Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 08:03

General

  • Target

    file.exe

  • Size

    1.3MB

  • MD5

    fac542e07ee96e3411e7d1231bee62f8

  • SHA1

    fee2493e7198eaf7241e943ba994fc972f2019d6

  • SHA256

    c0ddbd455467b4ba31285e0d66569f8073a43151f62835e83d3418e691dbfa07

  • SHA512

    f74d3b41a71cc38ee7b70bafbd648f6a2730875ffcef655e76cd2bd29e26ad6f50ad3851725d285f41bb2bd39b5bc53c79e6edc49e19e96ae41c6444dce2d6ad

  • SSDEEP

    24576:Lyq8VFaV+2wrqHoYifIkHjkelHvVQKYIxJ9Qz2fu6j/XyH2WCn1V9l5:+fHaBweHufIkHwCPVQmxMz2m6j6HHCXD

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5177869.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5177869.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3266719.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3266719.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5605249.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5605249.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2608
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3145049.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3145049.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2904
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4484607.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4484607.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2688
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2520
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2536
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 268
                  7⤵
                  • Program crash
                  PID:2344
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 280
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2980

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5177869.exe

      Filesize

      1.2MB

      MD5

      cbbb17c106c2fb6eddb27e110605848a

      SHA1

      ff8337aeb2f64cd434c5a922aa231e2985d31553

      SHA256

      e77d158d5e3fd92be5daba047a6e35151492e0ad812f1260174b0c0585819975

      SHA512

      6f0ac3ecab62aae2b748c79a9f33ad171821fd9c406c3b37ab711b4d79dcf8fec6000b26219bb884d56cf207db50a95337a07a9082d0916c25b58ffc36391f8e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5177869.exe

      Filesize

      1.2MB

      MD5

      cbbb17c106c2fb6eddb27e110605848a

      SHA1

      ff8337aeb2f64cd434c5a922aa231e2985d31553

      SHA256

      e77d158d5e3fd92be5daba047a6e35151492e0ad812f1260174b0c0585819975

      SHA512

      6f0ac3ecab62aae2b748c79a9f33ad171821fd9c406c3b37ab711b4d79dcf8fec6000b26219bb884d56cf207db50a95337a07a9082d0916c25b58ffc36391f8e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3266719.exe

      Filesize

      836KB

      MD5

      de82e49605afdfb05fc4f80dc34357fd

      SHA1

      8651ab67cdaebf7a763c9ab59e3430a25cde0049

      SHA256

      b1f064a115db5e794748c13cf246851bad749daedbae240897dd658b540fea22

      SHA512

      536aaf89f7e217e899a9e94b381eb9df0c39c23153c37488b5e12c583e337a14e0a2f582025f551aa2faff6aecb0675f7858215e36b1c11a6a1683bc2ff4ccee

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3266719.exe

      Filesize

      836KB

      MD5

      de82e49605afdfb05fc4f80dc34357fd

      SHA1

      8651ab67cdaebf7a763c9ab59e3430a25cde0049

      SHA256

      b1f064a115db5e794748c13cf246851bad749daedbae240897dd658b540fea22

      SHA512

      536aaf89f7e217e899a9e94b381eb9df0c39c23153c37488b5e12c583e337a14e0a2f582025f551aa2faff6aecb0675f7858215e36b1c11a6a1683bc2ff4ccee

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5605249.exe

      Filesize

      475KB

      MD5

      eac31419586b9ab70e522107622b323d

      SHA1

      8a8bd03c2b34ed04fdadb3bb3249fa5c3bfd8ba8

      SHA256

      ffb986d14e3ad16563cf1bc9b699201620714f7b31a5a44d8993fee1a78a252e

      SHA512

      332b8d4f9f0ec2f2a40f6368f759daeb4e8600fb4eec2fde88bab81f90117ff70b62ca9fc74fed02ed578e008d829c3ac6673937b5b4d803b4d6887c571b0d41

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5605249.exe

      Filesize

      475KB

      MD5

      eac31419586b9ab70e522107622b323d

      SHA1

      8a8bd03c2b34ed04fdadb3bb3249fa5c3bfd8ba8

      SHA256

      ffb986d14e3ad16563cf1bc9b699201620714f7b31a5a44d8993fee1a78a252e

      SHA512

      332b8d4f9f0ec2f2a40f6368f759daeb4e8600fb4eec2fde88bab81f90117ff70b62ca9fc74fed02ed578e008d829c3ac6673937b5b4d803b4d6887c571b0d41

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3145049.exe

      Filesize

      11KB

      MD5

      939a4c26894b6e43bf30755f11f861ce

      SHA1

      8a68588cde36acf688882c6f5108e345c50bfdad

      SHA256

      270b3cc128b102f1825cc1bf36b0fe2daf6351b6e4dddd8bf409b8d5d8f07c71

      SHA512

      a9cf1fcae5e7e2fafed8cda162308bf665760f2f5094bb375bab6d98f234c1a1861e5d220f0f9d05e7203f49add541252b84b4d48fd424f5b6acc94031318e95

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3145049.exe

      Filesize

      11KB

      MD5

      939a4c26894b6e43bf30755f11f861ce

      SHA1

      8a68588cde36acf688882c6f5108e345c50bfdad

      SHA256

      270b3cc128b102f1825cc1bf36b0fe2daf6351b6e4dddd8bf409b8d5d8f07c71

      SHA512

      a9cf1fcae5e7e2fafed8cda162308bf665760f2f5094bb375bab6d98f234c1a1861e5d220f0f9d05e7203f49add541252b84b4d48fd424f5b6acc94031318e95

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4484607.exe

      Filesize

      1.0MB

      MD5

      7d79df15d04e01cda34f42a7599810a2

      SHA1

      d803e1ccacaa2adc60e59a68340eef3858304b54

      SHA256

      c68ec18f8286ec21530639b4af1c7b3d9cf1110e197e0c430633c9974196991c

      SHA512

      63e0d9d9d1d0ce2a26b4a5864c3c8bd20050c922ef12d6d1648f0818b0d342354f35c72bd46763d21b1e51b876a98805a724be8d3b026b330ae6d1538c9304b0

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4484607.exe

      Filesize

      1.0MB

      MD5

      7d79df15d04e01cda34f42a7599810a2

      SHA1

      d803e1ccacaa2adc60e59a68340eef3858304b54

      SHA256

      c68ec18f8286ec21530639b4af1c7b3d9cf1110e197e0c430633c9974196991c

      SHA512

      63e0d9d9d1d0ce2a26b4a5864c3c8bd20050c922ef12d6d1648f0818b0d342354f35c72bd46763d21b1e51b876a98805a724be8d3b026b330ae6d1538c9304b0

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4484607.exe

      Filesize

      1.0MB

      MD5

      7d79df15d04e01cda34f42a7599810a2

      SHA1

      d803e1ccacaa2adc60e59a68340eef3858304b54

      SHA256

      c68ec18f8286ec21530639b4af1c7b3d9cf1110e197e0c430633c9974196991c

      SHA512

      63e0d9d9d1d0ce2a26b4a5864c3c8bd20050c922ef12d6d1648f0818b0d342354f35c72bd46763d21b1e51b876a98805a724be8d3b026b330ae6d1538c9304b0

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v5177869.exe

      Filesize

      1.2MB

      MD5

      cbbb17c106c2fb6eddb27e110605848a

      SHA1

      ff8337aeb2f64cd434c5a922aa231e2985d31553

      SHA256

      e77d158d5e3fd92be5daba047a6e35151492e0ad812f1260174b0c0585819975

      SHA512

      6f0ac3ecab62aae2b748c79a9f33ad171821fd9c406c3b37ab711b4d79dcf8fec6000b26219bb884d56cf207db50a95337a07a9082d0916c25b58ffc36391f8e

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v5177869.exe

      Filesize

      1.2MB

      MD5

      cbbb17c106c2fb6eddb27e110605848a

      SHA1

      ff8337aeb2f64cd434c5a922aa231e2985d31553

      SHA256

      e77d158d5e3fd92be5daba047a6e35151492e0ad812f1260174b0c0585819975

      SHA512

      6f0ac3ecab62aae2b748c79a9f33ad171821fd9c406c3b37ab711b4d79dcf8fec6000b26219bb884d56cf207db50a95337a07a9082d0916c25b58ffc36391f8e

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v3266719.exe

      Filesize

      836KB

      MD5

      de82e49605afdfb05fc4f80dc34357fd

      SHA1

      8651ab67cdaebf7a763c9ab59e3430a25cde0049

      SHA256

      b1f064a115db5e794748c13cf246851bad749daedbae240897dd658b540fea22

      SHA512

      536aaf89f7e217e899a9e94b381eb9df0c39c23153c37488b5e12c583e337a14e0a2f582025f551aa2faff6aecb0675f7858215e36b1c11a6a1683bc2ff4ccee

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v3266719.exe

      Filesize

      836KB

      MD5

      de82e49605afdfb05fc4f80dc34357fd

      SHA1

      8651ab67cdaebf7a763c9ab59e3430a25cde0049

      SHA256

      b1f064a115db5e794748c13cf246851bad749daedbae240897dd658b540fea22

      SHA512

      536aaf89f7e217e899a9e94b381eb9df0c39c23153c37488b5e12c583e337a14e0a2f582025f551aa2faff6aecb0675f7858215e36b1c11a6a1683bc2ff4ccee

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v5605249.exe

      Filesize

      475KB

      MD5

      eac31419586b9ab70e522107622b323d

      SHA1

      8a8bd03c2b34ed04fdadb3bb3249fa5c3bfd8ba8

      SHA256

      ffb986d14e3ad16563cf1bc9b699201620714f7b31a5a44d8993fee1a78a252e

      SHA512

      332b8d4f9f0ec2f2a40f6368f759daeb4e8600fb4eec2fde88bab81f90117ff70b62ca9fc74fed02ed578e008d829c3ac6673937b5b4d803b4d6887c571b0d41

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v5605249.exe

      Filesize

      475KB

      MD5

      eac31419586b9ab70e522107622b323d

      SHA1

      8a8bd03c2b34ed04fdadb3bb3249fa5c3bfd8ba8

      SHA256

      ffb986d14e3ad16563cf1bc9b699201620714f7b31a5a44d8993fee1a78a252e

      SHA512

      332b8d4f9f0ec2f2a40f6368f759daeb4e8600fb4eec2fde88bab81f90117ff70b62ca9fc74fed02ed578e008d829c3ac6673937b5b4d803b4d6887c571b0d41

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a3145049.exe

      Filesize

      11KB

      MD5

      939a4c26894b6e43bf30755f11f861ce

      SHA1

      8a68588cde36acf688882c6f5108e345c50bfdad

      SHA256

      270b3cc128b102f1825cc1bf36b0fe2daf6351b6e4dddd8bf409b8d5d8f07c71

      SHA512

      a9cf1fcae5e7e2fafed8cda162308bf665760f2f5094bb375bab6d98f234c1a1861e5d220f0f9d05e7203f49add541252b84b4d48fd424f5b6acc94031318e95

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b4484607.exe

      Filesize

      1.0MB

      MD5

      7d79df15d04e01cda34f42a7599810a2

      SHA1

      d803e1ccacaa2adc60e59a68340eef3858304b54

      SHA256

      c68ec18f8286ec21530639b4af1c7b3d9cf1110e197e0c430633c9974196991c

      SHA512

      63e0d9d9d1d0ce2a26b4a5864c3c8bd20050c922ef12d6d1648f0818b0d342354f35c72bd46763d21b1e51b876a98805a724be8d3b026b330ae6d1538c9304b0

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b4484607.exe

      Filesize

      1.0MB

      MD5

      7d79df15d04e01cda34f42a7599810a2

      SHA1

      d803e1ccacaa2adc60e59a68340eef3858304b54

      SHA256

      c68ec18f8286ec21530639b4af1c7b3d9cf1110e197e0c430633c9974196991c

      SHA512

      63e0d9d9d1d0ce2a26b4a5864c3c8bd20050c922ef12d6d1648f0818b0d342354f35c72bd46763d21b1e51b876a98805a724be8d3b026b330ae6d1538c9304b0

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b4484607.exe

      Filesize

      1.0MB

      MD5

      7d79df15d04e01cda34f42a7599810a2

      SHA1

      d803e1ccacaa2adc60e59a68340eef3858304b54

      SHA256

      c68ec18f8286ec21530639b4af1c7b3d9cf1110e197e0c430633c9974196991c

      SHA512

      63e0d9d9d1d0ce2a26b4a5864c3c8bd20050c922ef12d6d1648f0818b0d342354f35c72bd46763d21b1e51b876a98805a724be8d3b026b330ae6d1538c9304b0

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b4484607.exe

      Filesize

      1.0MB

      MD5

      7d79df15d04e01cda34f42a7599810a2

      SHA1

      d803e1ccacaa2adc60e59a68340eef3858304b54

      SHA256

      c68ec18f8286ec21530639b4af1c7b3d9cf1110e197e0c430633c9974196991c

      SHA512

      63e0d9d9d1d0ce2a26b4a5864c3c8bd20050c922ef12d6d1648f0818b0d342354f35c72bd46763d21b1e51b876a98805a724be8d3b026b330ae6d1538c9304b0

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b4484607.exe

      Filesize

      1.0MB

      MD5

      7d79df15d04e01cda34f42a7599810a2

      SHA1

      d803e1ccacaa2adc60e59a68340eef3858304b54

      SHA256

      c68ec18f8286ec21530639b4af1c7b3d9cf1110e197e0c430633c9974196991c

      SHA512

      63e0d9d9d1d0ce2a26b4a5864c3c8bd20050c922ef12d6d1648f0818b0d342354f35c72bd46763d21b1e51b876a98805a724be8d3b026b330ae6d1538c9304b0

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b4484607.exe

      Filesize

      1.0MB

      MD5

      7d79df15d04e01cda34f42a7599810a2

      SHA1

      d803e1ccacaa2adc60e59a68340eef3858304b54

      SHA256

      c68ec18f8286ec21530639b4af1c7b3d9cf1110e197e0c430633c9974196991c

      SHA512

      63e0d9d9d1d0ce2a26b4a5864c3c8bd20050c922ef12d6d1648f0818b0d342354f35c72bd46763d21b1e51b876a98805a724be8d3b026b330ae6d1538c9304b0

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b4484607.exe

      Filesize

      1.0MB

      MD5

      7d79df15d04e01cda34f42a7599810a2

      SHA1

      d803e1ccacaa2adc60e59a68340eef3858304b54

      SHA256

      c68ec18f8286ec21530639b4af1c7b3d9cf1110e197e0c430633c9974196991c

      SHA512

      63e0d9d9d1d0ce2a26b4a5864c3c8bd20050c922ef12d6d1648f0818b0d342354f35c72bd46763d21b1e51b876a98805a724be8d3b026b330ae6d1538c9304b0

    • memory/2536-53-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2536-52-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2536-51-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2536-55-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2536-54-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2536-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2536-58-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2536-56-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2536-60-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2536-62-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2904-41-0x000007FEF5410000-0x000007FEF5DFC000-memory.dmp

      Filesize

      9.9MB

    • memory/2904-40-0x000007FEF5410000-0x000007FEF5DFC000-memory.dmp

      Filesize

      9.9MB

    • memory/2904-39-0x000007FEF5410000-0x000007FEF5DFC000-memory.dmp

      Filesize

      9.9MB

    • memory/2904-38-0x0000000000260000-0x000000000026A000-memory.dmp

      Filesize

      40KB