Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    270s
  • max time network
    319s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 00:29

General

  • Target

    1aeb31a58921bf60f6ab8a9d1ae857b1cb908010e7c485fdf61c17e7af212fa4.exe

  • Size

    1.0MB

  • MD5

    70f9911b4958d9ee574e0cfbf12abc39

  • SHA1

    0e46cfccc570d4c1a0c36a7f541b15d67beb1872

  • SHA256

    1aeb31a58921bf60f6ab8a9d1ae857b1cb908010e7c485fdf61c17e7af212fa4

  • SHA512

    f59cc6a425cf20588c32cc3c37486e5942bbb3a82d78d2e4d5a32e23e4f18ce571006aa4f64d450434e5606678d8af1082ef58c156e7616d668c62f55a4f15d2

  • SSDEEP

    24576:KyDJIyi5oFw+L4zu9VAbxYAFJXBY31k1s74I/Aqxfefq:RDJyoFDMGVA1fXTC741w

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1aeb31a58921bf60f6ab8a9d1ae857b1cb908010e7c485fdf61c17e7af212fa4.exe
    "C:\Users\Admin\AppData\Local\Temp\1aeb31a58921bf60f6ab8a9d1ae857b1cb908010e7c485fdf61c17e7af212fa4.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5738292.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5738292.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9060937.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9060937.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2352
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1516257.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1516257.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2520
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8940121.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8940121.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2952
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3069629.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3069629.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2500
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2604
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5738292.exe

    Filesize

    969KB

    MD5

    02b37412711ff9a8e4c5e65ca309667b

    SHA1

    2539af6852919cab5c9293525f39d74f443ccbe9

    SHA256

    6592aca4eb98c5d1d2c402138048e1936390d3cefce5a2a53755e26027234136

    SHA512

    a6e1a35114598a26250c3c6c977464e48953758510af6e4eee1694530af293f423eff0a8d50a38d6ec5ff3a322cdabb63b76ee22e0e5fc586961956f08803224

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5738292.exe

    Filesize

    969KB

    MD5

    02b37412711ff9a8e4c5e65ca309667b

    SHA1

    2539af6852919cab5c9293525f39d74f443ccbe9

    SHA256

    6592aca4eb98c5d1d2c402138048e1936390d3cefce5a2a53755e26027234136

    SHA512

    a6e1a35114598a26250c3c6c977464e48953758510af6e4eee1694530af293f423eff0a8d50a38d6ec5ff3a322cdabb63b76ee22e0e5fc586961956f08803224

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9060937.exe

    Filesize

    786KB

    MD5

    e2275922cd74c974da9abd5f8f1b02e7

    SHA1

    612bff0a9dba863ac427be415af69eb44bbd9d78

    SHA256

    c6614fe125101a5f40201ff19c9314b4f09ec8519fc287782ddbe68afba91c8c

    SHA512

    ce4b5fc2ab7e9a2af05f01dbf6d9b208a6723d44007f87101597784e1f478cef59858ec16a6906226667e8b730ef6b099b3af3f1e190620d4970fd3ddfa6a178

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9060937.exe

    Filesize

    786KB

    MD5

    e2275922cd74c974da9abd5f8f1b02e7

    SHA1

    612bff0a9dba863ac427be415af69eb44bbd9d78

    SHA256

    c6614fe125101a5f40201ff19c9314b4f09ec8519fc287782ddbe68afba91c8c

    SHA512

    ce4b5fc2ab7e9a2af05f01dbf6d9b208a6723d44007f87101597784e1f478cef59858ec16a6906226667e8b730ef6b099b3af3f1e190620d4970fd3ddfa6a178

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1516257.exe

    Filesize

    603KB

    MD5

    6f8f268b1fdeb84553c7c5a84f3038e2

    SHA1

    d531e59c6e032f1a1e00e680716cd1e58c336267

    SHA256

    de917f2d044f3c6b7fe1d82d733e074578636365c19c33be9a862ad8e8698030

    SHA512

    3101c354fe9801433970d1ded9004f6873d07a7139f82d91fae5b4e53ef9ef450b9ded08eae65eb5d3e9039a371135af3bd71d60cb807cc39a4279ef6414a60e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1516257.exe

    Filesize

    603KB

    MD5

    6f8f268b1fdeb84553c7c5a84f3038e2

    SHA1

    d531e59c6e032f1a1e00e680716cd1e58c336267

    SHA256

    de917f2d044f3c6b7fe1d82d733e074578636365c19c33be9a862ad8e8698030

    SHA512

    3101c354fe9801433970d1ded9004f6873d07a7139f82d91fae5b4e53ef9ef450b9ded08eae65eb5d3e9039a371135af3bd71d60cb807cc39a4279ef6414a60e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8940121.exe

    Filesize

    344KB

    MD5

    a69fad305d0f3c82c6dad74cc4771453

    SHA1

    2b85eadba31a78076ab0cc20fdd507378c46a2a8

    SHA256

    505714bc6710529cdba1b93a1c07ddecb983c7fa3d3b39cf3950cbc892e42ddb

    SHA512

    8c22eb1a1a041be5c0e9ed22ec3d58a98a74a257eb289780d380b4b5d08e28cf504b86c90793f4c3114626038b35421e5362cb46c6713c38d20bc2cde956527d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8940121.exe

    Filesize

    344KB

    MD5

    a69fad305d0f3c82c6dad74cc4771453

    SHA1

    2b85eadba31a78076ab0cc20fdd507378c46a2a8

    SHA256

    505714bc6710529cdba1b93a1c07ddecb983c7fa3d3b39cf3950cbc892e42ddb

    SHA512

    8c22eb1a1a041be5c0e9ed22ec3d58a98a74a257eb289780d380b4b5d08e28cf504b86c90793f4c3114626038b35421e5362cb46c6713c38d20bc2cde956527d

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3069629.exe

    Filesize

    220KB

    MD5

    f27e37821f3f56468aad02a0192574a7

    SHA1

    49adb33356a77b43c9ab51dea688384006683119

    SHA256

    ec965301353a0b4973272129bb1f13279884209b56a91adb2a7dc101f306a8d3

    SHA512

    25389ecd1a69e7d7565ba08b415c991fc2f290d75a80e8c6adc31c55ea50c1c1418a145da2732d365099770e0dfddc86ed126d19b51f7a862cdf331870ab7fc6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3069629.exe

    Filesize

    220KB

    MD5

    f27e37821f3f56468aad02a0192574a7

    SHA1

    49adb33356a77b43c9ab51dea688384006683119

    SHA256

    ec965301353a0b4973272129bb1f13279884209b56a91adb2a7dc101f306a8d3

    SHA512

    25389ecd1a69e7d7565ba08b415c991fc2f290d75a80e8c6adc31c55ea50c1c1418a145da2732d365099770e0dfddc86ed126d19b51f7a862cdf331870ab7fc6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3069629.exe

    Filesize

    220KB

    MD5

    f27e37821f3f56468aad02a0192574a7

    SHA1

    49adb33356a77b43c9ab51dea688384006683119

    SHA256

    ec965301353a0b4973272129bb1f13279884209b56a91adb2a7dc101f306a8d3

    SHA512

    25389ecd1a69e7d7565ba08b415c991fc2f290d75a80e8c6adc31c55ea50c1c1418a145da2732d365099770e0dfddc86ed126d19b51f7a862cdf331870ab7fc6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5738292.exe

    Filesize

    969KB

    MD5

    02b37412711ff9a8e4c5e65ca309667b

    SHA1

    2539af6852919cab5c9293525f39d74f443ccbe9

    SHA256

    6592aca4eb98c5d1d2c402138048e1936390d3cefce5a2a53755e26027234136

    SHA512

    a6e1a35114598a26250c3c6c977464e48953758510af6e4eee1694530af293f423eff0a8d50a38d6ec5ff3a322cdabb63b76ee22e0e5fc586961956f08803224

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5738292.exe

    Filesize

    969KB

    MD5

    02b37412711ff9a8e4c5e65ca309667b

    SHA1

    2539af6852919cab5c9293525f39d74f443ccbe9

    SHA256

    6592aca4eb98c5d1d2c402138048e1936390d3cefce5a2a53755e26027234136

    SHA512

    a6e1a35114598a26250c3c6c977464e48953758510af6e4eee1694530af293f423eff0a8d50a38d6ec5ff3a322cdabb63b76ee22e0e5fc586961956f08803224

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9060937.exe

    Filesize

    786KB

    MD5

    e2275922cd74c974da9abd5f8f1b02e7

    SHA1

    612bff0a9dba863ac427be415af69eb44bbd9d78

    SHA256

    c6614fe125101a5f40201ff19c9314b4f09ec8519fc287782ddbe68afba91c8c

    SHA512

    ce4b5fc2ab7e9a2af05f01dbf6d9b208a6723d44007f87101597784e1f478cef59858ec16a6906226667e8b730ef6b099b3af3f1e190620d4970fd3ddfa6a178

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9060937.exe

    Filesize

    786KB

    MD5

    e2275922cd74c974da9abd5f8f1b02e7

    SHA1

    612bff0a9dba863ac427be415af69eb44bbd9d78

    SHA256

    c6614fe125101a5f40201ff19c9314b4f09ec8519fc287782ddbe68afba91c8c

    SHA512

    ce4b5fc2ab7e9a2af05f01dbf6d9b208a6723d44007f87101597784e1f478cef59858ec16a6906226667e8b730ef6b099b3af3f1e190620d4970fd3ddfa6a178

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1516257.exe

    Filesize

    603KB

    MD5

    6f8f268b1fdeb84553c7c5a84f3038e2

    SHA1

    d531e59c6e032f1a1e00e680716cd1e58c336267

    SHA256

    de917f2d044f3c6b7fe1d82d733e074578636365c19c33be9a862ad8e8698030

    SHA512

    3101c354fe9801433970d1ded9004f6873d07a7139f82d91fae5b4e53ef9ef450b9ded08eae65eb5d3e9039a371135af3bd71d60cb807cc39a4279ef6414a60e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1516257.exe

    Filesize

    603KB

    MD5

    6f8f268b1fdeb84553c7c5a84f3038e2

    SHA1

    d531e59c6e032f1a1e00e680716cd1e58c336267

    SHA256

    de917f2d044f3c6b7fe1d82d733e074578636365c19c33be9a862ad8e8698030

    SHA512

    3101c354fe9801433970d1ded9004f6873d07a7139f82d91fae5b4e53ef9ef450b9ded08eae65eb5d3e9039a371135af3bd71d60cb807cc39a4279ef6414a60e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8940121.exe

    Filesize

    344KB

    MD5

    a69fad305d0f3c82c6dad74cc4771453

    SHA1

    2b85eadba31a78076ab0cc20fdd507378c46a2a8

    SHA256

    505714bc6710529cdba1b93a1c07ddecb983c7fa3d3b39cf3950cbc892e42ddb

    SHA512

    8c22eb1a1a041be5c0e9ed22ec3d58a98a74a257eb289780d380b4b5d08e28cf504b86c90793f4c3114626038b35421e5362cb46c6713c38d20bc2cde956527d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8940121.exe

    Filesize

    344KB

    MD5

    a69fad305d0f3c82c6dad74cc4771453

    SHA1

    2b85eadba31a78076ab0cc20fdd507378c46a2a8

    SHA256

    505714bc6710529cdba1b93a1c07ddecb983c7fa3d3b39cf3950cbc892e42ddb

    SHA512

    8c22eb1a1a041be5c0e9ed22ec3d58a98a74a257eb289780d380b4b5d08e28cf504b86c90793f4c3114626038b35421e5362cb46c6713c38d20bc2cde956527d

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3069629.exe

    Filesize

    220KB

    MD5

    f27e37821f3f56468aad02a0192574a7

    SHA1

    49adb33356a77b43c9ab51dea688384006683119

    SHA256

    ec965301353a0b4973272129bb1f13279884209b56a91adb2a7dc101f306a8d3

    SHA512

    25389ecd1a69e7d7565ba08b415c991fc2f290d75a80e8c6adc31c55ea50c1c1418a145da2732d365099770e0dfddc86ed126d19b51f7a862cdf331870ab7fc6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3069629.exe

    Filesize

    220KB

    MD5

    f27e37821f3f56468aad02a0192574a7

    SHA1

    49adb33356a77b43c9ab51dea688384006683119

    SHA256

    ec965301353a0b4973272129bb1f13279884209b56a91adb2a7dc101f306a8d3

    SHA512

    25389ecd1a69e7d7565ba08b415c991fc2f290d75a80e8c6adc31c55ea50c1c1418a145da2732d365099770e0dfddc86ed126d19b51f7a862cdf331870ab7fc6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3069629.exe

    Filesize

    220KB

    MD5

    f27e37821f3f56468aad02a0192574a7

    SHA1

    49adb33356a77b43c9ab51dea688384006683119

    SHA256

    ec965301353a0b4973272129bb1f13279884209b56a91adb2a7dc101f306a8d3

    SHA512

    25389ecd1a69e7d7565ba08b415c991fc2f290d75a80e8c6adc31c55ea50c1c1418a145da2732d365099770e0dfddc86ed126d19b51f7a862cdf331870ab7fc6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3069629.exe

    Filesize

    220KB

    MD5

    f27e37821f3f56468aad02a0192574a7

    SHA1

    49adb33356a77b43c9ab51dea688384006683119

    SHA256

    ec965301353a0b4973272129bb1f13279884209b56a91adb2a7dc101f306a8d3

    SHA512

    25389ecd1a69e7d7565ba08b415c991fc2f290d75a80e8c6adc31c55ea50c1c1418a145da2732d365099770e0dfddc86ed126d19b51f7a862cdf331870ab7fc6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3069629.exe

    Filesize

    220KB

    MD5

    f27e37821f3f56468aad02a0192574a7

    SHA1

    49adb33356a77b43c9ab51dea688384006683119

    SHA256

    ec965301353a0b4973272129bb1f13279884209b56a91adb2a7dc101f306a8d3

    SHA512

    25389ecd1a69e7d7565ba08b415c991fc2f290d75a80e8c6adc31c55ea50c1c1418a145da2732d365099770e0dfddc86ed126d19b51f7a862cdf331870ab7fc6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3069629.exe

    Filesize

    220KB

    MD5

    f27e37821f3f56468aad02a0192574a7

    SHA1

    49adb33356a77b43c9ab51dea688384006683119

    SHA256

    ec965301353a0b4973272129bb1f13279884209b56a91adb2a7dc101f306a8d3

    SHA512

    25389ecd1a69e7d7565ba08b415c991fc2f290d75a80e8c6adc31c55ea50c1c1418a145da2732d365099770e0dfddc86ed126d19b51f7a862cdf331870ab7fc6

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3069629.exe

    Filesize

    220KB

    MD5

    f27e37821f3f56468aad02a0192574a7

    SHA1

    49adb33356a77b43c9ab51dea688384006683119

    SHA256

    ec965301353a0b4973272129bb1f13279884209b56a91adb2a7dc101f306a8d3

    SHA512

    25389ecd1a69e7d7565ba08b415c991fc2f290d75a80e8c6adc31c55ea50c1c1418a145da2732d365099770e0dfddc86ed126d19b51f7a862cdf331870ab7fc6

  • memory/2604-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2604-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2604-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2604-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2604-55-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2604-56-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2604-54-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2604-53-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB