Analysis

  • max time kernel
    0s
  • max time network
    13s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 18:05

Errors

Reason
Machine shutdown

General

  • Target

    10f472a1b5799a09ae60fd901a10125c8eed6220bdbed49cfa301962e7972837.exe

  • Size

    235KB

  • MD5

    ee5e79d00a13fde9e96a1f9953f35fea

  • SHA1

    788be8b6304f138f5c7bdf00fe98562de6f2790d

  • SHA256

    10f472a1b5799a09ae60fd901a10125c8eed6220bdbed49cfa301962e7972837

  • SHA512

    26b1209bb16d6e5ed3dabe6fc18e6ec425197ecfd26f2038d9d796cff93d25597c774ca01fec5d975457ef7e544b9d7f7d09372e391c1823b4a7e3bcf94d0c49

  • SSDEEP

    6144:KCy+bnr+0p0yN90QEdHyEL9MR1SKgfYLNYs1Ul8C2N:6Mrcy90zgoYLWs6l8V

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10f472a1b5799a09ae60fd901a10125c8eed6220bdbed49cfa301962e7972837.exe
    "C:\Users\Admin\AppData\Local\Temp\10f472a1b5799a09ae60fd901a10125c8eed6220bdbed49cfa301962e7972837.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a6528505.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a6528505.exe
      2⤵
      • Executes dropped EXE
      PID:3688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a6528505.exe

    Filesize

    13KB

    MD5

    84bab76f53d09527ab0783ba2ece2e2e

    SHA1

    bfdc2db1addb613025d32d8a288fc7b70b8b22ee

    SHA256

    8f1eae62ef850d5a0a78054f853cbbe4c3b547bfc34ee890746405cee8bbfe95

    SHA512

    45f0fa0cf107c116e6bd6e8145cfa5580cc007c3755e5b290f5aede15e195c83e296b90d4a6bbbbd619dfdb98168569c2efe8f2e4c9c5a7083a849ed65c670c9

  • memory/3688-7-0x0000000000D90000-0x0000000000D9A000-memory.dmp

    Filesize

    40KB

  • memory/3688-8-0x00007FF9508B3000-0x00007FF9508B5000-memory.dmp

    Filesize

    8KB