Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 09:00

General

  • Target

    Plants_Vs_Zombies_V1.2.exe

  • Size

    270KB

  • MD5

    e34782c5a80ffa4795fc6ec52938c414

  • SHA1

    a70f43d7308f480f5348a7915d644f8825c33b1b

  • SHA256

    6f1b1c63874a345aa14a7350e348d0e75a0d0b2b3e21af1946788d5f8fc1d663

  • SHA512

    077e5883c21af093d3ce556bc40354dbdfe015efefb75657b23a962b22c8560bf92f0de107fb29024661263c46d1dacadd1a16e8cfde1d63893cc76399ca7eb5

  • SSDEEP

    6144:eO7Iuxh3p7iwWdOXGou1oSy4H163LeylSkwhlXj6we7:37xxh3cwWdStaX/VSvlwd637

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Plants_Vs_Zombies_V1.2.exe
    "C:\Users\Admin\AppData\Local\Temp\Plants_Vs_Zombies_V1.2.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious use of WriteProcessMemory
    PID:4752
    • C:\Windows\SysWOW64\Plants_Vs_Zombies_V1.2.exe
      C:\Windows\system32\Plants_Vs_Zombies_V1.2.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1352
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x33c 0x4ac
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Plants_Vs_Zombies_V1.2.exe

    Filesize

    231KB

    MD5

    c37746b6fe495b24e829f8af6d884e74

    SHA1

    3fae205bf8a5db1d3aa577ed04a79585f13cd9f2

    SHA256

    75160a71d7167fd324fe4cdef176f16ce42f6a8a6f6250ab900e5d2a6810fd87

    SHA512

    c13726953b7ddadcebff99f845533ff33180c78540809c20aa450efaad47482ac29e7c1438d82124a42994fbf3c51ec8af123b783df2b90d166556939ea45eed