Analysis

  • max time kernel
    121s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 20:28

General

  • Target

    2e25a83ce6e7a12e57247bedb4c71422a60f08ee7a6d646f48146844582c048a.exe

  • Size

    1.1MB

  • MD5

    7796648ce4c5e810e8e5d98839f05be3

  • SHA1

    2a624a2dc4aa3b0de96d647ad8fcde8cb5e7f388

  • SHA256

    2e25a83ce6e7a12e57247bedb4c71422a60f08ee7a6d646f48146844582c048a

  • SHA512

    5564211bd87b1cec92ad9f6b8af334211c9a90bc82d15260102584d6f4c4ec86aebc6fd24af14d2737df014687f1f8cd81c6ee89ebcc3ea16ee28dfebc78bf13

  • SSDEEP

    24576:BymEvPQ+52EwsejS/Z+x0IIXK6E+8KOFKHhtge6:0mEvPZfjZ+ua6mdm

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e25a83ce6e7a12e57247bedb4c71422a60f08ee7a6d646f48146844582c048a.exe
    "C:\Users\Admin\AppData\Local\Temp\2e25a83ce6e7a12e57247bedb4c71422a60f08ee7a6d646f48146844582c048a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3045439.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3045439.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1266699.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1266699.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2124
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6687287.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6687287.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1264
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3198033.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3198033.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1748
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3383775.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3383775.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2096
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2692
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3045439.exe

    Filesize

    990KB

    MD5

    e56d06baf4521d70953613ddb8cf339b

    SHA1

    39e6e10af13d6dcea63f7335d635dbe2d0e27e91

    SHA256

    d98eb6f985b9b3c6ee096868ec4712b22d11ec76eff4062adba38655f5392a43

    SHA512

    085815303d38ac02a44aa241788984f99a445d888314e52f87dd137b1991f1f1b47723f07b4b5cfa25fe80213270db9f5c385b10c62f201d749f7654442203fa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3045439.exe

    Filesize

    990KB

    MD5

    e56d06baf4521d70953613ddb8cf339b

    SHA1

    39e6e10af13d6dcea63f7335d635dbe2d0e27e91

    SHA256

    d98eb6f985b9b3c6ee096868ec4712b22d11ec76eff4062adba38655f5392a43

    SHA512

    085815303d38ac02a44aa241788984f99a445d888314e52f87dd137b1991f1f1b47723f07b4b5cfa25fe80213270db9f5c385b10c62f201d749f7654442203fa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1266699.exe

    Filesize

    808KB

    MD5

    7bb14207f16f55356b50c52815e6c5a6

    SHA1

    6709bb756086e362f3237a6e8ef3698cecabcc5c

    SHA256

    3fbc502a457f55d975993f722da99b4015179bef1e6ec3a82e6fdb3706418bf5

    SHA512

    5ad6d4793354b8d47da7363795fc1de91e4654353a4ea1f8f73b32635726d3118929aae0f918cca9c91fddd13efedddeb16d633d932a51ec07e94e4e2002001c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1266699.exe

    Filesize

    808KB

    MD5

    7bb14207f16f55356b50c52815e6c5a6

    SHA1

    6709bb756086e362f3237a6e8ef3698cecabcc5c

    SHA256

    3fbc502a457f55d975993f722da99b4015179bef1e6ec3a82e6fdb3706418bf5

    SHA512

    5ad6d4793354b8d47da7363795fc1de91e4654353a4ea1f8f73b32635726d3118929aae0f918cca9c91fddd13efedddeb16d633d932a51ec07e94e4e2002001c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6687287.exe

    Filesize

    625KB

    MD5

    d65b619a1241162a2c53d87daeeecc62

    SHA1

    b54dc6d7c3e01a82025c6223661d61c04d433a3c

    SHA256

    a27830f86f173612db6e584b59724d3b832b91f9f36e8b8d79412fb99dc7e5da

    SHA512

    f0a288493fc9feec5473c3e69db8533b8e3d81e0580eb95bcad6138c50b12a4275afe50a634513bb38fd73a619b5b45955986db4f338d7eb57316acbd1d75b40

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6687287.exe

    Filesize

    625KB

    MD5

    d65b619a1241162a2c53d87daeeecc62

    SHA1

    b54dc6d7c3e01a82025c6223661d61c04d433a3c

    SHA256

    a27830f86f173612db6e584b59724d3b832b91f9f36e8b8d79412fb99dc7e5da

    SHA512

    f0a288493fc9feec5473c3e69db8533b8e3d81e0580eb95bcad6138c50b12a4275afe50a634513bb38fd73a619b5b45955986db4f338d7eb57316acbd1d75b40

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3198033.exe

    Filesize

    351KB

    MD5

    0ed602962138c3a35e8b08e6c60fac1b

    SHA1

    64faab4ae8f68b5be2fa98137c3e7d05b2411a30

    SHA256

    0478e129fb4656b84ad2146c97d00ed304b714a11a4f80ead2b49dd52ea86719

    SHA512

    ba5994d97192f463e73ae93b325cec2527c721b6ab0a00013761982aa9f36b4a3a245d285cb0694346e73b3c22ec6ed442276e69afb864585dce2b6e2234adee

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3198033.exe

    Filesize

    351KB

    MD5

    0ed602962138c3a35e8b08e6c60fac1b

    SHA1

    64faab4ae8f68b5be2fa98137c3e7d05b2411a30

    SHA256

    0478e129fb4656b84ad2146c97d00ed304b714a11a4f80ead2b49dd52ea86719

    SHA512

    ba5994d97192f463e73ae93b325cec2527c721b6ab0a00013761982aa9f36b4a3a245d285cb0694346e73b3c22ec6ed442276e69afb864585dce2b6e2234adee

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3383775.exe

    Filesize

    251KB

    MD5

    1cd0c36d46b948b712f195634d4b8e1f

    SHA1

    b285553e5b312644793a66da950913bcb3df1d09

    SHA256

    62ccc3ef6596506f5445a9a16f0e59e1c14d678c8422c0f23277ac1f85555086

    SHA512

    18a7df86cb97038a0ce93b4f9c43782fd090d63082ff7476a493d5d9b820d2fcbf1bee5b94baf7282164776e5dcbe1fe39d512a08df37540759539a31c2e80d6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3383775.exe

    Filesize

    251KB

    MD5

    1cd0c36d46b948b712f195634d4b8e1f

    SHA1

    b285553e5b312644793a66da950913bcb3df1d09

    SHA256

    62ccc3ef6596506f5445a9a16f0e59e1c14d678c8422c0f23277ac1f85555086

    SHA512

    18a7df86cb97038a0ce93b4f9c43782fd090d63082ff7476a493d5d9b820d2fcbf1bee5b94baf7282164776e5dcbe1fe39d512a08df37540759539a31c2e80d6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3383775.exe

    Filesize

    251KB

    MD5

    1cd0c36d46b948b712f195634d4b8e1f

    SHA1

    b285553e5b312644793a66da950913bcb3df1d09

    SHA256

    62ccc3ef6596506f5445a9a16f0e59e1c14d678c8422c0f23277ac1f85555086

    SHA512

    18a7df86cb97038a0ce93b4f9c43782fd090d63082ff7476a493d5d9b820d2fcbf1bee5b94baf7282164776e5dcbe1fe39d512a08df37540759539a31c2e80d6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3045439.exe

    Filesize

    990KB

    MD5

    e56d06baf4521d70953613ddb8cf339b

    SHA1

    39e6e10af13d6dcea63f7335d635dbe2d0e27e91

    SHA256

    d98eb6f985b9b3c6ee096868ec4712b22d11ec76eff4062adba38655f5392a43

    SHA512

    085815303d38ac02a44aa241788984f99a445d888314e52f87dd137b1991f1f1b47723f07b4b5cfa25fe80213270db9f5c385b10c62f201d749f7654442203fa

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3045439.exe

    Filesize

    990KB

    MD5

    e56d06baf4521d70953613ddb8cf339b

    SHA1

    39e6e10af13d6dcea63f7335d635dbe2d0e27e91

    SHA256

    d98eb6f985b9b3c6ee096868ec4712b22d11ec76eff4062adba38655f5392a43

    SHA512

    085815303d38ac02a44aa241788984f99a445d888314e52f87dd137b1991f1f1b47723f07b4b5cfa25fe80213270db9f5c385b10c62f201d749f7654442203fa

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1266699.exe

    Filesize

    808KB

    MD5

    7bb14207f16f55356b50c52815e6c5a6

    SHA1

    6709bb756086e362f3237a6e8ef3698cecabcc5c

    SHA256

    3fbc502a457f55d975993f722da99b4015179bef1e6ec3a82e6fdb3706418bf5

    SHA512

    5ad6d4793354b8d47da7363795fc1de91e4654353a4ea1f8f73b32635726d3118929aae0f918cca9c91fddd13efedddeb16d633d932a51ec07e94e4e2002001c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1266699.exe

    Filesize

    808KB

    MD5

    7bb14207f16f55356b50c52815e6c5a6

    SHA1

    6709bb756086e362f3237a6e8ef3698cecabcc5c

    SHA256

    3fbc502a457f55d975993f722da99b4015179bef1e6ec3a82e6fdb3706418bf5

    SHA512

    5ad6d4793354b8d47da7363795fc1de91e4654353a4ea1f8f73b32635726d3118929aae0f918cca9c91fddd13efedddeb16d633d932a51ec07e94e4e2002001c

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6687287.exe

    Filesize

    625KB

    MD5

    d65b619a1241162a2c53d87daeeecc62

    SHA1

    b54dc6d7c3e01a82025c6223661d61c04d433a3c

    SHA256

    a27830f86f173612db6e584b59724d3b832b91f9f36e8b8d79412fb99dc7e5da

    SHA512

    f0a288493fc9feec5473c3e69db8533b8e3d81e0580eb95bcad6138c50b12a4275afe50a634513bb38fd73a619b5b45955986db4f338d7eb57316acbd1d75b40

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6687287.exe

    Filesize

    625KB

    MD5

    d65b619a1241162a2c53d87daeeecc62

    SHA1

    b54dc6d7c3e01a82025c6223661d61c04d433a3c

    SHA256

    a27830f86f173612db6e584b59724d3b832b91f9f36e8b8d79412fb99dc7e5da

    SHA512

    f0a288493fc9feec5473c3e69db8533b8e3d81e0580eb95bcad6138c50b12a4275afe50a634513bb38fd73a619b5b45955986db4f338d7eb57316acbd1d75b40

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z3198033.exe

    Filesize

    351KB

    MD5

    0ed602962138c3a35e8b08e6c60fac1b

    SHA1

    64faab4ae8f68b5be2fa98137c3e7d05b2411a30

    SHA256

    0478e129fb4656b84ad2146c97d00ed304b714a11a4f80ead2b49dd52ea86719

    SHA512

    ba5994d97192f463e73ae93b325cec2527c721b6ab0a00013761982aa9f36b4a3a245d285cb0694346e73b3c22ec6ed442276e69afb864585dce2b6e2234adee

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z3198033.exe

    Filesize

    351KB

    MD5

    0ed602962138c3a35e8b08e6c60fac1b

    SHA1

    64faab4ae8f68b5be2fa98137c3e7d05b2411a30

    SHA256

    0478e129fb4656b84ad2146c97d00ed304b714a11a4f80ead2b49dd52ea86719

    SHA512

    ba5994d97192f463e73ae93b325cec2527c721b6ab0a00013761982aa9f36b4a3a245d285cb0694346e73b3c22ec6ed442276e69afb864585dce2b6e2234adee

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3383775.exe

    Filesize

    251KB

    MD5

    1cd0c36d46b948b712f195634d4b8e1f

    SHA1

    b285553e5b312644793a66da950913bcb3df1d09

    SHA256

    62ccc3ef6596506f5445a9a16f0e59e1c14d678c8422c0f23277ac1f85555086

    SHA512

    18a7df86cb97038a0ce93b4f9c43782fd090d63082ff7476a493d5d9b820d2fcbf1bee5b94baf7282164776e5dcbe1fe39d512a08df37540759539a31c2e80d6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3383775.exe

    Filesize

    251KB

    MD5

    1cd0c36d46b948b712f195634d4b8e1f

    SHA1

    b285553e5b312644793a66da950913bcb3df1d09

    SHA256

    62ccc3ef6596506f5445a9a16f0e59e1c14d678c8422c0f23277ac1f85555086

    SHA512

    18a7df86cb97038a0ce93b4f9c43782fd090d63082ff7476a493d5d9b820d2fcbf1bee5b94baf7282164776e5dcbe1fe39d512a08df37540759539a31c2e80d6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3383775.exe

    Filesize

    251KB

    MD5

    1cd0c36d46b948b712f195634d4b8e1f

    SHA1

    b285553e5b312644793a66da950913bcb3df1d09

    SHA256

    62ccc3ef6596506f5445a9a16f0e59e1c14d678c8422c0f23277ac1f85555086

    SHA512

    18a7df86cb97038a0ce93b4f9c43782fd090d63082ff7476a493d5d9b820d2fcbf1bee5b94baf7282164776e5dcbe1fe39d512a08df37540759539a31c2e80d6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3383775.exe

    Filesize

    251KB

    MD5

    1cd0c36d46b948b712f195634d4b8e1f

    SHA1

    b285553e5b312644793a66da950913bcb3df1d09

    SHA256

    62ccc3ef6596506f5445a9a16f0e59e1c14d678c8422c0f23277ac1f85555086

    SHA512

    18a7df86cb97038a0ce93b4f9c43782fd090d63082ff7476a493d5d9b820d2fcbf1bee5b94baf7282164776e5dcbe1fe39d512a08df37540759539a31c2e80d6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3383775.exe

    Filesize

    251KB

    MD5

    1cd0c36d46b948b712f195634d4b8e1f

    SHA1

    b285553e5b312644793a66da950913bcb3df1d09

    SHA256

    62ccc3ef6596506f5445a9a16f0e59e1c14d678c8422c0f23277ac1f85555086

    SHA512

    18a7df86cb97038a0ce93b4f9c43782fd090d63082ff7476a493d5d9b820d2fcbf1bee5b94baf7282164776e5dcbe1fe39d512a08df37540759539a31c2e80d6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3383775.exe

    Filesize

    251KB

    MD5

    1cd0c36d46b948b712f195634d4b8e1f

    SHA1

    b285553e5b312644793a66da950913bcb3df1d09

    SHA256

    62ccc3ef6596506f5445a9a16f0e59e1c14d678c8422c0f23277ac1f85555086

    SHA512

    18a7df86cb97038a0ce93b4f9c43782fd090d63082ff7476a493d5d9b820d2fcbf1bee5b94baf7282164776e5dcbe1fe39d512a08df37540759539a31c2e80d6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3383775.exe

    Filesize

    251KB

    MD5

    1cd0c36d46b948b712f195634d4b8e1f

    SHA1

    b285553e5b312644793a66da950913bcb3df1d09

    SHA256

    62ccc3ef6596506f5445a9a16f0e59e1c14d678c8422c0f23277ac1f85555086

    SHA512

    18a7df86cb97038a0ce93b4f9c43782fd090d63082ff7476a493d5d9b820d2fcbf1bee5b94baf7282164776e5dcbe1fe39d512a08df37540759539a31c2e80d6

  • memory/2692-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2692-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2692-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2692-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2692-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2692-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2692-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2692-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB