Analysis

  • max time kernel
    140s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22/05/2024, 10:20

General

  • Target

    pvzHE-Launcher-winXP.exe

  • Size

    1.8MB

  • MD5

    7afa30fe7cce68c1c29258713096f3ce

  • SHA1

    e548cf3fdc2cd66bf0a6bee9a5e634264ee4858d

  • SHA256

    08c7b97cf56b13c0739b734bc9440aaa6f473b1a06fbf8e92b4745eb08b64297

  • SHA512

    c28338c5cebb4e50ee8e117a03a8ad21bec34e4ef5b756531d92ffef4c4f933ddb5c54aab22f170dcf0b4688a6084ad6a35f1efb71e933c3fd0f6e76e4e8200f

  • SSDEEP

    24576:MQw/SHLZfZuVm7b/TwLWZWg18iteuXfob84Xm1JKauBgJZJqeGARYZe5GX5dJXgL:9aVTg88wb8NRnJqeDRcgL

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pvzHE-Launcher-winXP.exe
    "C:\Users\Admin\AppData\Local\Temp\pvzHE-Launcher-winXP.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Users\Admin\AppData\Local\Temp\PlantsVsZombies.exe
      "PlantsVsZombies.exe"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2992

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1764-0-0x0000000002360000-0x0000000002F28000-memory.dmp

    Filesize

    11.8MB

  • memory/2992-1-0x0000000000400000-0x0000000000FC8000-memory.dmp

    Filesize

    11.8MB

  • memory/2992-3-0x00000000029C0000-0x00000000029CA000-memory.dmp

    Filesize

    40KB

  • memory/2992-2-0x00000000029C0000-0x00000000029CA000-memory.dmp

    Filesize

    40KB

  • memory/2992-4-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/2992-174-0x0000000000400000-0x0000000000FC8000-memory.dmp

    Filesize

    11.8MB

  • memory/2992-176-0x00000000029C0000-0x00000000029CA000-memory.dmp

    Filesize

    40KB

  • memory/2992-175-0x00000000029C0000-0x00000000029CA000-memory.dmp

    Filesize

    40KB

  • memory/2992-177-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/2992-178-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/2992-179-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/2992-180-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/2992-181-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/2992-182-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/2992-183-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/2992-184-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/2992-185-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/2992-186-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/2992-187-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/2992-188-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/2992-189-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/2992-190-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB

  • memory/2992-191-0x0000000010000000-0x0000000010041000-memory.dmp

    Filesize

    260KB