          1d85a4e1e10b4702f849e3018a87175324f0526dbc23bd3c2dd5604545d6a0abf89366384fe5b20b697330d14001fd396628103cdeec38e6eb9af7b85e30df79

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6806240.exe

          Filesize

          940KB

          MD5

          88a798ecee1ef7648a11af8f383f925d

          SHA1

          70d4e201c5e4e39e5b9cbe4232e73ac5cf27a05e

          SHA256

          f6d66cf04a635ef2140999d0dc211201aafa2e79c6ce2bd21222b16751c6cbed

          SHA512

          1d85a4e1e10b4702f849e3018a87175324f0526dbc23bd3c2dd5604545d6a0abf89366384fe5b20b697330d14001fd396628103cdeec38e6eb9af7b85e30df79

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4872136.exe

          Filesize

          784KB

          MD5

          9068c1f2b92104ed1994b253ab3df9c1

          SHA1

          11c9b39573750c79b02dabf7a40d274619893210

          SHA256

          6239dc6080d891f07d4475efe426f1983ab80232e5b716a4e8dac89bd657cd27

          SHA512

          dddf92c1d6a92ac683435e8be01f412fcd2b8248ffe3bbe263f8dc8f9b380ead18f080f0cd1ed1211be60efec676abf0e330e799e83e4a0eddb6391f33347b8b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4872136.exe

          Filesize

          784KB

          MD5

          9068c1f2b92104ed1994b253ab3df9c1

          SHA1

          11c9b39573750c79b02dabf7a40d274619893210

          SHA256

          6239dc6080d891f07d4475efe426f1983ab80232e5b716a4e8dac89bd657cd27

          SHA512

          dddf92c1d6a92ac683435e8be01f412fcd2b8248ffe3bbe263f8dc8f9b380ead18f080f0cd1ed1211be60efec676abf0e330e799e83e4a0eddb6391f33347b8b

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7889926.exe

          Filesize

          618KB

          MD5

          0e87057ade27bbae7b9a2936dd22da65

          SHA1

          55271d892a776006ca27f7b6cf35daf960d5e952

          SHA256

          b74f9ce6f48f9d4182ac92423d9d363f8d91e21d2de78ea7987b5e3a8ce13e4f

          SHA512

          e89e2a854d3d533c70e88f312b2a595db48b0a57ebe9f6bf6a75ee62325e17ad818b225343d947bcbbd2bcf9f16d96ab277ad64669aa679cd9103356e14ed159

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7889926.exe

          Filesize

          618KB

          MD5

          0e87057ade27bbae7b9a2936dd22da65

          SHA1

          55271d892a776006ca27f7b6cf35daf960d5e952

          SHA256

          b74f9ce6f48f9d4182ac92423d9d363f8d91e21d2de78ea7987b5e3a8ce13e4f

          SHA512

          e89e2a854d3d533c70e88f312b2a595db48b0a57ebe9f6bf6a75ee62325e17ad818b225343d947bcbbd2bcf9f16d96ab277ad64669aa679cd9103356e14ed159

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v5051568.exe

          Filesize

          347KB

          MD5

          46dce2bca1d82afdfceb74600e572b4f

          SHA1

          b6e9addf0d387dc097e819d9c5507aea9099d884

          SHA256

          e27f7734a03a79f6df597ab1b5519df8b70797678df24b4661b8855b7380a3a4

          SHA512

          f32d3a3173466a7a28b313fb7e436ce543605e04fcd938a6752b575c2d7caf2469756775eff395612b494d886de866724662db344e80cc01f446f9e2ea46b0d0

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v5051568.exe

          Filesize

          347KB

          MD5

          46dce2bca1d82afdfceb74600e572b4f

          SHA1

          b6e9addf0d387dc097e819d9c5507aea9099d884

          SHA256

          e27f7734a03a79f6df597ab1b5519df8b70797678df24b4661b8855b7380a3a4

          SHA512

          f32d3a3173466a7a28b313fb7e436ce543605e04fcd938a6752b575c2d7caf2469756775eff395612b494d886de866724662db344e80cc01f446f9e2ea46b0d0

        • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a4489165.exe

          Filesize

          235KB

          MD5

          362380df34c6638128f5957f1d2b80b3

          SHA1

          71f15ab43f3f4b3d9529cf28fe4b4f1c934a149a

          SHA256

          1022834b008f6f1f49f58b5804d469f81d0faea3586f1527b4b8c1a74d73245a

          SHA512

          e02313355c74731721642a34982eb93da9eda8188726822778cfd4e47e04b98271da7e37711062f42d762a889ff250d4e5fc478632b45578e924f581eec74c9e

        • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a4489165.exe

          Filesize

          235KB

          MD5

          362380df34c6638128f5957f1d2b80b3

          SHA1

          71f15ab43f3f4b3d9529cf28fe4b4f1c934a149a

          SHA256

          1022834b008f6f1f49f58b5804d469f81d0faea3586f1527b4b8c1a74d73245a

          SHA512

          e02313355c74731721642a34982eb93da9eda8188726822778cfd4e47e04b98271da7e37711062f42d762a889ff250d4e5fc478632b45578e924f581eec74c9e

        • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a4489165.exe

          Filesize

          235KB

          MD5

          362380df34c6638128f5957f1d2b80b3

          SHA1

          71f15ab43f3f4b3d9529cf28fe4b4f1c934a149a

          SHA256

          1022834b008f6f1f49f58b5804d469f81d0faea3586f1527b4b8c1a74d73245a

          SHA512

          e02313355c74731721642a34982eb93da9eda8188726822778cfd4e47e04b98271da7e37711062f42d762a889ff250d4e5fc478632b45578e924f581eec74c9e

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7954251.exe

          Filesize

          1.2MB

          MD5

          ea4ee8c0078786fee5aa15d4f15fd590

          SHA1

          141bac5ea04c470cf2d6bec1066d548bdd7b3875

          SHA256

          dbb24cf5c472fa3f33b8e6930d0701537c5127db79be3b919edb9f7a4eb62ace

          SHA512

          4b3f0aa172e6a9aa784035e863de1bfbdbfc88401e8fc06c0148e2d1d2ce88fa9c3a5355355ea6538c41975aa2c1d77b95224385016a34fe9182d0fe05b7eeea

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7954251.exe

          Filesize

          1.2MB

          MD5

          ea4ee8c0078786fee5aa15d4f15fd590

          SHA1

          141bac5ea04c470cf2d6bec1066d548bdd7b3875

          SHA256

          dbb24cf5c472fa3f33b8e6930d0701537c5127db79be3b919edb9f7a4eb62ace

          SHA512

          4b3f0aa172e6a9aa784035e863de1bfbdbfc88401e8fc06c0148e2d1d2ce88fa9c3a5355355ea6538c41975aa2c1d77b95224385016a34fe9182d0fe05b7eeea

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6806240.exe

          Filesize

          940KB

          MD5

          88a798ecee1ef7648a11af8f383f925d

          SHA1

          70d4e201c5e4e39e5b9cbe4232e73ac5cf27a05e

          SHA256

          f6d66cf04a635ef2140999d0dc211201aafa2e79c6ce2bd21222b16751c6cbed

          SHA512

          1d85a4e1e10b4702f849e3018a87175324f0526dbc23bd3c2dd5604545d6a0abf89366384fe5b20b697330d14001fd396628103cdeec38e6eb9af7b85e30df79

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6806240.exe

          Filesize

          940KB

          MD5

          88a798ecee1ef7648a11af8f383f925d

          SHA1

          70d4e201c5e4e39e5b9cbe4232e73ac5cf27a05e

          SHA256

          f6d66cf04a635ef2140999d0dc211201aafa2e79c6ce2bd21222b16751c6cbed

          SHA512

          1d85a4e1e10b4702f849e3018a87175324f0526dbc23bd3c2dd5604545d6a0abf89366384fe5b20b697330d14001fd396628103cdeec38e6eb9af7b85e30df79

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4872136.exe

          Filesize

          784KB

          MD5

          9068c1f2b92104ed1994b253ab3df9c1

          SHA1

          11c9b39573750c79b02dabf7a40d274619893210

          SHA256

          6239dc6080d891f07d4475efe426f1983ab80232e5b716a4e8dac89bd657cd27

          SHA512

          dddf92c1d6a92ac683435e8be01f412fcd2b8248ffe3bbe263f8dc8f9b380ead18f080f0cd1ed1211be60efec676abf0e330e799e83e4a0eddb6391f33347b8b

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4872136.exe

          Filesize

          784KB

          MD5

          9068c1f2b92104ed1994b253ab3df9c1

          SHA1

          11c9b39573750c79b02dabf7a40d274619893210

          SHA256

          6239dc6080d891f07d4475efe426f1983ab80232e5b716a4e8dac89bd657cd27

          SHA512

          dddf92c1d6a92ac683435e8be01f412fcd2b8248ffe3bbe263f8dc8f9b380ead18f080f0cd1ed1211be60efec676abf0e330e799e83e4a0eddb6391f33347b8b

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v7889926.exe

          Filesize

          618KB

          MD5

          0e87057ade27bbae7b9a2936dd22da65

          SHA1

          55271d892a776006ca27f7b6cf35daf960d5e952

          SHA256

          b74f9ce6f48f9d4182ac92423d9d363f8d91e21d2de78ea7987b5e3a8ce13e4f

          SHA512

          e89e2a854d3d533c70e88f312b2a595db48b0a57ebe9f6bf6a75ee62325e17ad818b225343d947bcbbd2bcf9f16d96ab277ad64669aa679cd9103356e14ed159

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v7889926.exe

          Filesize

          618KB

          MD5

          0e87057ade27bbae7b9a2936dd22da65

          SHA1

          55271d892a776006ca27f7b6cf35daf960d5e952

          SHA256

          b74f9ce6f48f9d4182ac92423d9d363f8d91e21d2de78ea7987b5e3a8ce13e4f

          SHA512

          e89e2a854d3d533c70e88f312b2a595db48b0a57ebe9f6bf6a75ee62325e17ad818b225343d947bcbbd2bcf9f16d96ab277ad64669aa679cd9103356e14ed159

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v5051568.exe

          Filesize

          347KB

          MD5

          46dce2bca1d82afdfceb74600e572b4f

          SHA1

          b6e9addf0d387dc097e819d9c5507aea9099d884

          SHA256

          e27f7734a03a79f6df597ab1b5519df8b70797678df24b4661b8855b7380a3a4

          SHA512

          f32d3a3173466a7a28b313fb7e436ce543605e04fcd938a6752b575c2d7caf2469756775eff395612b494d886de866724662db344e80cc01f446f9e2ea46b0d0

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v5051568.exe

          Filesize

          347KB

          MD5

          46dce2bca1d82afdfceb74600e572b4f

          SHA1

          b6e9addf0d387dc097e819d9c5507aea9099d884

          SHA256

          e27f7734a03a79f6df597ab1b5519df8b70797678df24b4661b8855b7380a3a4

          SHA512

          f32d3a3173466a7a28b313fb7e436ce543605e04fcd938a6752b575c2d7caf2469756775eff395612b494d886de866724662db344e80cc01f446f9e2ea46b0d0

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a4489165.exe

          Filesize

          235KB

          MD5

          362380df34c6638128f5957f1d2b80b3

          SHA1

          71f15ab43f3f4b3d9529cf28fe4b4f1c934a149a

          SHA256

          1022834b008f6f1f49f58b5804d469f81d0faea3586f1527b4b8c1a74d73245a

          SHA512

          e02313355c74731721642a34982eb93da9eda8188726822778cfd4e47e04b98271da7e37711062f42d762a889ff250d4e5fc478632b45578e924f581eec74c9e

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a4489165.exe

          Filesize

          235KB

          MD5

          362380df34c6638128f5957f1d2b80b3

          SHA1

          71f15ab43f3f4b3d9529cf28fe4b4f1c934a149a

          SHA256

          1022834b008f6f1f49f58b5804d469f81d0faea3586f1527b4b8c1a74d73245a

          SHA512

          e02313355c74731721642a34982eb93da9eda8188726822778cfd4e47e04b98271da7e37711062f42d762a889ff250d4e5fc478632b45578e924f581eec74c9e

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a4489165.exe

          Filesize

          235KB

          MD5

          362380df34c6638128f5957f1d2b80b3

          SHA1

          71f15ab43f3f4b3d9529cf28fe4b4f1c934a149a

          SHA256

          1022834b008f6f1f49f58b5804d469f81d0faea3586f1527b4b8c1a74d73245a

          SHA512

          e02313355c74731721642a34982eb93da9eda8188726822778cfd4e47e04b98271da7e37711062f42d762a889ff250d4e5fc478632b45578e924f581eec74c9e

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a4489165.exe

          Filesize

          235KB

          MD5

          362380df34c6638128f5957f1d2b80b3

          SHA1

          71f15ab43f3f4b3d9529cf28fe4b4f1c934a149a

          SHA256

          1022834b008f6f1f49f58b5804d469f81d0faea3586f1527b4b8c1a74d73245a

          SHA512

          e02313355c74731721642a34982eb93da9eda8188726822778cfd4e47e04b98271da7e37711062f42d762a889ff250d4e5fc478632b45578e924f581eec74c9e

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a4489165.exe

          Filesize

          235KB

          MD5

          362380df34c6638128f5957f1d2b80b3

          SHA1

          71f15ab43f3f4b3d9529cf28fe4b4f1c934a149a

          SHA256

          1022834b008f6f1f49f58b5804d469f81d0faea3586f1527b4b8c1a74d73245a

          SHA512

          e02313355c74731721642a34982eb93da9eda8188726822778cfd4e47e04b98271da7e37711062f42d762a889ff250d4e5fc478632b45578e924f581eec74c9e

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a4489165.exe

          Filesize

          235KB

          MD5

          362380df34c6638128f5957f1d2b80b3

          SHA1

          71f15ab43f3f4b3d9529cf28fe4b4f1c934a149a

          SHA256

          1022834b008f6f1f49f58b5804d469f81d0faea3586f1527b4b8c1a74d73245a

          SHA512

          e02313355c74731721642a34982eb93da9eda8188726822778cfd4e47e04b98271da7e37711062f42d762a889ff250d4e5fc478632b45578e924f581eec74c9e

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a4489165.exe

          Filesize

          235KB

          MD5

          362380df34c6638128f5957f1d2b80b3

          SHA1

          71f15ab43f3f4b3d9529cf28fe4b4f1c934a149a

          SHA256

          1022834b008f6f1f49f58b5804d469f81d0faea3586f1527b4b8c1a74d73245a

          SHA512

          e02313355c74731721642a34982eb93da9eda8188726822778cfd4e47e04b98271da7e37711062f42d762a889ff250d4e5fc478632b45578e924f581eec74c9e

        • memory/2668-66-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2668-68-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2668-72-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2668-70-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2668-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2668-65-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2668-64-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2668-63-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB