Analysis

  • max time kernel
    118s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 19:29

General

  • Target

    0e53f45fba52b201be056b639a908b4495e950040017f1e31c9fbd34828aa4f0.exe

  • Size

    1.3MB

  • MD5

    6eafedd22eb1c2dc880b0fb59ecca6b5

  • SHA1

    cb45b2f6032d682561d34c79979cf1a076776f3d

  • SHA256

    0e53f45fba52b201be056b639a908b4495e950040017f1e31c9fbd34828aa4f0

  • SHA512

    cb49fc580d1fca41475f0cc57d424daa2d11420246221b79e8188a6bd55dc1e85bf619a51d06cce7e920dac9d00ee79d27bb41037790cb1c801c0e2ac6b4a7e6

  • SSDEEP

    24576:eyCY0L4UIJMhkv1tGKeOzcQdMmcEYs1WVWLn7mvg8MspUXNPDtY:tx/UhmXGKeOzcQQO1WVUah7wDt

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 17 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e53f45fba52b201be056b639a908b4495e950040017f1e31c9fbd34828aa4f0.exe
    "C:\Users\Admin\AppData\Local\Temp\0e53f45fba52b201be056b639a908b4495e950040017f1e31c9fbd34828aa4f0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2997707.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2997707.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2340
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1007645.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1007645.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2684
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0556404.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0556404.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2624
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6962295.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6962295.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2600
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v6072025.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v6072025.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:2496
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a5960861.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a5960861.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2748
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2544
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 272
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2997707.exe

    Filesize

    1.2MB

    MD5

    a702c1a739ce504a3031fb93b1215113

    SHA1

    1c72b2bba610d5a26ac6781e5113ae01cc36a2e4

    SHA256

    3f5177b2d1d412742b7d5ccf78e7c90cd3ef84a6d1be30bd795768f7a50789e2

    SHA512

    7c26033e935348228e963f07e146c3218ae06e7c795d059dc9756b01334c615964a9efbd60a59a5032489d3c402fe652b9c538f7f3d300f8c13be2848813688f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2997707.exe

    Filesize

    1.2MB

    MD5

    a702c1a739ce504a3031fb93b1215113

    SHA1

    1c72b2bba610d5a26ac6781e5113ae01cc36a2e4

    SHA256

    3f5177b2d1d412742b7d5ccf78e7c90cd3ef84a6d1be30bd795768f7a50789e2

    SHA512

    7c26033e935348228e963f07e146c3218ae06e7c795d059dc9756b01334c615964a9efbd60a59a5032489d3c402fe652b9c538f7f3d300f8c13be2848813688f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1007645.exe

    Filesize

    941KB

    MD5

    5ca1c2c2ccbb115edd89203261d8ea71

    SHA1

    d4b95ee33957c27d026bad90c2c4e9965498e716

    SHA256

    2f9021704041ee902ca55537d7b5792dc74436558b0453f72d8440264c1bb7bf

    SHA512

    b23857d5d9c9b63c7ecc6e947642ebeaf85ccaf75e4e7c490ad930fca3896a81f2e36ca099722317e2fa305ebb9675a4a8c3d5930761abb841d5dd0f5140067d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1007645.exe

    Filesize

    941KB

    MD5

    5ca1c2c2ccbb115edd89203261d8ea71

    SHA1

    d4b95ee33957c27d026bad90c2c4e9965498e716

    SHA256

    2f9021704041ee902ca55537d7b5792dc74436558b0453f72d8440264c1bb7bf

    SHA512

    b23857d5d9c9b63c7ecc6e947642ebeaf85ccaf75e4e7c490ad930fca3896a81f2e36ca099722317e2fa305ebb9675a4a8c3d5930761abb841d5dd0f5140067d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0556404.exe

    Filesize

    784KB

    MD5

    57ee8f8d047550c37d32cb4f8691bd2b

    SHA1

    c595718640efe4abba7168646effe188eabbafc2

    SHA256

    95bda9538d472bf1c549314caae19f9b62893b9b5d18b4f41a73763eea36681f

    SHA512

    059e2520b5e1d199d53ea45e0b359fe98dc0636ed8770dce8e2a7c254ab0c4c9db7c9cdce66c7755218f1afe8329d3fbe0abeff071d71ea66cab102d5d853476

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0556404.exe

    Filesize

    784KB

    MD5

    57ee8f8d047550c37d32cb4f8691bd2b

    SHA1

    c595718640efe4abba7168646effe188eabbafc2

    SHA256

    95bda9538d472bf1c549314caae19f9b62893b9b5d18b4f41a73763eea36681f

    SHA512

    059e2520b5e1d199d53ea45e0b359fe98dc0636ed8770dce8e2a7c254ab0c4c9db7c9cdce66c7755218f1afe8329d3fbe0abeff071d71ea66cab102d5d853476

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6962295.exe

    Filesize

    618KB

    MD5

    483a2f9712b2561c6135c8b6ae0837ab

    SHA1

    197c6308e3a2be8784d768e40bd8db5b43d1ee5e

    SHA256

    23967bf5de910a04002e8c439d9e40155aa793c596d66d0deca310faa6b064e6

    SHA512

    99c09b5910535aced445b00bc9ee0c2987ccda4d00b576ed5fb4fcde737476241f2115baa1a6da7b10537020a69f20f16624592e714f0b1e4273cf179b541f8b

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6962295.exe

    Filesize

    618KB

    MD5

    483a2f9712b2561c6135c8b6ae0837ab

    SHA1

    197c6308e3a2be8784d768e40bd8db5b43d1ee5e

    SHA256

    23967bf5de910a04002e8c439d9e40155aa793c596d66d0deca310faa6b064e6

    SHA512

    99c09b5910535aced445b00bc9ee0c2987ccda4d00b576ed5fb4fcde737476241f2115baa1a6da7b10537020a69f20f16624592e714f0b1e4273cf179b541f8b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v6072025.exe

    Filesize

    347KB

    MD5

    2f307ad0a14c6d8a8754dd624f0542c7

    SHA1

    556ac8bb0ade5471b222994f3a01456d7e7611eb

    SHA256

    477e8a18d69b1c9df62c1649da1598e719267a7b51caed601ff908994020f2b3

    SHA512

    26fd1ea1e2038846b33c8f2f9a3e9ab8ca5d9dc50904c19965289961868b87a7968c1c216761c0034a35f84bdee64f7509385bd4e4ba71ae3c33400fa5f3fe01

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v6072025.exe

    Filesize

    347KB

    MD5

    2f307ad0a14c6d8a8754dd624f0542c7

    SHA1

    556ac8bb0ade5471b222994f3a01456d7e7611eb

    SHA256

    477e8a18d69b1c9df62c1649da1598e719267a7b51caed601ff908994020f2b3

    SHA512

    26fd1ea1e2038846b33c8f2f9a3e9ab8ca5d9dc50904c19965289961868b87a7968c1c216761c0034a35f84bdee64f7509385bd4e4ba71ae3c33400fa5f3fe01

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a5960861.exe

    Filesize

    235KB

    MD5

    e0d51230e0bc836a685ba05fdb9f396f

    SHA1

    dc907a920167e7fcf9cd55d86d16ce1836f7e6dd

    SHA256

    a66bc7009b3c3b312cbb0c251a3873d979e4a81d64fa97e307e419509f3fb94b

    SHA512

    2ef00bf4d77beca4a2a972d3ee1798285cab807ada22b760e7ea7a275c592b05a727b69b273cdd30c159363e7583c7e7d785394919dbc07a87df2242661f80c5

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a5960861.exe

    Filesize

    235KB

    MD5

    e0d51230e0bc836a685ba05fdb9f396f

    SHA1

    dc907a920167e7fcf9cd55d86d16ce1836f7e6dd

    SHA256

    a66bc7009b3c3b312cbb0c251a3873d979e4a81d64fa97e307e419509f3fb94b

    SHA512

    2ef00bf4d77beca4a2a972d3ee1798285cab807ada22b760e7ea7a275c592b05a727b69b273cdd30c159363e7583c7e7d785394919dbc07a87df2242661f80c5

  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a5960861.exe

    Filesize

    235KB

    MD5

    e0d51230e0bc836a685ba05fdb9f396f

    SHA1

    dc907a920167e7fcf9cd55d86d16ce1836f7e6dd

    SHA256

    a66bc7009b3c3b312cbb0c251a3873d979e4a81d64fa97e307e419509f3fb94b

    SHA512

    2ef00bf4d77beca4a2a972d3ee1798285cab807ada22b760e7ea7a275c592b05a727b69b273cdd30c159363e7583c7e7d785394919dbc07a87df2242661f80c5

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v2997707.exe

    Filesize

    1.2MB

    MD5

    a702c1a739ce504a3031fb93b1215113

    SHA1

    1c72b2bba610d5a26ac6781e5113ae01cc36a2e4

    SHA256

    3f5177b2d1d412742b7d5ccf78e7c90cd3ef84a6d1be30bd795768f7a50789e2

    SHA512

    7c26033e935348228e963f07e146c3218ae06e7c795d059dc9756b01334c615964a9efbd60a59a5032489d3c402fe652b9c538f7f3d300f8c13be2848813688f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v2997707.exe

    Filesize

    1.2MB

    MD5

    a702c1a739ce504a3031fb93b1215113

    SHA1

    1c72b2bba610d5a26ac6781e5113ae01cc36a2e4

    SHA256

    3f5177b2d1d412742b7d5ccf78e7c90cd3ef84a6d1be30bd795768f7a50789e2

    SHA512

    7c26033e935348228e963f07e146c3218ae06e7c795d059dc9756b01334c615964a9efbd60a59a5032489d3c402fe652b9c538f7f3d300f8c13be2848813688f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v1007645.exe

    Filesize

    941KB

    MD5

    5ca1c2c2ccbb115edd89203261d8ea71

    SHA1

    d4b95ee33957c27d026bad90c2c4e9965498e716

    SHA256

    2f9021704041ee902ca55537d7b5792dc74436558b0453f72d8440264c1bb7bf

    SHA512

    b23857d5d9c9b63c7ecc6e947642ebeaf85ccaf75e4e7c490ad930fca3896a81f2e36ca099722317e2fa305ebb9675a4a8c3d5930761abb841d5dd0f5140067d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v1007645.exe

    Filesize

    941KB

    MD5

    5ca1c2c2ccbb115edd89203261d8ea71

    SHA1

    d4b95ee33957c27d026bad90c2c4e9965498e716

    SHA256

    2f9021704041ee902ca55537d7b5792dc74436558b0453f72d8440264c1bb7bf

    SHA512

    b23857d5d9c9b63c7ecc6e947642ebeaf85ccaf75e4e7c490ad930fca3896a81f2e36ca099722317e2fa305ebb9675a4a8c3d5930761abb841d5dd0f5140067d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v0556404.exe

    Filesize

    784KB

    MD5

    57ee8f8d047550c37d32cb4f8691bd2b

    SHA1

    c595718640efe4abba7168646effe188eabbafc2

    SHA256

    95bda9538d472bf1c549314caae19f9b62893b9b5d18b4f41a73763eea36681f

    SHA512

    059e2520b5e1d199d53ea45e0b359fe98dc0636ed8770dce8e2a7c254ab0c4c9db7c9cdce66c7755218f1afe8329d3fbe0abeff071d71ea66cab102d5d853476

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v0556404.exe

    Filesize

    784KB

    MD5

    57ee8f8d047550c37d32cb4f8691bd2b

    SHA1

    c595718640efe4abba7168646effe188eabbafc2

    SHA256

    95bda9538d472bf1c549314caae19f9b62893b9b5d18b4f41a73763eea36681f

    SHA512

    059e2520b5e1d199d53ea45e0b359fe98dc0636ed8770dce8e2a7c254ab0c4c9db7c9cdce66c7755218f1afe8329d3fbe0abeff071d71ea66cab102d5d853476

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v6962295.exe

    Filesize

    618KB

    MD5

    483a2f9712b2561c6135c8b6ae0837ab

    SHA1

    197c6308e3a2be8784d768e40bd8db5b43d1ee5e

    SHA256

    23967bf5de910a04002e8c439d9e40155aa793c596d66d0deca310faa6b064e6

    SHA512

    99c09b5910535aced445b00bc9ee0c2987ccda4d00b576ed5fb4fcde737476241f2115baa1a6da7b10537020a69f20f16624592e714f0b1e4273cf179b541f8b

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v6962295.exe

    Filesize

    618KB

    MD5

    483a2f9712b2561c6135c8b6ae0837ab

    SHA1

    197c6308e3a2be8784d768e40bd8db5b43d1ee5e

    SHA256

    23967bf5de910a04002e8c439d9e40155aa793c596d66d0deca310faa6b064e6

    SHA512

    99c09b5910535aced445b00bc9ee0c2987ccda4d00b576ed5fb4fcde737476241f2115baa1a6da7b10537020a69f20f16624592e714f0b1e4273cf179b541f8b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v6072025.exe

    Filesize

    347KB

    MD5

    2f307ad0a14c6d8a8754dd624f0542c7

    SHA1

    556ac8bb0ade5471b222994f3a01456d7e7611eb

    SHA256

    477e8a18d69b1c9df62c1649da1598e719267a7b51caed601ff908994020f2b3

    SHA512

    26fd1ea1e2038846b33c8f2f9a3e9ab8ca5d9dc50904c19965289961868b87a7968c1c216761c0034a35f84bdee64f7509385bd4e4ba71ae3c33400fa5f3fe01

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v6072025.exe

    Filesize

    347KB

    MD5

    2f307ad0a14c6d8a8754dd624f0542c7

    SHA1

    556ac8bb0ade5471b222994f3a01456d7e7611eb

    SHA256

    477e8a18d69b1c9df62c1649da1598e719267a7b51caed601ff908994020f2b3

    SHA512

    26fd1ea1e2038846b33c8f2f9a3e9ab8ca5d9dc50904c19965289961868b87a7968c1c216761c0034a35f84bdee64f7509385bd4e4ba71ae3c33400fa5f3fe01

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a5960861.exe

    Filesize

    235KB

    MD5

    e0d51230e0bc836a685ba05fdb9f396f

    SHA1

    dc907a920167e7fcf9cd55d86d16ce1836f7e6dd

    SHA256

    a66bc7009b3c3b312cbb0c251a3873d979e4a81d64fa97e307e419509f3fb94b

    SHA512

    2ef00bf4d77beca4a2a972d3ee1798285cab807ada22b760e7ea7a275c592b05a727b69b273cdd30c159363e7583c7e7d785394919dbc07a87df2242661f80c5

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a5960861.exe

    Filesize

    235KB

    MD5

    e0d51230e0bc836a685ba05fdb9f396f

    SHA1

    dc907a920167e7fcf9cd55d86d16ce1836f7e6dd

    SHA256

    a66bc7009b3c3b312cbb0c251a3873d979e4a81d64fa97e307e419509f3fb94b

    SHA512

    2ef00bf4d77beca4a2a972d3ee1798285cab807ada22b760e7ea7a275c592b05a727b69b273cdd30c159363e7583c7e7d785394919dbc07a87df2242661f80c5

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a5960861.exe

    Filesize

    235KB

    MD5

    e0d51230e0bc836a685ba05fdb9f396f

    SHA1

    dc907a920167e7fcf9cd55d86d16ce1836f7e6dd

    SHA256

    a66bc7009b3c3b312cbb0c251a3873d979e4a81d64fa97e307e419509f3fb94b

    SHA512

    2ef00bf4d77beca4a2a972d3ee1798285cab807ada22b760e7ea7a275c592b05a727b69b273cdd30c159363e7583c7e7d785394919dbc07a87df2242661f80c5

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a5960861.exe

    Filesize

    235KB

    MD5

    e0d51230e0bc836a685ba05fdb9f396f

    SHA1

    dc907a920167e7fcf9cd55d86d16ce1836f7e6dd

    SHA256

    a66bc7009b3c3b312cbb0c251a3873d979e4a81d64fa97e307e419509f3fb94b

    SHA512

    2ef00bf4d77beca4a2a972d3ee1798285cab807ada22b760e7ea7a275c592b05a727b69b273cdd30c159363e7583c7e7d785394919dbc07a87df2242661f80c5

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a5960861.exe

    Filesize

    235KB

    MD5

    e0d51230e0bc836a685ba05fdb9f396f

    SHA1

    dc907a920167e7fcf9cd55d86d16ce1836f7e6dd

    SHA256

    a66bc7009b3c3b312cbb0c251a3873d979e4a81d64fa97e307e419509f3fb94b

    SHA512

    2ef00bf4d77beca4a2a972d3ee1798285cab807ada22b760e7ea7a275c592b05a727b69b273cdd30c159363e7583c7e7d785394919dbc07a87df2242661f80c5

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a5960861.exe

    Filesize

    235KB

    MD5

    e0d51230e0bc836a685ba05fdb9f396f

    SHA1

    dc907a920167e7fcf9cd55d86d16ce1836f7e6dd

    SHA256

    a66bc7009b3c3b312cbb0c251a3873d979e4a81d64fa97e307e419509f3fb94b

    SHA512

    2ef00bf4d77beca4a2a972d3ee1798285cab807ada22b760e7ea7a275c592b05a727b69b273cdd30c159363e7583c7e7d785394919dbc07a87df2242661f80c5

  • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a5960861.exe

    Filesize

    235KB

    MD5

    e0d51230e0bc836a685ba05fdb9f396f

    SHA1

    dc907a920167e7fcf9cd55d86d16ce1836f7e6dd

    SHA256

    a66bc7009b3c3b312cbb0c251a3873d979e4a81d64fa97e307e419509f3fb94b

    SHA512

    2ef00bf4d77beca4a2a972d3ee1798285cab807ada22b760e7ea7a275c592b05a727b69b273cdd30c159363e7583c7e7d785394919dbc07a87df2242661f80c5

  • memory/2544-66-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2544-68-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2544-72-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2544-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2544-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2544-65-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2544-64-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2544-63-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB