Analysis

  • max time kernel
    118s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 02:57

General

  • Target

    1d826fb019ad7ad7480c12177fcda7d5916e8acdca772fd910ba791d4bca496f.exe

  • Size

    1.0MB

  • MD5

    3c4828acfedfd80829f11c4e828ed1c8

  • SHA1

    c8b2e2dd0ab18aeafa003a2dc03ab311ad0f5765

  • SHA256

    1d826fb019ad7ad7480c12177fcda7d5916e8acdca772fd910ba791d4bca496f

  • SHA512

    2f18f1684225efc0c54b720338ed3b66a5a24086119092d5694d773ba8858c9cacef2558ae5932e156bc24a45a41be71f3320bf47b95575df85a10ae90e19693

  • SSDEEP

    24576:jy9TzAsQQZW8XHRQRWVupByw+o3Q8ounc1uQcxgfSZ6tqeJz6:2xzxbjOj+6QBu5mz

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d826fb019ad7ad7480c12177fcda7d5916e8acdca772fd910ba791d4bca496f.exe
    "C:\Users\Admin\AppData\Local\Temp\1d826fb019ad7ad7480c12177fcda7d5916e8acdca772fd910ba791d4bca496f.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:340
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3944331.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3944331.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2144
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4813946.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4813946.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1512
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2304262.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2304262.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1108
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0690206.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0690206.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1596
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1187490.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1187490.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2552
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9698823.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9698823.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2240
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2484
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 268
                  8⤵
                  • Program crash
                  PID:2452
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3944331.exe

    Filesize

    969KB

    MD5

    d7c503f6fdd2ecc3333f90d70dc38fe4

    SHA1

    86e79f951d80c98f1353baa545e8e2468209c9a7

    SHA256

    faeb60c0c8f26c441e32e538edb6088a20dff08ba0c5c3040acacd339f0f5b77

    SHA512

    64586bc3c2fd0576c03644c7c2f0b74f24ab8d979dde6ad5fed247c7de9458c0349b79ab35717e392b2eb481720b6ed80eb4e5115189709daba5d64a4ac5d571

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3944331.exe

    Filesize

    969KB

    MD5

    d7c503f6fdd2ecc3333f90d70dc38fe4

    SHA1

    86e79f951d80c98f1353baa545e8e2468209c9a7

    SHA256

    faeb60c0c8f26c441e32e538edb6088a20dff08ba0c5c3040acacd339f0f5b77

    SHA512

    64586bc3c2fd0576c03644c7c2f0b74f24ab8d979dde6ad5fed247c7de9458c0349b79ab35717e392b2eb481720b6ed80eb4e5115189709daba5d64a4ac5d571

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4813946.exe

    Filesize

    787KB

    MD5

    ec9d0eabb4a22d6fa779c82cf358264b

    SHA1

    962785906b7762c96631f3c292f4d50d25d11fda

    SHA256

    5cc392555e042f14c42b5f716a4e3c4ce64596176e6721a4ce0412c8c1658696

    SHA512

    9c55314ffb03238d0ffa86f36136705e4079833c634171670f821218ed8b88c94b0aa05142c75e1605654efa9ec33df381d5c9b626f3cc24e99f466d707ad9db

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4813946.exe

    Filesize

    787KB

    MD5

    ec9d0eabb4a22d6fa779c82cf358264b

    SHA1

    962785906b7762c96631f3c292f4d50d25d11fda

    SHA256

    5cc392555e042f14c42b5f716a4e3c4ce64596176e6721a4ce0412c8c1658696

    SHA512

    9c55314ffb03238d0ffa86f36136705e4079833c634171670f821218ed8b88c94b0aa05142c75e1605654efa9ec33df381d5c9b626f3cc24e99f466d707ad9db

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2304262.exe

    Filesize

    603KB

    MD5

    a20c5b7232d9939daaedabda216c73b2

    SHA1

    c7059525aabc2bbe98ff00a9d180470841c2b7a3

    SHA256

    748811cad86c1f8e3e530087f51cb192b806c232daccbee9b707ba3dcdc5cacb

    SHA512

    2e35890444b417f0df675b00e781f2e5882daa964d08763880d41a50c9cb0ab0843930b15d9df4c5fcd5512b91f448f1b771572950e83b0aa697454d2236c605

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2304262.exe

    Filesize

    603KB

    MD5

    a20c5b7232d9939daaedabda216c73b2

    SHA1

    c7059525aabc2bbe98ff00a9d180470841c2b7a3

    SHA256

    748811cad86c1f8e3e530087f51cb192b806c232daccbee9b707ba3dcdc5cacb

    SHA512

    2e35890444b417f0df675b00e781f2e5882daa964d08763880d41a50c9cb0ab0843930b15d9df4c5fcd5512b91f448f1b771572950e83b0aa697454d2236c605

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0690206.exe

    Filesize

    339KB

    MD5

    5d3fc9d08b455966cf2fa01634eb4bcd

    SHA1

    95e6225834dcaab924665cf04ff024192a8c090d

    SHA256

    b8b5934e21fed31d0b7d176a86874c8fda9da71f78443fe004b37e0613969bbc

    SHA512

    d5556a93253c7dc0a447720b667187d2b9a524e923644a5195cf56b731be7d258f326f6631f276e1c3f0b1d454afb2369bb81cd6a4b6915038aa90b398a2e6c0

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0690206.exe

    Filesize

    339KB

    MD5

    5d3fc9d08b455966cf2fa01634eb4bcd

    SHA1

    95e6225834dcaab924665cf04ff024192a8c090d

    SHA256

    b8b5934e21fed31d0b7d176a86874c8fda9da71f78443fe004b37e0613969bbc

    SHA512

    d5556a93253c7dc0a447720b667187d2b9a524e923644a5195cf56b731be7d258f326f6631f276e1c3f0b1d454afb2369bb81cd6a4b6915038aa90b398a2e6c0

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1187490.exe

    Filesize

    12KB

    MD5

    e21655984ac4965a66fb6ebce909fa6a

    SHA1

    4403e518d735bcec50091198f58da02216a12539

    SHA256

    54582dc9c5f438f7704448d228253518ac1e51591b193a4d97d07523b22f39ba

    SHA512

    ddd9d29aa2dda98f51399af4991c7aaba636f87d142dd93f6145ac7f562f2561c440a93d2b70df4401bfde09cec565fc547b11b9eda1a72f899eedbaa7ed9137

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1187490.exe

    Filesize

    12KB

    MD5

    e21655984ac4965a66fb6ebce909fa6a

    SHA1

    4403e518d735bcec50091198f58da02216a12539

    SHA256

    54582dc9c5f438f7704448d228253518ac1e51591b193a4d97d07523b22f39ba

    SHA512

    ddd9d29aa2dda98f51399af4991c7aaba636f87d142dd93f6145ac7f562f2561c440a93d2b70df4401bfde09cec565fc547b11b9eda1a72f899eedbaa7ed9137

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9698823.exe

    Filesize

    365KB

    MD5

    7dde045b6e951c5c0c8edfbc100d356b

    SHA1

    f35530333843545febb2f6723927666c0ca3372d

    SHA256

    45fb0268bcc713a50f3c4e995676568aad440993f977a66d3d167aca6596061e

    SHA512

    6ef9a8ce7f684663bfecbde1d8a5150aa976f146c0fcea62a90f9da8057c291991b740942ddd8942c4e9e44107c1a2c003534458df488ab4948b48441425119e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9698823.exe

    Filesize

    365KB

    MD5

    7dde045b6e951c5c0c8edfbc100d356b

    SHA1

    f35530333843545febb2f6723927666c0ca3372d

    SHA256

    45fb0268bcc713a50f3c4e995676568aad440993f977a66d3d167aca6596061e

    SHA512

    6ef9a8ce7f684663bfecbde1d8a5150aa976f146c0fcea62a90f9da8057c291991b740942ddd8942c4e9e44107c1a2c003534458df488ab4948b48441425119e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3944331.exe

    Filesize

    969KB

    MD5

    d7c503f6fdd2ecc3333f90d70dc38fe4

    SHA1

    86e79f951d80c98f1353baa545e8e2468209c9a7

    SHA256

    faeb60c0c8f26c441e32e538edb6088a20dff08ba0c5c3040acacd339f0f5b77

    SHA512

    64586bc3c2fd0576c03644c7c2f0b74f24ab8d979dde6ad5fed247c7de9458c0349b79ab35717e392b2eb481720b6ed80eb4e5115189709daba5d64a4ac5d571

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3944331.exe

    Filesize

    969KB

    MD5

    d7c503f6fdd2ecc3333f90d70dc38fe4

    SHA1

    86e79f951d80c98f1353baa545e8e2468209c9a7

    SHA256

    faeb60c0c8f26c441e32e538edb6088a20dff08ba0c5c3040acacd339f0f5b77

    SHA512

    64586bc3c2fd0576c03644c7c2f0b74f24ab8d979dde6ad5fed247c7de9458c0349b79ab35717e392b2eb481720b6ed80eb4e5115189709daba5d64a4ac5d571

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z4813946.exe

    Filesize

    787KB

    MD5

    ec9d0eabb4a22d6fa779c82cf358264b

    SHA1

    962785906b7762c96631f3c292f4d50d25d11fda

    SHA256

    5cc392555e042f14c42b5f716a4e3c4ce64596176e6721a4ce0412c8c1658696

    SHA512

    9c55314ffb03238d0ffa86f36136705e4079833c634171670f821218ed8b88c94b0aa05142c75e1605654efa9ec33df381d5c9b626f3cc24e99f466d707ad9db

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z4813946.exe

    Filesize

    787KB

    MD5

    ec9d0eabb4a22d6fa779c82cf358264b

    SHA1

    962785906b7762c96631f3c292f4d50d25d11fda

    SHA256

    5cc392555e042f14c42b5f716a4e3c4ce64596176e6721a4ce0412c8c1658696

    SHA512

    9c55314ffb03238d0ffa86f36136705e4079833c634171670f821218ed8b88c94b0aa05142c75e1605654efa9ec33df381d5c9b626f3cc24e99f466d707ad9db

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2304262.exe

    Filesize

    603KB

    MD5

    a20c5b7232d9939daaedabda216c73b2

    SHA1

    c7059525aabc2bbe98ff00a9d180470841c2b7a3

    SHA256

    748811cad86c1f8e3e530087f51cb192b806c232daccbee9b707ba3dcdc5cacb

    SHA512

    2e35890444b417f0df675b00e781f2e5882daa964d08763880d41a50c9cb0ab0843930b15d9df4c5fcd5512b91f448f1b771572950e83b0aa697454d2236c605

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2304262.exe

    Filesize

    603KB

    MD5

    a20c5b7232d9939daaedabda216c73b2

    SHA1

    c7059525aabc2bbe98ff00a9d180470841c2b7a3

    SHA256

    748811cad86c1f8e3e530087f51cb192b806c232daccbee9b707ba3dcdc5cacb

    SHA512

    2e35890444b417f0df675b00e781f2e5882daa964d08763880d41a50c9cb0ab0843930b15d9df4c5fcd5512b91f448f1b771572950e83b0aa697454d2236c605

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z0690206.exe

    Filesize

    339KB

    MD5

    5d3fc9d08b455966cf2fa01634eb4bcd

    SHA1

    95e6225834dcaab924665cf04ff024192a8c090d

    SHA256

    b8b5934e21fed31d0b7d176a86874c8fda9da71f78443fe004b37e0613969bbc

    SHA512

    d5556a93253c7dc0a447720b667187d2b9a524e923644a5195cf56b731be7d258f326f6631f276e1c3f0b1d454afb2369bb81cd6a4b6915038aa90b398a2e6c0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z0690206.exe

    Filesize

    339KB

    MD5

    5d3fc9d08b455966cf2fa01634eb4bcd

    SHA1

    95e6225834dcaab924665cf04ff024192a8c090d

    SHA256

    b8b5934e21fed31d0b7d176a86874c8fda9da71f78443fe004b37e0613969bbc

    SHA512

    d5556a93253c7dc0a447720b667187d2b9a524e923644a5195cf56b731be7d258f326f6631f276e1c3f0b1d454afb2369bb81cd6a4b6915038aa90b398a2e6c0

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1187490.exe

    Filesize

    12KB

    MD5

    e21655984ac4965a66fb6ebce909fa6a

    SHA1

    4403e518d735bcec50091198f58da02216a12539

    SHA256

    54582dc9c5f438f7704448d228253518ac1e51591b193a4d97d07523b22f39ba

    SHA512

    ddd9d29aa2dda98f51399af4991c7aaba636f87d142dd93f6145ac7f562f2561c440a93d2b70df4401bfde09cec565fc547b11b9eda1a72f899eedbaa7ed9137

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9698823.exe

    Filesize

    365KB

    MD5

    7dde045b6e951c5c0c8edfbc100d356b

    SHA1

    f35530333843545febb2f6723927666c0ca3372d

    SHA256

    45fb0268bcc713a50f3c4e995676568aad440993f977a66d3d167aca6596061e

    SHA512

    6ef9a8ce7f684663bfecbde1d8a5150aa976f146c0fcea62a90f9da8057c291991b740942ddd8942c4e9e44107c1a2c003534458df488ab4948b48441425119e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9698823.exe

    Filesize

    365KB

    MD5

    7dde045b6e951c5c0c8edfbc100d356b

    SHA1

    f35530333843545febb2f6723927666c0ca3372d

    SHA256

    45fb0268bcc713a50f3c4e995676568aad440993f977a66d3d167aca6596061e

    SHA512

    6ef9a8ce7f684663bfecbde1d8a5150aa976f146c0fcea62a90f9da8057c291991b740942ddd8942c4e9e44107c1a2c003534458df488ab4948b48441425119e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9698823.exe

    Filesize

    365KB

    MD5

    7dde045b6e951c5c0c8edfbc100d356b

    SHA1

    f35530333843545febb2f6723927666c0ca3372d

    SHA256

    45fb0268bcc713a50f3c4e995676568aad440993f977a66d3d167aca6596061e

    SHA512

    6ef9a8ce7f684663bfecbde1d8a5150aa976f146c0fcea62a90f9da8057c291991b740942ddd8942c4e9e44107c1a2c003534458df488ab4948b48441425119e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9698823.exe

    Filesize

    365KB

    MD5

    7dde045b6e951c5c0c8edfbc100d356b

    SHA1

    f35530333843545febb2f6723927666c0ca3372d

    SHA256

    45fb0268bcc713a50f3c4e995676568aad440993f977a66d3d167aca6596061e

    SHA512

    6ef9a8ce7f684663bfecbde1d8a5150aa976f146c0fcea62a90f9da8057c291991b740942ddd8942c4e9e44107c1a2c003534458df488ab4948b48441425119e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9698823.exe

    Filesize

    365KB

    MD5

    7dde045b6e951c5c0c8edfbc100d356b

    SHA1

    f35530333843545febb2f6723927666c0ca3372d

    SHA256

    45fb0268bcc713a50f3c4e995676568aad440993f977a66d3d167aca6596061e

    SHA512

    6ef9a8ce7f684663bfecbde1d8a5150aa976f146c0fcea62a90f9da8057c291991b740942ddd8942c4e9e44107c1a2c003534458df488ab4948b48441425119e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9698823.exe

    Filesize

    365KB

    MD5

    7dde045b6e951c5c0c8edfbc100d356b

    SHA1

    f35530333843545febb2f6723927666c0ca3372d

    SHA256

    45fb0268bcc713a50f3c4e995676568aad440993f977a66d3d167aca6596061e

    SHA512

    6ef9a8ce7f684663bfecbde1d8a5150aa976f146c0fcea62a90f9da8057c291991b740942ddd8942c4e9e44107c1a2c003534458df488ab4948b48441425119e

  • memory/2484-62-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2484-59-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2484-60-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2484-58-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2484-61-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2484-64-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2484-63-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2484-65-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2484-67-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2484-69-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2552-51-0x000007FEF6100000-0x000007FEF6AEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2552-50-0x000007FEF6100000-0x000007FEF6AEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2552-49-0x0000000000B00000-0x0000000000B0A000-memory.dmp

    Filesize

    40KB

  • memory/2552-48-0x000007FEF6100000-0x000007FEF6AEC000-memory.dmp

    Filesize

    9.9MB