Analysis

  • max time kernel
    444s
  • max time network
    367s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/05/2024, 10:20

General

  • Target

    pvz.exe

  • Size

    73.6MB

  • MD5

    1e70ff1df951f6dc11f55554d15f2c37

  • SHA1

    714a0c595764c5d6c45cf5254fcad67a9cc8f10a

  • SHA256

    94a47191fb3a307fdaa84a1f8f31d8e1b4b79b34048814725c373e54f3d4e37a

  • SHA512

    9b9b44f42a5050e50550b8c266bdc9411598576ebcb10db896c991d792fc54c43429f63d8d7833257e06e916d73fc0f729357858aa046f202eab762c96259ddd

  • SSDEEP

    1572864:lmMjfJ+8Xk4dNaZJyxA2fYlGsazJWE5jqerWb:lBzJ+aaKilGsazkEQerWb

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 17 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 31 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pvz.exe
    "C:\Users\Admin\AppData\Local\Temp\pvz.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Program Files (x86)\pvzHE\pvzHE-Save-Relocate.exe
      "C:\Program Files (x86)\pvzHE\pvzHE-Save-Relocate.exe"
      2⤵
      • Executes dropped EXE
      PID:348
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\ProgramData\PopCap Games\PlantsVsZombies\pvzHE" /grant Users:(OI)(CI)F
      2⤵
      • Modifies file permissions
      PID:1644
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Program Files (x86)\pvzHE" /grant Users:(OI)(CI)F
      2⤵
      • Modifies file permissions
      PID:1988
    • C:\Program Files (x86)\pvzHE\pvzHE-Launcher.exe
      "C:\Program Files (x86)\pvzHE\pvzHE-Launcher.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1328
      • C:\Program Files (x86)\pvzHE\PlantsVsZombies.exe
        "PlantsVsZombies.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: GetForegroundWindowSpam
        PID:1492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\pvzHE\PlantsVsZombies.exe

    Filesize

    11.1MB

    MD5

    5eb4b93a103edc16ec6655485ad85982

    SHA1

    e2b56a04c40247175085e5c32c6367db323c105e

    SHA256

    acfcb9eae3409391218e69ff3fe5c9424a4486d7ec752e889a59bf6bc784d961

    SHA512

    fe4a81562037f4fa4c005dc27b180311eb855bcb40c8fab981ba88567ef0b90528dd780e6239b810a5cb221c32b50eb29bbf524897ed3bda57b78d42e0f0d47b

  • C:\Program Files (x86)\pvzHE\bass.dll

    Filesize

    90KB

    MD5

    6731f160e001bb85ba930574b8d42776

    SHA1

    aa2b48c55d9350be1ccf1dce921c33100e627378

    SHA256

    3627adef7e04dd7aa9b8e116d0afc11dcee40d0e09d573210a4f86bdc81a80b6

    SHA512

    07ae0cb85464b015b35e6157228775a6ac66e5e62a1b47f9395307b61176b6df835e00a1518846507718acffc271263008cc8a9b2c1e8a0192c5438774e12437

  • C:\Program Files (x86)\pvzHE\fonts\fzcq.ttf

    Filesize

    2.4MB

    MD5

    2167a0f0bf3f1cb718f2683d13a4c887

    SHA1

    bb9c3bdafa5a0032ae2fa4e1b90c08c153a40026

    SHA256

    5b7d4a996fc1077774a5a37c3dce400d6c7af152c95c17e80a257fdfa01b299d

    SHA512

    9b18e693ba428a464abfaf482559b7e602339ce2125eac06a0127f9735aece5b593329591e4f33bf3b1d609b394949ebfde6270bd68ee8efd36900d449d70403

  • C:\Program Files (x86)\pvzHE\fonts\fzjz.ttf

    Filesize

    1.4MB

    MD5

    b020f94b37feaebe8827cbe20574f3fe

    SHA1

    0909fab3388b8c5f0af1a88bb0ca63e825ba89b9

    SHA256

    d6e6bfaf209c2e6536b7fc91e73cfd0c65320913775bdd2c552b34cc6a4e3ad3

    SHA512

    a282e437fac567d7f27f6a1f6e99e9a37d5e5f2512c5e2f45534c5116a9e06e545dd6197367dd1c300cdfcefdbe2be3552ee4c136063f188f93f6d01225ccbd2

  • C:\Program Files (x86)\pvzHE\fonts\fzyh.ttf

    Filesize

    3.9MB

    MD5

    d8d4f4cd37f444e0d4a32e7f8d429b1f

    SHA1

    ffa5c01deeb65d36ffdb118e24351e958775b425

    SHA256

    ca830a3680be9a70c8a661d5f7327b6d24c7059ca783ad7eb6d75be7919326fb

    SHA512

    9577b0444fc6aebb5d7b902317d22d8a7fd39fd1fcdc7698f40d35e94905fbb3091ac536c2ca3789e9a9913f73908b756a4489b10fcb42727d93bd2eba55fbd4

  • C:\Program Files (x86)\pvzHE\fonts\wryh+pico12num.ttf

    Filesize

    13.7MB

    MD5

    ee6f32d05c738b25d7b8476f09d2a4e2

    SHA1

    cec7dcaa5219a47826cff8b9d35a55fe8eb23c64

    SHA256

    04242d27b05860c07906fbf0d5276b25e5951f892be898c59d4c9b755d79f52c

    SHA512

    62b72347513ec2b9d78e8f13ffe0a11433c4a288fb10ff02849d4a48c005bc28f5f6f220916fddf01d28a4e238a75860f35ba924fd93efa628812873fc173b7d

  • C:\Program Files (x86)\pvzHE\fonts\wryh.ttf

    Filesize

    14.3MB

    MD5

    c2db9c4749c6ecf521ffca0dd8f62752

    SHA1

    b65631674c73acb0c5b3f40b0e4cb875c15ce377

    SHA256

    c3c0e7bbcec69ee4765a53831c7be310acaca1ec1b408974ca4f4c73c1aa400c

    SHA512

    cd49890025a987d9a1754156d036b8c337c6ad50f1504c1ddbd23c50ce5a622cf0cf51784f5c99eae8e6b8f1f0f8a6f70be064a0cc731064f8aa643bb252d5fe

  • C:\Program Files (x86)\pvzHE\gdi42.dll

    Filesize

    2.4MB

    MD5

    925373c5522569c053ae3ff9a8879a40

    SHA1

    8e18a8dea1add62d9fb56414dfe42fc1c04b2505

    SHA256

    57d7f0a0290fbf80d2b3399ba102df384fbc27edaee77fec86a5c106f4bf8429

    SHA512

    2e239ba0fbab72d7bfef07746e287ac359341b5f96d14b754e8a16165da542ddb5431feb044ebb6b7084a06a33e65ff964b1cc2da9a6f2be0eb4a9a38b39278b

  • C:\Program Files (x86)\pvzHE\logo.ico

    Filesize

    264KB

    MD5

    6fb38ffb714d6d7d1e12697513fef822

    SHA1

    ce7e98021d2dbeb3108e373e217deaf3019a20d3

    SHA256

    ad55f328eb4dd9290a15dfbf4da474baed3269f934fd4a86de7b9487ee450cc4

    SHA512

    bcba7e5a9e4b619b0b9192d4e6c5efc31a2b08c65ac7339338712bc4891f9beb12625e9c816f124022129336e7ce84ba86dadd94394b09d32b0f7165361fa266

  • C:\Users\Admin\AppData\Local\Temp\nsd34A8.tmp\skin.zip

    Filesize

    2.4MB

    MD5

    293238829de472db381be13aa9173495

    SHA1

    75d6d4bc7992385167d1d4318edc9beb953db641

    SHA256

    7442eea2b3cc5865d6a18d47828840e5545b32ca8273c1d90ab55092e1c760af

    SHA512

    c7b44786810957f45c5e955c2880dd2f1d83fbe7715855d0f495de98372cf74b3a4a6e00e2dbe851fe69ec4212d1938fcb5fca882f722811060fccb3e5d5939a

  • \Program Files (x86)\pvzHE\pvzHE-Launcher.exe

    Filesize

    1.7MB

    MD5

    477c0edf4d9a20eb949582457996b2e2

    SHA1

    09030647039b6c76128759133bafc3e3ddee7f2e

    SHA256

    394360c438692fd46d2576e51a87ef09a6643b491e5cc6ee405ea5575905bca5

    SHA512

    72f19fe6e2e60ffcbcd3e9645ff52cdaf3d1722df3a5a74d6ff1c06250e6629e3936149597a07344902bda1f02b435237965b53ec38e90a51a190bb0187712cc

  • \Program Files (x86)\pvzHE\pvzHE-Save-Relocate.exe

    Filesize

    1.7MB

    MD5

    c7afc46bb41f5d7f97e60b76329a2398

    SHA1

    d18fd7153023ebca9cdc7df6d25a4142aae8e79c

    SHA256

    269c238bbfd9f30c4490235cb403e2dfea3fbdc3db7c8dc367db0403ea908295

    SHA512

    5766213d579891763220a6c7ae1fea317721b091e3b02fad2141cf75a5e44afa99a9320f0a74faa6dd1a590ba24668a1a90d6d368ecf8b0614689764253ab9bc

  • \Users\Admin\AppData\Local\Temp\nsd34A8.tmp\BgWorker.dll

    Filesize

    2KB

    MD5

    33ec04738007e665059cf40bc0f0c22b

    SHA1

    4196759a922e333d9b17bda5369f14c33cd5e3bc

    SHA256

    50f735ab8f3473423e6873d628150bbc0777be7b4f6405247cddf22bb00fb6be

    SHA512

    2318b01f0c2f2f021a618ca3e6e5c24a94df5d00154766b77160203b8b0a177c8581c7b688ffe69be93a69bc7fd06b8a589844d42447f5060fb4bcf94d8a9aef

  • \Users\Admin\AppData\Local\Temp\nsd34A8.tmp\ExecDos.dll

    Filesize

    6KB

    MD5

    774e3b33d151413dc826bf2421cd51e8

    SHA1

    ab2928dcf6fa54bb9eb16e5f64bfcffaaeee90fa

    SHA256

    91d5481f576382164703e4ac244052265769377838ac30233ad79c983ed9d454

    SHA512

    3cf955b13e81e4b6edb292df751ce7f64b0cf30979f57b1609f002859b4e68adc046b6674f76f7b7ce7144382316c344c11fed02d638e62fcc8464c32795a365

  • \Users\Admin\AppData\Local\Temp\nsd34A8.tmp\System.dll

    Filesize

    11KB

    MD5

    bf712f32249029466fa86756f5546950

    SHA1

    75ac4dc4808ac148ddd78f6b89a51afbd4091c2e

    SHA256

    7851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af

    SHA512

    13f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4

  • \Users\Admin\AppData\Local\Temp\nsd34A8.tmp\nsNiuniuSkin.dll

    Filesize

    891KB

    MD5

    cb9ccb0f6923b5e38221a2c9603eb669

    SHA1

    7214cae53f36cab79841e9d49b07cffd7ce5e1c5

    SHA256

    6a38b8084e7493ff57ea3eda7101fbfd6113d8470531b479ce05cefb4e34bc79

    SHA512

    5d510870559737ba9f10447716a654e3aa609b64a1b753e2d3722b7b92e1768980d2ff070e639add57a13a7941c1d680ffa6e13abd47c44b1d18a230590ebb6c

  • \Users\Admin\AppData\Local\Temp\nsd34A8.tmp\nsProcess.dll

    Filesize

    4KB

    MD5

    88d3e48d1c1a051c702d47046ade7b4c

    SHA1

    8fc805a8b7900b6ba895d1b809a9f3ad4c730d23

    SHA256

    51da07da18a5486b11e0d51ebff77a3f2fcbb4d66b5665d212cc6bda480c4257

    SHA512

    83299dd948b40b4e2c226256d018716dbacfa739d8e882131c7f4c028c0913bc4ed9d770deb252931f3d4890f8f385bd43dcf2a5bfe5b922ec35f4b3144247a7

  • \Users\Admin\AppData\Local\Temp\nsd34A8.tmp\nsis7zU.dll

    Filesize

    313KB

    MD5

    06a47571ac922f82c098622b2f5f6f63

    SHA1

    8a581c33b7f2029c41edaad55d024fc0d2d7c427

    SHA256

    e4ab3064f2e094910ae80104ef9d371ccb74ebbeeed592582cf099acd83f5fe9

    SHA512

    04b3d18042f1faa536e1393179f412a5644d2cf691fbc14970f79df5c0594eeedb0826b495807a3243f27aaa0380423c1f975fe857f32e057309bb3f2a529a83

  • memory/1492-318-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-328-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-137-0x0000000001060000-0x000000000106A000-memory.dmp

    Filesize

    40KB

  • memory/1492-140-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-310-0x0000000000400000-0x0000000000FC8000-memory.dmp

    Filesize

    11.8MB

  • memory/1492-311-0x0000000001060000-0x000000000106A000-memory.dmp

    Filesize

    40KB

  • memory/1492-312-0x0000000001060000-0x000000000106A000-memory.dmp

    Filesize

    40KB

  • memory/1492-313-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-314-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-315-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-316-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-317-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-135-0x0000000000400000-0x0000000000FC8000-memory.dmp

    Filesize

    11.8MB

  • memory/1492-319-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-321-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-322-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-323-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-324-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-325-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-326-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-327-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-138-0x0000000001060000-0x000000000106A000-memory.dmp

    Filesize

    40KB

  • memory/1492-329-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-330-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-331-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-332-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-333-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-334-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-335-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-336-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-337-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-338-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-339-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-340-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-341-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-342-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-343-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-344-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-345-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-346-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-347-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-348-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-349-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/1492-350-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB