Analysis

  • max time kernel
    60s
  • max time network
    82s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-04-2023 12:11

General

  • Target

    PvZ_Tools_v2.7.3/PvZ_Tools_v2.7.3.exe

  • Size

    855KB

  • MD5

    50fe1f3674d1ec0642c2f7badea05fbf

  • SHA1

    1b4a1b97606dbbc6033910cb08747973cf542d46

  • SHA256

    6285bd2c2fdcd5758c3e8936ae9ccf905b8c331b49ce482d62d91230e781da66

  • SHA512

    8c3e36b3f4cbedcf61bb86cc4f342bf8f0db057b0062979f64a7139de5121c0a16284ac0a793f8f4b436c03233f5f7307d9a3514d1d54b80610a57f567467679

  • SSDEEP

    24576:kv1uqi38HDrRxvxDA6kvF6ZQuB+kZ5SXhd+/D:kdY38jrzvxDACZ5SRd+/D

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PvZ_Tools_v2.7.3\PvZ_Tools_v2.7.3.exe
    "C:\Users\Admin\AppData\Local\Temp\PvZ_Tools_v2.7.3\PvZ_Tools_v2.7.3.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    PID:3260

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\PvZ_Tools_v2.7.3\pvztools.ini
    Filesize

    269KB

    MD5

    54ffabbcd3e79c8987366e11ffbe4e4c

    SHA1

    4d73ac016c6ef8812701d05484141f40b6595b1f

    SHA256

    2e5d79d84059aa2ee5feccf623729cb0fd8fcd723a297f8500a8ee9caaa76eec

    SHA512

    6c04408fb3c70777ea114eaf8e5db9e35a1ba423c1a98e38ecac92f7720e53a36eaa69807b0ca6aeb3cd574d29f0d88d53a56df9c5d46d2f01d3b999c19c7374

  • memory/3260-133-0x0000000000AB0000-0x0000000000AC0000-memory.dmp
    Filesize

    64KB

  • memory/3260-141-0x0000000000AB0000-0x0000000000AC0000-memory.dmp
    Filesize

    64KB

  • memory/3260-149-0x0000000000AB0000-0x0000000000AC0000-memory.dmp
    Filesize

    64KB