Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 04:11

General

  • Target

    644b7cb3aed3de4778e7a065b50051ecbe7804e682921f676816977729d3740c.exe

  • Size

    1.1MB

  • MD5

    07ce079b8fecf92910244fd9abb141bf

  • SHA1

    ea81a2f481e220d90550d8fdd9e0d2f5f2308174

  • SHA256

    644b7cb3aed3de4778e7a065b50051ecbe7804e682921f676816977729d3740c

  • SHA512

    56b6930e5a4289d8c0ade59820ee3806dd664262e7b38c67322db4c21775430ccc2a801457a662f04eb967ecefd65d068f723c36f18dedf4292b05125cad32e0

  • SSDEEP

    24576:DyiVhJOogVOl8vqT0yYy3PWQHqiLdRax0YOcxxUJ6GctWZ1fqja7:WUCj40y3fWaPd+0YOeoMwX0

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\644b7cb3aed3de4778e7a065b50051ecbe7804e682921f676816977729d3740c.exe
    "C:\Users\Admin\AppData\Local\Temp\644b7cb3aed3de4778e7a065b50051ecbe7804e682921f676816977729d3740c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3368209.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3368209.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7817443.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7817443.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0687993.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0687993.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:292
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2474002.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2474002.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2528
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1483903.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1483903.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:460
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5530254.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5530254.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1784
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2948
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 268
                  8⤵
                  • Program crash
                  PID:2824
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 272
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3368209.exe

    Filesize

    978KB

    MD5

    d7bc543410ab0d96507ba16c76392c33

    SHA1

    9cd728474693dc7e04137c69bd40eedd8ffb3bd0

    SHA256

    fd267e1fa940056fee701cede2e3227c8aba74466cf58af25d78f3c615269b5c

    SHA512

    d2f702879852aceb07a5016d9d943cad5311e7c425c6ffa4cc1120b1e7cf830594ba16f0d688e32234c1a1ed2b9b8a62f7fec52279f46c4045ad1552d7fbc4a4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3368209.exe

    Filesize

    978KB

    MD5

    d7bc543410ab0d96507ba16c76392c33

    SHA1

    9cd728474693dc7e04137c69bd40eedd8ffb3bd0

    SHA256

    fd267e1fa940056fee701cede2e3227c8aba74466cf58af25d78f3c615269b5c

    SHA512

    d2f702879852aceb07a5016d9d943cad5311e7c425c6ffa4cc1120b1e7cf830594ba16f0d688e32234c1a1ed2b9b8a62f7fec52279f46c4045ad1552d7fbc4a4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7817443.exe

    Filesize

    796KB

    MD5

    2fe63e245d95157658412bf7cc671259

    SHA1

    8bf020f8c9729ee89643b0e64fbd2e43b5ddca6b

    SHA256

    5624b408bbf7acc3fa22b013c8178967c70acef235bfafbaab9408ca69809d51

    SHA512

    d91beeb0ec776ee305621e5d039540ddbfed5726550a1e05587cc8a03a00c167ffc92132b06d13c50dd1b32003b61ccb4f71fa072253e0f4de738d7795a5229e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7817443.exe

    Filesize

    796KB

    MD5

    2fe63e245d95157658412bf7cc671259

    SHA1

    8bf020f8c9729ee89643b0e64fbd2e43b5ddca6b

    SHA256

    5624b408bbf7acc3fa22b013c8178967c70acef235bfafbaab9408ca69809d51

    SHA512

    d91beeb0ec776ee305621e5d039540ddbfed5726550a1e05587cc8a03a00c167ffc92132b06d13c50dd1b32003b61ccb4f71fa072253e0f4de738d7795a5229e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0687993.exe

    Filesize

    613KB

    MD5

    0138865a4f5d8fd30ac1585a67c0ed8b

    SHA1

    19310a0686e713493dedaf231bd5293357372f60

    SHA256

    1a9d6232a1c90019e04dc51a504acd89b87df81265696b7ac90feb5991e1fc0c

    SHA512

    5935bdc108f42eea8d51344496d3b3173b5cf1293b6348f10dd6a1d2de1eedf0a6ae5fe042b4b8ae7c6fe07c45177ffda0eaae18c71abc3f0c1c5d3d2e1e4f9a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0687993.exe

    Filesize

    613KB

    MD5

    0138865a4f5d8fd30ac1585a67c0ed8b

    SHA1

    19310a0686e713493dedaf231bd5293357372f60

    SHA256

    1a9d6232a1c90019e04dc51a504acd89b87df81265696b7ac90feb5991e1fc0c

    SHA512

    5935bdc108f42eea8d51344496d3b3173b5cf1293b6348f10dd6a1d2de1eedf0a6ae5fe042b4b8ae7c6fe07c45177ffda0eaae18c71abc3f0c1c5d3d2e1e4f9a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2474002.exe

    Filesize

    348KB

    MD5

    fbdb62b188fdd1ee0aa53a67d44d0182

    SHA1

    bd3ad01557910c29e38da6107178fe9977b9925b

    SHA256

    0cd466f2713cb6c6bfc51196266687e7cbf54b77bcc96ec34cf3513499d71e73

    SHA512

    51c8aa7c0d845dc62e604e562a38462bd8b52b837b28a947d1bca5acf148767e5f3c19692e50b434e0bc90809ae6ab2b0e1fc63ebc2536f60d53fd1839b47a9a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2474002.exe

    Filesize

    348KB

    MD5

    fbdb62b188fdd1ee0aa53a67d44d0182

    SHA1

    bd3ad01557910c29e38da6107178fe9977b9925b

    SHA256

    0cd466f2713cb6c6bfc51196266687e7cbf54b77bcc96ec34cf3513499d71e73

    SHA512

    51c8aa7c0d845dc62e604e562a38462bd8b52b837b28a947d1bca5acf148767e5f3c19692e50b434e0bc90809ae6ab2b0e1fc63ebc2536f60d53fd1839b47a9a

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1483903.exe

    Filesize

    12KB

    MD5

    4edc5f5447ec10028c4cd5c94b8f9c28

    SHA1

    c43b5b72c214ef5c31cbc777fa325f91d692be22

    SHA256

    e94afc4f53415ac2feb6dda80d5820ec64f0af1a94781cd3c7e7743e31e7fa09

    SHA512

    a11426332ff00b0168b8c64c8d450d975d263a34d5733b28343db2a0ec36df9b780d6be57bafafef73804701e12040628cd193b559dd627916b57d443c5a3ac9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1483903.exe

    Filesize

    12KB

    MD5

    4edc5f5447ec10028c4cd5c94b8f9c28

    SHA1

    c43b5b72c214ef5c31cbc777fa325f91d692be22

    SHA256

    e94afc4f53415ac2feb6dda80d5820ec64f0af1a94781cd3c7e7743e31e7fa09

    SHA512

    a11426332ff00b0168b8c64c8d450d975d263a34d5733b28343db2a0ec36df9b780d6be57bafafef73804701e12040628cd193b559dd627916b57d443c5a3ac9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5530254.exe

    Filesize

    378KB

    MD5

    b5fbd3b38de09cc9ae8553c3bd68909a

    SHA1

    b51f7a137bb657bb9b64a583dc0a271d179533ff

    SHA256

    44676ad7d4927b5c7876e76adb017ad31bea92da79d6c4a808b573a3ab647c16

    SHA512

    fcff41c0a1ba4c41744c895a875796e882dcc59e2fe1805db2ef3699d0339675b01b352193feb2d47016ec94b1ff6aaf51757dd2346b6bad1ed90d2d08163eb5

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5530254.exe

    Filesize

    378KB

    MD5

    b5fbd3b38de09cc9ae8553c3bd68909a

    SHA1

    b51f7a137bb657bb9b64a583dc0a271d179533ff

    SHA256

    44676ad7d4927b5c7876e76adb017ad31bea92da79d6c4a808b573a3ab647c16

    SHA512

    fcff41c0a1ba4c41744c895a875796e882dcc59e2fe1805db2ef3699d0339675b01b352193feb2d47016ec94b1ff6aaf51757dd2346b6bad1ed90d2d08163eb5

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3368209.exe

    Filesize

    978KB

    MD5

    d7bc543410ab0d96507ba16c76392c33

    SHA1

    9cd728474693dc7e04137c69bd40eedd8ffb3bd0

    SHA256

    fd267e1fa940056fee701cede2e3227c8aba74466cf58af25d78f3c615269b5c

    SHA512

    d2f702879852aceb07a5016d9d943cad5311e7c425c6ffa4cc1120b1e7cf830594ba16f0d688e32234c1a1ed2b9b8a62f7fec52279f46c4045ad1552d7fbc4a4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3368209.exe

    Filesize

    978KB

    MD5

    d7bc543410ab0d96507ba16c76392c33

    SHA1

    9cd728474693dc7e04137c69bd40eedd8ffb3bd0

    SHA256

    fd267e1fa940056fee701cede2e3227c8aba74466cf58af25d78f3c615269b5c

    SHA512

    d2f702879852aceb07a5016d9d943cad5311e7c425c6ffa4cc1120b1e7cf830594ba16f0d688e32234c1a1ed2b9b8a62f7fec52279f46c4045ad1552d7fbc4a4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7817443.exe

    Filesize

    796KB

    MD5

    2fe63e245d95157658412bf7cc671259

    SHA1

    8bf020f8c9729ee89643b0e64fbd2e43b5ddca6b

    SHA256

    5624b408bbf7acc3fa22b013c8178967c70acef235bfafbaab9408ca69809d51

    SHA512

    d91beeb0ec776ee305621e5d039540ddbfed5726550a1e05587cc8a03a00c167ffc92132b06d13c50dd1b32003b61ccb4f71fa072253e0f4de738d7795a5229e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7817443.exe

    Filesize

    796KB

    MD5

    2fe63e245d95157658412bf7cc671259

    SHA1

    8bf020f8c9729ee89643b0e64fbd2e43b5ddca6b

    SHA256

    5624b408bbf7acc3fa22b013c8178967c70acef235bfafbaab9408ca69809d51

    SHA512

    d91beeb0ec776ee305621e5d039540ddbfed5726550a1e05587cc8a03a00c167ffc92132b06d13c50dd1b32003b61ccb4f71fa072253e0f4de738d7795a5229e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0687993.exe

    Filesize

    613KB

    MD5

    0138865a4f5d8fd30ac1585a67c0ed8b

    SHA1

    19310a0686e713493dedaf231bd5293357372f60

    SHA256

    1a9d6232a1c90019e04dc51a504acd89b87df81265696b7ac90feb5991e1fc0c

    SHA512

    5935bdc108f42eea8d51344496d3b3173b5cf1293b6348f10dd6a1d2de1eedf0a6ae5fe042b4b8ae7c6fe07c45177ffda0eaae18c71abc3f0c1c5d3d2e1e4f9a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0687993.exe

    Filesize

    613KB

    MD5

    0138865a4f5d8fd30ac1585a67c0ed8b

    SHA1

    19310a0686e713493dedaf231bd5293357372f60

    SHA256

    1a9d6232a1c90019e04dc51a504acd89b87df81265696b7ac90feb5991e1fc0c

    SHA512

    5935bdc108f42eea8d51344496d3b3173b5cf1293b6348f10dd6a1d2de1eedf0a6ae5fe042b4b8ae7c6fe07c45177ffda0eaae18c71abc3f0c1c5d3d2e1e4f9a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2474002.exe

    Filesize

    348KB

    MD5

    fbdb62b188fdd1ee0aa53a67d44d0182

    SHA1

    bd3ad01557910c29e38da6107178fe9977b9925b

    SHA256

    0cd466f2713cb6c6bfc51196266687e7cbf54b77bcc96ec34cf3513499d71e73

    SHA512

    51c8aa7c0d845dc62e604e562a38462bd8b52b837b28a947d1bca5acf148767e5f3c19692e50b434e0bc90809ae6ab2b0e1fc63ebc2536f60d53fd1839b47a9a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2474002.exe

    Filesize

    348KB

    MD5

    fbdb62b188fdd1ee0aa53a67d44d0182

    SHA1

    bd3ad01557910c29e38da6107178fe9977b9925b

    SHA256

    0cd466f2713cb6c6bfc51196266687e7cbf54b77bcc96ec34cf3513499d71e73

    SHA512

    51c8aa7c0d845dc62e604e562a38462bd8b52b837b28a947d1bca5acf148767e5f3c19692e50b434e0bc90809ae6ab2b0e1fc63ebc2536f60d53fd1839b47a9a

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q1483903.exe

    Filesize

    12KB

    MD5

    4edc5f5447ec10028c4cd5c94b8f9c28

    SHA1

    c43b5b72c214ef5c31cbc777fa325f91d692be22

    SHA256

    e94afc4f53415ac2feb6dda80d5820ec64f0af1a94781cd3c7e7743e31e7fa09

    SHA512

    a11426332ff00b0168b8c64c8d450d975d263a34d5733b28343db2a0ec36df9b780d6be57bafafef73804701e12040628cd193b559dd627916b57d443c5a3ac9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5530254.exe

    Filesize

    378KB

    MD5

    b5fbd3b38de09cc9ae8553c3bd68909a

    SHA1

    b51f7a137bb657bb9b64a583dc0a271d179533ff

    SHA256

    44676ad7d4927b5c7876e76adb017ad31bea92da79d6c4a808b573a3ab647c16

    SHA512

    fcff41c0a1ba4c41744c895a875796e882dcc59e2fe1805db2ef3699d0339675b01b352193feb2d47016ec94b1ff6aaf51757dd2346b6bad1ed90d2d08163eb5

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5530254.exe

    Filesize

    378KB

    MD5

    b5fbd3b38de09cc9ae8553c3bd68909a

    SHA1

    b51f7a137bb657bb9b64a583dc0a271d179533ff

    SHA256

    44676ad7d4927b5c7876e76adb017ad31bea92da79d6c4a808b573a3ab647c16

    SHA512

    fcff41c0a1ba4c41744c895a875796e882dcc59e2fe1805db2ef3699d0339675b01b352193feb2d47016ec94b1ff6aaf51757dd2346b6bad1ed90d2d08163eb5

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5530254.exe

    Filesize

    378KB

    MD5

    b5fbd3b38de09cc9ae8553c3bd68909a

    SHA1

    b51f7a137bb657bb9b64a583dc0a271d179533ff

    SHA256

    44676ad7d4927b5c7876e76adb017ad31bea92da79d6c4a808b573a3ab647c16

    SHA512

    fcff41c0a1ba4c41744c895a875796e882dcc59e2fe1805db2ef3699d0339675b01b352193feb2d47016ec94b1ff6aaf51757dd2346b6bad1ed90d2d08163eb5

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5530254.exe

    Filesize

    378KB

    MD5

    b5fbd3b38de09cc9ae8553c3bd68909a

    SHA1

    b51f7a137bb657bb9b64a583dc0a271d179533ff

    SHA256

    44676ad7d4927b5c7876e76adb017ad31bea92da79d6c4a808b573a3ab647c16

    SHA512

    fcff41c0a1ba4c41744c895a875796e882dcc59e2fe1805db2ef3699d0339675b01b352193feb2d47016ec94b1ff6aaf51757dd2346b6bad1ed90d2d08163eb5

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5530254.exe

    Filesize

    378KB

    MD5

    b5fbd3b38de09cc9ae8553c3bd68909a

    SHA1

    b51f7a137bb657bb9b64a583dc0a271d179533ff

    SHA256

    44676ad7d4927b5c7876e76adb017ad31bea92da79d6c4a808b573a3ab647c16

    SHA512

    fcff41c0a1ba4c41744c895a875796e882dcc59e2fe1805db2ef3699d0339675b01b352193feb2d47016ec94b1ff6aaf51757dd2346b6bad1ed90d2d08163eb5

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5530254.exe

    Filesize

    378KB

    MD5

    b5fbd3b38de09cc9ae8553c3bd68909a

    SHA1

    b51f7a137bb657bb9b64a583dc0a271d179533ff

    SHA256

    44676ad7d4927b5c7876e76adb017ad31bea92da79d6c4a808b573a3ab647c16

    SHA512

    fcff41c0a1ba4c41744c895a875796e882dcc59e2fe1805db2ef3699d0339675b01b352193feb2d47016ec94b1ff6aaf51757dd2346b6bad1ed90d2d08163eb5

  • memory/460-49-0x000007FEF5040000-0x000007FEF5A2C000-memory.dmp

    Filesize

    9.9MB

  • memory/460-51-0x000007FEF5040000-0x000007FEF5A2C000-memory.dmp

    Filesize

    9.9MB

  • memory/460-48-0x0000000001090000-0x000000000109A000-memory.dmp

    Filesize

    40KB

  • memory/460-50-0x000007FEF5040000-0x000007FEF5A2C000-memory.dmp

    Filesize

    9.9MB

  • memory/2948-65-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2948-63-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2948-64-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2948-59-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2948-67-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2948-69-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2948-58-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2948-62-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2948-61-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2948-60-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB