Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 03:01 UTC

General

  • Target

    c82fe254e8cfb54a0b412db6a1150ac6952e3f9beb73fde881529bd737581d3a.exe

  • Size

    1.0MB

  • MD5

    d458ad458abc415304fd2c142d7f4745

  • SHA1

    6acfc584e7f647685db6a1d167c1a68b5d7d1a0b

  • SHA256

    c82fe254e8cfb54a0b412db6a1150ac6952e3f9beb73fde881529bd737581d3a

  • SHA512

    3e91ac67520164034976dbc4c516d0a10eed6f70f8aa4f5766b97c5a4dbb3f4136f1b3454dcb78fc3e72d06bae601d8facd35d25ad2b39545482c93438fa573f

  • SSDEEP

    24576:byB7LsVeg07T5RZzVgOoLuzdj6nEmSJBoCWI:OB3Wd0vXrAO2nEmWBoC

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c82fe254e8cfb54a0b412db6a1150ac6952e3f9beb73fde881529bd737581d3a.exe
    "C:\Users\Admin\AppData\Local\Temp\c82fe254e8cfb54a0b412db6a1150ac6952e3f9beb73fde881529bd737581d3a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7433478.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7433478.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7097406.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7097406.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9918756.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9918756.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2608
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6079066.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6079066.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2196
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6974817.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6974817.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2920
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3415629.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3415629.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2504
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2580
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 268
                  8⤵
                  • Program crash
                  PID:2488
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:1248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7433478.exe

    Filesize

    969KB

    MD5

    78baa7a42ee7ceac6f2c08d4184cd5fe

    SHA1

    fb7ecc79b1f22251ad0da4754824f570b413459e

    SHA256

    86e58acbec86b0c2ddd027a3e7e3e9e892f733c75779427c8e670a52e483cb4f

    SHA512

    0834a14f99635ee41cd7a7919dbcbbdd8427863ca323bd572c1fcf08f0e8e7a6d6f48a57d0861181e8a5afee90b9c950d137210785121b95bf6a4103ca10a480

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7433478.exe

    Filesize

    969KB

    MD5

    78baa7a42ee7ceac6f2c08d4184cd5fe

    SHA1

    fb7ecc79b1f22251ad0da4754824f570b413459e

    SHA256

    86e58acbec86b0c2ddd027a3e7e3e9e892f733c75779427c8e670a52e483cb4f

    SHA512

    0834a14f99635ee41cd7a7919dbcbbdd8427863ca323bd572c1fcf08f0e8e7a6d6f48a57d0861181e8a5afee90b9c950d137210785121b95bf6a4103ca10a480

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7097406.exe

    Filesize

    787KB

    MD5

    bfd2c36ec597471d08a0b177693e169b

    SHA1

    761d13db837884999939711519bc686e8713d4e7

    SHA256

    ca57db586b21557bdf43d0ebab2f5cd57031cf3e62465b55f81501cd36b75ef0

    SHA512

    f0f026c215dcc7a670a35c060c1c1d490bd820cafde97a7fd5a6114da18bc5f364a7bbd398436ea8c62ffbe9609ec0a7ea1dadc6eb0c24c87a8e941825b42d02

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7097406.exe

    Filesize

    787KB

    MD5

    bfd2c36ec597471d08a0b177693e169b

    SHA1

    761d13db837884999939711519bc686e8713d4e7

    SHA256

    ca57db586b21557bdf43d0ebab2f5cd57031cf3e62465b55f81501cd36b75ef0

    SHA512

    f0f026c215dcc7a670a35c060c1c1d490bd820cafde97a7fd5a6114da18bc5f364a7bbd398436ea8c62ffbe9609ec0a7ea1dadc6eb0c24c87a8e941825b42d02

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9918756.exe

    Filesize

    604KB

    MD5

    eb7f5142ac49f5c874d6ad0cd2e9419c

    SHA1

    8748e1fcc89a33245c764990da0ec21046af86a4

    SHA256

    bb23875ac2c644d848765a1c500aa2e68bfb4900b41517329e2ef4a57b193478

    SHA512

    690e685cd412ca953791dd5494ad037088f0670e7f25e84f7dad666f167163db5b80f0ba5be9132c1961252b44616cf55949e46549161d9c44a5175e213d79fa

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9918756.exe

    Filesize

    604KB

    MD5

    eb7f5142ac49f5c874d6ad0cd2e9419c

    SHA1

    8748e1fcc89a33245c764990da0ec21046af86a4

    SHA256

    bb23875ac2c644d848765a1c500aa2e68bfb4900b41517329e2ef4a57b193478

    SHA512

    690e685cd412ca953791dd5494ad037088f0670e7f25e84f7dad666f167163db5b80f0ba5be9132c1961252b44616cf55949e46549161d9c44a5175e213d79fa

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6079066.exe

    Filesize

    339KB

    MD5

    2d2ce8609a052abe9acaea62aa272644

    SHA1

    ea9c64e6d8cafc996ac931bfb676d6acbd72c39c

    SHA256

    7244ad9bca504f7a4726ec37acd6f97f49b59a922f08e13745cb9aeed9860eb5

    SHA512

    36c5d35d542eb85592d4e6a8c4fc6f923019e17b76e921258fd47e79f791da14dc78a361ad25029591b5b73dc0a637c109003c4d992c99fe62898012e064480f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6079066.exe

    Filesize

    339KB

    MD5

    2d2ce8609a052abe9acaea62aa272644

    SHA1

    ea9c64e6d8cafc996ac931bfb676d6acbd72c39c

    SHA256

    7244ad9bca504f7a4726ec37acd6f97f49b59a922f08e13745cb9aeed9860eb5

    SHA512

    36c5d35d542eb85592d4e6a8c4fc6f923019e17b76e921258fd47e79f791da14dc78a361ad25029591b5b73dc0a637c109003c4d992c99fe62898012e064480f

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6974817.exe

    Filesize

    12KB

    MD5

    bc6ac45639ad7fcb8cd2227ab91d8e9b

    SHA1

    ddd89bbff7d2138c5c091bc35ff22806b06e12f0

    SHA256

    bd3472f33d9d141843f74ab2bdb015b4348b1554ba0e0a697342cbda369edff4

    SHA512

    aa38564a0dd0825a18d91253c033a239d2cb7f6d2a47b666a12e63ec0c8f99fefe05e9183e04b9fbff197595a3b6666dfbb5fe1cc6dca21cdc99766c05c8adcf

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6974817.exe

    Filesize

    12KB

    MD5

    bc6ac45639ad7fcb8cd2227ab91d8e9b

    SHA1

    ddd89bbff7d2138c5c091bc35ff22806b06e12f0

    SHA256

    bd3472f33d9d141843f74ab2bdb015b4348b1554ba0e0a697342cbda369edff4

    SHA512

    aa38564a0dd0825a18d91253c033a239d2cb7f6d2a47b666a12e63ec0c8f99fefe05e9183e04b9fbff197595a3b6666dfbb5fe1cc6dca21cdc99766c05c8adcf

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3415629.exe

    Filesize

    365KB

    MD5

    7962538d0fdc7370356cc4ca7c154851

    SHA1

    f94497e3b3dfb6133c19a9c32fbe744d5f8edff1

    SHA256

    5d3df4e521f90880a59d1d53bccbb00c1f934d9f5ae4cb2ea241a001a39672bc

    SHA512

    a151ea40f08790cf2f0e80057b1d0967f0e9fcda1c3d5e4b2eb8855331cbd6b8bec14483158fd04907ff905113fcc4865b6037b49edd856c4db160c04fbe73c9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3415629.exe

    Filesize

    365KB

    MD5

    7962538d0fdc7370356cc4ca7c154851

    SHA1

    f94497e3b3dfb6133c19a9c32fbe744d5f8edff1

    SHA256

    5d3df4e521f90880a59d1d53bccbb00c1f934d9f5ae4cb2ea241a001a39672bc

    SHA512

    a151ea40f08790cf2f0e80057b1d0967f0e9fcda1c3d5e4b2eb8855331cbd6b8bec14483158fd04907ff905113fcc4865b6037b49edd856c4db160c04fbe73c9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7433478.exe

    Filesize

    969KB

    MD5

    78baa7a42ee7ceac6f2c08d4184cd5fe

    SHA1

    fb7ecc79b1f22251ad0da4754824f570b413459e

    SHA256

    86e58acbec86b0c2ddd027a3e7e3e9e892f733c75779427c8e670a52e483cb4f

    SHA512

    0834a14f99635ee41cd7a7919dbcbbdd8427863ca323bd572c1fcf08f0e8e7a6d6f48a57d0861181e8a5afee90b9c950d137210785121b95bf6a4103ca10a480

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7433478.exe

    Filesize

    969KB

    MD5

    78baa7a42ee7ceac6f2c08d4184cd5fe

    SHA1

    fb7ecc79b1f22251ad0da4754824f570b413459e

    SHA256

    86e58acbec86b0c2ddd027a3e7e3e9e892f733c75779427c8e670a52e483cb4f

    SHA512

    0834a14f99635ee41cd7a7919dbcbbdd8427863ca323bd572c1fcf08f0e8e7a6d6f48a57d0861181e8a5afee90b9c950d137210785121b95bf6a4103ca10a480

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7097406.exe

    Filesize

    787KB

    MD5

    bfd2c36ec597471d08a0b177693e169b

    SHA1

    761d13db837884999939711519bc686e8713d4e7

    SHA256

    ca57db586b21557bdf43d0ebab2f5cd57031cf3e62465b55f81501cd36b75ef0

    SHA512

    f0f026c215dcc7a670a35c060c1c1d490bd820cafde97a7fd5a6114da18bc5f364a7bbd398436ea8c62ffbe9609ec0a7ea1dadc6eb0c24c87a8e941825b42d02

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7097406.exe

    Filesize

    787KB

    MD5

    bfd2c36ec597471d08a0b177693e169b

    SHA1

    761d13db837884999939711519bc686e8713d4e7

    SHA256

    ca57db586b21557bdf43d0ebab2f5cd57031cf3e62465b55f81501cd36b75ef0

    SHA512

    f0f026c215dcc7a670a35c060c1c1d490bd820cafde97a7fd5a6114da18bc5f364a7bbd398436ea8c62ffbe9609ec0a7ea1dadc6eb0c24c87a8e941825b42d02

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9918756.exe

    Filesize

    604KB

    MD5

    eb7f5142ac49f5c874d6ad0cd2e9419c

    SHA1

    8748e1fcc89a33245c764990da0ec21046af86a4

    SHA256

    bb23875ac2c644d848765a1c500aa2e68bfb4900b41517329e2ef4a57b193478

    SHA512

    690e685cd412ca953791dd5494ad037088f0670e7f25e84f7dad666f167163db5b80f0ba5be9132c1961252b44616cf55949e46549161d9c44a5175e213d79fa

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9918756.exe

    Filesize

    604KB

    MD5

    eb7f5142ac49f5c874d6ad0cd2e9419c

    SHA1

    8748e1fcc89a33245c764990da0ec21046af86a4

    SHA256

    bb23875ac2c644d848765a1c500aa2e68bfb4900b41517329e2ef4a57b193478

    SHA512

    690e685cd412ca953791dd5494ad037088f0670e7f25e84f7dad666f167163db5b80f0ba5be9132c1961252b44616cf55949e46549161d9c44a5175e213d79fa

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6079066.exe

    Filesize

    339KB

    MD5

    2d2ce8609a052abe9acaea62aa272644

    SHA1

    ea9c64e6d8cafc996ac931bfb676d6acbd72c39c

    SHA256

    7244ad9bca504f7a4726ec37acd6f97f49b59a922f08e13745cb9aeed9860eb5

    SHA512

    36c5d35d542eb85592d4e6a8c4fc6f923019e17b76e921258fd47e79f791da14dc78a361ad25029591b5b73dc0a637c109003c4d992c99fe62898012e064480f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6079066.exe

    Filesize

    339KB

    MD5

    2d2ce8609a052abe9acaea62aa272644

    SHA1

    ea9c64e6d8cafc996ac931bfb676d6acbd72c39c

    SHA256

    7244ad9bca504f7a4726ec37acd6f97f49b59a922f08e13745cb9aeed9860eb5

    SHA512

    36c5d35d542eb85592d4e6a8c4fc6f923019e17b76e921258fd47e79f791da14dc78a361ad25029591b5b73dc0a637c109003c4d992c99fe62898012e064480f

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6974817.exe

    Filesize

    12KB

    MD5

    bc6ac45639ad7fcb8cd2227ab91d8e9b

    SHA1

    ddd89bbff7d2138c5c091bc35ff22806b06e12f0

    SHA256

    bd3472f33d9d141843f74ab2bdb015b4348b1554ba0e0a697342cbda369edff4

    SHA512

    aa38564a0dd0825a18d91253c033a239d2cb7f6d2a47b666a12e63ec0c8f99fefe05e9183e04b9fbff197595a3b6666dfbb5fe1cc6dca21cdc99766c05c8adcf

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3415629.exe

    Filesize

    365KB

    MD5

    7962538d0fdc7370356cc4ca7c154851

    SHA1

    f94497e3b3dfb6133c19a9c32fbe744d5f8edff1

    SHA256

    5d3df4e521f90880a59d1d53bccbb00c1f934d9f5ae4cb2ea241a001a39672bc

    SHA512

    a151ea40f08790cf2f0e80057b1d0967f0e9fcda1c3d5e4b2eb8855331cbd6b8bec14483158fd04907ff905113fcc4865b6037b49edd856c4db160c04fbe73c9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3415629.exe

    Filesize

    365KB

    MD5

    7962538d0fdc7370356cc4ca7c154851

    SHA1

    f94497e3b3dfb6133c19a9c32fbe744d5f8edff1

    SHA256

    5d3df4e521f90880a59d1d53bccbb00c1f934d9f5ae4cb2ea241a001a39672bc

    SHA512

    a151ea40f08790cf2f0e80057b1d0967f0e9fcda1c3d5e4b2eb8855331cbd6b8bec14483158fd04907ff905113fcc4865b6037b49edd856c4db160c04fbe73c9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3415629.exe

    Filesize

    365KB

    MD5

    7962538d0fdc7370356cc4ca7c154851

    SHA1

    f94497e3b3dfb6133c19a9c32fbe744d5f8edff1

    SHA256

    5d3df4e521f90880a59d1d53bccbb00c1f934d9f5ae4cb2ea241a001a39672bc

    SHA512

    a151ea40f08790cf2f0e80057b1d0967f0e9fcda1c3d5e4b2eb8855331cbd6b8bec14483158fd04907ff905113fcc4865b6037b49edd856c4db160c04fbe73c9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3415629.exe

    Filesize

    365KB

    MD5

    7962538d0fdc7370356cc4ca7c154851

    SHA1

    f94497e3b3dfb6133c19a9c32fbe744d5f8edff1

    SHA256

    5d3df4e521f90880a59d1d53bccbb00c1f934d9f5ae4cb2ea241a001a39672bc

    SHA512

    a151ea40f08790cf2f0e80057b1d0967f0e9fcda1c3d5e4b2eb8855331cbd6b8bec14483158fd04907ff905113fcc4865b6037b49edd856c4db160c04fbe73c9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3415629.exe

    Filesize

    365KB

    MD5

    7962538d0fdc7370356cc4ca7c154851

    SHA1

    f94497e3b3dfb6133c19a9c32fbe744d5f8edff1

    SHA256

    5d3df4e521f90880a59d1d53bccbb00c1f934d9f5ae4cb2ea241a001a39672bc

    SHA512

    a151ea40f08790cf2f0e80057b1d0967f0e9fcda1c3d5e4b2eb8855331cbd6b8bec14483158fd04907ff905113fcc4865b6037b49edd856c4db160c04fbe73c9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3415629.exe

    Filesize

    365KB

    MD5

    7962538d0fdc7370356cc4ca7c154851

    SHA1

    f94497e3b3dfb6133c19a9c32fbe744d5f8edff1

    SHA256

    5d3df4e521f90880a59d1d53bccbb00c1f934d9f5ae4cb2ea241a001a39672bc

    SHA512

    a151ea40f08790cf2f0e80057b1d0967f0e9fcda1c3d5e4b2eb8855331cbd6b8bec14483158fd04907ff905113fcc4865b6037b49edd856c4db160c04fbe73c9

  • memory/2580-61-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2580-59-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2580-60-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2580-58-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2580-62-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2580-63-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2580-64-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2580-65-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2580-67-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2580-69-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2920-51-0x000007FEF5FE0000-0x000007FEF69CC000-memory.dmp

    Filesize

    9.9MB

  • memory/2920-50-0x000007FEF5FE0000-0x000007FEF69CC000-memory.dmp

    Filesize

    9.9MB

  • memory/2920-49-0x000007FEF5FE0000-0x000007FEF69CC000-memory.dmp

    Filesize

    9.9MB

  • memory/2920-48-0x0000000001140000-0x000000000114A000-memory.dmp

    Filesize

    40KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.