Overview
overview
7Static
static
7HA_MarioXP120_DYJ.exe
windows7-x64
7HA_MarioXP120_DYJ.exe
windows10-2004-x64
7$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3CNCS32.dll
windows7-x64
1CNCS32.dll
windows10-2004-x64
1Editor/Mar...it.exe
windows7-x64
1Editor/Mar...it.exe
windows10-2004-x64
1MarioXP.exe
windows7-x64
7MarioXP.exe
windows10-2004-x64
7help.chm
windows7-x64
1help.chm
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 15:14
Behavioral task
behavioral1
Sample
HA_MarioXP120_DYJ.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
HA_MarioXP120_DYJ.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240319-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
CNCS32.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
CNCS32.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Editor/MarioXPEdit.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
Editor/MarioXPEdit.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
MarioXP.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
MarioXP.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
help.chm
Resource
win7-20240319-en
Behavioral task
behavioral18
Sample
help.chm
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
uninst.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
uninst.exe
Resource
win10v2004-20240226-en
General
-
Target
HA_MarioXP120_DYJ.exe
-
Size
4.8MB
-
MD5
b440c20cca1941852f65e44a2d8c3303
-
SHA1
ce8f0db79e6c168649d371be0749430ef71dd1ec
-
SHA256
ac7b79bd973c76fdc27e3b43a6f51742fc73c492b1d2a8fdd857173f77bf1560
-
SHA512
ac9b15f19f469d1cce46634c40583914193e16b17fc2cef0d4c2ff1389ec0487ed291e1fb083f2716f9739e0f4e2089a733387f4ac7371aa8fbbada1810c3883
-
SSDEEP
98304:sha2BPHVibYaZDkSB1jURkdp4vHSUgFRqHJLG2RDxgLeSMdHU6zx9:gvVibYTR6MHDgcK0gMdHU6V9
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 4004 HA_MarioXP120_DYJ.exe 4004 HA_MarioXP120_DYJ.exe 4004 HA_MarioXP120_DYJ.exe 4004 HA_MarioXP120_DYJ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4384 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4384 AUDIODG.EXE
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5ca5bc3627eced1e65e92bc681d1dd428
SHA15fb30cd6afcce2377feaed143debac138007d4e4
SHA256eb23e2436003fbaba5b08d441f98560c7f26bd25ba21910fb8f7446832bf3e32
SHA512eca6959adbf0a32015b38979e125f5812e1baa9d40e807993326a5bb362d6b42496510a467da99c38c5f266f2bb0705c3506b2979427e817651f04792f6e0a23
-
Filesize
12KB
MD583304a78d2b6ea45ea8404f4cd78721f
SHA1d5c5d19653c751c08579dd094bcc9fef1841af00
SHA25692344973083c0a5d8f5732814c1315124e8e0a2f1ed912583a081f95f7549414
SHA51294076cc935927925641d668c19b389d007ff7e8623f2afe706fc73d1ecb97210577a828a727404b200d9870e14b23d6bd047de9201d629e7443a929c0740c67e
-
Filesize
10KB
MD5d4d09da0218ba046a66a294f0cca9dfe
SHA1417b1acdeb0a4de6ac752a93080ca5b9164eb44b
SHA2569090e47d239aa1da9598a483861165e0153c01ad9ff9d65cb6c0f4497a1da5b3
SHA5123bc9a65842301dab56c139cc5a3457158d37ef294583728c93da1e11ae457df9551b0f8fbd03d5ea3058f3bc794d0ede57ea3efd5d663b45d25647a39cd955bf
-
Filesize
619B
MD53d218c33aba7077af5b11716d340ae2f
SHA1f506fb9c3a67812b2323eea60f7e97e0126b45a8
SHA2565637640c8df59cab3ec546634b2e625c4c69564786d333fd35fa339ba2a53a29
SHA512acbceac743285e37930552d38bba5cd82c901bf82b1035fada744d7de1d587ea9b64391d1a4420496e5ffd1c6f28653838ff61617863cb6fb44d9c3770061fbb