Analysis

  • max time kernel
    122s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 17:25

General

  • Target

    9f5b21ce9a0b727da4f89ed2530e54a3ebbd3f1fe040b2066764f715c697272f.exe

  • Size

    1.2MB

  • MD5

    212ec02ed9fd8f2ed8b8ff1b702c10ef

  • SHA1

    d4501b4e1bd14fc2e58e2d5ad599817d4ed78601

  • SHA256

    9f5b21ce9a0b727da4f89ed2530e54a3ebbd3f1fe040b2066764f715c697272f

  • SHA512

    034a868dbadb697bdb1f221b3883e431a22daa267ae2f2b86d230a75f273e6f0caead377588a2b07546fb0234dfb3dff7bc718d6d7af6726276898269cc6f69a

  • SSDEEP

    24576:YyE/Wd2pDlNi2wO3+zeXuA8J3/vi0p6exqCrgsu+ab9iWTcktB+v:fSW+RNi2NqeX78V/q0qB0w/

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 17 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f5b21ce9a0b727da4f89ed2530e54a3ebbd3f1fe040b2066764f715c697272f.exe
    "C:\Users\Admin\AppData\Local\Temp\9f5b21ce9a0b727da4f89ed2530e54a3ebbd3f1fe040b2066764f715c697272f.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0713234.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0713234.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3640971.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3640971.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2636
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5444635.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5444635.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7012868.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7012868.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2796
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v0038380.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v0038380.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:2896
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6714643.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6714643.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2724
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2544
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 272
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2680

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0713234.exe

          Filesize

          1.1MB

          MD5

          d68227a1c17dc2d1afbf7f2365e3ceda

          SHA1

          0f604fd2b8f3e9997df05495fb50af0407ad5bb1

          SHA256

          4a30558c157f4788f928c2eb5a25a65443f522ead22820fa70f88491e6f83430

          SHA512

          53c92ef12c8f046c7b44956be720752ab0c18a41652119d520c34c4355f1677bd1182a0fe3375ee4c2dd3c2e6bef852eb6b73fa530fbf703e9d3bc3eef939b34

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0713234.exe

          Filesize

          1.1MB

          MD5

          d68227a1c17dc2d1afbf7f2365e3ceda

          SHA1

          0f604fd2b8f3e9997df05495fb50af0407ad5bb1

          SHA256

          4a30558c157f4788f928c2eb5a25a65443f522ead22820fa70f88491e6f83430

          SHA512

          53c92ef12c8f046c7b44956be720752ab0c18a41652119d520c34c4355f1677bd1182a0fe3375ee4c2dd3c2e6bef852eb6b73fa530fbf703e9d3bc3eef939b34

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3640971.exe

          Filesize

          940KB

          MD5

          76fd941afc14e7b05bed34cb65092c39

          SHA1

          c5566fffeebbdf877c903f1a8574dace3fe15162

          SHA256

          651fd7407e3534d4ba6d49e4af5a4958b0b69ee96469c9396e1e9424b7beb563

          SHA512

          9156c253e09e9fb27a88626b022616114752d964c1b347913a55984554e714322c60c8d5701187dd2196ca1b299541049309768787dc27fa152a51f3f48aa928

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3640971.exe

          Filesize

          940KB

          MD5

          76fd941afc14e7b05bed34cb65092c39

          SHA1

          c5566fffeebbdf877c903f1a8574dace3fe15162

          SHA256

          651fd7407e3534d4ba6d49e4af5a4958b0b69ee96469c9396e1e9424b7beb563

          SHA512

          9156c253e09e9fb27a88626b022616114752d964c1b347913a55984554e714322c60c8d5701187dd2196ca1b299541049309768787dc27fa152a51f3f48aa928

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5444635.exe

          Filesize

          784KB

          MD5

          f723b118164c5e123828500fec6439d1

          SHA1

          f3e7fbd1edd5e4d7d1b1d8f470a066ffb6dd953e

          SHA256

          d704cf124ed254b16b88c42a35a1a20a2a567a9f4cff4dc88664f6e180a579bd

          SHA512

          c539ba47407a1efc4dc0a842ec758a099ad829696b5bc4a69ddb09613af622c9c4b9082c528262baeadb80b908936d476d3a81286afc947ba6fc084527aa159b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5444635.exe

          Filesize

          784KB

          MD5

          f723b118164c5e123828500fec6439d1

          SHA1

          f3e7fbd1edd5e4d7d1b1d8f470a066ffb6dd953e

          SHA256

          d704cf124ed254b16b88c42a35a1a20a2a567a9f4cff4dc88664f6e180a579bd

          SHA512

          c539ba47407a1efc4dc0a842ec758a099ad829696b5bc4a69ddb09613af622c9c4b9082c528262baeadb80b908936d476d3a81286afc947ba6fc084527aa159b

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7012868.exe

          Filesize

          618KB

          MD5

          2d014021c6ff1adadc8a950c9d1c466a

          SHA1

          2fc785a35d7c030632d8c8f35a0d9cd6f22f4272

          SHA256

          9795be7068c3dc518fa4921413db3795c816f4022c041c53d2a002a7c798b275

          SHA512

          d1f75e94e94bd05b157dd67135c976c47e09ecbf0069903f6d3bc1803b87eed61f30b237fef8f8c82ca4a0846972fbe742842188ea3fce18b2367f2c120833a7

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7012868.exe

          Filesize

          618KB

          MD5

          2d014021c6ff1adadc8a950c9d1c466a

          SHA1

          2fc785a35d7c030632d8c8f35a0d9cd6f22f4272

          SHA256

          9795be7068c3dc518fa4921413db3795c816f4022c041c53d2a002a7c798b275

          SHA512

          d1f75e94e94bd05b157dd67135c976c47e09ecbf0069903f6d3bc1803b87eed61f30b237fef8f8c82ca4a0846972fbe742842188ea3fce18b2367f2c120833a7

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v0038380.exe

          Filesize

          347KB

          MD5

          801886fc0e0c2e48055399fe1ee4bb73

          SHA1

          8c2f17bd612bcd07813e0c5370e9bffa449a77df

          SHA256

          94eb922adc5b84373feac036b69961c4ef9d402f1c70d7f895bdc8e73b4c16ac

          SHA512

          d9c684ce42f010fc0ba9edc965c996bfde4491f83e5422587b0fb1c0933ba2e0d9c96c6d1a8f75826f6ef4f661e3fc90b94fdb5d6b7941365b143ec702623cac

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v0038380.exe

          Filesize

          347KB

          MD5

          801886fc0e0c2e48055399fe1ee4bb73

          SHA1

          8c2f17bd612bcd07813e0c5370e9bffa449a77df

          SHA256

          94eb922adc5b84373feac036b69961c4ef9d402f1c70d7f895bdc8e73b4c16ac

          SHA512

          d9c684ce42f010fc0ba9edc965c996bfde4491f83e5422587b0fb1c0933ba2e0d9c96c6d1a8f75826f6ef4f661e3fc90b94fdb5d6b7941365b143ec702623cac

        • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6714643.exe

          Filesize

          235KB

          MD5

          743cc88f16886916589ecec8e2b8ae9d

          SHA1

          f9ffdc216c29f1d66859c07ed19da10a138b447a

          SHA256

          50b825f839bf3a678aa5453755a49d04521354ca147b5da70a7ff074ac70257c

          SHA512

          8dbe056be90ecbb512ec96b40f5c6dbad3cbd156af4b96bcab61f1ead957af7d73adeb2b940a7bae813f670d5c70f4cc8b52d5079edfb3ffba0e62ac1e15f612

        • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6714643.exe

          Filesize

          235KB

          MD5

          743cc88f16886916589ecec8e2b8ae9d

          SHA1

          f9ffdc216c29f1d66859c07ed19da10a138b447a

          SHA256

          50b825f839bf3a678aa5453755a49d04521354ca147b5da70a7ff074ac70257c

          SHA512

          8dbe056be90ecbb512ec96b40f5c6dbad3cbd156af4b96bcab61f1ead957af7d73adeb2b940a7bae813f670d5c70f4cc8b52d5079edfb3ffba0e62ac1e15f612

        • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6714643.exe

          Filesize

          235KB

          MD5

          743cc88f16886916589ecec8e2b8ae9d

          SHA1

          f9ffdc216c29f1d66859c07ed19da10a138b447a

          SHA256

          50b825f839bf3a678aa5453755a49d04521354ca147b5da70a7ff074ac70257c

          SHA512

          8dbe056be90ecbb512ec96b40f5c6dbad3cbd156af4b96bcab61f1ead957af7d73adeb2b940a7bae813f670d5c70f4cc8b52d5079edfb3ffba0e62ac1e15f612

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v0713234.exe

          Filesize

          1.1MB

          MD5

          d68227a1c17dc2d1afbf7f2365e3ceda

          SHA1

          0f604fd2b8f3e9997df05495fb50af0407ad5bb1

          SHA256

          4a30558c157f4788f928c2eb5a25a65443f522ead22820fa70f88491e6f83430

          SHA512

          53c92ef12c8f046c7b44956be720752ab0c18a41652119d520c34c4355f1677bd1182a0fe3375ee4c2dd3c2e6bef852eb6b73fa530fbf703e9d3bc3eef939b34

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v0713234.exe

          Filesize

          1.1MB

          MD5

          d68227a1c17dc2d1afbf7f2365e3ceda

          SHA1

          0f604fd2b8f3e9997df05495fb50af0407ad5bb1

          SHA256

          4a30558c157f4788f928c2eb5a25a65443f522ead22820fa70f88491e6f83430

          SHA512

          53c92ef12c8f046c7b44956be720752ab0c18a41652119d520c34c4355f1677bd1182a0fe3375ee4c2dd3c2e6bef852eb6b73fa530fbf703e9d3bc3eef939b34

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v3640971.exe

          Filesize

          940KB

          MD5

          76fd941afc14e7b05bed34cb65092c39

          SHA1

          c5566fffeebbdf877c903f1a8574dace3fe15162

          SHA256

          651fd7407e3534d4ba6d49e4af5a4958b0b69ee96469c9396e1e9424b7beb563

          SHA512

          9156c253e09e9fb27a88626b022616114752d964c1b347913a55984554e714322c60c8d5701187dd2196ca1b299541049309768787dc27fa152a51f3f48aa928

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v3640971.exe

          Filesize

          940KB

          MD5

          76fd941afc14e7b05bed34cb65092c39

          SHA1

          c5566fffeebbdf877c903f1a8574dace3fe15162

          SHA256

          651fd7407e3534d4ba6d49e4af5a4958b0b69ee96469c9396e1e9424b7beb563

          SHA512

          9156c253e09e9fb27a88626b022616114752d964c1b347913a55984554e714322c60c8d5701187dd2196ca1b299541049309768787dc27fa152a51f3f48aa928

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v5444635.exe

          Filesize

          784KB

          MD5

          f723b118164c5e123828500fec6439d1

          SHA1

          f3e7fbd1edd5e4d7d1b1d8f470a066ffb6dd953e

          SHA256

          d704cf124ed254b16b88c42a35a1a20a2a567a9f4cff4dc88664f6e180a579bd

          SHA512

          c539ba47407a1efc4dc0a842ec758a099ad829696b5bc4a69ddb09613af622c9c4b9082c528262baeadb80b908936d476d3a81286afc947ba6fc084527aa159b

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v5444635.exe

          Filesize

          784KB

          MD5

          f723b118164c5e123828500fec6439d1

          SHA1

          f3e7fbd1edd5e4d7d1b1d8f470a066ffb6dd953e

          SHA256

          d704cf124ed254b16b88c42a35a1a20a2a567a9f4cff4dc88664f6e180a579bd

          SHA512

          c539ba47407a1efc4dc0a842ec758a099ad829696b5bc4a69ddb09613af622c9c4b9082c528262baeadb80b908936d476d3a81286afc947ba6fc084527aa159b

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v7012868.exe

          Filesize

          618KB

          MD5

          2d014021c6ff1adadc8a950c9d1c466a

          SHA1

          2fc785a35d7c030632d8c8f35a0d9cd6f22f4272

          SHA256

          9795be7068c3dc518fa4921413db3795c816f4022c041c53d2a002a7c798b275

          SHA512

          d1f75e94e94bd05b157dd67135c976c47e09ecbf0069903f6d3bc1803b87eed61f30b237fef8f8c82ca4a0846972fbe742842188ea3fce18b2367f2c120833a7

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v7012868.exe

          Filesize

          618KB

          MD5

          2d014021c6ff1adadc8a950c9d1c466a

          SHA1

          2fc785a35d7c030632d8c8f35a0d9cd6f22f4272

          SHA256

          9795be7068c3dc518fa4921413db3795c816f4022c041c53d2a002a7c798b275

          SHA512

          d1f75e94e94bd05b157dd67135c976c47e09ecbf0069903f6d3bc1803b87eed61f30b237fef8f8c82ca4a0846972fbe742842188ea3fce18b2367f2c120833a7

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v0038380.exe

          Filesize

          347KB

          MD5

          801886fc0e0c2e48055399fe1ee4bb73

          SHA1

          8c2f17bd612bcd07813e0c5370e9bffa449a77df

          SHA256

          94eb922adc5b84373feac036b69961c4ef9d402f1c70d7f895bdc8e73b4c16ac

          SHA512

          d9c684ce42f010fc0ba9edc965c996bfde4491f83e5422587b0fb1c0933ba2e0d9c96c6d1a8f75826f6ef4f661e3fc90b94fdb5d6b7941365b143ec702623cac

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v0038380.exe

          Filesize

          347KB

          MD5

          801886fc0e0c2e48055399fe1ee4bb73

          SHA1

          8c2f17bd612bcd07813e0c5370e9bffa449a77df

          SHA256

          94eb922adc5b84373feac036b69961c4ef9d402f1c70d7f895bdc8e73b4c16ac

          SHA512

          d9c684ce42f010fc0ba9edc965c996bfde4491f83e5422587b0fb1c0933ba2e0d9c96c6d1a8f75826f6ef4f661e3fc90b94fdb5d6b7941365b143ec702623cac

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a6714643.exe

          Filesize

          235KB

          MD5

          743cc88f16886916589ecec8e2b8ae9d

          SHA1

          f9ffdc216c29f1d66859c07ed19da10a138b447a

          SHA256

          50b825f839bf3a678aa5453755a49d04521354ca147b5da70a7ff074ac70257c

          SHA512

          8dbe056be90ecbb512ec96b40f5c6dbad3cbd156af4b96bcab61f1ead957af7d73adeb2b940a7bae813f670d5c70f4cc8b52d5079edfb3ffba0e62ac1e15f612

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a6714643.exe

          Filesize

          235KB

          MD5

          743cc88f16886916589ecec8e2b8ae9d

          SHA1

          f9ffdc216c29f1d66859c07ed19da10a138b447a

          SHA256

          50b825f839bf3a678aa5453755a49d04521354ca147b5da70a7ff074ac70257c

          SHA512

          8dbe056be90ecbb512ec96b40f5c6dbad3cbd156af4b96bcab61f1ead957af7d73adeb2b940a7bae813f670d5c70f4cc8b52d5079edfb3ffba0e62ac1e15f612

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a6714643.exe

          Filesize

          235KB

          MD5

          743cc88f16886916589ecec8e2b8ae9d

          SHA1

          f9ffdc216c29f1d66859c07ed19da10a138b447a

          SHA256

          50b825f839bf3a678aa5453755a49d04521354ca147b5da70a7ff074ac70257c

          SHA512

          8dbe056be90ecbb512ec96b40f5c6dbad3cbd156af4b96bcab61f1ead957af7d73adeb2b940a7bae813f670d5c70f4cc8b52d5079edfb3ffba0e62ac1e15f612

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a6714643.exe

          Filesize

          235KB

          MD5

          743cc88f16886916589ecec8e2b8ae9d

          SHA1

          f9ffdc216c29f1d66859c07ed19da10a138b447a

          SHA256

          50b825f839bf3a678aa5453755a49d04521354ca147b5da70a7ff074ac70257c

          SHA512

          8dbe056be90ecbb512ec96b40f5c6dbad3cbd156af4b96bcab61f1ead957af7d73adeb2b940a7bae813f670d5c70f4cc8b52d5079edfb3ffba0e62ac1e15f612

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a6714643.exe

          Filesize

          235KB

          MD5

          743cc88f16886916589ecec8e2b8ae9d

          SHA1

          f9ffdc216c29f1d66859c07ed19da10a138b447a

          SHA256

          50b825f839bf3a678aa5453755a49d04521354ca147b5da70a7ff074ac70257c

          SHA512

          8dbe056be90ecbb512ec96b40f5c6dbad3cbd156af4b96bcab61f1ead957af7d73adeb2b940a7bae813f670d5c70f4cc8b52d5079edfb3ffba0e62ac1e15f612

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a6714643.exe

          Filesize

          235KB

          MD5

          743cc88f16886916589ecec8e2b8ae9d

          SHA1

          f9ffdc216c29f1d66859c07ed19da10a138b447a

          SHA256

          50b825f839bf3a678aa5453755a49d04521354ca147b5da70a7ff074ac70257c

          SHA512

          8dbe056be90ecbb512ec96b40f5c6dbad3cbd156af4b96bcab61f1ead957af7d73adeb2b940a7bae813f670d5c70f4cc8b52d5079edfb3ffba0e62ac1e15f612

        • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a6714643.exe

          Filesize

          235KB

          MD5

          743cc88f16886916589ecec8e2b8ae9d

          SHA1

          f9ffdc216c29f1d66859c07ed19da10a138b447a

          SHA256

          50b825f839bf3a678aa5453755a49d04521354ca147b5da70a7ff074ac70257c

          SHA512

          8dbe056be90ecbb512ec96b40f5c6dbad3cbd156af4b96bcab61f1ead957af7d73adeb2b940a7bae813f670d5c70f4cc8b52d5079edfb3ffba0e62ac1e15f612

        • memory/2544-68-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2544-70-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2544-72-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2544-74-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2544-69-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2544-67-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2544-65-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2544-63-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB