Analysis

  • max time kernel
    120s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 08:01

General

  • Target

    26d2bdb96ec12bc5365bea79b5193a92.exe

  • Size

    1.4MB

  • MD5

    26d2bdb96ec12bc5365bea79b5193a92

  • SHA1

    9df12cec889ddb87cbcc4440743f7954925639de

  • SHA256

    206642eb2f40851e1e9b035c7ce869b83dadec13ed42872dd693a28448fb3c50

  • SHA512

    7df7d3d04dca04b923ee9b4f9ad2b023735bb7e90bc8aec8adcfeb7f054b2f912f7af3d02992c3656b8ab756bc4c0e42c8029ee7c18472425e032f29156a847b

  • SSDEEP

    24576:lzxSd8DMSCi0QgCyPyegrkjM6BNu0gw8+LlxnYINltAdDQcRBv8ozUXYf:jSd8Dd0jydrkjhuZwFfnYIBUDQcLv8Wh

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26d2bdb96ec12bc5365bea79b5193a92.exe
    "C:\Users\Admin\AppData\Local\Temp\26d2bdb96ec12bc5365bea79b5193a92.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:2076
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
          PID:2792
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          2⤵
            PID:2892
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            2⤵
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2644
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2391555.exe
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2391555.exe
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:2532
              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8901184.exe
                C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8901184.exe
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Adds Run key to start application
                • Suspicious use of WriteProcessMemory
                PID:2512
                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1007075.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1007075.exe
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Suspicious use of WriteProcessMemory
                  PID:2100
                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2606138.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2606138.exe
                    6⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Adds Run key to start application
                    PID:2700
                    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6488020.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6488020.exe
                      7⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      PID:2848
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                        8⤵
                        • Modifies Windows Defender Real-time Protection settings
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2132
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 268
                        8⤵
                        • Loads dropped DLL
                        • Program crash
                        PID:540
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 120
            2⤵
            • Program crash
            PID:2608

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2391555.exe

                Filesize

                1.0MB

                MD5

                7a8c8092290fddfe954388d159079d1a

                SHA1

                a950fcfe3d848c7bd06d0098562ec7cdd593d6ca

                SHA256

                bff2d201a5b1a14cfe325927f9b99a90c964cb88502ad339564a86bcb322765b

                SHA512

                c1e02f8af8229b85e9434ae0f61e6d12ba6fab393e5ae60f0eebbcca990a6fb23a8eb400c4883be9bc161923f0d86b41aa0bc8e56a15e24e205178c7c81841e0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2391555.exe

                Filesize

                1.0MB

                MD5

                7a8c8092290fddfe954388d159079d1a

                SHA1

                a950fcfe3d848c7bd06d0098562ec7cdd593d6ca

                SHA256

                bff2d201a5b1a14cfe325927f9b99a90c964cb88502ad339564a86bcb322765b

                SHA512

                c1e02f8af8229b85e9434ae0f61e6d12ba6fab393e5ae60f0eebbcca990a6fb23a8eb400c4883be9bc161923f0d86b41aa0bc8e56a15e24e205178c7c81841e0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8901184.exe

                Filesize

                791KB

                MD5

                31dc8da43c17445d7925c6aa23ee680a

                SHA1

                9ca93b340cc1b64d53c84ca15537cb9c44bcfa29

                SHA256

                7010a99bc625595655ce6f15b8d15fabd3f44af5245c3bd90bcbdef7014402ad

                SHA512

                60f75d8e7a61efebb5b6950ae77c7dacbeb9de59b1491844f44e24a2ccfcc92e52c7c60a261b24686c39ca1a448b2fac9e32a3ed8a54ceaa007c3c4d454b7330

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8901184.exe

                Filesize

                791KB

                MD5

                31dc8da43c17445d7925c6aa23ee680a

                SHA1

                9ca93b340cc1b64d53c84ca15537cb9c44bcfa29

                SHA256

                7010a99bc625595655ce6f15b8d15fabd3f44af5245c3bd90bcbdef7014402ad

                SHA512

                60f75d8e7a61efebb5b6950ae77c7dacbeb9de59b1491844f44e24a2ccfcc92e52c7c60a261b24686c39ca1a448b2fac9e32a3ed8a54ceaa007c3c4d454b7330

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1007075.exe

                Filesize

                608KB

                MD5

                4ceae920c93d20b6d7e1ad72945e7cb8

                SHA1

                998c00dd35186ba57bbc4b56de0a2abeca212bd3

                SHA256

                8d0e5172f228ba06f423d4f76a139662a951996f842d57e88d95935b0a1a14d4

                SHA512

                420b8c8de25fbee39974a4c3d91077f0ad47303bb683b35f7afa13911bf50429c554a5f19b7299e2c71c468c93dbb31964afe5b00097a11d828b35db20a8c39a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1007075.exe

                Filesize

                608KB

                MD5

                4ceae920c93d20b6d7e1ad72945e7cb8

                SHA1

                998c00dd35186ba57bbc4b56de0a2abeca212bd3

                SHA256

                8d0e5172f228ba06f423d4f76a139662a951996f842d57e88d95935b0a1a14d4

                SHA512

                420b8c8de25fbee39974a4c3d91077f0ad47303bb683b35f7afa13911bf50429c554a5f19b7299e2c71c468c93dbb31964afe5b00097a11d828b35db20a8c39a

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2606138.exe

                Filesize

                366KB

                MD5

                9f7ff64e8e6afc5e79522a090dbfa252

                SHA1

                c50a46c94e4497921520071f73880085ffdcecef

                SHA256

                64b3ffaf11dd2959df7f207aa5a574f693f38d805339cfdbb1e9763f560ace3b

                SHA512

                3fbc35b357e09baf5129e6f953b3a9cbcc4a95479b194fbafc9fa59b9459da44028472ca042b209defb8538680b013a7ca7f3f5206f124bfa37f1ff48cea1fa3

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2606138.exe

                Filesize

                366KB

                MD5

                9f7ff64e8e6afc5e79522a090dbfa252

                SHA1

                c50a46c94e4497921520071f73880085ffdcecef

                SHA256

                64b3ffaf11dd2959df7f207aa5a574f693f38d805339cfdbb1e9763f560ace3b

                SHA512

                3fbc35b357e09baf5129e6f953b3a9cbcc4a95479b194fbafc9fa59b9459da44028472ca042b209defb8538680b013a7ca7f3f5206f124bfa37f1ff48cea1fa3

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6488020.exe

                Filesize

                238KB

                MD5

                172ba357cc1b7a27562152acdb60a022

                SHA1

                7ae48cb0f9a9aa77574c6243f342310c25755c89

                SHA256

                e1c43067f906ee944d786c9250795d4e5b223dc135856243adb3ed1feb1d50cd

                SHA512

                b89e997958451e9d20f4c51d0f4a0ab579cc095ebcb51a6c4758bc3944df56af57ae043fb68edec4f0a87381e0cc911edab2c2a4cf80895d6f90ef3930da86b4

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6488020.exe

                Filesize

                238KB

                MD5

                172ba357cc1b7a27562152acdb60a022

                SHA1

                7ae48cb0f9a9aa77574c6243f342310c25755c89

                SHA256

                e1c43067f906ee944d786c9250795d4e5b223dc135856243adb3ed1feb1d50cd

                SHA512

                b89e997958451e9d20f4c51d0f4a0ab579cc095ebcb51a6c4758bc3944df56af57ae043fb68edec4f0a87381e0cc911edab2c2a4cf80895d6f90ef3930da86b4

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6488020.exe

                Filesize

                238KB

                MD5

                172ba357cc1b7a27562152acdb60a022

                SHA1

                7ae48cb0f9a9aa77574c6243f342310c25755c89

                SHA256

                e1c43067f906ee944d786c9250795d4e5b223dc135856243adb3ed1feb1d50cd

                SHA512

                b89e997958451e9d20f4c51d0f4a0ab579cc095ebcb51a6c4758bc3944df56af57ae043fb68edec4f0a87381e0cc911edab2c2a4cf80895d6f90ef3930da86b4

              • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z2391555.exe

                Filesize

                1.0MB

                MD5

                7a8c8092290fddfe954388d159079d1a

                SHA1

                a950fcfe3d848c7bd06d0098562ec7cdd593d6ca

                SHA256

                bff2d201a5b1a14cfe325927f9b99a90c964cb88502ad339564a86bcb322765b

                SHA512

                c1e02f8af8229b85e9434ae0f61e6d12ba6fab393e5ae60f0eebbcca990a6fb23a8eb400c4883be9bc161923f0d86b41aa0bc8e56a15e24e205178c7c81841e0

              • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z2391555.exe

                Filesize

                1.0MB

                MD5

                7a8c8092290fddfe954388d159079d1a

                SHA1

                a950fcfe3d848c7bd06d0098562ec7cdd593d6ca

                SHA256

                bff2d201a5b1a14cfe325927f9b99a90c964cb88502ad339564a86bcb322765b

                SHA512

                c1e02f8af8229b85e9434ae0f61e6d12ba6fab393e5ae60f0eebbcca990a6fb23a8eb400c4883be9bc161923f0d86b41aa0bc8e56a15e24e205178c7c81841e0

              • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8901184.exe

                Filesize

                791KB

                MD5

                31dc8da43c17445d7925c6aa23ee680a

                SHA1

                9ca93b340cc1b64d53c84ca15537cb9c44bcfa29

                SHA256

                7010a99bc625595655ce6f15b8d15fabd3f44af5245c3bd90bcbdef7014402ad

                SHA512

                60f75d8e7a61efebb5b6950ae77c7dacbeb9de59b1491844f44e24a2ccfcc92e52c7c60a261b24686c39ca1a448b2fac9e32a3ed8a54ceaa007c3c4d454b7330

              • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8901184.exe

                Filesize

                791KB

                MD5

                31dc8da43c17445d7925c6aa23ee680a

                SHA1

                9ca93b340cc1b64d53c84ca15537cb9c44bcfa29

                SHA256

                7010a99bc625595655ce6f15b8d15fabd3f44af5245c3bd90bcbdef7014402ad

                SHA512

                60f75d8e7a61efebb5b6950ae77c7dacbeb9de59b1491844f44e24a2ccfcc92e52c7c60a261b24686c39ca1a448b2fac9e32a3ed8a54ceaa007c3c4d454b7330

              • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1007075.exe

                Filesize

                608KB

                MD5

                4ceae920c93d20b6d7e1ad72945e7cb8

                SHA1

                998c00dd35186ba57bbc4b56de0a2abeca212bd3

                SHA256

                8d0e5172f228ba06f423d4f76a139662a951996f842d57e88d95935b0a1a14d4

                SHA512

                420b8c8de25fbee39974a4c3d91077f0ad47303bb683b35f7afa13911bf50429c554a5f19b7299e2c71c468c93dbb31964afe5b00097a11d828b35db20a8c39a

              • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1007075.exe

                Filesize

                608KB

                MD5

                4ceae920c93d20b6d7e1ad72945e7cb8

                SHA1

                998c00dd35186ba57bbc4b56de0a2abeca212bd3

                SHA256

                8d0e5172f228ba06f423d4f76a139662a951996f842d57e88d95935b0a1a14d4

                SHA512

                420b8c8de25fbee39974a4c3d91077f0ad47303bb683b35f7afa13911bf50429c554a5f19b7299e2c71c468c93dbb31964afe5b00097a11d828b35db20a8c39a

              • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2606138.exe

                Filesize

                366KB

                MD5

                9f7ff64e8e6afc5e79522a090dbfa252

                SHA1

                c50a46c94e4497921520071f73880085ffdcecef

                SHA256

                64b3ffaf11dd2959df7f207aa5a574f693f38d805339cfdbb1e9763f560ace3b

                SHA512

                3fbc35b357e09baf5129e6f953b3a9cbcc4a95479b194fbafc9fa59b9459da44028472ca042b209defb8538680b013a7ca7f3f5206f124bfa37f1ff48cea1fa3

              • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2606138.exe

                Filesize

                366KB

                MD5

                9f7ff64e8e6afc5e79522a090dbfa252

                SHA1

                c50a46c94e4497921520071f73880085ffdcecef

                SHA256

                64b3ffaf11dd2959df7f207aa5a574f693f38d805339cfdbb1e9763f560ace3b

                SHA512

                3fbc35b357e09baf5129e6f953b3a9cbcc4a95479b194fbafc9fa59b9459da44028472ca042b209defb8538680b013a7ca7f3f5206f124bfa37f1ff48cea1fa3

              • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6488020.exe

                Filesize

                238KB

                MD5

                172ba357cc1b7a27562152acdb60a022

                SHA1

                7ae48cb0f9a9aa77574c6243f342310c25755c89

                SHA256

                e1c43067f906ee944d786c9250795d4e5b223dc135856243adb3ed1feb1d50cd

                SHA512

                b89e997958451e9d20f4c51d0f4a0ab579cc095ebcb51a6c4758bc3944df56af57ae043fb68edec4f0a87381e0cc911edab2c2a4cf80895d6f90ef3930da86b4

              • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6488020.exe

                Filesize

                238KB

                MD5

                172ba357cc1b7a27562152acdb60a022

                SHA1

                7ae48cb0f9a9aa77574c6243f342310c25755c89

                SHA256

                e1c43067f906ee944d786c9250795d4e5b223dc135856243adb3ed1feb1d50cd

                SHA512

                b89e997958451e9d20f4c51d0f4a0ab579cc095ebcb51a6c4758bc3944df56af57ae043fb68edec4f0a87381e0cc911edab2c2a4cf80895d6f90ef3930da86b4

              • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6488020.exe

                Filesize

                238KB

                MD5

                172ba357cc1b7a27562152acdb60a022

                SHA1

                7ae48cb0f9a9aa77574c6243f342310c25755c89

                SHA256

                e1c43067f906ee944d786c9250795d4e5b223dc135856243adb3ed1feb1d50cd

                SHA512

                b89e997958451e9d20f4c51d0f4a0ab579cc095ebcb51a6c4758bc3944df56af57ae043fb68edec4f0a87381e0cc911edab2c2a4cf80895d6f90ef3930da86b4

              • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6488020.exe

                Filesize

                238KB

                MD5

                172ba357cc1b7a27562152acdb60a022

                SHA1

                7ae48cb0f9a9aa77574c6243f342310c25755c89

                SHA256

                e1c43067f906ee944d786c9250795d4e5b223dc135856243adb3ed1feb1d50cd

                SHA512

                b89e997958451e9d20f4c51d0f4a0ab579cc095ebcb51a6c4758bc3944df56af57ae043fb68edec4f0a87381e0cc911edab2c2a4cf80895d6f90ef3930da86b4

              • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6488020.exe

                Filesize

                238KB

                MD5

                172ba357cc1b7a27562152acdb60a022

                SHA1

                7ae48cb0f9a9aa77574c6243f342310c25755c89

                SHA256

                e1c43067f906ee944d786c9250795d4e5b223dc135856243adb3ed1feb1d50cd

                SHA512

                b89e997958451e9d20f4c51d0f4a0ab579cc095ebcb51a6c4758bc3944df56af57ae043fb68edec4f0a87381e0cc911edab2c2a4cf80895d6f90ef3930da86b4

              • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6488020.exe

                Filesize

                238KB

                MD5

                172ba357cc1b7a27562152acdb60a022

                SHA1

                7ae48cb0f9a9aa77574c6243f342310c25755c89

                SHA256

                e1c43067f906ee944d786c9250795d4e5b223dc135856243adb3ed1feb1d50cd

                SHA512

                b89e997958451e9d20f4c51d0f4a0ab579cc095ebcb51a6c4758bc3944df56af57ae043fb68edec4f0a87381e0cc911edab2c2a4cf80895d6f90ef3930da86b4

              • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6488020.exe

                Filesize

                238KB

                MD5

                172ba357cc1b7a27562152acdb60a022

                SHA1

                7ae48cb0f9a9aa77574c6243f342310c25755c89

                SHA256

                e1c43067f906ee944d786c9250795d4e5b223dc135856243adb3ed1feb1d50cd

                SHA512

                b89e997958451e9d20f4c51d0f4a0ab579cc095ebcb51a6c4758bc3944df56af57ae043fb68edec4f0a87381e0cc911edab2c2a4cf80895d6f90ef3930da86b4

              • memory/2132-76-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/2132-78-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/2132-80-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/2132-75-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                Filesize

                4KB

              • memory/2132-74-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/2132-73-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/2132-71-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/2132-72-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/2644-2-0x0000000000400000-0x000000000053D000-memory.dmp

                Filesize

                1.2MB

              • memory/2644-17-0x0000000000400000-0x000000000053D000-memory.dmp

                Filesize

                1.2MB

              • memory/2644-4-0x0000000000400000-0x000000000053D000-memory.dmp

                Filesize

                1.2MB

              • memory/2644-0-0x0000000000400000-0x000000000053D000-memory.dmp

                Filesize

                1.2MB

              • memory/2644-15-0x0000000000400000-0x000000000053D000-memory.dmp

                Filesize

                1.2MB

              • memory/2644-6-0x0000000000400000-0x000000000053D000-memory.dmp

                Filesize

                1.2MB

              • memory/2644-13-0x0000000000400000-0x000000000053D000-memory.dmp

                Filesize

                1.2MB

              • memory/2644-8-0x0000000000400000-0x000000000053D000-memory.dmp

                Filesize

                1.2MB

              • memory/2644-12-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                Filesize

                4KB

              • memory/2644-10-0x0000000000400000-0x000000000053D000-memory.dmp

                Filesize

                1.2MB

              • memory/2644-85-0x0000000000400000-0x000000000053D000-memory.dmp

                Filesize

                1.2MB