Analysis

  • max time kernel
    117s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 03:07

General

  • Target

    f9a1359016c7ec4b6c22bb199a2993367f307345f7582302f640391c9e4656aa.exe

  • Size

    1.0MB

  • MD5

    0478b19db749cf637b410728b3e037f7

  • SHA1

    551ce950dd7c815ba563cb6ed0e207717603812e

  • SHA256

    f9a1359016c7ec4b6c22bb199a2993367f307345f7582302f640391c9e4656aa

  • SHA512

    dfb2f7d8f0ec9de11e9a1f6679ac24eef823f100f0ffc2354f4937b7e067956a523f7d4a7199a77facc4d71ca87d418247d8c1c45dfdc3569f597e5e86f11059

  • SSDEEP

    24576:9yjbRsTBIy34HRRBnnp+Sv0iePb51AAgGStn:Yx+BIC4HRDnVv07Pb5RZS

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9a1359016c7ec4b6c22bb199a2993367f307345f7582302f640391c9e4656aa.exe
    "C:\Users\Admin\AppData\Local\Temp\f9a1359016c7ec4b6c22bb199a2993367f307345f7582302f640391c9e4656aa.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3830606.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3830606.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6968610.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6968610.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5244836.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5244836.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2584
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9761810.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9761810.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2736
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9701566.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9701566.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2480
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5454725.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5454725.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1432
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1572
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 268
                  8⤵
                  • Program crash
                  PID:1500
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:1616

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3830606.exe

          Filesize

          969KB

          MD5

          02a0dff4aca66293afbb02b2223ca863

          SHA1

          62dd7391d764a3808c6ad2041e003b995c4a0aa0

          SHA256

          267dc85bb016109e0bdf1acb460ec854434e10d68b700977ed265050a1d1010b

          SHA512

          f3c82c8fb0dd96bdd2eda1cb0c7b24a81efecab2bfa3ce2b457bb158e794297de25eb66d1f8578329858dadea9a3daa543aa227632994a5360c46dd48b0b63d9

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3830606.exe

          Filesize

          969KB

          MD5

          02a0dff4aca66293afbb02b2223ca863

          SHA1

          62dd7391d764a3808c6ad2041e003b995c4a0aa0

          SHA256

          267dc85bb016109e0bdf1acb460ec854434e10d68b700977ed265050a1d1010b

          SHA512

          f3c82c8fb0dd96bdd2eda1cb0c7b24a81efecab2bfa3ce2b457bb158e794297de25eb66d1f8578329858dadea9a3daa543aa227632994a5360c46dd48b0b63d9

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6968610.exe

          Filesize

          786KB

          MD5

          beffcaaa68a9484213cdcba807cc1fef

          SHA1

          83834e9bc13a90bf665f124fc21363ce99e2de49

          SHA256

          ac22974ae8a30731b1f973957b11316623223fda00067dd3bef7f3a42eba1b8e

          SHA512

          2fbe54fe737403a2a05d94220e17b7a4121b070e5306bc1932c5b1cfe5a616d2306182bf16145865a0f3a1b4998e506a62ccdf5db73e3cf8fff60c7cb4c70985

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6968610.exe

          Filesize

          786KB

          MD5

          beffcaaa68a9484213cdcba807cc1fef

          SHA1

          83834e9bc13a90bf665f124fc21363ce99e2de49

          SHA256

          ac22974ae8a30731b1f973957b11316623223fda00067dd3bef7f3a42eba1b8e

          SHA512

          2fbe54fe737403a2a05d94220e17b7a4121b070e5306bc1932c5b1cfe5a616d2306182bf16145865a0f3a1b4998e506a62ccdf5db73e3cf8fff60c7cb4c70985

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5244836.exe

          Filesize

          603KB

          MD5

          b30ca13a6cf58a4d295f7a44d15fb0b7

          SHA1

          2595a4bed3b84dbaea2a66963b37b845379c5a5a

          SHA256

          888c4134a049c054433df9b1dbd4fa21418c8de016ab6096a9b0984c136babf5

          SHA512

          9656687e1d7768f4caff3e1b8cbcc4cdeb3cf01615e21707bc56622630e8faf3a3b0aa9779781f0cfe503181162640ad49e8f393fd7b56b55e902f1b8fbe532b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5244836.exe

          Filesize

          603KB

          MD5

          b30ca13a6cf58a4d295f7a44d15fb0b7

          SHA1

          2595a4bed3b84dbaea2a66963b37b845379c5a5a

          SHA256

          888c4134a049c054433df9b1dbd4fa21418c8de016ab6096a9b0984c136babf5

          SHA512

          9656687e1d7768f4caff3e1b8cbcc4cdeb3cf01615e21707bc56622630e8faf3a3b0aa9779781f0cfe503181162640ad49e8f393fd7b56b55e902f1b8fbe532b

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9761810.exe

          Filesize

          339KB

          MD5

          c33c41c13b8993c0d8817ab4702f0d99

          SHA1

          cc3c3670c15e28501771a70dba90a208d5e762ee

          SHA256

          dc2ee20ac081e6d251d17a1f27393028f4e813662399716d9faea7254a4c072f

          SHA512

          27ffbe80c833eff114808dccdf56c1453616d063665c03d20e62d92655de30485ca858b18a6041704328eb6902dcd8da0cfef26c0c12337d48c0ffc14916c53a

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9761810.exe

          Filesize

          339KB

          MD5

          c33c41c13b8993c0d8817ab4702f0d99

          SHA1

          cc3c3670c15e28501771a70dba90a208d5e762ee

          SHA256

          dc2ee20ac081e6d251d17a1f27393028f4e813662399716d9faea7254a4c072f

          SHA512

          27ffbe80c833eff114808dccdf56c1453616d063665c03d20e62d92655de30485ca858b18a6041704328eb6902dcd8da0cfef26c0c12337d48c0ffc14916c53a

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9701566.exe

          Filesize

          12KB

          MD5

          f7c1d316879300b778197b4645143312

          SHA1

          2ba62a47b58580762301aed279cecc28ea7a7287

          SHA256

          23448e2a14437297e62d22f9eb7c21ae8936547417959f0afd86a4b968e592e0

          SHA512

          1043d2fd03f45d1d9d9f655be0b73d2655bf136ca0ef702329e1a4892c904c21a7b7fc0b744e239e8b2526849ce3f17ee6ca63f38691cb9c82bf2d423523c4dd

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9701566.exe

          Filesize

          12KB

          MD5

          f7c1d316879300b778197b4645143312

          SHA1

          2ba62a47b58580762301aed279cecc28ea7a7287

          SHA256

          23448e2a14437297e62d22f9eb7c21ae8936547417959f0afd86a4b968e592e0

          SHA512

          1043d2fd03f45d1d9d9f655be0b73d2655bf136ca0ef702329e1a4892c904c21a7b7fc0b744e239e8b2526849ce3f17ee6ca63f38691cb9c82bf2d423523c4dd

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5454725.exe

          Filesize

          365KB

          MD5

          2932ddbb32ba1eb7efbabf4969258a22

          SHA1

          0c20be7e9b63660df0fe4d3720e478f0a8747ab1

          SHA256

          232a89d5cd50f011fd6f8f0eb50d4f09a4ccdaca028c6f6421b9a8ce07f2d40f

          SHA512

          fbdedbbe85a46e1ca3752101a6daff7519b1cf2e1ebc3cea148b742121365c023b27d8ff0502654bd38a1ac9b867eaa897bc63cf2ac040af2cdd0ca292f9f72b

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5454725.exe

          Filesize

          365KB

          MD5

          2932ddbb32ba1eb7efbabf4969258a22

          SHA1

          0c20be7e9b63660df0fe4d3720e478f0a8747ab1

          SHA256

          232a89d5cd50f011fd6f8f0eb50d4f09a4ccdaca028c6f6421b9a8ce07f2d40f

          SHA512

          fbdedbbe85a46e1ca3752101a6daff7519b1cf2e1ebc3cea148b742121365c023b27d8ff0502654bd38a1ac9b867eaa897bc63cf2ac040af2cdd0ca292f9f72b

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3830606.exe

          Filesize

          969KB

          MD5

          02a0dff4aca66293afbb02b2223ca863

          SHA1

          62dd7391d764a3808c6ad2041e003b995c4a0aa0

          SHA256

          267dc85bb016109e0bdf1acb460ec854434e10d68b700977ed265050a1d1010b

          SHA512

          f3c82c8fb0dd96bdd2eda1cb0c7b24a81efecab2bfa3ce2b457bb158e794297de25eb66d1f8578329858dadea9a3daa543aa227632994a5360c46dd48b0b63d9

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3830606.exe

          Filesize

          969KB

          MD5

          02a0dff4aca66293afbb02b2223ca863

          SHA1

          62dd7391d764a3808c6ad2041e003b995c4a0aa0

          SHA256

          267dc85bb016109e0bdf1acb460ec854434e10d68b700977ed265050a1d1010b

          SHA512

          f3c82c8fb0dd96bdd2eda1cb0c7b24a81efecab2bfa3ce2b457bb158e794297de25eb66d1f8578329858dadea9a3daa543aa227632994a5360c46dd48b0b63d9

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6968610.exe

          Filesize

          786KB

          MD5

          beffcaaa68a9484213cdcba807cc1fef

          SHA1

          83834e9bc13a90bf665f124fc21363ce99e2de49

          SHA256

          ac22974ae8a30731b1f973957b11316623223fda00067dd3bef7f3a42eba1b8e

          SHA512

          2fbe54fe737403a2a05d94220e17b7a4121b070e5306bc1932c5b1cfe5a616d2306182bf16145865a0f3a1b4998e506a62ccdf5db73e3cf8fff60c7cb4c70985

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6968610.exe

          Filesize

          786KB

          MD5

          beffcaaa68a9484213cdcba807cc1fef

          SHA1

          83834e9bc13a90bf665f124fc21363ce99e2de49

          SHA256

          ac22974ae8a30731b1f973957b11316623223fda00067dd3bef7f3a42eba1b8e

          SHA512

          2fbe54fe737403a2a05d94220e17b7a4121b070e5306bc1932c5b1cfe5a616d2306182bf16145865a0f3a1b4998e506a62ccdf5db73e3cf8fff60c7cb4c70985

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5244836.exe

          Filesize

          603KB

          MD5

          b30ca13a6cf58a4d295f7a44d15fb0b7

          SHA1

          2595a4bed3b84dbaea2a66963b37b845379c5a5a

          SHA256

          888c4134a049c054433df9b1dbd4fa21418c8de016ab6096a9b0984c136babf5

          SHA512

          9656687e1d7768f4caff3e1b8cbcc4cdeb3cf01615e21707bc56622630e8faf3a3b0aa9779781f0cfe503181162640ad49e8f393fd7b56b55e902f1b8fbe532b

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5244836.exe

          Filesize

          603KB

          MD5

          b30ca13a6cf58a4d295f7a44d15fb0b7

          SHA1

          2595a4bed3b84dbaea2a66963b37b845379c5a5a

          SHA256

          888c4134a049c054433df9b1dbd4fa21418c8de016ab6096a9b0984c136babf5

          SHA512

          9656687e1d7768f4caff3e1b8cbcc4cdeb3cf01615e21707bc56622630e8faf3a3b0aa9779781f0cfe503181162640ad49e8f393fd7b56b55e902f1b8fbe532b

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9761810.exe

          Filesize

          339KB

          MD5

          c33c41c13b8993c0d8817ab4702f0d99

          SHA1

          cc3c3670c15e28501771a70dba90a208d5e762ee

          SHA256

          dc2ee20ac081e6d251d17a1f27393028f4e813662399716d9faea7254a4c072f

          SHA512

          27ffbe80c833eff114808dccdf56c1453616d063665c03d20e62d92655de30485ca858b18a6041704328eb6902dcd8da0cfef26c0c12337d48c0ffc14916c53a

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9761810.exe

          Filesize

          339KB

          MD5

          c33c41c13b8993c0d8817ab4702f0d99

          SHA1

          cc3c3670c15e28501771a70dba90a208d5e762ee

          SHA256

          dc2ee20ac081e6d251d17a1f27393028f4e813662399716d9faea7254a4c072f

          SHA512

          27ffbe80c833eff114808dccdf56c1453616d063665c03d20e62d92655de30485ca858b18a6041704328eb6902dcd8da0cfef26c0c12337d48c0ffc14916c53a

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9701566.exe

          Filesize

          12KB

          MD5

          f7c1d316879300b778197b4645143312

          SHA1

          2ba62a47b58580762301aed279cecc28ea7a7287

          SHA256

          23448e2a14437297e62d22f9eb7c21ae8936547417959f0afd86a4b968e592e0

          SHA512

          1043d2fd03f45d1d9d9f655be0b73d2655bf136ca0ef702329e1a4892c904c21a7b7fc0b744e239e8b2526849ce3f17ee6ca63f38691cb9c82bf2d423523c4dd

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5454725.exe

          Filesize

          365KB

          MD5

          2932ddbb32ba1eb7efbabf4969258a22

          SHA1

          0c20be7e9b63660df0fe4d3720e478f0a8747ab1

          SHA256

          232a89d5cd50f011fd6f8f0eb50d4f09a4ccdaca028c6f6421b9a8ce07f2d40f

          SHA512

          fbdedbbe85a46e1ca3752101a6daff7519b1cf2e1ebc3cea148b742121365c023b27d8ff0502654bd38a1ac9b867eaa897bc63cf2ac040af2cdd0ca292f9f72b

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5454725.exe

          Filesize

          365KB

          MD5

          2932ddbb32ba1eb7efbabf4969258a22

          SHA1

          0c20be7e9b63660df0fe4d3720e478f0a8747ab1

          SHA256

          232a89d5cd50f011fd6f8f0eb50d4f09a4ccdaca028c6f6421b9a8ce07f2d40f

          SHA512

          fbdedbbe85a46e1ca3752101a6daff7519b1cf2e1ebc3cea148b742121365c023b27d8ff0502654bd38a1ac9b867eaa897bc63cf2ac040af2cdd0ca292f9f72b

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5454725.exe

          Filesize

          365KB

          MD5

          2932ddbb32ba1eb7efbabf4969258a22

          SHA1

          0c20be7e9b63660df0fe4d3720e478f0a8747ab1

          SHA256

          232a89d5cd50f011fd6f8f0eb50d4f09a4ccdaca028c6f6421b9a8ce07f2d40f

          SHA512

          fbdedbbe85a46e1ca3752101a6daff7519b1cf2e1ebc3cea148b742121365c023b27d8ff0502654bd38a1ac9b867eaa897bc63cf2ac040af2cdd0ca292f9f72b

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5454725.exe

          Filesize

          365KB

          MD5

          2932ddbb32ba1eb7efbabf4969258a22

          SHA1

          0c20be7e9b63660df0fe4d3720e478f0a8747ab1

          SHA256

          232a89d5cd50f011fd6f8f0eb50d4f09a4ccdaca028c6f6421b9a8ce07f2d40f

          SHA512

          fbdedbbe85a46e1ca3752101a6daff7519b1cf2e1ebc3cea148b742121365c023b27d8ff0502654bd38a1ac9b867eaa897bc63cf2ac040af2cdd0ca292f9f72b

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5454725.exe

          Filesize

          365KB

          MD5

          2932ddbb32ba1eb7efbabf4969258a22

          SHA1

          0c20be7e9b63660df0fe4d3720e478f0a8747ab1

          SHA256

          232a89d5cd50f011fd6f8f0eb50d4f09a4ccdaca028c6f6421b9a8ce07f2d40f

          SHA512

          fbdedbbe85a46e1ca3752101a6daff7519b1cf2e1ebc3cea148b742121365c023b27d8ff0502654bd38a1ac9b867eaa897bc63cf2ac040af2cdd0ca292f9f72b

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5454725.exe

          Filesize

          365KB

          MD5

          2932ddbb32ba1eb7efbabf4969258a22

          SHA1

          0c20be7e9b63660df0fe4d3720e478f0a8747ab1

          SHA256

          232a89d5cd50f011fd6f8f0eb50d4f09a4ccdaca028c6f6421b9a8ce07f2d40f

          SHA512

          fbdedbbe85a46e1ca3752101a6daff7519b1cf2e1ebc3cea148b742121365c023b27d8ff0502654bd38a1ac9b867eaa897bc63cf2ac040af2cdd0ca292f9f72b

        • memory/1572-61-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/1572-59-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/1572-60-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/1572-58-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/1572-62-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/1572-65-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/1572-64-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/1572-63-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/1572-67-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/1572-69-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB

        • memory/2480-51-0x000007FEF5870000-0x000007FEF625C000-memory.dmp

          Filesize

          9.9MB

        • memory/2480-50-0x000007FEF5870000-0x000007FEF625C000-memory.dmp

          Filesize

          9.9MB

        • memory/2480-49-0x00000000013B0000-0x00000000013BA000-memory.dmp

          Filesize

          40KB

        • memory/2480-48-0x000007FEF5870000-0x000007FEF625C000-memory.dmp

          Filesize

          9.9MB