Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 03:03

General

  • Target

    e76deefba3ed3dbd3da65f7f4db4cfecb917a08db073701b3ddaf583bc47a3ad.exe

  • Size

    1.0MB

  • MD5

    28955c1f8a6f4e2e9c73394976118f94

  • SHA1

    97975b393fede2ed83294243e9934550eb0498e6

  • SHA256

    e76deefba3ed3dbd3da65f7f4db4cfecb917a08db073701b3ddaf583bc47a3ad

  • SHA512

    3088e274c4f275bfe032e1b460afc519f22fba682c63352303140b8f1225f27825eeec7c26e87e42a5f5277efc8edca26d07d6fe8268d53a1341103c6698a811

  • SSDEEP

    24576:ZyYp0G9Dg/u83W4W+H27YI+1rduDRXSo1KM:Mg0Ecm8C0KYr+DRXSo

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e76deefba3ed3dbd3da65f7f4db4cfecb917a08db073701b3ddaf583bc47a3ad.exe
    "C:\Users\Admin\AppData\Local\Temp\e76deefba3ed3dbd3da65f7f4db4cfecb917a08db073701b3ddaf583bc47a3ad.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6635235.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6635235.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8966806.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8966806.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2824
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0265309.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0265309.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2128
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8431339.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8431339.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2772
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3881416.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3881416.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2980
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8412595.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8412595.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2536
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2616
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:1228
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                      PID:3068
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 268
                        8⤵
                        • Program crash
                        PID:804
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 288
                      7⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:2444

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6635235.exe

          Filesize

          968KB

          MD5

          2ffc0f733e3ec69256ae68ff907c226c

          SHA1

          29d7666e996586f8d71dc9382b2fdef96648670a

          SHA256

          1ca80e0e5daa98995897184466c5d920d15cb88b88d1773bb405176ad762174b

          SHA512

          bd158e7753be59390fb5c651006186b1bac4ce5a49acb4471d0c982516fb06974441c3d18a589a2e76d25350ce6bb800ec141cf82642a46608dffc080d4c0a36

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6635235.exe

          Filesize

          968KB

          MD5

          2ffc0f733e3ec69256ae68ff907c226c

          SHA1

          29d7666e996586f8d71dc9382b2fdef96648670a

          SHA256

          1ca80e0e5daa98995897184466c5d920d15cb88b88d1773bb405176ad762174b

          SHA512

          bd158e7753be59390fb5c651006186b1bac4ce5a49acb4471d0c982516fb06974441c3d18a589a2e76d25350ce6bb800ec141cf82642a46608dffc080d4c0a36

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8966806.exe

          Filesize

          786KB

          MD5

          79c1b29da81edfd2336cf9120a46b2ef

          SHA1

          2cf4412ff64c10e664fa30c97894cae9bc92e1c8

          SHA256

          c10e8d67637237c10bd7a6e2e67daca457a671aecd32c8d17d9c35520eded2f7

          SHA512

          26930077237db52992a349e83a082b80a33b9b76fc09079aaa05bdc140c05650cab600cadb3389aa61a6963c713c5bac126d5a7cdd08ae204c9a7b6a7a48bfa1

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8966806.exe

          Filesize

          786KB

          MD5

          79c1b29da81edfd2336cf9120a46b2ef

          SHA1

          2cf4412ff64c10e664fa30c97894cae9bc92e1c8

          SHA256

          c10e8d67637237c10bd7a6e2e67daca457a671aecd32c8d17d9c35520eded2f7

          SHA512

          26930077237db52992a349e83a082b80a33b9b76fc09079aaa05bdc140c05650cab600cadb3389aa61a6963c713c5bac126d5a7cdd08ae204c9a7b6a7a48bfa1

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0265309.exe

          Filesize

          604KB

          MD5

          f6bbc0ab5377b94586411b6e0b8b1e6e

          SHA1

          db1bc7aa48106ba029cb1f1b12572dcc135185e4

          SHA256

          edbe11e3791c95446124ab95af4119dce14e1604afff3812c3ef632baacfaf9a

          SHA512

          1c2695f752b612b011eb50f82697a42a6be4d0b22995b9d784e17579dede12b294f44aa41ae89c1b1e7f73765dcfc1f8d23be96099f9099f4a15802d29e36389

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0265309.exe

          Filesize

          604KB

          MD5

          f6bbc0ab5377b94586411b6e0b8b1e6e

          SHA1

          db1bc7aa48106ba029cb1f1b12572dcc135185e4

          SHA256

          edbe11e3791c95446124ab95af4119dce14e1604afff3812c3ef632baacfaf9a

          SHA512

          1c2695f752b612b011eb50f82697a42a6be4d0b22995b9d784e17579dede12b294f44aa41ae89c1b1e7f73765dcfc1f8d23be96099f9099f4a15802d29e36389

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8431339.exe

          Filesize

          339KB

          MD5

          39650462b3bee513fbb022d6a60f22e3

          SHA1

          879a07f2a2e6ba8d3753ade3dfb42a95a25a1995

          SHA256

          9d4f62fa66402ef410d1b3d9680fa72b40e1f8e7f80561799e04e8f292b0489e

          SHA512

          85a9c2083d01c0745cd795a8110d838cec52c68a530aa41bbf07ab0fe1b3242cb92ecab5d63fff906d3f6f62a06823ef0df00d774f084f6ad58d3e0692791d14

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8431339.exe

          Filesize

          339KB

          MD5

          39650462b3bee513fbb022d6a60f22e3

          SHA1

          879a07f2a2e6ba8d3753ade3dfb42a95a25a1995

          SHA256

          9d4f62fa66402ef410d1b3d9680fa72b40e1f8e7f80561799e04e8f292b0489e

          SHA512

          85a9c2083d01c0745cd795a8110d838cec52c68a530aa41bbf07ab0fe1b3242cb92ecab5d63fff906d3f6f62a06823ef0df00d774f084f6ad58d3e0692791d14

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3881416.exe

          Filesize

          12KB

          MD5

          03ce9f155d445597847f4bebe0db6c66

          SHA1

          87f2fe49f1690be07773466cec473fabc6eecbc7

          SHA256

          3962dc8912cff52707da4c912260b33efafd1491d7f0cd2a631394677eeecdac

          SHA512

          9580c9fff5924ed4e91b6d75ba7e34d371ee01035db948d64190ac53556845a838b84464d8f361a22a4a25a2f26521322ff33da4366ed55626469cc6f79dc64f

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3881416.exe

          Filesize

          12KB

          MD5

          03ce9f155d445597847f4bebe0db6c66

          SHA1

          87f2fe49f1690be07773466cec473fabc6eecbc7

          SHA256

          3962dc8912cff52707da4c912260b33efafd1491d7f0cd2a631394677eeecdac

          SHA512

          9580c9fff5924ed4e91b6d75ba7e34d371ee01035db948d64190ac53556845a838b84464d8f361a22a4a25a2f26521322ff33da4366ed55626469cc6f79dc64f

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8412595.exe

          Filesize

          365KB

          MD5

          49afa33f1aa03b1db561236073e2cd06

          SHA1

          27d8327a76c56735f55c54e4eb6f6dade6ff14a5

          SHA256

          466e247df1eadf8081ee9940d064f6619346839bb39af202d77a2672037ec0fd

          SHA512

          b1b52be4860ce4fcc91fc9fa156b5eecfd928de29c09a25589845f2956c90c576436c8d682ed007dd4038832256acb97fea9b38b7636ddbe088a80f6b0b1cfd1

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8412595.exe

          Filesize

          365KB

          MD5

          49afa33f1aa03b1db561236073e2cd06

          SHA1

          27d8327a76c56735f55c54e4eb6f6dade6ff14a5

          SHA256

          466e247df1eadf8081ee9940d064f6619346839bb39af202d77a2672037ec0fd

          SHA512

          b1b52be4860ce4fcc91fc9fa156b5eecfd928de29c09a25589845f2956c90c576436c8d682ed007dd4038832256acb97fea9b38b7636ddbe088a80f6b0b1cfd1

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6635235.exe

          Filesize

          968KB

          MD5

          2ffc0f733e3ec69256ae68ff907c226c

          SHA1

          29d7666e996586f8d71dc9382b2fdef96648670a

          SHA256

          1ca80e0e5daa98995897184466c5d920d15cb88b88d1773bb405176ad762174b

          SHA512

          bd158e7753be59390fb5c651006186b1bac4ce5a49acb4471d0c982516fb06974441c3d18a589a2e76d25350ce6bb800ec141cf82642a46608dffc080d4c0a36

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6635235.exe

          Filesize

          968KB

          MD5

          2ffc0f733e3ec69256ae68ff907c226c

          SHA1

          29d7666e996586f8d71dc9382b2fdef96648670a

          SHA256

          1ca80e0e5daa98995897184466c5d920d15cb88b88d1773bb405176ad762174b

          SHA512

          bd158e7753be59390fb5c651006186b1bac4ce5a49acb4471d0c982516fb06974441c3d18a589a2e76d25350ce6bb800ec141cf82642a46608dffc080d4c0a36

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8966806.exe

          Filesize

          786KB

          MD5

          79c1b29da81edfd2336cf9120a46b2ef

          SHA1

          2cf4412ff64c10e664fa30c97894cae9bc92e1c8

          SHA256

          c10e8d67637237c10bd7a6e2e67daca457a671aecd32c8d17d9c35520eded2f7

          SHA512

          26930077237db52992a349e83a082b80a33b9b76fc09079aaa05bdc140c05650cab600cadb3389aa61a6963c713c5bac126d5a7cdd08ae204c9a7b6a7a48bfa1

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8966806.exe

          Filesize

          786KB

          MD5

          79c1b29da81edfd2336cf9120a46b2ef

          SHA1

          2cf4412ff64c10e664fa30c97894cae9bc92e1c8

          SHA256

          c10e8d67637237c10bd7a6e2e67daca457a671aecd32c8d17d9c35520eded2f7

          SHA512

          26930077237db52992a349e83a082b80a33b9b76fc09079aaa05bdc140c05650cab600cadb3389aa61a6963c713c5bac126d5a7cdd08ae204c9a7b6a7a48bfa1

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0265309.exe

          Filesize

          604KB

          MD5

          f6bbc0ab5377b94586411b6e0b8b1e6e

          SHA1

          db1bc7aa48106ba029cb1f1b12572dcc135185e4

          SHA256

          edbe11e3791c95446124ab95af4119dce14e1604afff3812c3ef632baacfaf9a

          SHA512

          1c2695f752b612b011eb50f82697a42a6be4d0b22995b9d784e17579dede12b294f44aa41ae89c1b1e7f73765dcfc1f8d23be96099f9099f4a15802d29e36389

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0265309.exe

          Filesize

          604KB

          MD5

          f6bbc0ab5377b94586411b6e0b8b1e6e

          SHA1

          db1bc7aa48106ba029cb1f1b12572dcc135185e4

          SHA256

          edbe11e3791c95446124ab95af4119dce14e1604afff3812c3ef632baacfaf9a

          SHA512

          1c2695f752b612b011eb50f82697a42a6be4d0b22995b9d784e17579dede12b294f44aa41ae89c1b1e7f73765dcfc1f8d23be96099f9099f4a15802d29e36389

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8431339.exe

          Filesize

          339KB

          MD5

          39650462b3bee513fbb022d6a60f22e3

          SHA1

          879a07f2a2e6ba8d3753ade3dfb42a95a25a1995

          SHA256

          9d4f62fa66402ef410d1b3d9680fa72b40e1f8e7f80561799e04e8f292b0489e

          SHA512

          85a9c2083d01c0745cd795a8110d838cec52c68a530aa41bbf07ab0fe1b3242cb92ecab5d63fff906d3f6f62a06823ef0df00d774f084f6ad58d3e0692791d14

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8431339.exe

          Filesize

          339KB

          MD5

          39650462b3bee513fbb022d6a60f22e3

          SHA1

          879a07f2a2e6ba8d3753ade3dfb42a95a25a1995

          SHA256

          9d4f62fa66402ef410d1b3d9680fa72b40e1f8e7f80561799e04e8f292b0489e

          SHA512

          85a9c2083d01c0745cd795a8110d838cec52c68a530aa41bbf07ab0fe1b3242cb92ecab5d63fff906d3f6f62a06823ef0df00d774f084f6ad58d3e0692791d14

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q3881416.exe

          Filesize

          12KB

          MD5

          03ce9f155d445597847f4bebe0db6c66

          SHA1

          87f2fe49f1690be07773466cec473fabc6eecbc7

          SHA256

          3962dc8912cff52707da4c912260b33efafd1491d7f0cd2a631394677eeecdac

          SHA512

          9580c9fff5924ed4e91b6d75ba7e34d371ee01035db948d64190ac53556845a838b84464d8f361a22a4a25a2f26521322ff33da4366ed55626469cc6f79dc64f

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r8412595.exe

          Filesize

          365KB

          MD5

          49afa33f1aa03b1db561236073e2cd06

          SHA1

          27d8327a76c56735f55c54e4eb6f6dade6ff14a5

          SHA256

          466e247df1eadf8081ee9940d064f6619346839bb39af202d77a2672037ec0fd

          SHA512

          b1b52be4860ce4fcc91fc9fa156b5eecfd928de29c09a25589845f2956c90c576436c8d682ed007dd4038832256acb97fea9b38b7636ddbe088a80f6b0b1cfd1

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r8412595.exe

          Filesize

          365KB

          MD5

          49afa33f1aa03b1db561236073e2cd06

          SHA1

          27d8327a76c56735f55c54e4eb6f6dade6ff14a5

          SHA256

          466e247df1eadf8081ee9940d064f6619346839bb39af202d77a2672037ec0fd

          SHA512

          b1b52be4860ce4fcc91fc9fa156b5eecfd928de29c09a25589845f2956c90c576436c8d682ed007dd4038832256acb97fea9b38b7636ddbe088a80f6b0b1cfd1

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r8412595.exe

          Filesize

          365KB

          MD5

          49afa33f1aa03b1db561236073e2cd06

          SHA1

          27d8327a76c56735f55c54e4eb6f6dade6ff14a5

          SHA256

          466e247df1eadf8081ee9940d064f6619346839bb39af202d77a2672037ec0fd

          SHA512

          b1b52be4860ce4fcc91fc9fa156b5eecfd928de29c09a25589845f2956c90c576436c8d682ed007dd4038832256acb97fea9b38b7636ddbe088a80f6b0b1cfd1

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r8412595.exe

          Filesize

          365KB

          MD5

          49afa33f1aa03b1db561236073e2cd06

          SHA1

          27d8327a76c56735f55c54e4eb6f6dade6ff14a5

          SHA256

          466e247df1eadf8081ee9940d064f6619346839bb39af202d77a2672037ec0fd

          SHA512

          b1b52be4860ce4fcc91fc9fa156b5eecfd928de29c09a25589845f2956c90c576436c8d682ed007dd4038832256acb97fea9b38b7636ddbe088a80f6b0b1cfd1

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r8412595.exe

          Filesize

          365KB

          MD5

          49afa33f1aa03b1db561236073e2cd06

          SHA1

          27d8327a76c56735f55c54e4eb6f6dade6ff14a5

          SHA256

          466e247df1eadf8081ee9940d064f6619346839bb39af202d77a2672037ec0fd

          SHA512

          b1b52be4860ce4fcc91fc9fa156b5eecfd928de29c09a25589845f2956c90c576436c8d682ed007dd4038832256acb97fea9b38b7636ddbe088a80f6b0b1cfd1

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r8412595.exe

          Filesize

          365KB

          MD5

          49afa33f1aa03b1db561236073e2cd06

          SHA1

          27d8327a76c56735f55c54e4eb6f6dade6ff14a5

          SHA256

          466e247df1eadf8081ee9940d064f6619346839bb39af202d77a2672037ec0fd

          SHA512

          b1b52be4860ce4fcc91fc9fa156b5eecfd928de29c09a25589845f2956c90c576436c8d682ed007dd4038832256acb97fea9b38b7636ddbe088a80f6b0b1cfd1

        • memory/2980-49-0x000007FEF5830000-0x000007FEF621C000-memory.dmp

          Filesize

          9.9MB

        • memory/2980-51-0x000007FEF5830000-0x000007FEF621C000-memory.dmp

          Filesize

          9.9MB

        • memory/2980-48-0x00000000010E0000-0x00000000010EA000-memory.dmp

          Filesize

          40KB

        • memory/2980-50-0x000007FEF5830000-0x000007FEF621C000-memory.dmp

          Filesize

          9.9MB

        • memory/3068-59-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/3068-65-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/3068-64-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/3068-60-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/3068-69-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/3068-67-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/3068-58-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/3068-63-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/3068-62-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/3068-61-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB