Overview
overview
8Static
static
HearthBudd...xe.xml
windows7-x64
1HearthBudd...xe.xml
windows10-2004-x64
1HearthBudd...34.dll
windows7-x64
1HearthBudd...34.dll
windows10-2004-x64
1HearthBudd..._HB.js
windows7-x64
1HearthBudd..._HB.js
windows10-2004-x64
1HearthBudd...ic.dll
windows7-x64
1HearthBudd...ic.dll
windows10-2004-x64
1HearthBudd...dy.exe
windows7-x64
8HearthBudd...dy.exe
windows10-2004-x64
8HearthBudd...SM.dll
windows7-x64
1HearthBudd...SM.dll
windows10-2004-x64
1HearthBudd...ve.dll
windows7-x64
1HearthBudd...ve.dll
windows10-2004-x64
1HearthBudd...er.exe
windows7-x64
8HearthBudd...er.exe
windows10-2004-x64
8HearthBudd...er.exe
windows7-x64
1HearthBudd...er.exe
windows10-2004-x64
8Analysis
-
max time kernel
153s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
HearthBuddy/CDPatcher.exe.xml
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
HearthBuddy/CDPatcher.exe.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
HearthBuddy/CompiledAssemblies/Silverfish_635523813765361934.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
HearthBuddy/CompiledAssemblies/Silverfish_635523813765361934.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
HearthBuddy/CustomDecks/Silverfish/silverfish_HB.js
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
HearthBuddy/CustomDecks/Silverfish/silverfish_HB.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
HearthBuddy/GreyMagic.dll
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
HearthBuddy/GreyMagic.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
HearthBuddy/Hearthbuddy.exe
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
HearthBuddy/Hearthbuddy.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
HearthBuddy/RemoteASM.dll
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
HearthBuddy/RemoteASM.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
HearthBuddy/RemoteASMNative.dll
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
HearthBuddy/RemoteASMNative.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
HearthBuddy/СDРаtcher.exe
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
HearthBuddy/СDРаtcher.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral17
Sample
HearthBuddy/СDРаtcher.exe
Resource
win7-20220901-en
Behavioral task
behavioral18
Sample
HearthBuddy/СDРаtcher.exe
Resource
win10v2004-20220812-en
General
-
Target
HearthBuddy/СDРаtcher.exe
-
Size
248KB
-
MD5
9fc784dc68fdba14bb4a3d0119a570c2
-
SHA1
e7af27020339711043b3d2eed9b1cfd9a4071e30
-
SHA256
0b56d9cc1fc6cac40c16471797015d6f338371e90e86056b7e5eaad801409daf
-
SHA512
469c0261f0c8d9e3cd2ec7cc9b2685d7ef91dcd8af182da9a3de408d4d8879617473bcc7a1b73767e5caa94419c4f62419685892d41fa0bb8e59d196eb0eaf5a
-
SSDEEP
6144:orS+Eo+YBOU0zoJ836T9sJ8BaF9m+9tK74HkldENff4uL4ELR9xk90:z+D+8OUwj3qsjbm+9t24HkldENff4uLf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 556 tmp4BA1.tmp -
Loads dropped DLL 1 IoCs
pid Process 1244 СDРаtcher.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1244 СDРаtcher.exe 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp 556 tmp4BA1.tmp -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1244 СDРаtcher.exe Token: SeDebugPrivilege 556 tmp4BA1.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1244 wrote to memory of 556 1244 СDРаtcher.exe 28 PID 1244 wrote to memory of 556 1244 СDРаtcher.exe 28 PID 1244 wrote to memory of 556 1244 СDРаtcher.exe 28 PID 1244 wrote to memory of 556 1244 СDРаtcher.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\HearthBuddy\СDРаtcher.exe"C:\Users\Admin\AppData\Local\Temp\HearthBuddy\СDРаtcher.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\tmp4BA1.tmp"C:\Users\Admin\AppData\Local\Temp\tmp4BA1.tmp" "C:\Users\Admin\AppData\Local\Temp\HearthBuddy\Settings.xml"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:556
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD59fc784dc68fdba14bb4a3d0119a570c2
SHA1e7af27020339711043b3d2eed9b1cfd9a4071e30
SHA2560b56d9cc1fc6cac40c16471797015d6f338371e90e86056b7e5eaad801409daf
SHA512469c0261f0c8d9e3cd2ec7cc9b2685d7ef91dcd8af182da9a3de408d4d8879617473bcc7a1b73767e5caa94419c4f62419685892d41fa0bb8e59d196eb0eaf5a
-
Filesize
248KB
MD59fc784dc68fdba14bb4a3d0119a570c2
SHA1e7af27020339711043b3d2eed9b1cfd9a4071e30
SHA2560b56d9cc1fc6cac40c16471797015d6f338371e90e86056b7e5eaad801409daf
SHA512469c0261f0c8d9e3cd2ec7cc9b2685d7ef91dcd8af182da9a3de408d4d8879617473bcc7a1b73767e5caa94419c4f62419685892d41fa0bb8e59d196eb0eaf5a
-
Filesize
248KB
MD59fc784dc68fdba14bb4a3d0119a570c2
SHA1e7af27020339711043b3d2eed9b1cfd9a4071e30
SHA2560b56d9cc1fc6cac40c16471797015d6f338371e90e86056b7e5eaad801409daf
SHA512469c0261f0c8d9e3cd2ec7cc9b2685d7ef91dcd8af182da9a3de408d4d8879617473bcc7a1b73767e5caa94419c4f62419685892d41fa0bb8e59d196eb0eaf5a