Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 03:29

General

  • Target

    4d9bba70a81682664e0f77bd1315f4218a1bbcb656ac0db55ba82d1fb4147b97.exe

  • Size

    1.0MB

  • MD5

    0750baf6c545d259d79fd912c87b1177

  • SHA1

    21678bc0d0d85b78861ef0d47e68f91d18682d1e

  • SHA256

    4d9bba70a81682664e0f77bd1315f4218a1bbcb656ac0db55ba82d1fb4147b97

  • SHA512

    12b0e81c5730744b74e08e7eacf598f0e0b2360c1e4b49bae3531168774a545688b40085c17042ad308582ce68cbb3f5fe5dd158ea4c1b2954e1213bd3791c86

  • SSDEEP

    12288:DMr8y90pCx7vr7ajY55K4VLZv+NTkSJIfc+LjvWQMqO4zeD26xn1fHMSwaB/7HzS:fy3jzvgxmLjvli4zeD2OC/KHdUBxYWj

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d9bba70a81682664e0f77bd1315f4218a1bbcb656ac0db55ba82d1fb4147b97.exe
    "C:\Users\Admin\AppData\Local\Temp\4d9bba70a81682664e0f77bd1315f4218a1bbcb656ac0db55ba82d1fb4147b97.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5821232.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5821232.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5584974.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5584974.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9281542.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9281542.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2600
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6051068.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6051068.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2660
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3835922.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3835922.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2700
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0287617.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0287617.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2516
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3004
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 268
                  8⤵
                  • Program crash
                  PID:1244
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:1644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5821232.exe

    Filesize

    967KB

    MD5

    970cbd047873b7441b91af31eaa64588

    SHA1

    600fa38705e336d34f33b642a0feab7caf6955b9

    SHA256

    3c5cf5f2b9e5d37daafd586cd27eae2473293fcabcb560dca6004ca7bae39aff

    SHA512

    400e06ab766729742f8d92182a0620315a34b8ef7f2f8cdce3dfefbe7649fa93d1ba97c14d27e274118b0ddda99860896f08eab5f9f853ecdf76848e35b54636

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5821232.exe

    Filesize

    967KB

    MD5

    970cbd047873b7441b91af31eaa64588

    SHA1

    600fa38705e336d34f33b642a0feab7caf6955b9

    SHA256

    3c5cf5f2b9e5d37daafd586cd27eae2473293fcabcb560dca6004ca7bae39aff

    SHA512

    400e06ab766729742f8d92182a0620315a34b8ef7f2f8cdce3dfefbe7649fa93d1ba97c14d27e274118b0ddda99860896f08eab5f9f853ecdf76848e35b54636

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5584974.exe

    Filesize

    787KB

    MD5

    9ff65fe045ef6d686590f66bf8e2d472

    SHA1

    e3c664978b2542fb0060f118262b496fa171948a

    SHA256

    8a69e91161e7d10c4b93f0210b2f6d4e05024761effe0b0d05d149dc21f7fe72

    SHA512

    3dc06df0f58d8193a85627bc9282e0acff78c9c0d55bff12e57f8069dedd6b60b4ea8b7845c4be837473238f23d35c154419880ffd9020672ca742aab9f5732d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5584974.exe

    Filesize

    787KB

    MD5

    9ff65fe045ef6d686590f66bf8e2d472

    SHA1

    e3c664978b2542fb0060f118262b496fa171948a

    SHA256

    8a69e91161e7d10c4b93f0210b2f6d4e05024761effe0b0d05d149dc21f7fe72

    SHA512

    3dc06df0f58d8193a85627bc9282e0acff78c9c0d55bff12e57f8069dedd6b60b4ea8b7845c4be837473238f23d35c154419880ffd9020672ca742aab9f5732d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9281542.exe

    Filesize

    604KB

    MD5

    4d0e3f87d9336562529914d5748e221a

    SHA1

    3a69697feb26c02a8cb30d3b3e044189ee0409cf

    SHA256

    5a96743df8bd37c26b18206c11d16e57548952fae3cf40a3af5e7805f47626ab

    SHA512

    ada587dc3fe6af01af562044fad494b0faa8480f95a0d7dafb54920859e0c3c5797a3ded15ca74d80cb88e9597d94545d7413c4e152ef87134e505dcebd41f39

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9281542.exe

    Filesize

    604KB

    MD5

    4d0e3f87d9336562529914d5748e221a

    SHA1

    3a69697feb26c02a8cb30d3b3e044189ee0409cf

    SHA256

    5a96743df8bd37c26b18206c11d16e57548952fae3cf40a3af5e7805f47626ab

    SHA512

    ada587dc3fe6af01af562044fad494b0faa8480f95a0d7dafb54920859e0c3c5797a3ded15ca74d80cb88e9597d94545d7413c4e152ef87134e505dcebd41f39

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6051068.exe

    Filesize

    339KB

    MD5

    f817e9bb61fba7052fbca6d45087b47e

    SHA1

    fd02eec013a86793c0aff86c1ac405edcae9390d

    SHA256

    f0ab43e45b92954965e97fb1051a6276caf570f4070d7268ef0c2c662c0c6456

    SHA512

    f25751c8477c351b2060c0edce1f58de9b44fbbf58342ff668866fac898da5e174215de314f8c14dde6fb93969ab7a72cd97fcfb8f3580ad1915f794f1bb1398

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6051068.exe

    Filesize

    339KB

    MD5

    f817e9bb61fba7052fbca6d45087b47e

    SHA1

    fd02eec013a86793c0aff86c1ac405edcae9390d

    SHA256

    f0ab43e45b92954965e97fb1051a6276caf570f4070d7268ef0c2c662c0c6456

    SHA512

    f25751c8477c351b2060c0edce1f58de9b44fbbf58342ff668866fac898da5e174215de314f8c14dde6fb93969ab7a72cd97fcfb8f3580ad1915f794f1bb1398

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3835922.exe

    Filesize

    12KB

    MD5

    d4b4a7772f6f8f85412c699b77011ccd

    SHA1

    59d21e924091eab299069ae82857bc2b5024f349

    SHA256

    ade5ce5bb4273683eb42b86d71401c35f9be04195a203b0bc5ac56e251a1e250

    SHA512

    5ee245333150f8bffa059609f7c1548540466db8a43cdfa47d118bdc1d667acfb6712dee5fc166ae6199cc0abc992c0968e7ae4cfbae769e9ee4486bdab10c74

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3835922.exe

    Filesize

    12KB

    MD5

    d4b4a7772f6f8f85412c699b77011ccd

    SHA1

    59d21e924091eab299069ae82857bc2b5024f349

    SHA256

    ade5ce5bb4273683eb42b86d71401c35f9be04195a203b0bc5ac56e251a1e250

    SHA512

    5ee245333150f8bffa059609f7c1548540466db8a43cdfa47d118bdc1d667acfb6712dee5fc166ae6199cc0abc992c0968e7ae4cfbae769e9ee4486bdab10c74

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0287617.exe

    Filesize

    365KB

    MD5

    e56fcc3fe5142a780463706514125707

    SHA1

    a397a582674625bbe519a037271403d0751273b9

    SHA256

    cd31b5fa64abeac281362971f6205db093f5b36edd15617c5765f169d95754ac

    SHA512

    17044a20a4235112a3fd1ec27b3ba6b0c6657458f7102a67181bb3a5772866909b4dff5da7124b0282087bb9c0ea3e8cd1ff585ccc9e734881473c6e9ed1ff48

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0287617.exe

    Filesize

    365KB

    MD5

    e56fcc3fe5142a780463706514125707

    SHA1

    a397a582674625bbe519a037271403d0751273b9

    SHA256

    cd31b5fa64abeac281362971f6205db093f5b36edd15617c5765f169d95754ac

    SHA512

    17044a20a4235112a3fd1ec27b3ba6b0c6657458f7102a67181bb3a5772866909b4dff5da7124b0282087bb9c0ea3e8cd1ff585ccc9e734881473c6e9ed1ff48

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5821232.exe

    Filesize

    967KB

    MD5

    970cbd047873b7441b91af31eaa64588

    SHA1

    600fa38705e336d34f33b642a0feab7caf6955b9

    SHA256

    3c5cf5f2b9e5d37daafd586cd27eae2473293fcabcb560dca6004ca7bae39aff

    SHA512

    400e06ab766729742f8d92182a0620315a34b8ef7f2f8cdce3dfefbe7649fa93d1ba97c14d27e274118b0ddda99860896f08eab5f9f853ecdf76848e35b54636

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5821232.exe

    Filesize

    967KB

    MD5

    970cbd047873b7441b91af31eaa64588

    SHA1

    600fa38705e336d34f33b642a0feab7caf6955b9

    SHA256

    3c5cf5f2b9e5d37daafd586cd27eae2473293fcabcb560dca6004ca7bae39aff

    SHA512

    400e06ab766729742f8d92182a0620315a34b8ef7f2f8cdce3dfefbe7649fa93d1ba97c14d27e274118b0ddda99860896f08eab5f9f853ecdf76848e35b54636

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5584974.exe

    Filesize

    787KB

    MD5

    9ff65fe045ef6d686590f66bf8e2d472

    SHA1

    e3c664978b2542fb0060f118262b496fa171948a

    SHA256

    8a69e91161e7d10c4b93f0210b2f6d4e05024761effe0b0d05d149dc21f7fe72

    SHA512

    3dc06df0f58d8193a85627bc9282e0acff78c9c0d55bff12e57f8069dedd6b60b4ea8b7845c4be837473238f23d35c154419880ffd9020672ca742aab9f5732d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5584974.exe

    Filesize

    787KB

    MD5

    9ff65fe045ef6d686590f66bf8e2d472

    SHA1

    e3c664978b2542fb0060f118262b496fa171948a

    SHA256

    8a69e91161e7d10c4b93f0210b2f6d4e05024761effe0b0d05d149dc21f7fe72

    SHA512

    3dc06df0f58d8193a85627bc9282e0acff78c9c0d55bff12e57f8069dedd6b60b4ea8b7845c4be837473238f23d35c154419880ffd9020672ca742aab9f5732d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9281542.exe

    Filesize

    604KB

    MD5

    4d0e3f87d9336562529914d5748e221a

    SHA1

    3a69697feb26c02a8cb30d3b3e044189ee0409cf

    SHA256

    5a96743df8bd37c26b18206c11d16e57548952fae3cf40a3af5e7805f47626ab

    SHA512

    ada587dc3fe6af01af562044fad494b0faa8480f95a0d7dafb54920859e0c3c5797a3ded15ca74d80cb88e9597d94545d7413c4e152ef87134e505dcebd41f39

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9281542.exe

    Filesize

    604KB

    MD5

    4d0e3f87d9336562529914d5748e221a

    SHA1

    3a69697feb26c02a8cb30d3b3e044189ee0409cf

    SHA256

    5a96743df8bd37c26b18206c11d16e57548952fae3cf40a3af5e7805f47626ab

    SHA512

    ada587dc3fe6af01af562044fad494b0faa8480f95a0d7dafb54920859e0c3c5797a3ded15ca74d80cb88e9597d94545d7413c4e152ef87134e505dcebd41f39

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6051068.exe

    Filesize

    339KB

    MD5

    f817e9bb61fba7052fbca6d45087b47e

    SHA1

    fd02eec013a86793c0aff86c1ac405edcae9390d

    SHA256

    f0ab43e45b92954965e97fb1051a6276caf570f4070d7268ef0c2c662c0c6456

    SHA512

    f25751c8477c351b2060c0edce1f58de9b44fbbf58342ff668866fac898da5e174215de314f8c14dde6fb93969ab7a72cd97fcfb8f3580ad1915f794f1bb1398

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6051068.exe

    Filesize

    339KB

    MD5

    f817e9bb61fba7052fbca6d45087b47e

    SHA1

    fd02eec013a86793c0aff86c1ac405edcae9390d

    SHA256

    f0ab43e45b92954965e97fb1051a6276caf570f4070d7268ef0c2c662c0c6456

    SHA512

    f25751c8477c351b2060c0edce1f58de9b44fbbf58342ff668866fac898da5e174215de314f8c14dde6fb93969ab7a72cd97fcfb8f3580ad1915f794f1bb1398

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3835922.exe

    Filesize

    12KB

    MD5

    d4b4a7772f6f8f85412c699b77011ccd

    SHA1

    59d21e924091eab299069ae82857bc2b5024f349

    SHA256

    ade5ce5bb4273683eb42b86d71401c35f9be04195a203b0bc5ac56e251a1e250

    SHA512

    5ee245333150f8bffa059609f7c1548540466db8a43cdfa47d118bdc1d667acfb6712dee5fc166ae6199cc0abc992c0968e7ae4cfbae769e9ee4486bdab10c74

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0287617.exe

    Filesize

    365KB

    MD5

    e56fcc3fe5142a780463706514125707

    SHA1

    a397a582674625bbe519a037271403d0751273b9

    SHA256

    cd31b5fa64abeac281362971f6205db093f5b36edd15617c5765f169d95754ac

    SHA512

    17044a20a4235112a3fd1ec27b3ba6b0c6657458f7102a67181bb3a5772866909b4dff5da7124b0282087bb9c0ea3e8cd1ff585ccc9e734881473c6e9ed1ff48

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0287617.exe

    Filesize

    365KB

    MD5

    e56fcc3fe5142a780463706514125707

    SHA1

    a397a582674625bbe519a037271403d0751273b9

    SHA256

    cd31b5fa64abeac281362971f6205db093f5b36edd15617c5765f169d95754ac

    SHA512

    17044a20a4235112a3fd1ec27b3ba6b0c6657458f7102a67181bb3a5772866909b4dff5da7124b0282087bb9c0ea3e8cd1ff585ccc9e734881473c6e9ed1ff48

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0287617.exe

    Filesize

    365KB

    MD5

    e56fcc3fe5142a780463706514125707

    SHA1

    a397a582674625bbe519a037271403d0751273b9

    SHA256

    cd31b5fa64abeac281362971f6205db093f5b36edd15617c5765f169d95754ac

    SHA512

    17044a20a4235112a3fd1ec27b3ba6b0c6657458f7102a67181bb3a5772866909b4dff5da7124b0282087bb9c0ea3e8cd1ff585ccc9e734881473c6e9ed1ff48

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0287617.exe

    Filesize

    365KB

    MD5

    e56fcc3fe5142a780463706514125707

    SHA1

    a397a582674625bbe519a037271403d0751273b9

    SHA256

    cd31b5fa64abeac281362971f6205db093f5b36edd15617c5765f169d95754ac

    SHA512

    17044a20a4235112a3fd1ec27b3ba6b0c6657458f7102a67181bb3a5772866909b4dff5da7124b0282087bb9c0ea3e8cd1ff585ccc9e734881473c6e9ed1ff48

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0287617.exe

    Filesize

    365KB

    MD5

    e56fcc3fe5142a780463706514125707

    SHA1

    a397a582674625bbe519a037271403d0751273b9

    SHA256

    cd31b5fa64abeac281362971f6205db093f5b36edd15617c5765f169d95754ac

    SHA512

    17044a20a4235112a3fd1ec27b3ba6b0c6657458f7102a67181bb3a5772866909b4dff5da7124b0282087bb9c0ea3e8cd1ff585ccc9e734881473c6e9ed1ff48

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0287617.exe

    Filesize

    365KB

    MD5

    e56fcc3fe5142a780463706514125707

    SHA1

    a397a582674625bbe519a037271403d0751273b9

    SHA256

    cd31b5fa64abeac281362971f6205db093f5b36edd15617c5765f169d95754ac

    SHA512

    17044a20a4235112a3fd1ec27b3ba6b0c6657458f7102a67181bb3a5772866909b4dff5da7124b0282087bb9c0ea3e8cd1ff585ccc9e734881473c6e9ed1ff48

  • memory/2700-49-0x00000000011C0000-0x00000000011CA000-memory.dmp

    Filesize

    40KB

  • memory/2700-51-0x000007FEF5820000-0x000007FEF620C000-memory.dmp

    Filesize

    9.9MB

  • memory/2700-48-0x000007FEF5820000-0x000007FEF620C000-memory.dmp

    Filesize

    9.9MB

  • memory/2700-50-0x000007FEF5820000-0x000007FEF620C000-memory.dmp

    Filesize

    9.9MB

  • memory/3004-65-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3004-63-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3004-64-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/3004-59-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3004-67-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3004-69-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3004-58-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3004-62-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3004-61-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3004-60-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB