pvzhe_launcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
PlantsVsZombies Hybrid English v2.5.1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PlantsVsZombies Hybrid English v2.5.1.exe
Resource
win10v2004-20241007-en
General
-
Target
PlantsVsZombies Hybrid English v2.5.1.exe
-
Size
146.1MB
-
MD5
e4892459efdf67e7d27296886f95060b
-
SHA1
526982357b445835231acb9306e56c7ac10628f4
-
SHA256
beb0b07adf6b8d818a6aec48779d8e6eedb18e100675dabf9b634f15f4ccf1b8
-
SHA512
75cd95ade8c94d37e8366b2f63d19093372378257e9c904ac865037ceb81db4b04166b9f2ccf51f24429fd9dd52429e897bbc78d13993f9679532bcf52c714fd
-
SSDEEP
3145728:9Akcko8i8iQi/iOiriIiTiLiQiJikiFi6i4i3i2iWi2iqtiiiMiSiwibieiUiTiG:9Akcko4DoUS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource PlantsVsZombies Hybrid English v2.5.1.exe
Files
-
PlantsVsZombies Hybrid English v2.5.1.exe.exe windows:5 windows x86 arch:x86
Password: 111
baae94c249ba146bfd59fa89a7d865f4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcessTimes
GetCurrentProcess
GetCurrentProcessId
TerminateProcess
SwitchToThread
CreateThread
GetCurrentThreadId
IsProcessorFeaturePresent
GlobalMemoryStatusEx
GetSystemInfo
GetSystemTimeAsFileTime
GetSystemDirectoryW
VirtualAlloc
VirtualProtect
VirtualQuery
FreeLibrary
GetModuleFileNameW
GetProcAddress
LoadLibraryW
LocalFree
GetConsoleOutputCP
HeapSize
SetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetCommandLineA
GetModuleHandleExW
WriteFile
TlsFree
TlsSetValue
TlsAlloc
DeleteCriticalSection
CompareStringW
MultiByteToWideChar
WideCharToMultiByte
LCMapStringW
RtlUnwind
GetStartupInfoW
SetUnhandledExceptionFilter
CreateMutexA
WaitForSingleObjectEx
WaitForSingleObject
ReleaseMutex
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
HeapFree
HeapReAlloc
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
CreateWaitableTimerW
Sleep
SetWaitableTimer
GetModuleHandleA
GetFullPathNameW
WriteConsoleW
CreateProcessW
GetWindowsDirectoryW
CreateNamedPipeW
ExitProcess
GetModuleHandleW
GetFileType
GetConsoleMode
CopyFileExW
HeapAlloc
SetLastError
GetLastError
RaiseException
DuplicateHandle
AreFileApisANSI
TlsGetValue
DeleteFileW
CreateDirectoryW
GetFileInformationByHandle
FindClose
FindNextFileW
lstrlenW
LoadLibraryA
QueryPerformanceFrequency
WriteFileEx
GetStdHandle
SleepEx
ReadFileEx
SetFilePointerEx
FlushFileBuffers
GetCommandLineW
SetEnvironmentVariableW
GetEnvironmentVariableW
GetEnvironmentStringsW
GetCurrentDirectoryW
RtlCaptureContext
QueryPerformanceCounter
GetCurrentThread
AddVectoredExceptionHandler
FreeEnvironmentStringsW
FormatMessageW
GetFileAttributesW
FindFirstFileW
OpenProcess
ReadProcessMemory
WriteProcessMemory
SetFileAttributesW
CreateFileW
GetVersionExW
GetStringTypeW
CloseHandle
GetProcessIoCounters
GetSystemTimes
GetProcessHeap
VirtualQueryEx
advapi32
OpenProcessToken
IsValidSid
GetLengthSid
CopySid
GetTokenInformation
psapi
GetPerformanceInfo
GetProcessMemoryInfo
GetModuleFileNameExW
pdh
PdhAddCounterW
PdhCollectQueryData
PdhOpenQueryA
PdhCloseQuery
PdhRemoveCounter
PdhGetFormattedCounterValue
shell32
CommandLineToArgvW
powrprof
CallNtPowerInformation
oleaut32
SysFreeString
GetErrorInfo
SysStringLen
ntdll
NtReadFile
NtCreateFile
RtlNtStatusToDosError
NtQueryInformationProcess
NtQuerySystemInformation
NtWriteFile
RtlGetVersion
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 144.4MB - Virtual size: 144.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 265KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ