Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    156s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 08:28

General

  • Target

    file.exe

  • Size

    1.3MB

  • MD5

    a51f2a618f03f89330ea04e10bd641f5

  • SHA1

    0bfa08735330688d90ad5ea247f7ee828d6aa24d

  • SHA256

    02a6140ef4bb80d193b02621309b21b7519dfbd768b608f30bd2391b8911a993

  • SHA512

    bec91dbbeed05413e43428696acd4fbdf75c68b0de4c4a515b35e344b7bc740385be82dcefd968bf85a1a02e269101cfc0bb2887242852dac56518f89ada4663

  • SSDEEP

    24576:OyUEQAEJQ7o+xQQCKsXl79X0T08gs760g4IWp8UVSwsZYUrz1U:dUEQAErT179X0g8LlVVSwKVZ

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0848204.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0848204.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3961873.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3961873.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2157350.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2157350.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2464
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0610557.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0610557.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2548
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8771626.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8771626.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:572
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1012
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 268
                7⤵
                • Program crash
                PID:524
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 268
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0848204.exe

    Filesize

    1.2MB

    MD5

    2e1d7e45dc89b0112eb241a1bf4718db

    SHA1

    49b47ec8c40294e457f36915b09bf197b4300348

    SHA256

    b0e62ca0d260ad653c0357f7ce073b5fbe90f58c402b5cb2d29d38bcbacad112

    SHA512

    df8b3dfe672dd40e3f41400eb5229666f74db7bbbcefc76504df2947d5c889f1c51aec077e98a1f075e15368f58c5ced4fb2fbc5faa8c05599821a37432ad075

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0848204.exe

    Filesize

    1.2MB

    MD5

    2e1d7e45dc89b0112eb241a1bf4718db

    SHA1

    49b47ec8c40294e457f36915b09bf197b4300348

    SHA256

    b0e62ca0d260ad653c0357f7ce073b5fbe90f58c402b5cb2d29d38bcbacad112

    SHA512

    df8b3dfe672dd40e3f41400eb5229666f74db7bbbcefc76504df2947d5c889f1c51aec077e98a1f075e15368f58c5ced4fb2fbc5faa8c05599821a37432ad075

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3961873.exe

    Filesize

    836KB

    MD5

    9e41c9166655bf9da9fd5c7ecaa8c623

    SHA1

    25c2879943a82113f2b4a64e9a44f5daf3479991

    SHA256

    79ce1078fa4cc423adf363b315d3f87e41e6d975841bf25303ab860101b1644c

    SHA512

    d7d336ae3da540a55fd5e62040a47caa3c9b8f781b4613e9f092bf38f294234d15e790e2b35a1dd6e4ed3a64421e3fead7e293025acb0f01e96af76306de478e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3961873.exe

    Filesize

    836KB

    MD5

    9e41c9166655bf9da9fd5c7ecaa8c623

    SHA1

    25c2879943a82113f2b4a64e9a44f5daf3479991

    SHA256

    79ce1078fa4cc423adf363b315d3f87e41e6d975841bf25303ab860101b1644c

    SHA512

    d7d336ae3da540a55fd5e62040a47caa3c9b8f781b4613e9f092bf38f294234d15e790e2b35a1dd6e4ed3a64421e3fead7e293025acb0f01e96af76306de478e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2157350.exe

    Filesize

    475KB

    MD5

    50ec41c3009243506426482a8e1d9cb8

    SHA1

    fd22cdf40038885cc871c71927d2a8c5e4e307d2

    SHA256

    083041560c46584bf8d0d27ddd096572824126c1e0fe5b68e9e0219da5986cc2

    SHA512

    5faf672124a6fbba27c74c0bfabbc2bd452a3c20ecca6668e342f38660f1a28143baf09cea328b107fdb9a1af9eada0c41bd22b99c47424f4220021274651b04

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2157350.exe

    Filesize

    475KB

    MD5

    50ec41c3009243506426482a8e1d9cb8

    SHA1

    fd22cdf40038885cc871c71927d2a8c5e4e307d2

    SHA256

    083041560c46584bf8d0d27ddd096572824126c1e0fe5b68e9e0219da5986cc2

    SHA512

    5faf672124a6fbba27c74c0bfabbc2bd452a3c20ecca6668e342f38660f1a28143baf09cea328b107fdb9a1af9eada0c41bd22b99c47424f4220021274651b04

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0610557.exe

    Filesize

    11KB

    MD5

    d9df96e81b1268ea050163e53d8ffde3

    SHA1

    ec163044735347804f92ff2d9a7c6f891835e623

    SHA256

    bc718079551d5e7fbf9e0cea0857b2341e4d532d1fdad7e6807157f5058c3abe

    SHA512

    7e4d94f38c55a108b6725213f6afce595061da0b9a89cff93e5c0920636550d0da171bf2df4b65938cf697b2b7bc4b7d079433d365a4c5e7d6bd73ebd3481a5e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0610557.exe

    Filesize

    11KB

    MD5

    d9df96e81b1268ea050163e53d8ffde3

    SHA1

    ec163044735347804f92ff2d9a7c6f891835e623

    SHA256

    bc718079551d5e7fbf9e0cea0857b2341e4d532d1fdad7e6807157f5058c3abe

    SHA512

    7e4d94f38c55a108b6725213f6afce595061da0b9a89cff93e5c0920636550d0da171bf2df4b65938cf697b2b7bc4b7d079433d365a4c5e7d6bd73ebd3481a5e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8771626.exe

    Filesize

    1.0MB

    MD5

    1e242f585ecbd91652920a22195ffccb

    SHA1

    43000e195af2ed6b5c417e0477a2c5b9ed862218

    SHA256

    3e0b6ce5ca68d029e05fd4deb321ee9e0ec5c98740df1e20cd7d87f3343fe2a0

    SHA512

    07618d3776038262c5e17b2239f829be7a974b8363ae65b79b5c9a41e1ecdd0eb32271afbaa3caae4a8a878a06b038d726493532b1ffa9793c30d3b6cec727a0

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8771626.exe

    Filesize

    1.0MB

    MD5

    1e242f585ecbd91652920a22195ffccb

    SHA1

    43000e195af2ed6b5c417e0477a2c5b9ed862218

    SHA256

    3e0b6ce5ca68d029e05fd4deb321ee9e0ec5c98740df1e20cd7d87f3343fe2a0

    SHA512

    07618d3776038262c5e17b2239f829be7a974b8363ae65b79b5c9a41e1ecdd0eb32271afbaa3caae4a8a878a06b038d726493532b1ffa9793c30d3b6cec727a0

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8771626.exe

    Filesize

    1.0MB

    MD5

    1e242f585ecbd91652920a22195ffccb

    SHA1

    43000e195af2ed6b5c417e0477a2c5b9ed862218

    SHA256

    3e0b6ce5ca68d029e05fd4deb321ee9e0ec5c98740df1e20cd7d87f3343fe2a0

    SHA512

    07618d3776038262c5e17b2239f829be7a974b8363ae65b79b5c9a41e1ecdd0eb32271afbaa3caae4a8a878a06b038d726493532b1ffa9793c30d3b6cec727a0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v0848204.exe

    Filesize

    1.2MB

    MD5

    2e1d7e45dc89b0112eb241a1bf4718db

    SHA1

    49b47ec8c40294e457f36915b09bf197b4300348

    SHA256

    b0e62ca0d260ad653c0357f7ce073b5fbe90f58c402b5cb2d29d38bcbacad112

    SHA512

    df8b3dfe672dd40e3f41400eb5229666f74db7bbbcefc76504df2947d5c889f1c51aec077e98a1f075e15368f58c5ced4fb2fbc5faa8c05599821a37432ad075

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v0848204.exe

    Filesize

    1.2MB

    MD5

    2e1d7e45dc89b0112eb241a1bf4718db

    SHA1

    49b47ec8c40294e457f36915b09bf197b4300348

    SHA256

    b0e62ca0d260ad653c0357f7ce073b5fbe90f58c402b5cb2d29d38bcbacad112

    SHA512

    df8b3dfe672dd40e3f41400eb5229666f74db7bbbcefc76504df2947d5c889f1c51aec077e98a1f075e15368f58c5ced4fb2fbc5faa8c05599821a37432ad075

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v3961873.exe

    Filesize

    836KB

    MD5

    9e41c9166655bf9da9fd5c7ecaa8c623

    SHA1

    25c2879943a82113f2b4a64e9a44f5daf3479991

    SHA256

    79ce1078fa4cc423adf363b315d3f87e41e6d975841bf25303ab860101b1644c

    SHA512

    d7d336ae3da540a55fd5e62040a47caa3c9b8f781b4613e9f092bf38f294234d15e790e2b35a1dd6e4ed3a64421e3fead7e293025acb0f01e96af76306de478e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v3961873.exe

    Filesize

    836KB

    MD5

    9e41c9166655bf9da9fd5c7ecaa8c623

    SHA1

    25c2879943a82113f2b4a64e9a44f5daf3479991

    SHA256

    79ce1078fa4cc423adf363b315d3f87e41e6d975841bf25303ab860101b1644c

    SHA512

    d7d336ae3da540a55fd5e62040a47caa3c9b8f781b4613e9f092bf38f294234d15e790e2b35a1dd6e4ed3a64421e3fead7e293025acb0f01e96af76306de478e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v2157350.exe

    Filesize

    475KB

    MD5

    50ec41c3009243506426482a8e1d9cb8

    SHA1

    fd22cdf40038885cc871c71927d2a8c5e4e307d2

    SHA256

    083041560c46584bf8d0d27ddd096572824126c1e0fe5b68e9e0219da5986cc2

    SHA512

    5faf672124a6fbba27c74c0bfabbc2bd452a3c20ecca6668e342f38660f1a28143baf09cea328b107fdb9a1af9eada0c41bd22b99c47424f4220021274651b04

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v2157350.exe

    Filesize

    475KB

    MD5

    50ec41c3009243506426482a8e1d9cb8

    SHA1

    fd22cdf40038885cc871c71927d2a8c5e4e307d2

    SHA256

    083041560c46584bf8d0d27ddd096572824126c1e0fe5b68e9e0219da5986cc2

    SHA512

    5faf672124a6fbba27c74c0bfabbc2bd452a3c20ecca6668e342f38660f1a28143baf09cea328b107fdb9a1af9eada0c41bd22b99c47424f4220021274651b04

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a0610557.exe

    Filesize

    11KB

    MD5

    d9df96e81b1268ea050163e53d8ffde3

    SHA1

    ec163044735347804f92ff2d9a7c6f891835e623

    SHA256

    bc718079551d5e7fbf9e0cea0857b2341e4d532d1fdad7e6807157f5058c3abe

    SHA512

    7e4d94f38c55a108b6725213f6afce595061da0b9a89cff93e5c0920636550d0da171bf2df4b65938cf697b2b7bc4b7d079433d365a4c5e7d6bd73ebd3481a5e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b8771626.exe

    Filesize

    1.0MB

    MD5

    1e242f585ecbd91652920a22195ffccb

    SHA1

    43000e195af2ed6b5c417e0477a2c5b9ed862218

    SHA256

    3e0b6ce5ca68d029e05fd4deb321ee9e0ec5c98740df1e20cd7d87f3343fe2a0

    SHA512

    07618d3776038262c5e17b2239f829be7a974b8363ae65b79b5c9a41e1ecdd0eb32271afbaa3caae4a8a878a06b038d726493532b1ffa9793c30d3b6cec727a0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b8771626.exe

    Filesize

    1.0MB

    MD5

    1e242f585ecbd91652920a22195ffccb

    SHA1

    43000e195af2ed6b5c417e0477a2c5b9ed862218

    SHA256

    3e0b6ce5ca68d029e05fd4deb321ee9e0ec5c98740df1e20cd7d87f3343fe2a0

    SHA512

    07618d3776038262c5e17b2239f829be7a974b8363ae65b79b5c9a41e1ecdd0eb32271afbaa3caae4a8a878a06b038d726493532b1ffa9793c30d3b6cec727a0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b8771626.exe

    Filesize

    1.0MB

    MD5

    1e242f585ecbd91652920a22195ffccb

    SHA1

    43000e195af2ed6b5c417e0477a2c5b9ed862218

    SHA256

    3e0b6ce5ca68d029e05fd4deb321ee9e0ec5c98740df1e20cd7d87f3343fe2a0

    SHA512

    07618d3776038262c5e17b2239f829be7a974b8363ae65b79b5c9a41e1ecdd0eb32271afbaa3caae4a8a878a06b038d726493532b1ffa9793c30d3b6cec727a0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b8771626.exe

    Filesize

    1.0MB

    MD5

    1e242f585ecbd91652920a22195ffccb

    SHA1

    43000e195af2ed6b5c417e0477a2c5b9ed862218

    SHA256

    3e0b6ce5ca68d029e05fd4deb321ee9e0ec5c98740df1e20cd7d87f3343fe2a0

    SHA512

    07618d3776038262c5e17b2239f829be7a974b8363ae65b79b5c9a41e1ecdd0eb32271afbaa3caae4a8a878a06b038d726493532b1ffa9793c30d3b6cec727a0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b8771626.exe

    Filesize

    1.0MB

    MD5

    1e242f585ecbd91652920a22195ffccb

    SHA1

    43000e195af2ed6b5c417e0477a2c5b9ed862218

    SHA256

    3e0b6ce5ca68d029e05fd4deb321ee9e0ec5c98740df1e20cd7d87f3343fe2a0

    SHA512

    07618d3776038262c5e17b2239f829be7a974b8363ae65b79b5c9a41e1ecdd0eb32271afbaa3caae4a8a878a06b038d726493532b1ffa9793c30d3b6cec727a0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b8771626.exe

    Filesize

    1.0MB

    MD5

    1e242f585ecbd91652920a22195ffccb

    SHA1

    43000e195af2ed6b5c417e0477a2c5b9ed862218

    SHA256

    3e0b6ce5ca68d029e05fd4deb321ee9e0ec5c98740df1e20cd7d87f3343fe2a0

    SHA512

    07618d3776038262c5e17b2239f829be7a974b8363ae65b79b5c9a41e1ecdd0eb32271afbaa3caae4a8a878a06b038d726493532b1ffa9793c30d3b6cec727a0

  • memory/1012-53-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1012-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1012-52-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1012-62-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1012-54-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1012-55-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1012-56-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1012-51-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1012-58-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1012-60-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2548-41-0x000007FEF52C0000-0x000007FEF5CAC000-memory.dmp

    Filesize

    9.9MB

  • memory/2548-40-0x0000000000EC0000-0x0000000000ECA000-memory.dmp

    Filesize

    40KB

  • memory/2548-39-0x000007FEF52C0000-0x000007FEF5CAC000-memory.dmp

    Filesize

    9.9MB

  • memory/2548-38-0x000007FEF52C0000-0x000007FEF5CAC000-memory.dmp

    Filesize

    9.9MB