Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 17:29

General

  • Target

    503ea02b0643553cd611b4dfbb30a54be1a992bd6d5c689f4047cc219504c152.exe

  • Size

    1.1MB

  • MD5

    45bc3db57f419b5108a60e4364aad48e

  • SHA1

    930f6fb4a2fffa33f6a8f9af3437704d3dfc2e35

  • SHA256

    503ea02b0643553cd611b4dfbb30a54be1a992bd6d5c689f4047cc219504c152

  • SHA512

    f70af17d1eddb876942b2a48e9bef055efc97d0d86c6a4dceec34124bb6d98860f05b217a9c5b3a079d5c62bb18f16b963551c30c8326fcafbd495c475aeb696

  • SSDEEP

    24576:zyCKq4gO2eqvdqkCFZGxVRfYu+H9+D79L/5x47:GQVOLqvdhCi5YF9+Dt/34

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\503ea02b0643553cd611b4dfbb30a54be1a992bd6d5c689f4047cc219504c152.exe
    "C:\Users\Admin\AppData\Local\Temp\503ea02b0643553cd611b4dfbb30a54be1a992bd6d5c689f4047cc219504c152.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6285195.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6285195.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1027013.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1027013.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2140
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0546425.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0546425.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2712
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9691174.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9691174.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2620
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9163831.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9163831.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2792
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2832
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6285195.exe

    Filesize

    983KB

    MD5

    5859a737c19279e73d294bcc6403d3c0

    SHA1

    960ab2945de8c707576eeac52452782a63279d49

    SHA256

    127800b4ca3798a09eaf8642e52bfb82f19028c68c00bf896d6c35c97122831f

    SHA512

    695cfcaaed79b5c4dba12bcb482be02605d0130c2f584504260319b350b931ebe5780b31cc926eedc6e9a998724402de1d3c1b1db2021c7e8a90285f5f7e28e5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6285195.exe

    Filesize

    983KB

    MD5

    5859a737c19279e73d294bcc6403d3c0

    SHA1

    960ab2945de8c707576eeac52452782a63279d49

    SHA256

    127800b4ca3798a09eaf8642e52bfb82f19028c68c00bf896d6c35c97122831f

    SHA512

    695cfcaaed79b5c4dba12bcb482be02605d0130c2f584504260319b350b931ebe5780b31cc926eedc6e9a998724402de1d3c1b1db2021c7e8a90285f5f7e28e5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1027013.exe

    Filesize

    801KB

    MD5

    9c1269d85862b572787a9578f8c7666a

    SHA1

    3bab1e5165f4a4b76281f082f850ba05e366a067

    SHA256

    f8fe45e04d104d6e868a49f744c43ada1b621f6224b82525d216f8087a4d683a

    SHA512

    b107d84f0c788ea16afa0e4c950a6b51f78d0ce02851be339f961dd2da1cd29efa20b6d97f81f23152a763eeac60e4113ccce3112e4ae679e0b487b2f04b4dab

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1027013.exe

    Filesize

    801KB

    MD5

    9c1269d85862b572787a9578f8c7666a

    SHA1

    3bab1e5165f4a4b76281f082f850ba05e366a067

    SHA256

    f8fe45e04d104d6e868a49f744c43ada1b621f6224b82525d216f8087a4d683a

    SHA512

    b107d84f0c788ea16afa0e4c950a6b51f78d0ce02851be339f961dd2da1cd29efa20b6d97f81f23152a763eeac60e4113ccce3112e4ae679e0b487b2f04b4dab

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0546425.exe

    Filesize

    617KB

    MD5

    2340f203aee9bf04235375545d49fccf

    SHA1

    5a0f8f28f0d2b2cec8757edc9bbb4d1bdc26e0e6

    SHA256

    035bb20ccf01a29c6301611f36379284d82fd483b574df0257c719d3d0781454

    SHA512

    9878e86260e142bacc5fa897add596995fdc04a5628986a3d69a9ad45f520ab655b5e000f584a265cde811ef14dab409600db046e8beb2e237a108796827a7a7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0546425.exe

    Filesize

    617KB

    MD5

    2340f203aee9bf04235375545d49fccf

    SHA1

    5a0f8f28f0d2b2cec8757edc9bbb4d1bdc26e0e6

    SHA256

    035bb20ccf01a29c6301611f36379284d82fd483b574df0257c719d3d0781454

    SHA512

    9878e86260e142bacc5fa897add596995fdc04a5628986a3d69a9ad45f520ab655b5e000f584a265cde811ef14dab409600db046e8beb2e237a108796827a7a7

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9691174.exe

    Filesize

    346KB

    MD5

    71a7b2bffa81c01bdf2ada5e6ca14f6a

    SHA1

    3d3eb04b7826fe3b838e57c6f9bc1a8c63f4b911

    SHA256

    684a7ffabbecbef690dd701a4a3f277ed406e7165f454dcef4a0affab6cdb2ac

    SHA512

    d0c3777d90a23bb314932d60464b1060eb80468576319e5c7384bef0a651c0ddec036be4e564f144a535ee2572273f6947f77d28869d185670417351dd8f9234

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9691174.exe

    Filesize

    346KB

    MD5

    71a7b2bffa81c01bdf2ada5e6ca14f6a

    SHA1

    3d3eb04b7826fe3b838e57c6f9bc1a8c63f4b911

    SHA256

    684a7ffabbecbef690dd701a4a3f277ed406e7165f454dcef4a0affab6cdb2ac

    SHA512

    d0c3777d90a23bb314932d60464b1060eb80468576319e5c7384bef0a651c0ddec036be4e564f144a535ee2572273f6947f77d28869d185670417351dd8f9234

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9163831.exe

    Filesize

    235KB

    MD5

    3ae0064b1cd38d69332074a5861bcb73

    SHA1

    a54f7c1da2ae61f7c558a628940e905a58786dc0

    SHA256

    4bf6addfb2debcc2f4e753921ddca9db2f84a2ee9d29c7123e21093e0b6f05bc

    SHA512

    16cf60adcd5a8f26c7db7c30498b409db2f4dc6b0944b9f8cce73811c1c14997069da35e66541549d6aa558316701fab2e5fb68d0d489b25b4b47251f79ccf54

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9163831.exe

    Filesize

    235KB

    MD5

    3ae0064b1cd38d69332074a5861bcb73

    SHA1

    a54f7c1da2ae61f7c558a628940e905a58786dc0

    SHA256

    4bf6addfb2debcc2f4e753921ddca9db2f84a2ee9d29c7123e21093e0b6f05bc

    SHA512

    16cf60adcd5a8f26c7db7c30498b409db2f4dc6b0944b9f8cce73811c1c14997069da35e66541549d6aa558316701fab2e5fb68d0d489b25b4b47251f79ccf54

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9163831.exe

    Filesize

    235KB

    MD5

    3ae0064b1cd38d69332074a5861bcb73

    SHA1

    a54f7c1da2ae61f7c558a628940e905a58786dc0

    SHA256

    4bf6addfb2debcc2f4e753921ddca9db2f84a2ee9d29c7123e21093e0b6f05bc

    SHA512

    16cf60adcd5a8f26c7db7c30498b409db2f4dc6b0944b9f8cce73811c1c14997069da35e66541549d6aa558316701fab2e5fb68d0d489b25b4b47251f79ccf54

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6285195.exe

    Filesize

    983KB

    MD5

    5859a737c19279e73d294bcc6403d3c0

    SHA1

    960ab2945de8c707576eeac52452782a63279d49

    SHA256

    127800b4ca3798a09eaf8642e52bfb82f19028c68c00bf896d6c35c97122831f

    SHA512

    695cfcaaed79b5c4dba12bcb482be02605d0130c2f584504260319b350b931ebe5780b31cc926eedc6e9a998724402de1d3c1b1db2021c7e8a90285f5f7e28e5

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6285195.exe

    Filesize

    983KB

    MD5

    5859a737c19279e73d294bcc6403d3c0

    SHA1

    960ab2945de8c707576eeac52452782a63279d49

    SHA256

    127800b4ca3798a09eaf8642e52bfb82f19028c68c00bf896d6c35c97122831f

    SHA512

    695cfcaaed79b5c4dba12bcb482be02605d0130c2f584504260319b350b931ebe5780b31cc926eedc6e9a998724402de1d3c1b1db2021c7e8a90285f5f7e28e5

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1027013.exe

    Filesize

    801KB

    MD5

    9c1269d85862b572787a9578f8c7666a

    SHA1

    3bab1e5165f4a4b76281f082f850ba05e366a067

    SHA256

    f8fe45e04d104d6e868a49f744c43ada1b621f6224b82525d216f8087a4d683a

    SHA512

    b107d84f0c788ea16afa0e4c950a6b51f78d0ce02851be339f961dd2da1cd29efa20b6d97f81f23152a763eeac60e4113ccce3112e4ae679e0b487b2f04b4dab

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1027013.exe

    Filesize

    801KB

    MD5

    9c1269d85862b572787a9578f8c7666a

    SHA1

    3bab1e5165f4a4b76281f082f850ba05e366a067

    SHA256

    f8fe45e04d104d6e868a49f744c43ada1b621f6224b82525d216f8087a4d683a

    SHA512

    b107d84f0c788ea16afa0e4c950a6b51f78d0ce02851be339f961dd2da1cd29efa20b6d97f81f23152a763eeac60e4113ccce3112e4ae679e0b487b2f04b4dab

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0546425.exe

    Filesize

    617KB

    MD5

    2340f203aee9bf04235375545d49fccf

    SHA1

    5a0f8f28f0d2b2cec8757edc9bbb4d1bdc26e0e6

    SHA256

    035bb20ccf01a29c6301611f36379284d82fd483b574df0257c719d3d0781454

    SHA512

    9878e86260e142bacc5fa897add596995fdc04a5628986a3d69a9ad45f520ab655b5e000f584a265cde811ef14dab409600db046e8beb2e237a108796827a7a7

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0546425.exe

    Filesize

    617KB

    MD5

    2340f203aee9bf04235375545d49fccf

    SHA1

    5a0f8f28f0d2b2cec8757edc9bbb4d1bdc26e0e6

    SHA256

    035bb20ccf01a29c6301611f36379284d82fd483b574df0257c719d3d0781454

    SHA512

    9878e86260e142bacc5fa897add596995fdc04a5628986a3d69a9ad45f520ab655b5e000f584a265cde811ef14dab409600db046e8beb2e237a108796827a7a7

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9691174.exe

    Filesize

    346KB

    MD5

    71a7b2bffa81c01bdf2ada5e6ca14f6a

    SHA1

    3d3eb04b7826fe3b838e57c6f9bc1a8c63f4b911

    SHA256

    684a7ffabbecbef690dd701a4a3f277ed406e7165f454dcef4a0affab6cdb2ac

    SHA512

    d0c3777d90a23bb314932d60464b1060eb80468576319e5c7384bef0a651c0ddec036be4e564f144a535ee2572273f6947f77d28869d185670417351dd8f9234

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9691174.exe

    Filesize

    346KB

    MD5

    71a7b2bffa81c01bdf2ada5e6ca14f6a

    SHA1

    3d3eb04b7826fe3b838e57c6f9bc1a8c63f4b911

    SHA256

    684a7ffabbecbef690dd701a4a3f277ed406e7165f454dcef4a0affab6cdb2ac

    SHA512

    d0c3777d90a23bb314932d60464b1060eb80468576319e5c7384bef0a651c0ddec036be4e564f144a535ee2572273f6947f77d28869d185670417351dd8f9234

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9163831.exe

    Filesize

    235KB

    MD5

    3ae0064b1cd38d69332074a5861bcb73

    SHA1

    a54f7c1da2ae61f7c558a628940e905a58786dc0

    SHA256

    4bf6addfb2debcc2f4e753921ddca9db2f84a2ee9d29c7123e21093e0b6f05bc

    SHA512

    16cf60adcd5a8f26c7db7c30498b409db2f4dc6b0944b9f8cce73811c1c14997069da35e66541549d6aa558316701fab2e5fb68d0d489b25b4b47251f79ccf54

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9163831.exe

    Filesize

    235KB

    MD5

    3ae0064b1cd38d69332074a5861bcb73

    SHA1

    a54f7c1da2ae61f7c558a628940e905a58786dc0

    SHA256

    4bf6addfb2debcc2f4e753921ddca9db2f84a2ee9d29c7123e21093e0b6f05bc

    SHA512

    16cf60adcd5a8f26c7db7c30498b409db2f4dc6b0944b9f8cce73811c1c14997069da35e66541549d6aa558316701fab2e5fb68d0d489b25b4b47251f79ccf54

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9163831.exe

    Filesize

    235KB

    MD5

    3ae0064b1cd38d69332074a5861bcb73

    SHA1

    a54f7c1da2ae61f7c558a628940e905a58786dc0

    SHA256

    4bf6addfb2debcc2f4e753921ddca9db2f84a2ee9d29c7123e21093e0b6f05bc

    SHA512

    16cf60adcd5a8f26c7db7c30498b409db2f4dc6b0944b9f8cce73811c1c14997069da35e66541549d6aa558316701fab2e5fb68d0d489b25b4b47251f79ccf54

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9163831.exe

    Filesize

    235KB

    MD5

    3ae0064b1cd38d69332074a5861bcb73

    SHA1

    a54f7c1da2ae61f7c558a628940e905a58786dc0

    SHA256

    4bf6addfb2debcc2f4e753921ddca9db2f84a2ee9d29c7123e21093e0b6f05bc

    SHA512

    16cf60adcd5a8f26c7db7c30498b409db2f4dc6b0944b9f8cce73811c1c14997069da35e66541549d6aa558316701fab2e5fb68d0d489b25b4b47251f79ccf54

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9163831.exe

    Filesize

    235KB

    MD5

    3ae0064b1cd38d69332074a5861bcb73

    SHA1

    a54f7c1da2ae61f7c558a628940e905a58786dc0

    SHA256

    4bf6addfb2debcc2f4e753921ddca9db2f84a2ee9d29c7123e21093e0b6f05bc

    SHA512

    16cf60adcd5a8f26c7db7c30498b409db2f4dc6b0944b9f8cce73811c1c14997069da35e66541549d6aa558316701fab2e5fb68d0d489b25b4b47251f79ccf54

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9163831.exe

    Filesize

    235KB

    MD5

    3ae0064b1cd38d69332074a5861bcb73

    SHA1

    a54f7c1da2ae61f7c558a628940e905a58786dc0

    SHA256

    4bf6addfb2debcc2f4e753921ddca9db2f84a2ee9d29c7123e21093e0b6f05bc

    SHA512

    16cf60adcd5a8f26c7db7c30498b409db2f4dc6b0944b9f8cce73811c1c14997069da35e66541549d6aa558316701fab2e5fb68d0d489b25b4b47251f79ccf54

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9163831.exe

    Filesize

    235KB

    MD5

    3ae0064b1cd38d69332074a5861bcb73

    SHA1

    a54f7c1da2ae61f7c558a628940e905a58786dc0

    SHA256

    4bf6addfb2debcc2f4e753921ddca9db2f84a2ee9d29c7123e21093e0b6f05bc

    SHA512

    16cf60adcd5a8f26c7db7c30498b409db2f4dc6b0944b9f8cce73811c1c14997069da35e66541549d6aa558316701fab2e5fb68d0d489b25b4b47251f79ccf54

  • memory/2832-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2832-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2832-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2832-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2832-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2832-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2832-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2832-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB