pvzhe_launcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
pvzHE-Launcher.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
pvzHE-Launcher.exe
Resource
win10v2004-20240802-en
General
-
Target
pvzHE-Launcher.exe
-
Size
117.1MB
-
MD5
a7713285446a587451c4437bfac47ebe
-
SHA1
218f3d79c57b75e00045a7cffccbff70fcdcdfe5
-
SHA256
2ca3fe7deebb692dcba731ac00380f5b7f9d9b3a07bb041b25c17a4eae80d75b
-
SHA512
bb317a22d46bf2ead38fe84ecdd76d5f0591682f777b2e8d4d49c2693841c7cc66e48d96e52586b9ffaf35fd4ef4a58ad0b5847fcbed7176a55d37d1e09cca8e
-
SSDEEP
3145728:Y+GAkMko0isiOiTiaiBiIiTiYiLiJiki3i6i4i3i2i1iyi8iHi2iaiYitiFiUiVv:Y9AkMkopvEZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource pvzHE-Launcher.exe
Files
-
pvzHE-Launcher.exe.exe windows:5 windows x86 arch:x86
4322c818399d6133080916a41627c3d1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcessTimes
GetCurrentProcess
GetCurrentProcessId
TerminateProcess
SwitchToThread
CreateThread
GetCurrentThreadId
IsProcessorFeaturePresent
GlobalMemoryStatusEx
GetSystemInfo
GetSystemTimeAsFileTime
GetSystemDirectoryW
VirtualAlloc
VirtualProtect
VirtualQuery
FreeLibrary
GetModuleFileNameW
GetProcAddress
LoadLibraryW
LocalFree
GetConsoleOutputCP
HeapSize
SetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetCommandLineA
GetModuleHandleExW
WriteFile
TlsFree
TlsSetValue
TlsAlloc
DeleteCriticalSection
CompareStringW
MultiByteToWideChar
WideCharToMultiByte
LCMapStringW
RtlUnwind
GetStartupInfoW
SetUnhandledExceptionFilter
CreateMutexA
WaitForSingleObjectEx
WaitForSingleObject
ReleaseMutex
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
HeapFree
HeapReAlloc
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
CreateWaitableTimerW
Sleep
SetWaitableTimer
GetTempPathW
GetModuleHandleA
GetFullPathNameW
WriteConsoleW
CreateProcessW
GetWindowsDirectoryW
CreateNamedPipeW
ExitProcess
GetModuleHandleW
GetFileType
GetConsoleMode
HeapAlloc
SetLastError
GetLastError
RaiseException
DuplicateHandle
AreFileApisANSI
TlsGetValue
DeleteFileW
CreateDirectoryW
GetFileInformationByHandle
FindClose
FindNextFileW
lstrlenW
LoadLibraryA
QueryPerformanceFrequency
WriteFileEx
GetStdHandle
SleepEx
ReadFileEx
SetFilePointerEx
FlushFileBuffers
GetCommandLineW
SetEnvironmentVariableW
GetEnvironmentVariableW
GetEnvironmentStringsW
GetCurrentDirectoryW
RtlCaptureContext
QueryPerformanceCounter
GetCurrentThread
AddVectoredExceptionHandler
FreeEnvironmentStringsW
FormatMessageW
GetFileAttributesW
FindFirstFileW
OpenProcess
ReadProcessMemory
WriteProcessMemory
SetFileAttributesW
CreateFileW
GetVersionExW
GetStringTypeW
CloseHandle
GetProcessIoCounters
GetSystemTimes
GetProcessHeap
VirtualQueryEx
advapi32
OpenProcessToken
IsValidSid
GetLengthSid
CopySid
GetTokenInformation
psapi
GetPerformanceInfo
GetProcessMemoryInfo
GetModuleFileNameExW
pdh
PdhAddCounterW
PdhCollectQueryData
PdhOpenQueryA
PdhCloseQuery
PdhRemoveCounter
PdhGetFormattedCounterValue
shell32
CommandLineToArgvW
powrprof
CallNtPowerInformation
oleaut32
SysFreeString
GetErrorInfo
SysStringLen
ntdll
NtReadFile
NtCreateFile
RtlNtStatusToDosError
NtQueryInformationProcess
NtQuerySystemInformation
NtWriteFile
RtlGetVersion
Sections
.text Size: 668KB - Virtual size: 668KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116.2MB - Virtual size: 116.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 265KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ