Overview
overview
10Static
static
5Heart-Send...ig.bat
windows7-x64
10Heart-Send...ig.bat
windows10-2004-x64
10Heart-Send...ck.dll
windows7-x64
1Heart-Send...ck.dll
windows10-2004-x64
1Heart-Send...ad.exe
windows7-x64
3Heart-Send...ad.exe
windows10-2004-x64
3Heart-Send...er.exe
windows7-x64
10Heart-Send...er.exe
windows10-2004-x64
10Heart-Send...r1.exe
windows7-x64
10Heart-Send...r1.exe
windows10-2004-x64
10Heart-Send...ye.exe
windows7-x64
10Heart-Send...ye.exe
windows10-2004-x64
10Heart-Send...ck.dll
windows7-x64
1Heart-Send...ck.dll
windows10-2004-x64
1Heart-Send...ad.exe
windows7-x64
3Heart-Send...ad.exe
windows10-2004-x64
3Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 12:33
Behavioral task
behavioral1
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Config.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Config.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Heart/HtmlAgilityPack.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Heart/HtmlAgilityPack.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Heart/Load.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Heart/Load.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Loader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Loader1.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Loader1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/HtmlAgilityPack.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/HtmlAgilityPack.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Load.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Load.exe
Resource
win10v2004-20241007-en
General
-
Target
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Heart/Load.exe
-
Size
226KB
-
MD5
9c7691ff597e9efd7f796b31accb78e8
-
SHA1
81bb289aa37d182b60e86990376a375de7a8decc
-
SHA256
1624af752c9f85fd117fafb28feb42a079f283dc133cdcc5799810072a95a6cb
-
SHA512
739f187aaeda13b7ebef3918a965b8da4ee939cd3e60d36802768f52be7b08f5964b121d1e977f4c408ff8ae6aba02df4a4d37785735c2f70d8610551cbab135
-
SSDEEP
3072:bo98cfXJyH8Rpf1RAshsapucG/6I2VI6whmHAsEye7Zm8TPRQfSFEq8o:b2ZycrfbARZ0AsEye7Zm8TPXFb8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Load.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Load.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Load.exepid process 2828 Load.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2_Cracked_by_JC0der-FireEye\Config\Heart\Load.exe"C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2_Cracked_by_JC0der-FireEye\Config\Heart\Load.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2_Cracked_by_JC0der-FireEye\Config\Heart\Settings.ini
Filesize148B
MD5c264554e8e058a904b349426e9d55106
SHA107767c8ac19271942719e6a46e3aa7b35d72dd74
SHA2566f19282087ae76e463085c178ceb3866908ad76d775cdae52dcdfa54208fcd6f
SHA51227c86786986337aaf2aeac6f70486bc979a072cd0eeb9246346fe62f1e725e4280a6ed2ce63383a4ac71a8ad442d4f5029da5683c506357828ae75096d1be13d