Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 16:49

General

  • Target

    75cee994c049f17b655df4dadcc5c3506bdfe61a5676166f23192065f169d7e3.exe

  • Size

    1.2MB

  • MD5

    549f8405b65afa939eeebf28f9c4e83e

  • SHA1

    ae121e6b5d5d836348ea14c20f2f031f3076d85b

  • SHA256

    75cee994c049f17b655df4dadcc5c3506bdfe61a5676166f23192065f169d7e3

  • SHA512

    b8ee45142344d21e3c2cc9f3074a62b458ce3b1ee3844b2770620c4b2c65067f4ed5351e70c56ba9ecd37210879b542b265607c998f4858a565b8fe5557cf1a2

  • SSDEEP

    24576:wyvkHwDAlpdgDWbBP3rwsll/tc5NSXcSzl9sn1:3vVDAlpdgK3V+5Nujg

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 17 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75cee994c049f17b655df4dadcc5c3506bdfe61a5676166f23192065f169d7e3.exe
    "C:\Users\Admin\AppData\Local\Temp\75cee994c049f17b655df4dadcc5c3506bdfe61a5676166f23192065f169d7e3.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5840216.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5840216.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6373839.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6373839.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2620
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6063151.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6063151.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2860
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4327448.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4327448.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2752
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v1184851.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v1184851.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:2516
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0765307.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0765307.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2648
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2500
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 272
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2600

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5840216.exe

          Filesize

          1.2MB

          MD5

          f06f7d4dd035b712649c8a29aecc2145

          SHA1

          d1ebf85ca8bbcd5062e508e7737c5bd1519903b1

          SHA256

          f712035a48da1a0d2f25148a9be70fc40b12ed6910b2db8cb1ccaf3cfa6a9cc3

          SHA512

          2ee2205bd94c51d719ffd274a9ce5974fb9d83d48cf4d2c0a1361fcf2247c0b2ccfb44d836028ea215cdedcbb18a37134495db0ab88d16c1d48d04ae11e0f48f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5840216.exe

          Filesize

          1.2MB

          MD5

          f06f7d4dd035b712649c8a29aecc2145

          SHA1

          d1ebf85ca8bbcd5062e508e7737c5bd1519903b1

          SHA256

          f712035a48da1a0d2f25148a9be70fc40b12ed6910b2db8cb1ccaf3cfa6a9cc3

          SHA512

          2ee2205bd94c51d719ffd274a9ce5974fb9d83d48cf4d2c0a1361fcf2247c0b2ccfb44d836028ea215cdedcbb18a37134495db0ab88d16c1d48d04ae11e0f48f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6373839.exe

          Filesize

          941KB

          MD5

          5da928ed43cd32e8c21bfecb7f1e3513

          SHA1

          0a9726d9610691ba87a726f543e3a4d56f369200

          SHA256

          630df8d5c5e4f692b7810d042248181811c5749139ab4c3cc1e026660c6b6462

          SHA512

          e805868d445e40a07b82574110eeb47c9e7258ee00d56f12e89fa73f4b665c0a6448678bd8d6152f71304df3a512ce1d03a2d6f0f680cd2d1a3db9f1e57e6c8a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6373839.exe

          Filesize

          941KB

          MD5

          5da928ed43cd32e8c21bfecb7f1e3513

          SHA1

          0a9726d9610691ba87a726f543e3a4d56f369200

          SHA256

          630df8d5c5e4f692b7810d042248181811c5749139ab4c3cc1e026660c6b6462

          SHA512

          e805868d445e40a07b82574110eeb47c9e7258ee00d56f12e89fa73f4b665c0a6448678bd8d6152f71304df3a512ce1d03a2d6f0f680cd2d1a3db9f1e57e6c8a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6063151.exe

          Filesize

          785KB

          MD5

          467a79b04db1cd069faca25b68d3fa80

          SHA1

          88867d92d98a5536e7446be7cddb5cfb7758d2d9

          SHA256

          4d772c6dcec770a2ebc278587c1304e8153e92d7d06186ef546b9b74233eb0e1

          SHA512

          cee582ab6f90071c41d53ad355020fa1691e707522d4d9e79ec449070c66bcf05c44a25f97fa69e003916a5b50280868e38eb97075918a65f39023da542c465b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6063151.exe

          Filesize

          785KB

          MD5

          467a79b04db1cd069faca25b68d3fa80

          SHA1

          88867d92d98a5536e7446be7cddb5cfb7758d2d9

          SHA256

          4d772c6dcec770a2ebc278587c1304e8153e92d7d06186ef546b9b74233eb0e1

          SHA512

          cee582ab6f90071c41d53ad355020fa1691e707522d4d9e79ec449070c66bcf05c44a25f97fa69e003916a5b50280868e38eb97075918a65f39023da542c465b

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4327448.exe

          Filesize

          619KB

          MD5

          34265e9a390039843fa95f49810be844

          SHA1

          55c5f60fa457f6b9ef56f9e0fc9b8def4f97a221

          SHA256

          3275f5d21e8d547fe121f169dc3748c05666b2b5725e721c380283f949af3e79

          SHA512

          a65af42d0c55c043d95369a2643a1cb248c9e98369290b2603615696218c10e134a3ee6212ebd845b5449457f3c72d2cdbf698564d511f0667a7130455211d05

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4327448.exe

          Filesize

          619KB

          MD5

          34265e9a390039843fa95f49810be844

          SHA1

          55c5f60fa457f6b9ef56f9e0fc9b8def4f97a221

          SHA256

          3275f5d21e8d547fe121f169dc3748c05666b2b5725e721c380283f949af3e79

          SHA512

          a65af42d0c55c043d95369a2643a1cb248c9e98369290b2603615696218c10e134a3ee6212ebd845b5449457f3c72d2cdbf698564d511f0667a7130455211d05

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v1184851.exe

          Filesize

          348KB

          MD5

          dd8e0ff11af4f01a7a6469d9ef252199

          SHA1

          fb24b4edc905c5c934fd51ab80edfee3866a031b

          SHA256

          ac22359d59dd3e724787828433bf5d700f07d5b050e543599de9c86420db8e32

          SHA512

          6e6f2c5fadbdd52a50a08263f3bc6be0a37a345e23975a9fafaccac285974fb795b17f0d6b2f6ba037ca313916834707a349721a23b004bfc136c54e362434e6

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v1184851.exe

          Filesize

          348KB

          MD5

          dd8e0ff11af4f01a7a6469d9ef252199

          SHA1

          fb24b4edc905c5c934fd51ab80edfee3866a031b

          SHA256

          ac22359d59dd3e724787828433bf5d700f07d5b050e543599de9c86420db8e32

          SHA512

          6e6f2c5fadbdd52a50a08263f3bc6be0a37a345e23975a9fafaccac285974fb795b17f0d6b2f6ba037ca313916834707a349721a23b004bfc136c54e362434e6

        • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0765307.exe

          Filesize

          235KB

          MD5

          4db82db6d21d448f3f45f6e5f11db07c

          SHA1

          5c03717d96676bf286f1918dad3599d3753c4971

          SHA256

          99f44482a09cebfb2ac1d1780f7a61c38dcff8c92692b7394956d51b6dd3ea4d

          SHA512

          53affa185404e643b7bcea3b3c0d7af1e0b2f1f690214258119dd7b74afdf07fd35156e5436ac53f68bcba59fa1d898489e63ce2a9fe442bdabfb2f0374207cd

        • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0765307.exe

          Filesize

          235KB

          MD5

          4db82db6d21d448f3f45f6e5f11db07c

          SHA1

          5c03717d96676bf286f1918dad3599d3753c4971

          SHA256

          99f44482a09cebfb2ac1d1780f7a61c38dcff8c92692b7394956d51b6dd3ea4d

          SHA512

          53affa185404e643b7bcea3b3c0d7af1e0b2f1f690214258119dd7b74afdf07fd35156e5436ac53f68bcba59fa1d898489e63ce2a9fe442bdabfb2f0374207cd

        • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0765307.exe

          Filesize

          235KB

          MD5

          4db82db6d21d448f3f45f6e5f11db07c

          SHA1

          5c03717d96676bf286f1918dad3599d3753c4971

          SHA256

          99f44482a09cebfb2ac1d1780f7a61c38dcff8c92692b7394956d51b6dd3ea4d

          SHA512

          53affa185404e643b7bcea3b3c0d7af1e0b2f1f690214258119dd7b74afdf07fd35156e5436ac53f68bcba59fa1d898489e63ce2a9fe442bdabfb2f0374207cd

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v5840216.exe

          Filesize

          1.2MB

          MD5

          f06f7d4dd035b712649c8a29aecc2145

          SHA1

          d1ebf85ca8bbcd5062e508e7737c5bd1519903b1

          SHA256

          f712035a48da1a0d2f25148a9be70fc40b12ed6910b2db8cb1ccaf3cfa6a9cc3

          SHA512

          2ee2205bd94c51d719ffd274a9ce5974fb9d83d48cf4d2c0a1361fcf2247c0b2ccfb44d836028ea215cdedcbb18a37134495db0ab88d16c1d48d04ae11e0f48f

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v5840216.exe

          Filesize

          1.2MB

          MD5

          f06f7d4dd035b712649c8a29aecc2145

          SHA1

          d1ebf85ca8bbcd5062e508e7737c5bd1519903b1

          SHA256

          f712035a48da1a0d2f25148a9be70fc40b12ed6910b2db8cb1ccaf3cfa6a9cc3

          SHA512

          2ee2205bd94c51d719ffd274a9ce5974fb9d83d48cf4d2c0a1361fcf2247c0b2ccfb44d836028ea215cdedcbb18a37134495db0ab88d16c1d48d04ae11e0f48f

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6373839.exe

          Filesize

          941KB

          MD5

          5da928ed43cd32e8c21bfecb7f1e3513

          SHA1

          0a9726d9610691ba87a726f543e3a4d56f369200

          SHA256

          630df8d5c5e4f692b7810d042248181811c5749139ab4c3cc1e026660c6b6462

          SHA512

          e805868d445e40a07b82574110eeb47c9e7258ee00d56f12e89fa73f4b665c0a6448678bd8d6152f71304df3a512ce1d03a2d6f0f680cd2d1a3db9f1e57e6c8a

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6373839.exe

          Filesize

          941KB

          MD5

          5da928ed43cd32e8c21bfecb7f1e3513

          SHA1

          0a9726d9610691ba87a726f543e3a4d56f369200

          SHA256

          630df8d5c5e4f692b7810d042248181811c5749139ab4c3cc1e026660c6b6462

          SHA512

          e805868d445e40a07b82574110eeb47c9e7258ee00d56f12e89fa73f4b665c0a6448678bd8d6152f71304df3a512ce1d03a2d6f0f680cd2d1a3db9f1e57e6c8a

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v6063151.exe

          Filesize

          785KB

          MD5

          467a79b04db1cd069faca25b68d3fa80

          SHA1

          88867d92d98a5536e7446be7cddb5cfb7758d2d9

          SHA256

          4d772c6dcec770a2ebc278587c1304e8153e92d7d06186ef546b9b74233eb0e1

          SHA512

          cee582ab6f90071c41d53ad355020fa1691e707522d4d9e79ec449070c66bcf05c44a25f97fa69e003916a5b50280868e38eb97075918a65f39023da542c465b

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v6063151.exe

          Filesize

          785KB

          MD5

          467a79b04db1cd069faca25b68d3fa80

          SHA1

          88867d92d98a5536e7446be7cddb5cfb7758d2d9

          SHA256

          4d772c6dcec770a2ebc278587c1304e8153e92d7d06186ef546b9b74233eb0e1

          SHA512

          cee582ab6f90071c41d53ad355020fa1691e707522d4d9e79ec449070c66bcf05c44a25f97fa69e003916a5b50280868e38eb97075918a65f39023da542c465b

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v4327448.exe

          Filesize

          619KB

          MD5

          34265e9a390039843fa95f49810be844

          SHA1

          55c5f60fa457f6b9ef56f9e0fc9b8def4f97a221

          SHA256

          3275f5d21e8d547fe121f169dc3748c05666b2b5725e721c380283f949af3e79

          SHA512

          a65af42d0c55c043d95369a2643a1cb248c9e98369290b2603615696218c10e134a3ee6212ebd845b5449457f3c72d2cdbf698564d511f0667a7130455211d05

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v4327448.exe

          Filesize

          619KB

          MD5

          34265e9a390039843fa95f49810be844

          SHA1

          55c5f60fa457f6b9ef56f9e0fc9b8def4f97a221

          SHA256

          3275f5d21e8d547fe121f169dc3748c05666b2b5725e721c380283f949af3e79

          SHA512

          a65af42d0c55c043d95369a2643a1cb248c9e98369290b2603615696218c10e134a3ee6212ebd845b5449457f3c72d2cdbf698564d511f0667a7130455211d05

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v1184851.exe

          Filesize

          348KB

          MD5

          dd8e0ff11af4f01a7a6469d9ef252199

          SHA1

          fb24b4edc905c5c934fd51ab80edfee3866a031b

          SHA256

          ac22359d59dd3e724787828433bf5d700f07d5b050e543599de9c86420db8e32

          SHA512

          6e6f2c5fadbdd52a50a08263f3bc6be0a37a345e23975a9fafaccac285974fb795b17f0d6b2f6ba037ca313916834707a349721a23b004bfc136c54e362434e6

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v1184851.exe

          Filesize

          348KB

          MD5

          dd8e0ff11af4f01a7a6469d9ef252199

          SHA1

          fb24b4edc905c5c934fd51ab80edfee3866a031b

          SHA256

          ac22359d59dd3e724787828433bf5d700f07d5b050e543599de9c86420db8e32

          SHA512

          6e6f2c5fadbdd52a50a08263f3bc6be0a37a345e23975a9fafaccac285974fb795b17f0d6b2f6ba037ca313916834707a349721a23b004bfc136c54e362434e6

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0765307.exe

          Filesize

          235KB

          MD5

          4db82db6d21d448f3f45f6e5f11db07c

          SHA1

          5c03717d96676bf286f1918dad3599d3753c4971

          SHA256

          99f44482a09cebfb2ac1d1780f7a61c38dcff8c92692b7394956d51b6dd3ea4d

          SHA512

          53affa185404e643b7bcea3b3c0d7af1e0b2f1f690214258119dd7b74afdf07fd35156e5436ac53f68bcba59fa1d898489e63ce2a9fe442bdabfb2f0374207cd

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0765307.exe

          Filesize

          235KB

          MD5

          4db82db6d21d448f3f45f6e5f11db07c

          SHA1

          5c03717d96676bf286f1918dad3599d3753c4971

          SHA256

          99f44482a09cebfb2ac1d1780f7a61c38dcff8c92692b7394956d51b6dd3ea4d

          SHA512

          53affa185404e643b7bcea3b3c0d7af1e0b2f1f690214258119dd7b74afdf07fd35156e5436ac53f68bcba59fa1d898489e63ce2a9fe442bdabfb2f0374207cd

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0765307.exe

          Filesize

          235KB

          MD5

          4db82db6d21d448f3f45f6e5f11db07c

          SHA1

          5c03717d96676bf286f1918dad3599d3753c4971

          SHA256

          99f44482a09cebfb2ac1d1780f7a61c38dcff8c92692b7394956d51b6dd3ea4d

          SHA512

          53affa185404e643b7bcea3b3c0d7af1e0b2f1f690214258119dd7b74afdf07fd35156e5436ac53f68bcba59fa1d898489e63ce2a9fe442bdabfb2f0374207cd

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0765307.exe

          Filesize

          235KB

          MD5

          4db82db6d21d448f3f45f6e5f11db07c

          SHA1

          5c03717d96676bf286f1918dad3599d3753c4971

          SHA256

          99f44482a09cebfb2ac1d1780f7a61c38dcff8c92692b7394956d51b6dd3ea4d

          SHA512

          53affa185404e643b7bcea3b3c0d7af1e0b2f1f690214258119dd7b74afdf07fd35156e5436ac53f68bcba59fa1d898489e63ce2a9fe442bdabfb2f0374207cd

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0765307.exe

          Filesize

          235KB

          MD5

          4db82db6d21d448f3f45f6e5f11db07c

          SHA1

          5c03717d96676bf286f1918dad3599d3753c4971

          SHA256

          99f44482a09cebfb2ac1d1780f7a61c38dcff8c92692b7394956d51b6dd3ea4d

          SHA512

          53affa185404e643b7bcea3b3c0d7af1e0b2f1f690214258119dd7b74afdf07fd35156e5436ac53f68bcba59fa1d898489e63ce2a9fe442bdabfb2f0374207cd

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0765307.exe

          Filesize

          235KB

          MD5

          4db82db6d21d448f3f45f6e5f11db07c

          SHA1

          5c03717d96676bf286f1918dad3599d3753c4971

          SHA256

          99f44482a09cebfb2ac1d1780f7a61c38dcff8c92692b7394956d51b6dd3ea4d

          SHA512

          53affa185404e643b7bcea3b3c0d7af1e0b2f1f690214258119dd7b74afdf07fd35156e5436ac53f68bcba59fa1d898489e63ce2a9fe442bdabfb2f0374207cd

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0765307.exe

          Filesize

          235KB

          MD5

          4db82db6d21d448f3f45f6e5f11db07c

          SHA1

          5c03717d96676bf286f1918dad3599d3753c4971

          SHA256

          99f44482a09cebfb2ac1d1780f7a61c38dcff8c92692b7394956d51b6dd3ea4d

          SHA512

          53affa185404e643b7bcea3b3c0d7af1e0b2f1f690214258119dd7b74afdf07fd35156e5436ac53f68bcba59fa1d898489e63ce2a9fe442bdabfb2f0374207cd

        • memory/2500-68-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2500-66-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2500-72-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2500-70-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2500-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2500-65-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2500-64-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2500-63-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB