Analysis

  • max time kernel
    118s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 11:59

General

  • Target

    782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe

  • Size

    2.6MB

  • MD5

    417d0554c7f79458682763044a771084

  • SHA1

    31386b623d1c36613dcd48bdc2ab5a1edf19edf4

  • SHA256

    782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22

  • SHA512

    07f21621add8483f9eb3a3d23d5c7c0f5109942c1e07422f0549297fa749f88e9e30f937f67978494de0b6eebc4f16fc0ae74013b5ec8bae30454d969599414b

  • SSDEEP

    49152:T99i4yt//gvNQFuYqXXA/jnalIsazERbh1gd53nHVQgTlUlI2TWrCTnyHBpsJfQ:IpGnMjakzqlS3vTx2+CLyHBpH

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe
    "C:\Users\Admin\AppData\Local\Temp\782f8703b8de46e53a653e4298028b85b89e78068e40ff3d2cd52d4e9fda7e22.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:340
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:604
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5360434.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5360434.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2096
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3423245.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3423245.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2616
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4451620.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4451620.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2700
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7023018.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7023018.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2660
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2192
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 268
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2160
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 340 -s 92
      2⤵
      • Program crash
      PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5360434.exe

    Filesize

    1.0MB

    MD5

    8a68e904f64205e2ec90e43db3a7a1e8

    SHA1

    9f88b17311ff3c4c44e0405a087f4f3e0b2c5592

    SHA256

    01f5b5d2e5a93f576849694301925d10346b23ccd3de818874a2e22456ebec03

    SHA512

    f66efecaab7a11df1737233f34ff452429460c0ce59c1bd676135addbbf526274701945bcffdbfda0b71d7a25467e539f1cee17374c45df590f352a0dc4a5593

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5360434.exe

    Filesize

    1.0MB

    MD5

    8a68e904f64205e2ec90e43db3a7a1e8

    SHA1

    9f88b17311ff3c4c44e0405a087f4f3e0b2c5592

    SHA256

    01f5b5d2e5a93f576849694301925d10346b23ccd3de818874a2e22456ebec03

    SHA512

    f66efecaab7a11df1737233f34ff452429460c0ce59c1bd676135addbbf526274701945bcffdbfda0b71d7a25467e539f1cee17374c45df590f352a0dc4a5593

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3423245.exe

    Filesize

    651KB

    MD5

    cd7d55036ef681f7602230d5979b2879

    SHA1

    f0f46779d35477fe49115f2ef026cfcf88aa6a77

    SHA256

    cdf5ec87525bc001e32d828516442f1ff8ea9020638c51c722780d3792232aba

    SHA512

    bc7b77d8ea1fd90b4cc8cdf117f5ff154671b377bcd89b94f0722303525ded8b66920369107728aa79feb83b0a9fdfcaa416a97200b5e72b8eba23971e6410e6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3423245.exe

    Filesize

    651KB

    MD5

    cd7d55036ef681f7602230d5979b2879

    SHA1

    f0f46779d35477fe49115f2ef026cfcf88aa6a77

    SHA256

    cdf5ec87525bc001e32d828516442f1ff8ea9020638c51c722780d3792232aba

    SHA512

    bc7b77d8ea1fd90b4cc8cdf117f5ff154671b377bcd89b94f0722303525ded8b66920369107728aa79feb83b0a9fdfcaa416a97200b5e72b8eba23971e6410e6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4451620.exe

    Filesize

    465KB

    MD5

    8c768f79fb1012d8ec1474d97960b8cd

    SHA1

    b6427a45aec52e24a1efd5130ddba5e2ae17511d

    SHA256

    66aa96f30c7de00f8f75d2340922990acd0b43403e37b8073f516c45341f634e

    SHA512

    56ba9e8c7502916c5e598248f112df14fd69891e9082088fe386601cbed7edf38276a13a0babfd946ba08fa9e8cb8f6aea32395ba78190d77ea5b4bdfbdee5df

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4451620.exe

    Filesize

    465KB

    MD5

    8c768f79fb1012d8ec1474d97960b8cd

    SHA1

    b6427a45aec52e24a1efd5130ddba5e2ae17511d

    SHA256

    66aa96f30c7de00f8f75d2340922990acd0b43403e37b8073f516c45341f634e

    SHA512

    56ba9e8c7502916c5e598248f112df14fd69891e9082088fe386601cbed7edf38276a13a0babfd946ba08fa9e8cb8f6aea32395ba78190d77ea5b4bdfbdee5df

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7023018.exe

    Filesize

    899KB

    MD5

    89c946869f131eb7d37e928860bfeff8

    SHA1

    90237a4510913c03d142c917988dfa46081661d2

    SHA256

    d8c622d3af0187737e1a5c515d413cdb3112f508a4b633a430d62d6b278351f7

    SHA512

    5ddb24bb72ee8ff2ef6d7df9735cfe2f8b55ed859ea3f663d2280a8fc18f4ce2501be7545718ac3034de61060645ffe0e4fb7d3f30fb82696ce68f300c294621

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7023018.exe

    Filesize

    899KB

    MD5

    89c946869f131eb7d37e928860bfeff8

    SHA1

    90237a4510913c03d142c917988dfa46081661d2

    SHA256

    d8c622d3af0187737e1a5c515d413cdb3112f508a4b633a430d62d6b278351f7

    SHA512

    5ddb24bb72ee8ff2ef6d7df9735cfe2f8b55ed859ea3f663d2280a8fc18f4ce2501be7545718ac3034de61060645ffe0e4fb7d3f30fb82696ce68f300c294621

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7023018.exe

    Filesize

    899KB

    MD5

    89c946869f131eb7d37e928860bfeff8

    SHA1

    90237a4510913c03d142c917988dfa46081661d2

    SHA256

    d8c622d3af0187737e1a5c515d413cdb3112f508a4b633a430d62d6b278351f7

    SHA512

    5ddb24bb72ee8ff2ef6d7df9735cfe2f8b55ed859ea3f663d2280a8fc18f4ce2501be7545718ac3034de61060645ffe0e4fb7d3f30fb82696ce68f300c294621

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5360434.exe

    Filesize

    1.0MB

    MD5

    8a68e904f64205e2ec90e43db3a7a1e8

    SHA1

    9f88b17311ff3c4c44e0405a087f4f3e0b2c5592

    SHA256

    01f5b5d2e5a93f576849694301925d10346b23ccd3de818874a2e22456ebec03

    SHA512

    f66efecaab7a11df1737233f34ff452429460c0ce59c1bd676135addbbf526274701945bcffdbfda0b71d7a25467e539f1cee17374c45df590f352a0dc4a5593

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5360434.exe

    Filesize

    1.0MB

    MD5

    8a68e904f64205e2ec90e43db3a7a1e8

    SHA1

    9f88b17311ff3c4c44e0405a087f4f3e0b2c5592

    SHA256

    01f5b5d2e5a93f576849694301925d10346b23ccd3de818874a2e22456ebec03

    SHA512

    f66efecaab7a11df1737233f34ff452429460c0ce59c1bd676135addbbf526274701945bcffdbfda0b71d7a25467e539f1cee17374c45df590f352a0dc4a5593

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x3423245.exe

    Filesize

    651KB

    MD5

    cd7d55036ef681f7602230d5979b2879

    SHA1

    f0f46779d35477fe49115f2ef026cfcf88aa6a77

    SHA256

    cdf5ec87525bc001e32d828516442f1ff8ea9020638c51c722780d3792232aba

    SHA512

    bc7b77d8ea1fd90b4cc8cdf117f5ff154671b377bcd89b94f0722303525ded8b66920369107728aa79feb83b0a9fdfcaa416a97200b5e72b8eba23971e6410e6

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x3423245.exe

    Filesize

    651KB

    MD5

    cd7d55036ef681f7602230d5979b2879

    SHA1

    f0f46779d35477fe49115f2ef026cfcf88aa6a77

    SHA256

    cdf5ec87525bc001e32d828516442f1ff8ea9020638c51c722780d3792232aba

    SHA512

    bc7b77d8ea1fd90b4cc8cdf117f5ff154671b377bcd89b94f0722303525ded8b66920369107728aa79feb83b0a9fdfcaa416a97200b5e72b8eba23971e6410e6

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x4451620.exe

    Filesize

    465KB

    MD5

    8c768f79fb1012d8ec1474d97960b8cd

    SHA1

    b6427a45aec52e24a1efd5130ddba5e2ae17511d

    SHA256

    66aa96f30c7de00f8f75d2340922990acd0b43403e37b8073f516c45341f634e

    SHA512

    56ba9e8c7502916c5e598248f112df14fd69891e9082088fe386601cbed7edf38276a13a0babfd946ba08fa9e8cb8f6aea32395ba78190d77ea5b4bdfbdee5df

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x4451620.exe

    Filesize

    465KB

    MD5

    8c768f79fb1012d8ec1474d97960b8cd

    SHA1

    b6427a45aec52e24a1efd5130ddba5e2ae17511d

    SHA256

    66aa96f30c7de00f8f75d2340922990acd0b43403e37b8073f516c45341f634e

    SHA512

    56ba9e8c7502916c5e598248f112df14fd69891e9082088fe386601cbed7edf38276a13a0babfd946ba08fa9e8cb8f6aea32395ba78190d77ea5b4bdfbdee5df

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7023018.exe

    Filesize

    899KB

    MD5

    89c946869f131eb7d37e928860bfeff8

    SHA1

    90237a4510913c03d142c917988dfa46081661d2

    SHA256

    d8c622d3af0187737e1a5c515d413cdb3112f508a4b633a430d62d6b278351f7

    SHA512

    5ddb24bb72ee8ff2ef6d7df9735cfe2f8b55ed859ea3f663d2280a8fc18f4ce2501be7545718ac3034de61060645ffe0e4fb7d3f30fb82696ce68f300c294621

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7023018.exe

    Filesize

    899KB

    MD5

    89c946869f131eb7d37e928860bfeff8

    SHA1

    90237a4510913c03d142c917988dfa46081661d2

    SHA256

    d8c622d3af0187737e1a5c515d413cdb3112f508a4b633a430d62d6b278351f7

    SHA512

    5ddb24bb72ee8ff2ef6d7df9735cfe2f8b55ed859ea3f663d2280a8fc18f4ce2501be7545718ac3034de61060645ffe0e4fb7d3f30fb82696ce68f300c294621

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7023018.exe

    Filesize

    899KB

    MD5

    89c946869f131eb7d37e928860bfeff8

    SHA1

    90237a4510913c03d142c917988dfa46081661d2

    SHA256

    d8c622d3af0187737e1a5c515d413cdb3112f508a4b633a430d62d6b278351f7

    SHA512

    5ddb24bb72ee8ff2ef6d7df9735cfe2f8b55ed859ea3f663d2280a8fc18f4ce2501be7545718ac3034de61060645ffe0e4fb7d3f30fb82696ce68f300c294621

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7023018.exe

    Filesize

    899KB

    MD5

    89c946869f131eb7d37e928860bfeff8

    SHA1

    90237a4510913c03d142c917988dfa46081661d2

    SHA256

    d8c622d3af0187737e1a5c515d413cdb3112f508a4b633a430d62d6b278351f7

    SHA512

    5ddb24bb72ee8ff2ef6d7df9735cfe2f8b55ed859ea3f663d2280a8fc18f4ce2501be7545718ac3034de61060645ffe0e4fb7d3f30fb82696ce68f300c294621

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7023018.exe

    Filesize

    899KB

    MD5

    89c946869f131eb7d37e928860bfeff8

    SHA1

    90237a4510913c03d142c917988dfa46081661d2

    SHA256

    d8c622d3af0187737e1a5c515d413cdb3112f508a4b633a430d62d6b278351f7

    SHA512

    5ddb24bb72ee8ff2ef6d7df9735cfe2f8b55ed859ea3f663d2280a8fc18f4ce2501be7545718ac3034de61060645ffe0e4fb7d3f30fb82696ce68f300c294621

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7023018.exe

    Filesize

    899KB

    MD5

    89c946869f131eb7d37e928860bfeff8

    SHA1

    90237a4510913c03d142c917988dfa46081661d2

    SHA256

    d8c622d3af0187737e1a5c515d413cdb3112f508a4b633a430d62d6b278351f7

    SHA512

    5ddb24bb72ee8ff2ef6d7df9735cfe2f8b55ed859ea3f663d2280a8fc18f4ce2501be7545718ac3034de61060645ffe0e4fb7d3f30fb82696ce68f300c294621

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7023018.exe

    Filesize

    899KB

    MD5

    89c946869f131eb7d37e928860bfeff8

    SHA1

    90237a4510913c03d142c917988dfa46081661d2

    SHA256

    d8c622d3af0187737e1a5c515d413cdb3112f508a4b633a430d62d6b278351f7

    SHA512

    5ddb24bb72ee8ff2ef6d7df9735cfe2f8b55ed859ea3f663d2280a8fc18f4ce2501be7545718ac3034de61060645ffe0e4fb7d3f30fb82696ce68f300c294621

  • memory/604-17-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/604-5-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/604-16-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/604-14-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/604-12-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/604-11-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/604-9-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/604-75-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/604-1-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/604-3-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/604-0-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/604-7-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/2192-66-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2192-64-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2192-63-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2192-71-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2192-73-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2192-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2192-61-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB