Analysis

  • max time kernel
    120s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 08:03

General

  • Target

    2e166360f53bff4c633425321740632620ce43ea6cbacbef2a8655f3f7370b1a.exe

  • Size

    1.3MB

  • MD5

    a952b0398c89ddbb164b0bab1db7f957

  • SHA1

    7ec5b8c25ad4243084f6ff901496228cfd598961

  • SHA256

    2e166360f53bff4c633425321740632620ce43ea6cbacbef2a8655f3f7370b1a

  • SHA512

    2785af1e8f3dd0be72ccd409e0e361d703110e3b447cdf148389d13158f04d928fcd275312405242ed139dda87ef29b16d0ad3a6d61ceff9e25a54a1a456590b

  • SSDEEP

    24576:ty1Ec1lu3LvuQ2pss6fc57FbSZOBlIZQ+yzec1B1eQbma3pCGO:IJ1luzipssTAZOLIEqWeQbma3kG

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e166360f53bff4c633425321740632620ce43ea6cbacbef2a8655f3f7370b1a.exe
    "C:\Users\Admin\AppData\Local\Temp\2e166360f53bff4c633425321740632620ce43ea6cbacbef2a8655f3f7370b1a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3970171.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3970171.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:836
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5034817.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5034817.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9618383.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9618383.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5942549.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5942549.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2712
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8284422.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8284422.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2672
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1936
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 268
                7⤵
                • Program crash
                PID:2848
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 268
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2876

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3970171.exe

          Filesize

          1.2MB

          MD5

          e69d1e3e5c90d767c261f45f07882f7f

          SHA1

          0a34976cc78e799fedc869b3fa8ade086ad0f881

          SHA256

          d48f84117dc61016ace5148957eb51b699eb563e7282422a5e22f3eb04928678

          SHA512

          fe14196837cba17a71461c9a3bdbfd4c6db2a82ac030c989bd4959e13c4cd6a6b804125f09febde2b4c962b5a5d103e337e663d93fe5614a4fea8b786355f5db

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3970171.exe

          Filesize

          1.2MB

          MD5

          e69d1e3e5c90d767c261f45f07882f7f

          SHA1

          0a34976cc78e799fedc869b3fa8ade086ad0f881

          SHA256

          d48f84117dc61016ace5148957eb51b699eb563e7282422a5e22f3eb04928678

          SHA512

          fe14196837cba17a71461c9a3bdbfd4c6db2a82ac030c989bd4959e13c4cd6a6b804125f09febde2b4c962b5a5d103e337e663d93fe5614a4fea8b786355f5db

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5034817.exe

          Filesize

          835KB

          MD5

          8ea96908fede3935f88f940b05d7aa41

          SHA1

          69cf7b46ae014f788dfedc5c95b5e0c3f04f94d4

          SHA256

          2c9a5a595cc34f5a36791dd5da160dd64e249fb57be87e29a53332b2a4823917

          SHA512

          d63aae4b5e2675de24be6590486234c8bf483ffbf78a0ed7c767504d6b58405e055dfb7e7a2dec78b5b284ecd8fc7776a28f68d774f4f759f396674c21d9b82b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5034817.exe

          Filesize

          835KB

          MD5

          8ea96908fede3935f88f940b05d7aa41

          SHA1

          69cf7b46ae014f788dfedc5c95b5e0c3f04f94d4

          SHA256

          2c9a5a595cc34f5a36791dd5da160dd64e249fb57be87e29a53332b2a4823917

          SHA512

          d63aae4b5e2675de24be6590486234c8bf483ffbf78a0ed7c767504d6b58405e055dfb7e7a2dec78b5b284ecd8fc7776a28f68d774f4f759f396674c21d9b82b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9618383.exe

          Filesize

          475KB

          MD5

          40ab95e7c96062a8281adee87be31eea

          SHA1

          c66cebf4a1d144106718205ad48860816c8f7d95

          SHA256

          81c998638755a1ef04a1b326d8bbafc10d846891571c4574b236961469d4f2a4

          SHA512

          6b8f3a3768dcf6243773932828736e765822e795528d71c17ecb60b96f77d377735ba0f44f86ea1b99853b71908160eb56ca1728b614a08fbef10cf639b93433

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9618383.exe

          Filesize

          475KB

          MD5

          40ab95e7c96062a8281adee87be31eea

          SHA1

          c66cebf4a1d144106718205ad48860816c8f7d95

          SHA256

          81c998638755a1ef04a1b326d8bbafc10d846891571c4574b236961469d4f2a4

          SHA512

          6b8f3a3768dcf6243773932828736e765822e795528d71c17ecb60b96f77d377735ba0f44f86ea1b99853b71908160eb56ca1728b614a08fbef10cf639b93433

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5942549.exe

          Filesize

          11KB

          MD5

          e0233372fb5a978e424016b9233a3f95

          SHA1

          5dbc3e695cbbb7c8d982fac7c330d199cb461141

          SHA256

          111c507d7b970b8a17f2b1c7828b9dd35f14e73461ac9afa986c9f9dabeffba6

          SHA512

          4e82c114e995bb3582ed1b478465eea994e478d64f5859bf45ab02452705b56865580f2feddba76ae550787b0d60920c8c984578977e7615060ab9cf1b955e9d

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5942549.exe

          Filesize

          11KB

          MD5

          e0233372fb5a978e424016b9233a3f95

          SHA1

          5dbc3e695cbbb7c8d982fac7c330d199cb461141

          SHA256

          111c507d7b970b8a17f2b1c7828b9dd35f14e73461ac9afa986c9f9dabeffba6

          SHA512

          4e82c114e995bb3582ed1b478465eea994e478d64f5859bf45ab02452705b56865580f2feddba76ae550787b0d60920c8c984578977e7615060ab9cf1b955e9d

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8284422.exe

          Filesize

          1.0MB

          MD5

          d4e5183193542eae08d6db8347b0b2f2

          SHA1

          8b863552656586e9576644516f7ed4231fc6ca87

          SHA256

          bc3bf7e049dcd2ea7ebebc5a3371adbf48ea4d81a652d0985efcb042c976cca8

          SHA512

          93e02f47709e3b80e38b22c9a793f5a9f75a7488c350fc2ce1048d7e1bdc3b00800dad8171234e5e916e6bb1acc094285e4f691f0cd782657ed30978e7484eb6

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8284422.exe

          Filesize

          1.0MB

          MD5

          d4e5183193542eae08d6db8347b0b2f2

          SHA1

          8b863552656586e9576644516f7ed4231fc6ca87

          SHA256

          bc3bf7e049dcd2ea7ebebc5a3371adbf48ea4d81a652d0985efcb042c976cca8

          SHA512

          93e02f47709e3b80e38b22c9a793f5a9f75a7488c350fc2ce1048d7e1bdc3b00800dad8171234e5e916e6bb1acc094285e4f691f0cd782657ed30978e7484eb6

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8284422.exe

          Filesize

          1.0MB

          MD5

          d4e5183193542eae08d6db8347b0b2f2

          SHA1

          8b863552656586e9576644516f7ed4231fc6ca87

          SHA256

          bc3bf7e049dcd2ea7ebebc5a3371adbf48ea4d81a652d0985efcb042c976cca8

          SHA512

          93e02f47709e3b80e38b22c9a793f5a9f75a7488c350fc2ce1048d7e1bdc3b00800dad8171234e5e916e6bb1acc094285e4f691f0cd782657ed30978e7484eb6

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v3970171.exe

          Filesize

          1.2MB

          MD5

          e69d1e3e5c90d767c261f45f07882f7f

          SHA1

          0a34976cc78e799fedc869b3fa8ade086ad0f881

          SHA256

          d48f84117dc61016ace5148957eb51b699eb563e7282422a5e22f3eb04928678

          SHA512

          fe14196837cba17a71461c9a3bdbfd4c6db2a82ac030c989bd4959e13c4cd6a6b804125f09febde2b4c962b5a5d103e337e663d93fe5614a4fea8b786355f5db

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v3970171.exe

          Filesize

          1.2MB

          MD5

          e69d1e3e5c90d767c261f45f07882f7f

          SHA1

          0a34976cc78e799fedc869b3fa8ade086ad0f881

          SHA256

          d48f84117dc61016ace5148957eb51b699eb563e7282422a5e22f3eb04928678

          SHA512

          fe14196837cba17a71461c9a3bdbfd4c6db2a82ac030c989bd4959e13c4cd6a6b804125f09febde2b4c962b5a5d103e337e663d93fe5614a4fea8b786355f5db

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v5034817.exe

          Filesize

          835KB

          MD5

          8ea96908fede3935f88f940b05d7aa41

          SHA1

          69cf7b46ae014f788dfedc5c95b5e0c3f04f94d4

          SHA256

          2c9a5a595cc34f5a36791dd5da160dd64e249fb57be87e29a53332b2a4823917

          SHA512

          d63aae4b5e2675de24be6590486234c8bf483ffbf78a0ed7c767504d6b58405e055dfb7e7a2dec78b5b284ecd8fc7776a28f68d774f4f759f396674c21d9b82b

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v5034817.exe

          Filesize

          835KB

          MD5

          8ea96908fede3935f88f940b05d7aa41

          SHA1

          69cf7b46ae014f788dfedc5c95b5e0c3f04f94d4

          SHA256

          2c9a5a595cc34f5a36791dd5da160dd64e249fb57be87e29a53332b2a4823917

          SHA512

          d63aae4b5e2675de24be6590486234c8bf483ffbf78a0ed7c767504d6b58405e055dfb7e7a2dec78b5b284ecd8fc7776a28f68d774f4f759f396674c21d9b82b

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v9618383.exe

          Filesize

          475KB

          MD5

          40ab95e7c96062a8281adee87be31eea

          SHA1

          c66cebf4a1d144106718205ad48860816c8f7d95

          SHA256

          81c998638755a1ef04a1b326d8bbafc10d846891571c4574b236961469d4f2a4

          SHA512

          6b8f3a3768dcf6243773932828736e765822e795528d71c17ecb60b96f77d377735ba0f44f86ea1b99853b71908160eb56ca1728b614a08fbef10cf639b93433

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v9618383.exe

          Filesize

          475KB

          MD5

          40ab95e7c96062a8281adee87be31eea

          SHA1

          c66cebf4a1d144106718205ad48860816c8f7d95

          SHA256

          81c998638755a1ef04a1b326d8bbafc10d846891571c4574b236961469d4f2a4

          SHA512

          6b8f3a3768dcf6243773932828736e765822e795528d71c17ecb60b96f77d377735ba0f44f86ea1b99853b71908160eb56ca1728b614a08fbef10cf639b93433

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a5942549.exe

          Filesize

          11KB

          MD5

          e0233372fb5a978e424016b9233a3f95

          SHA1

          5dbc3e695cbbb7c8d982fac7c330d199cb461141

          SHA256

          111c507d7b970b8a17f2b1c7828b9dd35f14e73461ac9afa986c9f9dabeffba6

          SHA512

          4e82c114e995bb3582ed1b478465eea994e478d64f5859bf45ab02452705b56865580f2feddba76ae550787b0d60920c8c984578977e7615060ab9cf1b955e9d

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b8284422.exe

          Filesize

          1.0MB

          MD5

          d4e5183193542eae08d6db8347b0b2f2

          SHA1

          8b863552656586e9576644516f7ed4231fc6ca87

          SHA256

          bc3bf7e049dcd2ea7ebebc5a3371adbf48ea4d81a652d0985efcb042c976cca8

          SHA512

          93e02f47709e3b80e38b22c9a793f5a9f75a7488c350fc2ce1048d7e1bdc3b00800dad8171234e5e916e6bb1acc094285e4f691f0cd782657ed30978e7484eb6

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b8284422.exe

          Filesize

          1.0MB

          MD5

          d4e5183193542eae08d6db8347b0b2f2

          SHA1

          8b863552656586e9576644516f7ed4231fc6ca87

          SHA256

          bc3bf7e049dcd2ea7ebebc5a3371adbf48ea4d81a652d0985efcb042c976cca8

          SHA512

          93e02f47709e3b80e38b22c9a793f5a9f75a7488c350fc2ce1048d7e1bdc3b00800dad8171234e5e916e6bb1acc094285e4f691f0cd782657ed30978e7484eb6

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b8284422.exe

          Filesize

          1.0MB

          MD5

          d4e5183193542eae08d6db8347b0b2f2

          SHA1

          8b863552656586e9576644516f7ed4231fc6ca87

          SHA256

          bc3bf7e049dcd2ea7ebebc5a3371adbf48ea4d81a652d0985efcb042c976cca8

          SHA512

          93e02f47709e3b80e38b22c9a793f5a9f75a7488c350fc2ce1048d7e1bdc3b00800dad8171234e5e916e6bb1acc094285e4f691f0cd782657ed30978e7484eb6

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b8284422.exe

          Filesize

          1.0MB

          MD5

          d4e5183193542eae08d6db8347b0b2f2

          SHA1

          8b863552656586e9576644516f7ed4231fc6ca87

          SHA256

          bc3bf7e049dcd2ea7ebebc5a3371adbf48ea4d81a652d0985efcb042c976cca8

          SHA512

          93e02f47709e3b80e38b22c9a793f5a9f75a7488c350fc2ce1048d7e1bdc3b00800dad8171234e5e916e6bb1acc094285e4f691f0cd782657ed30978e7484eb6

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b8284422.exe

          Filesize

          1.0MB

          MD5

          d4e5183193542eae08d6db8347b0b2f2

          SHA1

          8b863552656586e9576644516f7ed4231fc6ca87

          SHA256

          bc3bf7e049dcd2ea7ebebc5a3371adbf48ea4d81a652d0985efcb042c976cca8

          SHA512

          93e02f47709e3b80e38b22c9a793f5a9f75a7488c350fc2ce1048d7e1bdc3b00800dad8171234e5e916e6bb1acc094285e4f691f0cd782657ed30978e7484eb6

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b8284422.exe

          Filesize

          1.0MB

          MD5

          d4e5183193542eae08d6db8347b0b2f2

          SHA1

          8b863552656586e9576644516f7ed4231fc6ca87

          SHA256

          bc3bf7e049dcd2ea7ebebc5a3371adbf48ea4d81a652d0985efcb042c976cca8

          SHA512

          93e02f47709e3b80e38b22c9a793f5a9f75a7488c350fc2ce1048d7e1bdc3b00800dad8171234e5e916e6bb1acc094285e4f691f0cd782657ed30978e7484eb6

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b8284422.exe

          Filesize

          1.0MB

          MD5

          d4e5183193542eae08d6db8347b0b2f2

          SHA1

          8b863552656586e9576644516f7ed4231fc6ca87

          SHA256

          bc3bf7e049dcd2ea7ebebc5a3371adbf48ea4d81a652d0985efcb042c976cca8

          SHA512

          93e02f47709e3b80e38b22c9a793f5a9f75a7488c350fc2ce1048d7e1bdc3b00800dad8171234e5e916e6bb1acc094285e4f691f0cd782657ed30978e7484eb6

        • memory/1936-54-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1936-53-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1936-51-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1936-56-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1936-58-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1936-59-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1936-60-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/1936-61-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1936-63-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1936-65-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2712-41-0x000007FEF5410000-0x000007FEF5DFC000-memory.dmp

          Filesize

          9.9MB

        • memory/2712-40-0x000007FEF5410000-0x000007FEF5DFC000-memory.dmp

          Filesize

          9.9MB

        • memory/2712-39-0x000007FEF5410000-0x000007FEF5DFC000-memory.dmp

          Filesize

          9.9MB

        • memory/2712-38-0x0000000000D00000-0x0000000000D0A000-memory.dmp

          Filesize

          40KB