Analysis

  • max time kernel
    240s
  • max time network
    287s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    17-10-2023 21:10

General

  • Target

    NEAS.2a08446266b425a3d75ce4716d7543e0_JC.exe

  • Size

    1.2MB

  • MD5

    2a08446266b425a3d75ce4716d7543e0

  • SHA1

    92c8163bb2ab5684936adb837978d25d0ecbc3f4

  • SHA256

    79a81e523b3975fb70a90dc17c117a1ddc587ca26fe5b812c1b5a0cf09f6736a

  • SHA512

    65bd5f3e828a26cbf8c794b4c9976102d0f3ff958815a9bf87fe821eb29534d4774f8905845316b8dc81d292a87a85701c1172c2266a85efdc509b09ae41d6ef

  • SSDEEP

    24576:hyTHiU0yUgvV0dmyJsPCYwjYukDJ4bAiELcxpolNk2:UmU0BgvV0jJsaYwHkt4bEcgNk

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.2a08446266b425a3d75ce4716d7543e0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.2a08446266b425a3d75ce4716d7543e0_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0371290.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0371290.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9970433.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9970433.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6446300.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6446300.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2564
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q1575803.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q1575803.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2580
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2976
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 268
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2808

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0371290.exe
    Filesize

    1.0MB

    MD5

    76b9573fc5aa2230b969a3b4a11259e2

    SHA1

    d395e22aa9e558484e4b55139c0e1622364a2e82

    SHA256

    f0aa7c93c4cfbc8384ca760314a1f611a330298861d92be38d5f8caad5b16ceb

    SHA512

    0d54678d144c0e210725bbdc30eef7a2f3fea8702bdad64e4ab4d9db13fd2d0de0fd0340fa1d0277af8c0ad41e638026015d66225145332bbdf52b3e3f0a1ea0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0371290.exe
    Filesize

    1.0MB

    MD5

    76b9573fc5aa2230b969a3b4a11259e2

    SHA1

    d395e22aa9e558484e4b55139c0e1622364a2e82

    SHA256

    f0aa7c93c4cfbc8384ca760314a1f611a330298861d92be38d5f8caad5b16ceb

    SHA512

    0d54678d144c0e210725bbdc30eef7a2f3fea8702bdad64e4ab4d9db13fd2d0de0fd0340fa1d0277af8c0ad41e638026015d66225145332bbdf52b3e3f0a1ea0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9970433.exe
    Filesize

    880KB

    MD5

    524338d3e4327fea8c52b3da4d2005e8

    SHA1

    90d679b4a7ec10cf5fe2240156226fded75ce8d0

    SHA256

    a10e36af16ddeeb7aaffea832977fbcf3eefac16e26ee4d497bce0a4c59b618e

    SHA512

    2044e479d7f1f2cadb3c9fc98ab4d2ade784f13d3edbefa392213dbb3c780e07c010d01e9a451356e7ff649060d5638ab715f756e58fa37bceb62232a7ae8810

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9970433.exe
    Filesize

    880KB

    MD5

    524338d3e4327fea8c52b3da4d2005e8

    SHA1

    90d679b4a7ec10cf5fe2240156226fded75ce8d0

    SHA256

    a10e36af16ddeeb7aaffea832977fbcf3eefac16e26ee4d497bce0a4c59b618e

    SHA512

    2044e479d7f1f2cadb3c9fc98ab4d2ade784f13d3edbefa392213dbb3c780e07c010d01e9a451356e7ff649060d5638ab715f756e58fa37bceb62232a7ae8810

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6446300.exe
    Filesize

    490KB

    MD5

    a269aeb55509715c071d68ac5d929e8a

    SHA1

    ab1d435685061fa873af1f52e0ae8a3547016547

    SHA256

    8d179a5660038a16dfd5dee3af6197edb5f046b037039461da3702019e326d7b

    SHA512

    3a796a6b8b85e431318d304447e29ffac80a9ec026ea68a453585d22425994f13f5a13de6883e3c59c4a4309e520b3c55098ef3bda68c2f7c0f265d1e1779832

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6446300.exe
    Filesize

    490KB

    MD5

    a269aeb55509715c071d68ac5d929e8a

    SHA1

    ab1d435685061fa873af1f52e0ae8a3547016547

    SHA256

    8d179a5660038a16dfd5dee3af6197edb5f046b037039461da3702019e326d7b

    SHA512

    3a796a6b8b85e431318d304447e29ffac80a9ec026ea68a453585d22425994f13f5a13de6883e3c59c4a4309e520b3c55098ef3bda68c2f7c0f265d1e1779832

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q1575803.exe
    Filesize

    860KB

    MD5

    cf37791334475813f263f72f6ad27c69

    SHA1

    12999d2bd6e5f0eb9642ca9836b901f130eb2564

    SHA256

    a1b7b342a99d7448c5bc141382a6cbd26dd65a518d668ffec46514c304894f15

    SHA512

    49d31bd4718bed8eb91a44f6a21bdd349f724926b3c78ca1e6fbe7a0c149e8859e4c9680b5332f36ea53a4267c3d4750395a2c293ef996e20e89632eff5aaa39

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q1575803.exe
    Filesize

    860KB

    MD5

    cf37791334475813f263f72f6ad27c69

    SHA1

    12999d2bd6e5f0eb9642ca9836b901f130eb2564

    SHA256

    a1b7b342a99d7448c5bc141382a6cbd26dd65a518d668ffec46514c304894f15

    SHA512

    49d31bd4718bed8eb91a44f6a21bdd349f724926b3c78ca1e6fbe7a0c149e8859e4c9680b5332f36ea53a4267c3d4750395a2c293ef996e20e89632eff5aaa39

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\q1575803.exe
    Filesize

    860KB

    MD5

    cf37791334475813f263f72f6ad27c69

    SHA1

    12999d2bd6e5f0eb9642ca9836b901f130eb2564

    SHA256

    a1b7b342a99d7448c5bc141382a6cbd26dd65a518d668ffec46514c304894f15

    SHA512

    49d31bd4718bed8eb91a44f6a21bdd349f724926b3c78ca1e6fbe7a0c149e8859e4c9680b5332f36ea53a4267c3d4750395a2c293ef996e20e89632eff5aaa39

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0371290.exe
    Filesize

    1.0MB

    MD5

    76b9573fc5aa2230b969a3b4a11259e2

    SHA1

    d395e22aa9e558484e4b55139c0e1622364a2e82

    SHA256

    f0aa7c93c4cfbc8384ca760314a1f611a330298861d92be38d5f8caad5b16ceb

    SHA512

    0d54678d144c0e210725bbdc30eef7a2f3fea8702bdad64e4ab4d9db13fd2d0de0fd0340fa1d0277af8c0ad41e638026015d66225145332bbdf52b3e3f0a1ea0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0371290.exe
    Filesize

    1.0MB

    MD5

    76b9573fc5aa2230b969a3b4a11259e2

    SHA1

    d395e22aa9e558484e4b55139c0e1622364a2e82

    SHA256

    f0aa7c93c4cfbc8384ca760314a1f611a330298861d92be38d5f8caad5b16ceb

    SHA512

    0d54678d144c0e210725bbdc30eef7a2f3fea8702bdad64e4ab4d9db13fd2d0de0fd0340fa1d0277af8c0ad41e638026015d66225145332bbdf52b3e3f0a1ea0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9970433.exe
    Filesize

    880KB

    MD5

    524338d3e4327fea8c52b3da4d2005e8

    SHA1

    90d679b4a7ec10cf5fe2240156226fded75ce8d0

    SHA256

    a10e36af16ddeeb7aaffea832977fbcf3eefac16e26ee4d497bce0a4c59b618e

    SHA512

    2044e479d7f1f2cadb3c9fc98ab4d2ade784f13d3edbefa392213dbb3c780e07c010d01e9a451356e7ff649060d5638ab715f756e58fa37bceb62232a7ae8810

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9970433.exe
    Filesize

    880KB

    MD5

    524338d3e4327fea8c52b3da4d2005e8

    SHA1

    90d679b4a7ec10cf5fe2240156226fded75ce8d0

    SHA256

    a10e36af16ddeeb7aaffea832977fbcf3eefac16e26ee4d497bce0a4c59b618e

    SHA512

    2044e479d7f1f2cadb3c9fc98ab4d2ade784f13d3edbefa392213dbb3c780e07c010d01e9a451356e7ff649060d5638ab715f756e58fa37bceb62232a7ae8810

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6446300.exe
    Filesize

    490KB

    MD5

    a269aeb55509715c071d68ac5d929e8a

    SHA1

    ab1d435685061fa873af1f52e0ae8a3547016547

    SHA256

    8d179a5660038a16dfd5dee3af6197edb5f046b037039461da3702019e326d7b

    SHA512

    3a796a6b8b85e431318d304447e29ffac80a9ec026ea68a453585d22425994f13f5a13de6883e3c59c4a4309e520b3c55098ef3bda68c2f7c0f265d1e1779832

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6446300.exe
    Filesize

    490KB

    MD5

    a269aeb55509715c071d68ac5d929e8a

    SHA1

    ab1d435685061fa873af1f52e0ae8a3547016547

    SHA256

    8d179a5660038a16dfd5dee3af6197edb5f046b037039461da3702019e326d7b

    SHA512

    3a796a6b8b85e431318d304447e29ffac80a9ec026ea68a453585d22425994f13f5a13de6883e3c59c4a4309e520b3c55098ef3bda68c2f7c0f265d1e1779832

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\q1575803.exe
    Filesize

    860KB

    MD5

    cf37791334475813f263f72f6ad27c69

    SHA1

    12999d2bd6e5f0eb9642ca9836b901f130eb2564

    SHA256

    a1b7b342a99d7448c5bc141382a6cbd26dd65a518d668ffec46514c304894f15

    SHA512

    49d31bd4718bed8eb91a44f6a21bdd349f724926b3c78ca1e6fbe7a0c149e8859e4c9680b5332f36ea53a4267c3d4750395a2c293ef996e20e89632eff5aaa39

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\q1575803.exe
    Filesize

    860KB

    MD5

    cf37791334475813f263f72f6ad27c69

    SHA1

    12999d2bd6e5f0eb9642ca9836b901f130eb2564

    SHA256

    a1b7b342a99d7448c5bc141382a6cbd26dd65a518d668ffec46514c304894f15

    SHA512

    49d31bd4718bed8eb91a44f6a21bdd349f724926b3c78ca1e6fbe7a0c149e8859e4c9680b5332f36ea53a4267c3d4750395a2c293ef996e20e89632eff5aaa39

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\q1575803.exe
    Filesize

    860KB

    MD5

    cf37791334475813f263f72f6ad27c69

    SHA1

    12999d2bd6e5f0eb9642ca9836b901f130eb2564

    SHA256

    a1b7b342a99d7448c5bc141382a6cbd26dd65a518d668ffec46514c304894f15

    SHA512

    49d31bd4718bed8eb91a44f6a21bdd349f724926b3c78ca1e6fbe7a0c149e8859e4c9680b5332f36ea53a4267c3d4750395a2c293ef996e20e89632eff5aaa39

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\q1575803.exe
    Filesize

    860KB

    MD5

    cf37791334475813f263f72f6ad27c69

    SHA1

    12999d2bd6e5f0eb9642ca9836b901f130eb2564

    SHA256

    a1b7b342a99d7448c5bc141382a6cbd26dd65a518d668ffec46514c304894f15

    SHA512

    49d31bd4718bed8eb91a44f6a21bdd349f724926b3c78ca1e6fbe7a0c149e8859e4c9680b5332f36ea53a4267c3d4750395a2c293ef996e20e89632eff5aaa39

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\q1575803.exe
    Filesize

    860KB

    MD5

    cf37791334475813f263f72f6ad27c69

    SHA1

    12999d2bd6e5f0eb9642ca9836b901f130eb2564

    SHA256

    a1b7b342a99d7448c5bc141382a6cbd26dd65a518d668ffec46514c304894f15

    SHA512

    49d31bd4718bed8eb91a44f6a21bdd349f724926b3c78ca1e6fbe7a0c149e8859e4c9680b5332f36ea53a4267c3d4750395a2c293ef996e20e89632eff5aaa39

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\q1575803.exe
    Filesize

    860KB

    MD5

    cf37791334475813f263f72f6ad27c69

    SHA1

    12999d2bd6e5f0eb9642ca9836b901f130eb2564

    SHA256

    a1b7b342a99d7448c5bc141382a6cbd26dd65a518d668ffec46514c304894f15

    SHA512

    49d31bd4718bed8eb91a44f6a21bdd349f724926b3c78ca1e6fbe7a0c149e8859e4c9680b5332f36ea53a4267c3d4750395a2c293ef996e20e89632eff5aaa39

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\q1575803.exe
    Filesize

    860KB

    MD5

    cf37791334475813f263f72f6ad27c69

    SHA1

    12999d2bd6e5f0eb9642ca9836b901f130eb2564

    SHA256

    a1b7b342a99d7448c5bc141382a6cbd26dd65a518d668ffec46514c304894f15

    SHA512

    49d31bd4718bed8eb91a44f6a21bdd349f724926b3c78ca1e6fbe7a0c149e8859e4c9680b5332f36ea53a4267c3d4750395a2c293ef996e20e89632eff5aaa39

  • memory/2976-47-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2976-43-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2976-52-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2976-54-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2976-45-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2976-50-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2976-48-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2976-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB