Analysis

  • max time kernel
    138s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/02/2024, 07:55

General

  • Target

    Plants.Vs.Zombies.GOTY/Plants Vs Zombies GOTY/Plants vs. Zombies/Core/codecs/qkrcodecs4.dll

  • Size

    78KB

  • MD5

    3e6767b5743c7d57992dce99246e486b

  • SHA1

    941d346ae8c4198d0acad19668af89fd9bc1fd25

  • SHA256

    826b03637074ec6a782236a37dcf205eea6889cfb1c2e00dc1b460e8ea3f5702

  • SHA512

    1003cb38911e4cb818803c4fd579bf06587d49c1fd46f4f602812fef80b42acb4f47d08c2f71efd813a62fe818446222df3cf8b23dd21363967d15fabd5da1be

  • SSDEEP

    1536:GHOgQa2TnP/58oPBFpFZxsj2EpBWyt8onEEkYyhPbwkT3STwJOfod:GzQa2zB8oPj/wL0m8ondTwSTYOfod

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\Plants.Vs.Zombies.GOTY\Plants Vs Zombies GOTY\Plants vs. Zombies\Core\codecs\qkrcodecs4.dll",#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:208
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\Plants.Vs.Zombies.GOTY\Plants Vs Zombies GOTY\Plants vs. Zombies\Core\codecs\qkrcodecs4.dll",#1
      2⤵
        PID:1288

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads