Static task
static1
Behavioral task
behavioral1
Sample
HeartsOnFire.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
HeartsOnFire.exe
Resource
win10v2004-20230831-en
General
-
Target
HeartsOnFire.eXe
-
Size
37KB
-
MD5
0f9c5a108cc9a63092351b60abbd7bb8
-
SHA1
ae77d80bf23f920a4298e9992816bd96d8cd5900
-
SHA256
1115c7829a5da053a0e3d2951a8dcde6dae2d31db9bc7f514d36db9475fa2bd2
-
SHA512
db51f6f327276a7732f857220b7bc2ccbe48e0b9e7a3cc6ffbdc197bef9976b184babebcc2a45b2e9301a7e7d9fd29a818d40a3b4cc5e0cf8b6f646770772e1b
-
SSDEEP
384:sqTY1XxtJvs6AvSWehkYydi5qElZTaUKTw/7m618qPrjV9SGLnI81eho:6JE6AEF5q3w/7dJPVFI81b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource HeartsOnFire.eXe
Files
-
HeartsOnFire.eXe.exe windows x86
Password: infected
f736665ac33b6775ed4c156ddf9c52af
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
htons
inet_addr
recv
send
socket
kernel32
ExitProcess
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetFileSize
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetProcAddress
GetSystemDirectoryA
GetTickCount
GetWindowsDirectoryA
CopyFileA
IsBadReadPtr
LoadLibraryA
MapViewOfFile
OpenMutexA
OpenProcess
Process32First
Process32Next
CreateFileA
ReadFile
CreateFileMappingA
ReadProcessMemory
ReleaseMutex
RtlUnwind
RtlZeroMemory
SetCurrentDirectoryA
SetEndOfFile
SetFileAttributesA
SetFilePointer
SetThreadPriority
CreateMutexA
TerminateProcess
UnmapViewOfFile
VirtualProtect
WriteFile
CreateThread
CreateToolhelp32Snapshot
user32
LoadCursorA
SetTimer
KillTimer
RegisterClassA
GetMessageA
TranslateMessage
DispatchMessageA
CreateWindowExA
DefWindowProcA
advapi32
GetUserNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
crtdll
__GetMainArgs
_strcmpi
toupper
abort
exit
fclose
feof
fgets
fopen
fputc
fputs
fread
free
fseek
ftell
fwrite
malloc
memcmp
memcpy
memset
raise
rand
signal
srand
strcat
strchr
strcmp
strstr
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE