Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-09-2022 08:18
Static task
static1
Behavioral task
behavioral1
Sample
Heart-Sender Priv8 Version/Heart-Sender-V1.2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Heart-Sender Priv8 Version/Heart-Sender-V1.2.exe
Resource
win10-20220901-en
Behavioral task
behavioral3
Sample
Heart-Sender Priv8 Version/Heart-Sender-V1.2.exe
Resource
win10v2004-20220812-en
General
-
Target
Heart-Sender Priv8 Version/Heart-Sender-V1.2.exe
-
Size
1.5MB
-
MD5
175d1484e55c5b6f16bff5631b92c171
-
SHA1
b11901746a8143c558877ea42dfa1221874bfba5
-
SHA256
7119d9570d888f5ffcb8f3c54d8d962fc87d83fbdd34c96b951acb3d2889777f
-
SHA512
93fa8f0b5401ef5d6069bfecec897267fae61888d82058973687bb13bcfa684d3c29249703774c889efe5ae91efda0957098f1c3fd4d7a0eccec86184104537c
-
SSDEEP
12288:+7qKAAwzaQa3lsZtsW2NH8d98AsmZF3ARZ0AsEye7Zm8TPXWP:2xJwzaQa3Pc98pmZFQ3WP
Malware Config
Extracted
njrat
0.7d
HacKed
newpartyfrmaap.ddns.net:7070
fb4647cd59a8f29058f4529d83344fa5
-
reg_key
fb4647cd59a8f29058f4529d83344fa5
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
WindowsApp1.exeHeart-Sender-V1.2.exeJavaUpdate.exepid process 944 WindowsApp1.exe 1760 Heart-Sender-V1.2.exe 1564 JavaUpdate.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Loads dropped DLL 3 IoCs
Processes:
Heart-Sender-V1.2.exeWindowsApp1.exepid process 1956 Heart-Sender-V1.2.exe 1956 Heart-Sender-V1.2.exe 944 WindowsApp1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
JavaUpdate.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\fb4647cd59a8f29058f4529d83344fa5 = "\"C:\\Users\\Admin\\AppData\\Roaming\\JavaUpdate.exe\" .." JavaUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\fb4647cd59a8f29058f4529d83344fa5 = "\"C:\\Users\\Admin\\AppData\\Roaming\\JavaUpdate.exe\" .." JavaUpdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
JavaUpdate.exedescription pid process Token: SeDebugPrivilege 1564 JavaUpdate.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
Heart-Sender-V1.2.exeWindowsApp1.exeJavaUpdate.exedescription pid process target process PID 1956 wrote to memory of 944 1956 Heart-Sender-V1.2.exe WindowsApp1.exe PID 1956 wrote to memory of 944 1956 Heart-Sender-V1.2.exe WindowsApp1.exe PID 1956 wrote to memory of 944 1956 Heart-Sender-V1.2.exe WindowsApp1.exe PID 1956 wrote to memory of 944 1956 Heart-Sender-V1.2.exe WindowsApp1.exe PID 1956 wrote to memory of 1760 1956 Heart-Sender-V1.2.exe Heart-Sender-V1.2.exe PID 1956 wrote to memory of 1760 1956 Heart-Sender-V1.2.exe Heart-Sender-V1.2.exe PID 1956 wrote to memory of 1760 1956 Heart-Sender-V1.2.exe Heart-Sender-V1.2.exe PID 1956 wrote to memory of 1760 1956 Heart-Sender-V1.2.exe Heart-Sender-V1.2.exe PID 944 wrote to memory of 1564 944 WindowsApp1.exe JavaUpdate.exe PID 944 wrote to memory of 1564 944 WindowsApp1.exe JavaUpdate.exe PID 944 wrote to memory of 1564 944 WindowsApp1.exe JavaUpdate.exe PID 944 wrote to memory of 1564 944 WindowsApp1.exe JavaUpdate.exe PID 944 wrote to memory of 1564 944 WindowsApp1.exe JavaUpdate.exe PID 944 wrote to memory of 1564 944 WindowsApp1.exe JavaUpdate.exe PID 944 wrote to memory of 1564 944 WindowsApp1.exe JavaUpdate.exe PID 1564 wrote to memory of 1592 1564 JavaUpdate.exe netsh.exe PID 1564 wrote to memory of 1592 1564 JavaUpdate.exe netsh.exe PID 1564 wrote to memory of 1592 1564 JavaUpdate.exe netsh.exe PID 1564 wrote to memory of 1592 1564 JavaUpdate.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Heart-Sender Priv8 Version\Heart-Sender-V1.2.exe"C:\Users\Admin\AppData\Local\Temp\Heart-Sender Priv8 Version\Heart-Sender-V1.2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\WindowsApp1.exe"C:\Users\Admin\AppData\Local\Temp\WindowsApp1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\JavaUpdate.exe"C:\Users\Admin\AppData\Roaming\JavaUpdate.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\JavaUpdate.exe" "JavaUpdate.exe" ENABLE4⤵
- Modifies Windows Firewall
-
C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2.exe"C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2.exeFilesize
226KB
MD59c7691ff597e9efd7f796b31accb78e8
SHA181bb289aa37d182b60e86990376a375de7a8decc
SHA2561624af752c9f85fd117fafb28feb42a079f283dc133cdcc5799810072a95a6cb
SHA512739f187aaeda13b7ebef3918a965b8da4ee939cd3e60d36802768f52be7b08f5964b121d1e977f4c408ff8ae6aba02df4a4d37785735c2f70d8610551cbab135
-
C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2.exeFilesize
226KB
MD59c7691ff597e9efd7f796b31accb78e8
SHA181bb289aa37d182b60e86990376a375de7a8decc
SHA2561624af752c9f85fd117fafb28feb42a079f283dc133cdcc5799810072a95a6cb
SHA512739f187aaeda13b7ebef3918a965b8da4ee939cd3e60d36802768f52be7b08f5964b121d1e977f4c408ff8ae6aba02df4a4d37785735c2f70d8610551cbab135
-
C:\Users\Admin\AppData\Local\Temp\WindowsApp1.exeFilesize
1.0MB
MD50f2aa87f7c7e6b11b911f71170ba1104
SHA103000e57f78fab7596c4c59aab06fda9c2e9d91d
SHA256b596ca499b0af2b700d867b976d0d793a98431309f88ef306c62056d0315f857
SHA512f2e7d5646490ed4cf1b3a8dbaa7490228f744d694c7642f4bd4d22a155235720f2fa5ac65b5e4adcd443139e12a630198dd8d558d977c90bf1802851b7e54fb9
-
C:\Users\Admin\AppData\Local\Temp\WindowsApp1.exeFilesize
1.0MB
MD50f2aa87f7c7e6b11b911f71170ba1104
SHA103000e57f78fab7596c4c59aab06fda9c2e9d91d
SHA256b596ca499b0af2b700d867b976d0d793a98431309f88ef306c62056d0315f857
SHA512f2e7d5646490ed4cf1b3a8dbaa7490228f744d694c7642f4bd4d22a155235720f2fa5ac65b5e4adcd443139e12a630198dd8d558d977c90bf1802851b7e54fb9
-
C:\Users\Admin\AppData\Roaming\JavaUpdate.exeFilesize
1.0MB
MD50f2aa87f7c7e6b11b911f71170ba1104
SHA103000e57f78fab7596c4c59aab06fda9c2e9d91d
SHA256b596ca499b0af2b700d867b976d0d793a98431309f88ef306c62056d0315f857
SHA512f2e7d5646490ed4cf1b3a8dbaa7490228f744d694c7642f4bd4d22a155235720f2fa5ac65b5e4adcd443139e12a630198dd8d558d977c90bf1802851b7e54fb9
-
C:\Users\Admin\AppData\Roaming\JavaUpdate.exeFilesize
1.0MB
MD50f2aa87f7c7e6b11b911f71170ba1104
SHA103000e57f78fab7596c4c59aab06fda9c2e9d91d
SHA256b596ca499b0af2b700d867b976d0d793a98431309f88ef306c62056d0315f857
SHA512f2e7d5646490ed4cf1b3a8dbaa7490228f744d694c7642f4bd4d22a155235720f2fa5ac65b5e4adcd443139e12a630198dd8d558d977c90bf1802851b7e54fb9
-
\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2.exeFilesize
226KB
MD59c7691ff597e9efd7f796b31accb78e8
SHA181bb289aa37d182b60e86990376a375de7a8decc
SHA2561624af752c9f85fd117fafb28feb42a079f283dc133cdcc5799810072a95a6cb
SHA512739f187aaeda13b7ebef3918a965b8da4ee939cd3e60d36802768f52be7b08f5964b121d1e977f4c408ff8ae6aba02df4a4d37785735c2f70d8610551cbab135
-
\Users\Admin\AppData\Local\Temp\WindowsApp1.exeFilesize
1.0MB
MD50f2aa87f7c7e6b11b911f71170ba1104
SHA103000e57f78fab7596c4c59aab06fda9c2e9d91d
SHA256b596ca499b0af2b700d867b976d0d793a98431309f88ef306c62056d0315f857
SHA512f2e7d5646490ed4cf1b3a8dbaa7490228f744d694c7642f4bd4d22a155235720f2fa5ac65b5e4adcd443139e12a630198dd8d558d977c90bf1802851b7e54fb9
-
\Users\Admin\AppData\Roaming\JavaUpdate.exeFilesize
1.0MB
MD50f2aa87f7c7e6b11b911f71170ba1104
SHA103000e57f78fab7596c4c59aab06fda9c2e9d91d
SHA256b596ca499b0af2b700d867b976d0d793a98431309f88ef306c62056d0315f857
SHA512f2e7d5646490ed4cf1b3a8dbaa7490228f744d694c7642f4bd4d22a155235720f2fa5ac65b5e4adcd443139e12a630198dd8d558d977c90bf1802851b7e54fb9
-
memory/944-57-0x0000000000000000-mapping.dmp
-
memory/944-66-0x0000000000100000-0x0000000000210000-memory.dmpFilesize
1.1MB
-
memory/944-69-0x0000000000310000-0x000000000031A000-memory.dmpFilesize
40KB
-
memory/1564-75-0x00000000002E0000-0x00000000003F0000-memory.dmpFilesize
1.1MB
-
memory/1564-72-0x0000000000000000-mapping.dmp
-
memory/1592-76-0x0000000000000000-mapping.dmp
-
memory/1760-70-0x0000000001FE5000-0x0000000001FF6000-memory.dmpFilesize
68KB
-
memory/1760-67-0x00000000048A0000-0x0000000004958000-memory.dmpFilesize
736KB
-
memory/1760-65-0x00000000000C0000-0x00000000000FE000-memory.dmpFilesize
248KB
-
memory/1760-61-0x0000000000000000-mapping.dmp
-
memory/1760-78-0x0000000001FE5000-0x0000000001FF6000-memory.dmpFilesize
68KB
-
memory/1956-54-0x0000000075141000-0x0000000075143000-memory.dmpFilesize
8KB
-
memory/1956-64-0x00000000742C0000-0x000000007486B000-memory.dmpFilesize
5.7MB
-
memory/1956-55-0x00000000742C0000-0x000000007486B000-memory.dmpFilesize
5.7MB