Overview
overview
7Static
static
3pvz.exe
windows7-x64
7pvz.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...se.rtf
windows7-x64
4$PLUGINSDI...se.rtf
windows10-2004-x64
1$PLUGINSDI...in.dll
windows7-x64
1$PLUGINSDI...in.dll
windows10-2004-x64
1$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$PLUGINSDI...zU.dll
windows7-x64
3$PLUGINSDI...zU.dll
windows10-2004-x64
3PlantsVsZombies.exe
windows7-x64
1PlantsVsZombies.exe
windows10-2004-x64
6bass.dll
windows7-x64
1bass.dll
windows10-2004-x64
1gdi42.dll
windows7-x64
1gdi42.dll
windows10-2004-x64
1pvzHE-Laun...XP.exe
windows7-x64
1pvzHE-Laun...XP.exe
windows10-2004-x64
6pvzHE-Launcher.exe
windows7-x64
1pvzHE-Launcher.exe
windows10-2004-x64
6pvzHE-Save...te.exe
windows7-x64
1pvzHE-Save...te.exe
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3Analysis
-
max time kernel
141s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 10:20
Static task
static1
Behavioral task
behavioral1
Sample
pvz.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
pvz.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/license.rtf
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/license.rtf
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsNiuniuSkin.dll
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsNiuniuSkin.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsis7zU.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsis7zU.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
PlantsVsZombies.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
PlantsVsZombies.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
bass.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
bass.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
gdi42.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
gdi42.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
pvzHE-Launcher-winXP.exe
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
pvzHE-Launcher-winXP.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
pvzHE-Launcher.exe
Resource
win7-20240215-en
Behavioral task
behavioral26
Sample
pvzHE-Launcher.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
pvzHE-Save-Relocate.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
pvzHE-Save-Relocate.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uninst.exe
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
uninst.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win10v2004-20240226-en
General
-
Target
uninst.exe
-
Size
3.1MB
-
MD5
dd830000e3cadbd45d2d08b0c77c8cd3
-
SHA1
130295b33d11e62db959499de8d6365c222b05ab
-
SHA256
e262c2b744613496e27a8cd3e9c260da1723218852c071a4532ae5aace3cc642
-
SHA512
1c2dcccf9d6db98a6865730497ab137737c49dd01ba28aa291e743cbc3aa399238c2cf4f87f5ef69d00e3526bfda424f95796519998f54f6642e16868cd5d345
-
SSDEEP
98304:zuxNBVhR63NHbnG7Cstb0WnqP2oJkslcLSg7MINUWT:zafs3Fy7iDPUvMzWT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1968 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 1968 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1052 wrote to memory of 1968 1052 uninst.exe 85 PID 1052 wrote to memory of 1968 1052 uninst.exe 85 PID 1052 wrote to memory of 1968 1052 uninst.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
891KB
MD5cb9ccb0f6923b5e38221a2c9603eb669
SHA17214cae53f36cab79841e9d49b07cffd7ce5e1c5
SHA2566a38b8084e7493ff57ea3eda7101fbfd6113d8470531b479ce05cefb4e34bc79
SHA5125d510870559737ba9f10447716a654e3aa609b64a1b753e2d3722b7b92e1768980d2ff070e639add57a13a7941c1d680ffa6e13abd47c44b1d18a230590ebb6c
-
Filesize
2.4MB
MD5293238829de472db381be13aa9173495
SHA175d6d4bc7992385167d1d4318edc9beb953db641
SHA2567442eea2b3cc5865d6a18d47828840e5545b32ca8273c1d90ab55092e1c760af
SHA512c7b44786810957f45c5e955c2880dd2f1d83fbe7715855d0f495de98372cf74b3a4a6e00e2dbe851fe69ec4212d1938fcb5fca882f722811060fccb3e5d5939a
-
Filesize
3.1MB
MD5dd830000e3cadbd45d2d08b0c77c8cd3
SHA1130295b33d11e62db959499de8d6365c222b05ab
SHA256e262c2b744613496e27a8cd3e9c260da1723218852c071a4532ae5aace3cc642
SHA5121c2dcccf9d6db98a6865730497ab137737c49dd01ba28aa291e743cbc3aa399238c2cf4f87f5ef69d00e3526bfda424f95796519998f54f6642e16868cd5d345