Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 20:33

General

  • Target

    2345575d5631e8b61eb68785bd2075bcbdf76284187146d80a9d24fa451c641f.exe

  • Size

    1.1MB

  • MD5

    8cfce258fc2516f89319a9e1a9c49598

  • SHA1

    3c20d5a91bb2af360156f5ee411a0d76f85f8957

  • SHA256

    2345575d5631e8b61eb68785bd2075bcbdf76284187146d80a9d24fa451c641f

  • SHA512

    606f4bc116c8af245993936fffd35bfdc34102938720b1f93b58eaa1ace7f91ea03012a5be1c9fb10976b83e1241cae9b3bb3f1c38a69132681489f13da7e2ef

  • SSDEEP

    24576:oyQBWIG/XCeX5tANMpEt6UtYeP/qcxiRR7gTcH9SU2Cn:vQQ6eJtVet6NO/qcxiRxgTD

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2345575d5631e8b61eb68785bd2075bcbdf76284187146d80a9d24fa451c641f.exe
    "C:\Users\Admin\AppData\Local\Temp\2345575d5631e8b61eb68785bd2075bcbdf76284187146d80a9d24fa451c641f.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5514196.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5514196.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1317343.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1317343.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2644
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0864365.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0864365.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2924
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4463671.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4463671.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2640
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2212306.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2212306.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2776
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2672
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2748

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5514196.exe

          Filesize

          990KB

          MD5

          4a617b92973e90b6214e1687e6f54d4a

          SHA1

          9430237e70fdbe28e6ab135e39d05a6ed8986edc

          SHA256

          fd499119ffc036ada026e7710d4e23c7bea4cb1562c623c8d15aa8c9cc785807

          SHA512

          24d5fac8323de228d9e55ec8b3ec2c082bc030c95894e261b177c7d29419b2f3d2a8a6d42c60f039c2d5cbeaa33758d7e81f16eea888958ceca4904f3bcfcac2

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5514196.exe

          Filesize

          990KB

          MD5

          4a617b92973e90b6214e1687e6f54d4a

          SHA1

          9430237e70fdbe28e6ab135e39d05a6ed8986edc

          SHA256

          fd499119ffc036ada026e7710d4e23c7bea4cb1562c623c8d15aa8c9cc785807

          SHA512

          24d5fac8323de228d9e55ec8b3ec2c082bc030c95894e261b177c7d29419b2f3d2a8a6d42c60f039c2d5cbeaa33758d7e81f16eea888958ceca4904f3bcfcac2

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1317343.exe

          Filesize

          807KB

          MD5

          439cfef4b3095520aa37ea397632b3d2

          SHA1

          0c713e859989c4a831f10fa5ebc0cf3d6ea66feb

          SHA256

          917cff5cb1c83fdbbf399596194454024c540559f7f93b535c7ed14d4cbd8b4e

          SHA512

          c16bd9714f4d1df7da8da7ca57df45511ae99bbca09c499ff9bee129725ea10211fbb9b021550dfc627f32722073c265bf239237359ed76b1e36585a0e981ed9

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1317343.exe

          Filesize

          807KB

          MD5

          439cfef4b3095520aa37ea397632b3d2

          SHA1

          0c713e859989c4a831f10fa5ebc0cf3d6ea66feb

          SHA256

          917cff5cb1c83fdbbf399596194454024c540559f7f93b535c7ed14d4cbd8b4e

          SHA512

          c16bd9714f4d1df7da8da7ca57df45511ae99bbca09c499ff9bee129725ea10211fbb9b021550dfc627f32722073c265bf239237359ed76b1e36585a0e981ed9

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0864365.exe

          Filesize

          624KB

          MD5

          64f3806df21f1e6a478a3093d8537fde

          SHA1

          21a6080f5f1e8c4f9f900772ac3824196970d9b6

          SHA256

          7479dd78beeabc26d3ac8ee02d7fee0a60b4437d40121556ac38330c9f88a49f

          SHA512

          06ddf3472f45cddec84549cfcfbd86c69d4881dbbca1ff4546f4fae369bdb86d62efef0c71b29d38f3daf3262ec62ee9ea19069eb159ee2ec6841173fb8d43cf

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0864365.exe

          Filesize

          624KB

          MD5

          64f3806df21f1e6a478a3093d8537fde

          SHA1

          21a6080f5f1e8c4f9f900772ac3824196970d9b6

          SHA256

          7479dd78beeabc26d3ac8ee02d7fee0a60b4437d40121556ac38330c9f88a49f

          SHA512

          06ddf3472f45cddec84549cfcfbd86c69d4881dbbca1ff4546f4fae369bdb86d62efef0c71b29d38f3daf3262ec62ee9ea19069eb159ee2ec6841173fb8d43cf

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4463671.exe

          Filesize

          350KB

          MD5

          e5ecbeb5fa0c02b9232d30e97549d153

          SHA1

          37933609f6b92d60995f25cfa863301bc10cb44f

          SHA256

          5a6145b77a45648a9e19dd73048f420856ab68798dbdd2697b1b6215e6ea4367

          SHA512

          e5a3c1fc241e68432c0a4237a6b4bb243adb80d09e46c65d4296d8a8d2cc6df4731733fc5b82dbf66e0553b8631699a734d2f2bcaadcda016974092549995a2e

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4463671.exe

          Filesize

          350KB

          MD5

          e5ecbeb5fa0c02b9232d30e97549d153

          SHA1

          37933609f6b92d60995f25cfa863301bc10cb44f

          SHA256

          5a6145b77a45648a9e19dd73048f420856ab68798dbdd2697b1b6215e6ea4367

          SHA512

          e5a3c1fc241e68432c0a4237a6b4bb243adb80d09e46c65d4296d8a8d2cc6df4731733fc5b82dbf66e0553b8631699a734d2f2bcaadcda016974092549995a2e

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2212306.exe

          Filesize

          251KB

          MD5

          88c3fafdf0559fd74ddb02a45d19204e

          SHA1

          a2ce0057622b90611985ad5f5ccad86d0fd9f8b6

          SHA256

          3a544020ce23bf23e5a7cf6eb17f0c0e77ae858a214acb27044445dc91dc0118

          SHA512

          98fc98d8352bc54529e7efc8e5deca4346f17b12e1276bc0a6d9bb9be8c0f9c04b2f8c29164e00e4f7c637ed639f3dae307bcdf2b88314515aaaec4eb9249202

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2212306.exe

          Filesize

          251KB

          MD5

          88c3fafdf0559fd74ddb02a45d19204e

          SHA1

          a2ce0057622b90611985ad5f5ccad86d0fd9f8b6

          SHA256

          3a544020ce23bf23e5a7cf6eb17f0c0e77ae858a214acb27044445dc91dc0118

          SHA512

          98fc98d8352bc54529e7efc8e5deca4346f17b12e1276bc0a6d9bb9be8c0f9c04b2f8c29164e00e4f7c637ed639f3dae307bcdf2b88314515aaaec4eb9249202

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2212306.exe

          Filesize

          251KB

          MD5

          88c3fafdf0559fd74ddb02a45d19204e

          SHA1

          a2ce0057622b90611985ad5f5ccad86d0fd9f8b6

          SHA256

          3a544020ce23bf23e5a7cf6eb17f0c0e77ae858a214acb27044445dc91dc0118

          SHA512

          98fc98d8352bc54529e7efc8e5deca4346f17b12e1276bc0a6d9bb9be8c0f9c04b2f8c29164e00e4f7c637ed639f3dae307bcdf2b88314515aaaec4eb9249202

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5514196.exe

          Filesize

          990KB

          MD5

          4a617b92973e90b6214e1687e6f54d4a

          SHA1

          9430237e70fdbe28e6ab135e39d05a6ed8986edc

          SHA256

          fd499119ffc036ada026e7710d4e23c7bea4cb1562c623c8d15aa8c9cc785807

          SHA512

          24d5fac8323de228d9e55ec8b3ec2c082bc030c95894e261b177c7d29419b2f3d2a8a6d42c60f039c2d5cbeaa33758d7e81f16eea888958ceca4904f3bcfcac2

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5514196.exe

          Filesize

          990KB

          MD5

          4a617b92973e90b6214e1687e6f54d4a

          SHA1

          9430237e70fdbe28e6ab135e39d05a6ed8986edc

          SHA256

          fd499119ffc036ada026e7710d4e23c7bea4cb1562c623c8d15aa8c9cc785807

          SHA512

          24d5fac8323de228d9e55ec8b3ec2c082bc030c95894e261b177c7d29419b2f3d2a8a6d42c60f039c2d5cbeaa33758d7e81f16eea888958ceca4904f3bcfcac2

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1317343.exe

          Filesize

          807KB

          MD5

          439cfef4b3095520aa37ea397632b3d2

          SHA1

          0c713e859989c4a831f10fa5ebc0cf3d6ea66feb

          SHA256

          917cff5cb1c83fdbbf399596194454024c540559f7f93b535c7ed14d4cbd8b4e

          SHA512

          c16bd9714f4d1df7da8da7ca57df45511ae99bbca09c499ff9bee129725ea10211fbb9b021550dfc627f32722073c265bf239237359ed76b1e36585a0e981ed9

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z1317343.exe

          Filesize

          807KB

          MD5

          439cfef4b3095520aa37ea397632b3d2

          SHA1

          0c713e859989c4a831f10fa5ebc0cf3d6ea66feb

          SHA256

          917cff5cb1c83fdbbf399596194454024c540559f7f93b535c7ed14d4cbd8b4e

          SHA512

          c16bd9714f4d1df7da8da7ca57df45511ae99bbca09c499ff9bee129725ea10211fbb9b021550dfc627f32722073c265bf239237359ed76b1e36585a0e981ed9

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0864365.exe

          Filesize

          624KB

          MD5

          64f3806df21f1e6a478a3093d8537fde

          SHA1

          21a6080f5f1e8c4f9f900772ac3824196970d9b6

          SHA256

          7479dd78beeabc26d3ac8ee02d7fee0a60b4437d40121556ac38330c9f88a49f

          SHA512

          06ddf3472f45cddec84549cfcfbd86c69d4881dbbca1ff4546f4fae369bdb86d62efef0c71b29d38f3daf3262ec62ee9ea19069eb159ee2ec6841173fb8d43cf

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0864365.exe

          Filesize

          624KB

          MD5

          64f3806df21f1e6a478a3093d8537fde

          SHA1

          21a6080f5f1e8c4f9f900772ac3824196970d9b6

          SHA256

          7479dd78beeabc26d3ac8ee02d7fee0a60b4437d40121556ac38330c9f88a49f

          SHA512

          06ddf3472f45cddec84549cfcfbd86c69d4881dbbca1ff4546f4fae369bdb86d62efef0c71b29d38f3daf3262ec62ee9ea19069eb159ee2ec6841173fb8d43cf

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z4463671.exe

          Filesize

          350KB

          MD5

          e5ecbeb5fa0c02b9232d30e97549d153

          SHA1

          37933609f6b92d60995f25cfa863301bc10cb44f

          SHA256

          5a6145b77a45648a9e19dd73048f420856ab68798dbdd2697b1b6215e6ea4367

          SHA512

          e5a3c1fc241e68432c0a4237a6b4bb243adb80d09e46c65d4296d8a8d2cc6df4731733fc5b82dbf66e0553b8631699a734d2f2bcaadcda016974092549995a2e

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z4463671.exe

          Filesize

          350KB

          MD5

          e5ecbeb5fa0c02b9232d30e97549d153

          SHA1

          37933609f6b92d60995f25cfa863301bc10cb44f

          SHA256

          5a6145b77a45648a9e19dd73048f420856ab68798dbdd2697b1b6215e6ea4367

          SHA512

          e5a3c1fc241e68432c0a4237a6b4bb243adb80d09e46c65d4296d8a8d2cc6df4731733fc5b82dbf66e0553b8631699a734d2f2bcaadcda016974092549995a2e

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2212306.exe

          Filesize

          251KB

          MD5

          88c3fafdf0559fd74ddb02a45d19204e

          SHA1

          a2ce0057622b90611985ad5f5ccad86d0fd9f8b6

          SHA256

          3a544020ce23bf23e5a7cf6eb17f0c0e77ae858a214acb27044445dc91dc0118

          SHA512

          98fc98d8352bc54529e7efc8e5deca4346f17b12e1276bc0a6d9bb9be8c0f9c04b2f8c29164e00e4f7c637ed639f3dae307bcdf2b88314515aaaec4eb9249202

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2212306.exe

          Filesize

          251KB

          MD5

          88c3fafdf0559fd74ddb02a45d19204e

          SHA1

          a2ce0057622b90611985ad5f5ccad86d0fd9f8b6

          SHA256

          3a544020ce23bf23e5a7cf6eb17f0c0e77ae858a214acb27044445dc91dc0118

          SHA512

          98fc98d8352bc54529e7efc8e5deca4346f17b12e1276bc0a6d9bb9be8c0f9c04b2f8c29164e00e4f7c637ed639f3dae307bcdf2b88314515aaaec4eb9249202

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2212306.exe

          Filesize

          251KB

          MD5

          88c3fafdf0559fd74ddb02a45d19204e

          SHA1

          a2ce0057622b90611985ad5f5ccad86d0fd9f8b6

          SHA256

          3a544020ce23bf23e5a7cf6eb17f0c0e77ae858a214acb27044445dc91dc0118

          SHA512

          98fc98d8352bc54529e7efc8e5deca4346f17b12e1276bc0a6d9bb9be8c0f9c04b2f8c29164e00e4f7c637ed639f3dae307bcdf2b88314515aaaec4eb9249202

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2212306.exe

          Filesize

          251KB

          MD5

          88c3fafdf0559fd74ddb02a45d19204e

          SHA1

          a2ce0057622b90611985ad5f5ccad86d0fd9f8b6

          SHA256

          3a544020ce23bf23e5a7cf6eb17f0c0e77ae858a214acb27044445dc91dc0118

          SHA512

          98fc98d8352bc54529e7efc8e5deca4346f17b12e1276bc0a6d9bb9be8c0f9c04b2f8c29164e00e4f7c637ed639f3dae307bcdf2b88314515aaaec4eb9249202

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2212306.exe

          Filesize

          251KB

          MD5

          88c3fafdf0559fd74ddb02a45d19204e

          SHA1

          a2ce0057622b90611985ad5f5ccad86d0fd9f8b6

          SHA256

          3a544020ce23bf23e5a7cf6eb17f0c0e77ae858a214acb27044445dc91dc0118

          SHA512

          98fc98d8352bc54529e7efc8e5deca4346f17b12e1276bc0a6d9bb9be8c0f9c04b2f8c29164e00e4f7c637ed639f3dae307bcdf2b88314515aaaec4eb9249202

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2212306.exe

          Filesize

          251KB

          MD5

          88c3fafdf0559fd74ddb02a45d19204e

          SHA1

          a2ce0057622b90611985ad5f5ccad86d0fd9f8b6

          SHA256

          3a544020ce23bf23e5a7cf6eb17f0c0e77ae858a214acb27044445dc91dc0118

          SHA512

          98fc98d8352bc54529e7efc8e5deca4346f17b12e1276bc0a6d9bb9be8c0f9c04b2f8c29164e00e4f7c637ed639f3dae307bcdf2b88314515aaaec4eb9249202

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2212306.exe

          Filesize

          251KB

          MD5

          88c3fafdf0559fd74ddb02a45d19204e

          SHA1

          a2ce0057622b90611985ad5f5ccad86d0fd9f8b6

          SHA256

          3a544020ce23bf23e5a7cf6eb17f0c0e77ae858a214acb27044445dc91dc0118

          SHA512

          98fc98d8352bc54529e7efc8e5deca4346f17b12e1276bc0a6d9bb9be8c0f9c04b2f8c29164e00e4f7c637ed639f3dae307bcdf2b88314515aaaec4eb9249202

        • memory/2672-55-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2672-53-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2672-62-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2672-60-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2672-56-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2672-58-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2672-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2672-54-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB