Analysis

  • max time kernel
    126s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 08:34

General

  • Target

    file.exe

  • Size

    1.3MB

  • MD5

    403a44c417c6bb48cefe477df134eca1

  • SHA1

    e60292baa731dea64a35f119a3ad036b9455eef7

  • SHA256

    c3bf03b6326fe69aafb7c573efb0ea371106e07e2e961f12becd58fdcc9f819f

  • SHA512

    ad6a426823354dc85d48cc2d778318f4a43611b0601b3de6683c18a48e677e5981d1d5e83418634ce3435e5c25a37b195ac2469cbcd646b4ee96ea9a95f504fd

  • SSDEEP

    24576:Ky0c5KUrqD6BLLT39wA6tA2TeM1Ko6CGWW7jqkelEpoYq4Ob4pcDRQx3LvROa:Rzu6heRA48o6CGFFgEp5UbzMLvR

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3780724.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3780724.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4728735.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4728735.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2068
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7663353.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7663353.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2192
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5370175.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5370175.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2332
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1870356.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1870356.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2848
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2776
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 268
                7⤵
                • Program crash
                PID:2536
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 268
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3780724.exe

    Filesize

    1.2MB

    MD5

    a9b38836c7d9201b00591d87a4ea8785

    SHA1

    10254090e374d23739013b0395729fd5ed578356

    SHA256

    4db9a45632acb95d3bc77355fe45a3d3cf255824ce5457da0fc841bcbf03d85d

    SHA512

    7244338e5da38dfa0ea996a69023afed8f4f09ab54701e379019488e4840f1da13df7d1fd8e5662c421dcf88c3ae896a220f250386cf398b86ab8fa561e87cf6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3780724.exe

    Filesize

    1.2MB

    MD5

    a9b38836c7d9201b00591d87a4ea8785

    SHA1

    10254090e374d23739013b0395729fd5ed578356

    SHA256

    4db9a45632acb95d3bc77355fe45a3d3cf255824ce5457da0fc841bcbf03d85d

    SHA512

    7244338e5da38dfa0ea996a69023afed8f4f09ab54701e379019488e4840f1da13df7d1fd8e5662c421dcf88c3ae896a220f250386cf398b86ab8fa561e87cf6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4728735.exe

    Filesize

    836KB

    MD5

    c47804a0eed5a2abbf80c32cdabb712c

    SHA1

    10ede31baeac35fc1acb5a145e045698b1c45bf9

    SHA256

    188266ac64a509641eb11289a21ae8b41e1a5afe4386d32de1419f56623d4ea9

    SHA512

    1d1f0990a79f69da310a61b64a895365acfd325627cf0dfb235fae3b2205422e480e35bd9d70282676ac3d18066d3f907adb5fa8b823941051869a00b20c35c3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4728735.exe

    Filesize

    836KB

    MD5

    c47804a0eed5a2abbf80c32cdabb712c

    SHA1

    10ede31baeac35fc1acb5a145e045698b1c45bf9

    SHA256

    188266ac64a509641eb11289a21ae8b41e1a5afe4386d32de1419f56623d4ea9

    SHA512

    1d1f0990a79f69da310a61b64a895365acfd325627cf0dfb235fae3b2205422e480e35bd9d70282676ac3d18066d3f907adb5fa8b823941051869a00b20c35c3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7663353.exe

    Filesize

    475KB

    MD5

    10d3ac327d202bf516ceedc458e6efe4

    SHA1

    91c05e8cebe4b799e1361e877cb1fc45dd89675b

    SHA256

    a3b4081814b2284ebdcd705978edf8d7a9e28b1537b1a61a3e8aafc7e8cfd54c

    SHA512

    9eff655a0edaae8f339654936334491e17de777a48cacf80180f7a5121a91fa79243f4f4aada699c31a0826b0b928e53d95e4192147eac59f151b31335c587a1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7663353.exe

    Filesize

    475KB

    MD5

    10d3ac327d202bf516ceedc458e6efe4

    SHA1

    91c05e8cebe4b799e1361e877cb1fc45dd89675b

    SHA256

    a3b4081814b2284ebdcd705978edf8d7a9e28b1537b1a61a3e8aafc7e8cfd54c

    SHA512

    9eff655a0edaae8f339654936334491e17de777a48cacf80180f7a5121a91fa79243f4f4aada699c31a0826b0b928e53d95e4192147eac59f151b31335c587a1

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5370175.exe

    Filesize

    11KB

    MD5

    c7aaadd3c5a95545168c78034e38ad43

    SHA1

    83bcb7c55598e0c2bff7d7784304bdd9171d82ca

    SHA256

    33324323524e53016d55a728a612dca9f26b763cd11c4ddc824b8b90b67dde30

    SHA512

    cd48fdae998db3248afef926a9ea355a763cf7f33cd1be21275af7725ea8afac4791d9ced928d6c71c8e4ade195c0e090dc3d8ca113a2cc35fec01a6cf266752

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5370175.exe

    Filesize

    11KB

    MD5

    c7aaadd3c5a95545168c78034e38ad43

    SHA1

    83bcb7c55598e0c2bff7d7784304bdd9171d82ca

    SHA256

    33324323524e53016d55a728a612dca9f26b763cd11c4ddc824b8b90b67dde30

    SHA512

    cd48fdae998db3248afef926a9ea355a763cf7f33cd1be21275af7725ea8afac4791d9ced928d6c71c8e4ade195c0e090dc3d8ca113a2cc35fec01a6cf266752

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1870356.exe

    Filesize

    1.0MB

    MD5

    c631d6067a23f7e3ed58af96d0008d1f

    SHA1

    ef162b1ff525624d709f29fb45adfb68138f1e31

    SHA256

    b5f614fb017442be1343d9c7834eee17c82315423fc92339964a431b001421ab

    SHA512

    33242ad03cadef8bde6750b25612b153e7ec5fc06996992834186a803fcde9e6293599dd34b6300624904e90c91497fe96507f3f5168c86eb44ccbdc4e8f7edf

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1870356.exe

    Filesize

    1.0MB

    MD5

    c631d6067a23f7e3ed58af96d0008d1f

    SHA1

    ef162b1ff525624d709f29fb45adfb68138f1e31

    SHA256

    b5f614fb017442be1343d9c7834eee17c82315423fc92339964a431b001421ab

    SHA512

    33242ad03cadef8bde6750b25612b153e7ec5fc06996992834186a803fcde9e6293599dd34b6300624904e90c91497fe96507f3f5168c86eb44ccbdc4e8f7edf

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1870356.exe

    Filesize

    1.0MB

    MD5

    c631d6067a23f7e3ed58af96d0008d1f

    SHA1

    ef162b1ff525624d709f29fb45adfb68138f1e31

    SHA256

    b5f614fb017442be1343d9c7834eee17c82315423fc92339964a431b001421ab

    SHA512

    33242ad03cadef8bde6750b25612b153e7ec5fc06996992834186a803fcde9e6293599dd34b6300624904e90c91497fe96507f3f5168c86eb44ccbdc4e8f7edf

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v3780724.exe

    Filesize

    1.2MB

    MD5

    a9b38836c7d9201b00591d87a4ea8785

    SHA1

    10254090e374d23739013b0395729fd5ed578356

    SHA256

    4db9a45632acb95d3bc77355fe45a3d3cf255824ce5457da0fc841bcbf03d85d

    SHA512

    7244338e5da38dfa0ea996a69023afed8f4f09ab54701e379019488e4840f1da13df7d1fd8e5662c421dcf88c3ae896a220f250386cf398b86ab8fa561e87cf6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v3780724.exe

    Filesize

    1.2MB

    MD5

    a9b38836c7d9201b00591d87a4ea8785

    SHA1

    10254090e374d23739013b0395729fd5ed578356

    SHA256

    4db9a45632acb95d3bc77355fe45a3d3cf255824ce5457da0fc841bcbf03d85d

    SHA512

    7244338e5da38dfa0ea996a69023afed8f4f09ab54701e379019488e4840f1da13df7d1fd8e5662c421dcf88c3ae896a220f250386cf398b86ab8fa561e87cf6

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v4728735.exe

    Filesize

    836KB

    MD5

    c47804a0eed5a2abbf80c32cdabb712c

    SHA1

    10ede31baeac35fc1acb5a145e045698b1c45bf9

    SHA256

    188266ac64a509641eb11289a21ae8b41e1a5afe4386d32de1419f56623d4ea9

    SHA512

    1d1f0990a79f69da310a61b64a895365acfd325627cf0dfb235fae3b2205422e480e35bd9d70282676ac3d18066d3f907adb5fa8b823941051869a00b20c35c3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v4728735.exe

    Filesize

    836KB

    MD5

    c47804a0eed5a2abbf80c32cdabb712c

    SHA1

    10ede31baeac35fc1acb5a145e045698b1c45bf9

    SHA256

    188266ac64a509641eb11289a21ae8b41e1a5afe4386d32de1419f56623d4ea9

    SHA512

    1d1f0990a79f69da310a61b64a895365acfd325627cf0dfb235fae3b2205422e480e35bd9d70282676ac3d18066d3f907adb5fa8b823941051869a00b20c35c3

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v7663353.exe

    Filesize

    475KB

    MD5

    10d3ac327d202bf516ceedc458e6efe4

    SHA1

    91c05e8cebe4b799e1361e877cb1fc45dd89675b

    SHA256

    a3b4081814b2284ebdcd705978edf8d7a9e28b1537b1a61a3e8aafc7e8cfd54c

    SHA512

    9eff655a0edaae8f339654936334491e17de777a48cacf80180f7a5121a91fa79243f4f4aada699c31a0826b0b928e53d95e4192147eac59f151b31335c587a1

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v7663353.exe

    Filesize

    475KB

    MD5

    10d3ac327d202bf516ceedc458e6efe4

    SHA1

    91c05e8cebe4b799e1361e877cb1fc45dd89675b

    SHA256

    a3b4081814b2284ebdcd705978edf8d7a9e28b1537b1a61a3e8aafc7e8cfd54c

    SHA512

    9eff655a0edaae8f339654936334491e17de777a48cacf80180f7a5121a91fa79243f4f4aada699c31a0826b0b928e53d95e4192147eac59f151b31335c587a1

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a5370175.exe

    Filesize

    11KB

    MD5

    c7aaadd3c5a95545168c78034e38ad43

    SHA1

    83bcb7c55598e0c2bff7d7784304bdd9171d82ca

    SHA256

    33324323524e53016d55a728a612dca9f26b763cd11c4ddc824b8b90b67dde30

    SHA512

    cd48fdae998db3248afef926a9ea355a763cf7f33cd1be21275af7725ea8afac4791d9ced928d6c71c8e4ade195c0e090dc3d8ca113a2cc35fec01a6cf266752

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b1870356.exe

    Filesize

    1.0MB

    MD5

    c631d6067a23f7e3ed58af96d0008d1f

    SHA1

    ef162b1ff525624d709f29fb45adfb68138f1e31

    SHA256

    b5f614fb017442be1343d9c7834eee17c82315423fc92339964a431b001421ab

    SHA512

    33242ad03cadef8bde6750b25612b153e7ec5fc06996992834186a803fcde9e6293599dd34b6300624904e90c91497fe96507f3f5168c86eb44ccbdc4e8f7edf

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b1870356.exe

    Filesize

    1.0MB

    MD5

    c631d6067a23f7e3ed58af96d0008d1f

    SHA1

    ef162b1ff525624d709f29fb45adfb68138f1e31

    SHA256

    b5f614fb017442be1343d9c7834eee17c82315423fc92339964a431b001421ab

    SHA512

    33242ad03cadef8bde6750b25612b153e7ec5fc06996992834186a803fcde9e6293599dd34b6300624904e90c91497fe96507f3f5168c86eb44ccbdc4e8f7edf

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b1870356.exe

    Filesize

    1.0MB

    MD5

    c631d6067a23f7e3ed58af96d0008d1f

    SHA1

    ef162b1ff525624d709f29fb45adfb68138f1e31

    SHA256

    b5f614fb017442be1343d9c7834eee17c82315423fc92339964a431b001421ab

    SHA512

    33242ad03cadef8bde6750b25612b153e7ec5fc06996992834186a803fcde9e6293599dd34b6300624904e90c91497fe96507f3f5168c86eb44ccbdc4e8f7edf

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b1870356.exe

    Filesize

    1.0MB

    MD5

    c631d6067a23f7e3ed58af96d0008d1f

    SHA1

    ef162b1ff525624d709f29fb45adfb68138f1e31

    SHA256

    b5f614fb017442be1343d9c7834eee17c82315423fc92339964a431b001421ab

    SHA512

    33242ad03cadef8bde6750b25612b153e7ec5fc06996992834186a803fcde9e6293599dd34b6300624904e90c91497fe96507f3f5168c86eb44ccbdc4e8f7edf

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b1870356.exe

    Filesize

    1.0MB

    MD5

    c631d6067a23f7e3ed58af96d0008d1f

    SHA1

    ef162b1ff525624d709f29fb45adfb68138f1e31

    SHA256

    b5f614fb017442be1343d9c7834eee17c82315423fc92339964a431b001421ab

    SHA512

    33242ad03cadef8bde6750b25612b153e7ec5fc06996992834186a803fcde9e6293599dd34b6300624904e90c91497fe96507f3f5168c86eb44ccbdc4e8f7edf

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b1870356.exe

    Filesize

    1.0MB

    MD5

    c631d6067a23f7e3ed58af96d0008d1f

    SHA1

    ef162b1ff525624d709f29fb45adfb68138f1e31

    SHA256

    b5f614fb017442be1343d9c7834eee17c82315423fc92339964a431b001421ab

    SHA512

    33242ad03cadef8bde6750b25612b153e7ec5fc06996992834186a803fcde9e6293599dd34b6300624904e90c91497fe96507f3f5168c86eb44ccbdc4e8f7edf

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\b1870356.exe

    Filesize

    1.0MB

    MD5

    c631d6067a23f7e3ed58af96d0008d1f

    SHA1

    ef162b1ff525624d709f29fb45adfb68138f1e31

    SHA256

    b5f614fb017442be1343d9c7834eee17c82315423fc92339964a431b001421ab

    SHA512

    33242ad03cadef8bde6750b25612b153e7ec5fc06996992834186a803fcde9e6293599dd34b6300624904e90c91497fe96507f3f5168c86eb44ccbdc4e8f7edf

  • memory/2332-41-0x000007FEF5F70000-0x000007FEF695C000-memory.dmp

    Filesize

    9.9MB

  • memory/2332-40-0x000007FEF5F70000-0x000007FEF695C000-memory.dmp

    Filesize

    9.9MB

  • memory/2332-38-0x000007FEF5F70000-0x000007FEF695C000-memory.dmp

    Filesize

    9.9MB

  • memory/2332-39-0x0000000000F40000-0x0000000000F4A000-memory.dmp

    Filesize

    40KB

  • memory/2776-58-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2776-56-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2776-57-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2776-52-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2776-60-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2776-62-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2776-51-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2776-53-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2776-55-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2776-54-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB