Analysis

  • max time kernel
    128s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 01:45

General

  • Target

    718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe

  • Size

    446KB

  • MD5

    9607ed5c7e1b88f1d1035a34d258ea9c

  • SHA1

    aed23957bf68a9b43aa7eedcf5cf2cbc12cbe5f0

  • SHA256

    718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0

  • SHA512

    5c3e56b36ba171964fe9d98eaa778aa352e9fe9d43c35b62376991b203ea9b41950b8b6049442e14a896a71d240309c1e87dc1b99bea9b1155c56caa54110aad

  • SSDEEP

    12288:KMrMy90vr6TORA+xHWOmUh9LaeKJvhSODV:yyQWSR5WOmUhwVJvhSOR

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe
    "C:\Users\Admin\AppData\Local\Temp\718ef786bb121ab5ef655334f856a52ab177a1f6fdd1c0f892afe3252199c1b0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3528
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8150321.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8150321.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2136167.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2136167.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2184
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4448
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 580
          4⤵
          • Program crash
          PID:4264
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0169593.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0169593.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2936
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:3952
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 540
              5⤵
              • Program crash
              PID:1896
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 552
            4⤵
            • Program crash
            PID:2712
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5241735.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5241735.exe
        2⤵
        • Executes dropped EXE
        PID:2372
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2184 -ip 2184
      1⤵
        PID:1424
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2936 -ip 2936
        1⤵
          PID:4932
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3952 -ip 3952
          1⤵
            PID:1872

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5241735.exe

            Filesize

            19KB

            MD5

            3182699a931a4bd0949984e270feb6e2

            SHA1

            800134414d8759e2572b5c5e4af5d4eb719769fa

            SHA256

            4402d15a8edd830bf8e98ee0cc60581968cd679994d36533ee9db966b8abab7d

            SHA512

            f4010cae8023b48c412eb7c4f65262789bcffb9886fd8934903ddb7b717eeb91bf91c321f5d611730cc68f9fee9f2d13f95efdc0628dff4d66de1f03570cb6a5

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5241735.exe

            Filesize

            19KB

            MD5

            3182699a931a4bd0949984e270feb6e2

            SHA1

            800134414d8759e2572b5c5e4af5d4eb719769fa

            SHA256

            4402d15a8edd830bf8e98ee0cc60581968cd679994d36533ee9db966b8abab7d

            SHA512

            f4010cae8023b48c412eb7c4f65262789bcffb9886fd8934903ddb7b717eeb91bf91c321f5d611730cc68f9fee9f2d13f95efdc0628dff4d66de1f03570cb6a5

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8150321.exe

            Filesize

            344KB

            MD5

            325f3e44d888ac484242d7ffcb8de718

            SHA1

            7077444752fb0c9864cf8d7c1be5c3f1c21e13d4

            SHA256

            8222cc4c79f4ab381c5ca1aedfebf14c7f2cbe3b74e3650de8f44222c2097b2b

            SHA512

            f0119ac3cdf8081d659d24bdef942929e0080f38f51f5a025b5636eea301ac35d53b48bbe1d9759b66e45919a0325487dbc6a4b2e35819a5ac9b2fc49cc7231f

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8150321.exe

            Filesize

            344KB

            MD5

            325f3e44d888ac484242d7ffcb8de718

            SHA1

            7077444752fb0c9864cf8d7c1be5c3f1c21e13d4

            SHA256

            8222cc4c79f4ab381c5ca1aedfebf14c7f2cbe3b74e3650de8f44222c2097b2b

            SHA512

            f0119ac3cdf8081d659d24bdef942929e0080f38f51f5a025b5636eea301ac35d53b48bbe1d9759b66e45919a0325487dbc6a4b2e35819a5ac9b2fc49cc7231f

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2136167.exe

            Filesize

            220KB

            MD5

            581a608a9bfcf0cc4e06528947efe778

            SHA1

            40d77d9bb82795ebdb78774a6a5524a2d5ad30c2

            SHA256

            d8c220d8d660b3ea7a07f50cbf56c78afbe7af0ec99c7e6fc20ed22b6cdfbcd9

            SHA512

            66d92c89f167d7d9a3ca8fe2104add448d08f8604331641e233a1b71535c5f2b9431fbe8fd5843550fe5242e161edb019c84e9ff062983be0257bae19b7be320

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2136167.exe

            Filesize

            220KB

            MD5

            581a608a9bfcf0cc4e06528947efe778

            SHA1

            40d77d9bb82795ebdb78774a6a5524a2d5ad30c2

            SHA256

            d8c220d8d660b3ea7a07f50cbf56c78afbe7af0ec99c7e6fc20ed22b6cdfbcd9

            SHA512

            66d92c89f167d7d9a3ca8fe2104add448d08f8604331641e233a1b71535c5f2b9431fbe8fd5843550fe5242e161edb019c84e9ff062983be0257bae19b7be320

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0169593.exe

            Filesize

            364KB

            MD5

            afa67287f08a490da4f8af7d75ceae16

            SHA1

            accfbe43947040c6d02739283a1441e9157e8f8d

            SHA256

            f8936912798e55028b40a3001ab0daf715063c893edfe681bd7d10ae7c9185f8

            SHA512

            be10b4998566576de59628be822e4267da61a0a55753b4db17886b443cde8f5fbedb58ebccf117c0b78bf28a30dcb6f7e2f207ef34b2bdfeec9d78a47ccc2cd8

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0169593.exe

            Filesize

            364KB

            MD5

            afa67287f08a490da4f8af7d75ceae16

            SHA1

            accfbe43947040c6d02739283a1441e9157e8f8d

            SHA256

            f8936912798e55028b40a3001ab0daf715063c893edfe681bd7d10ae7c9185f8

            SHA512

            be10b4998566576de59628be822e4267da61a0a55753b4db17886b443cde8f5fbedb58ebccf117c0b78bf28a30dcb6f7e2f207ef34b2bdfeec9d78a47ccc2cd8

          • memory/3952-24-0x0000000000400000-0x000000000042C000-memory.dmp

            Filesize

            176KB

          • memory/3952-20-0x0000000000400000-0x000000000042C000-memory.dmp

            Filesize

            176KB

          • memory/3952-21-0x0000000000400000-0x000000000042C000-memory.dmp

            Filesize

            176KB

          • memory/3952-22-0x0000000000400000-0x000000000042C000-memory.dmp

            Filesize

            176KB

          • memory/4448-16-0x00000000741B0000-0x0000000074960000-memory.dmp

            Filesize

            7.7MB

          • memory/4448-15-0x00000000741B0000-0x0000000074960000-memory.dmp

            Filesize

            7.7MB

          • memory/4448-28-0x00000000741B0000-0x0000000074960000-memory.dmp

            Filesize

            7.7MB

          • memory/4448-14-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB