Overview
overview
7Static
static
3SM64Plus.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$TEMP/vcre...15.exe
windows10-2004-x64
7Super Mari...us.exe
windows10-2004-x64
1Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3build.sh
windows10-2004-x64
3lib64Plus.dll
windows10-2004-x64
1lib64Plus_arm64.so
windows10-2004-x64
3lib64Plus_x64.so
windows10-2004-x64
3rebuild.sh
windows10-2004-x64
3rebuild_clean.sh
windows10-2004-x64
3uninstall.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
SM64Plus.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$TEMP/vcredist_x86_2015.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
Super Mario 64 Plus.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240319-en
Behavioral task
behavioral10
Sample
build.sh
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
lib64Plus.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
lib64Plus_arm64.so
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
lib64Plus_x64.so
Resource
win10v2004-20240226-en
Behavioral task
behavioral14
Sample
rebuild.sh
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
rebuild_clean.sh
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
uninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20231215-en
General
-
Target
SM64Plus.exe
-
Size
16.2MB
-
MD5
7590e973dab0640c3fdcd9a2a1577c99
-
SHA1
95a2403f8b02fa83e0963078cba8c4028eefb79b
-
SHA256
312575ab6ccbd049e30b38bb914cf3ec3abfa47d2415f2d6ca6c640d9ea05d7a
-
SHA512
8f5d4307cf4884ab574e63bc782a383e956d33fc58dff7080b810d54e3467ba3bd4e1be3e35a9ba8613de608d37055483177bf0e38ceae39fc260f3006e1e822
-
SSDEEP
393216:b351NOsenD12zS7SEOegn4j7BgNE9O+wcDGFdClu8ZLzzA:bNOnnD1kS7249O3cDGvClnk
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4000 vcredist_x86_2015.exe 1028 vcredist_x86_2015.exe 2728 Super Mario 64 Plus.exe -
Loads dropped DLL 17 IoCs
pid Process 3708 SM64Plus.exe 3708 SM64Plus.exe 3708 SM64Plus.exe 3708 SM64Plus.exe 3708 SM64Plus.exe 3708 SM64Plus.exe 3708 SM64Plus.exe 3708 SM64Plus.exe 3708 SM64Plus.exe 3708 SM64Plus.exe 3708 SM64Plus.exe 3708 SM64Plus.exe 3708 SM64Plus.exe 3708 SM64Plus.exe 1028 vcredist_x86_2015.exe 3708 SM64Plus.exe 2728 Super Mario 64 Plus.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 11 IoCs
description ioc Process File created C:\Program Files (x86)\Super Mario 64 Plus\build.sh SM64Plus.exe File created C:\Program Files (x86)\Super Mario 64 Plus\lib64Plus.dll SM64Plus.exe File created C:\Program Files (x86)\Super Mario 64 Plus\options.ini SM64Plus.exe File created C:\Program Files (x86)\Super Mario 64 Plus\rebuild.sh SM64Plus.exe File created C:\Program Files (x86)\Super Mario 64 Plus\rebuild_clean.sh SM64Plus.exe File opened for modification C:\Program Files (x86)\Super Mario 64 Plus\Uninstall.exe SM64Plus.exe File created C:\Program Files (x86)\Super Mario 64 Plus\Super Mario 64 Plus.exe SM64Plus.exe File created C:\Program Files (x86)\Super Mario 64 Plus\data.win SM64Plus.exe File created C:\Program Files (x86)\Super Mario 64 Plus\lib64Plus_arm64.so SM64Plus.exe File created C:\Program Files (x86)\Super Mario 64 Plus\lib64Plus_x64.so SM64Plus.exe File created C:\Program Files (x86)\Super Mario 64 Plus\uninstall.exe SM64Plus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell Super Mario 64 Plus.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Super Mario 64 Plus.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Super Mario 64 Plus.exe Set value (data) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff Super Mario 64 Plus.exe Set value (int) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\NodeSlot = "3" Super Mario 64 Plus.exe Set value (data) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = ffffffff Super Mario 64 Plus.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 Super Mario 64 Plus.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Super Mario 64 Plus.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings Super Mario 64 Plus.exe Set value (data) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 Super Mario 64 Plus.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Super Mario 64 Plus.exe Set value (data) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 Super Mario 64 Plus.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Super Mario 64 Plus.exe Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Super Mario 64 Plus.exe Set value (data) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Super Mario 64 Plus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Documents" Super Mario 64 Plus.exe Set value (data) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 14002e80922b16d365937a46956b92703aca08af0000 Super Mario 64 Plus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Super Mario 64 Plus.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1780 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1780 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2728 Super Mario 64 Plus.exe 2728 Super Mario 64 Plus.exe 2728 Super Mario 64 Plus.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3708 wrote to memory of 4000 3708 SM64Plus.exe 92 PID 3708 wrote to memory of 4000 3708 SM64Plus.exe 92 PID 3708 wrote to memory of 4000 3708 SM64Plus.exe 92 PID 4000 wrote to memory of 1028 4000 vcredist_x86_2015.exe 93 PID 4000 wrote to memory of 1028 4000 vcredist_x86_2015.exe 93 PID 4000 wrote to memory of 1028 4000 vcredist_x86_2015.exe 93 PID 3708 wrote to memory of 2728 3708 SM64Plus.exe 95 PID 3708 wrote to memory of 2728 3708 SM64Plus.exe 95 PID 1332 wrote to memory of 1844 1332 sethc.exe 98 PID 1332 wrote to memory of 1844 1332 sethc.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\SM64Plus.exe"C:\Users\Admin\AppData\Local\Temp\SM64Plus.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\vcredist_x86_2015.exe"C:\Users\Admin\AppData\Local\Temp\vcredist_x86_2015.exe" /quiet /norestart2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\vcredist_x86_2015.exe"C:\Users\Admin\AppData\Local\Temp\vcredist_x86_2015.exe" /quiet /norestart -burn.unelevated BurnPipe.{E2E3258E-1C92-4F04-A5E7-A605FD7E52FA} {CBD06012-D3B9-43CF-B5A3-0A8FB0BCD7B2} 40003⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1028
-
-
-
C:\Program Files (x86)\Super Mario 64 Plus\Super Mario 64 Plus.exe"C:\Program Files (x86)\Super Mario 64 Plus\Super Mario 64 Plus.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2728
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2fc 0x1541⤵
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
C:\Windows\system32\sethc.exesethc.exe 2111⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\system32\EaseOfAccessDialog.exe"C:\Windows\system32\EaseOfAccessDialog.exe" 2112⤵PID:1844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.9MB
MD56137428e578b25a60f754788072feaf0
SHA17d74367fe0972a8267ffe42a11a03affabf8f594
SHA256f5116daf3771f9f4cb216745ceaea2f087f61dbd3ead76094692e11f0b06bf60
SHA51287d41a08e7f8ab01d0e884c2555346be6323717075f18a6932e4cf9b020e156130d35c0b1984f6ad6bce7dfe6a849ece9559a040691bab8ca4e8ea1aae16017e
-
Filesize
2.0MB
MD50f7fa16456de57bd3f9d69307fb51cf8
SHA123f7ff3def6fe375877b970785474eb866754141
SHA25623ffcd45e53984afd65531b3ee20070f8930746b77aaa8581d935c5d796ea05c
SHA51258b7edb7d1099f80db01ef41d4849efb24d9ff86c46a67cd962ca1e09fffabb4d2740542c599e40d100458c61d67df98f7d88a987345629c089ceedc9425fea3
-
Filesize
224KB
MD536be8df46c3ca20360e9fe65ee112ef6
SHA192bfb8a9137932e7db8e9dfb84b273479e618373
SHA256f97a2e89f33fb28d058b3a60e3e2b50778dab2d38cfcc5546fd085fb73036668
SHA5124e48a680fc397a4ba3a018c0f9d38cca15bac0f1b13af081065d1a9e7349aeec4a09029b49ac0d3ef2294f6b364a5209adec0ba26985ba3bc5578863e671c50b
-
Filesize
156B
MD55cabcee1eb050c169db3b89154f912ce
SHA1691b5f13c28612e87e65e8608bf290fd19e9e371
SHA256aa72cf7612ee1c5f61bcf9722f7b40dd21d40fab93ba9c3ccbd22f0bb88502c7
SHA5129be66df5d7f5578b5a11455a4d7c666f04449134e6b4f6af31600d83cc54a592247b5d15995007ab1e593c95b96da33bf29b84536c4d916a8a07aa0bd8cfe7a9
-
Filesize
12KB
MD5ea00e2678e4679ba28b0f560baec9776
SHA1f9b647b1ab50cc2de981757ac914a5787bccd95a
SHA25660d4a86f65e141d4b6b778e5f448a0c818bd2fa28db7b9dabc1395d354b19cc5
SHA5122ee7a4a0af955ba376c66d13e626ca135b2afd13277a006f523eb2fdc1133a12ea35b065a8c119843fbe82f89190cdb2b769329af14e4313a2419b739b27337a
-
Filesize
3KB
MD5fe3ee87108ce3e17ea6698e4cc042c14
SHA1e3cf6cd95a4791efff2e80bdc8cf3e03263a63ae
SHA256b9c539e660aec3e9fb6437d66d1cb5df963414a7b686623e44cf1abdb2267cc2
SHA512cb1ada56abae8675932a5202bc5e688683de6ca18ce48ccabbed2a99080e786c47b3fe0880baf8a0dace61fc52246bbb2bab0b4eaac2b6aea59f2fd17b516c18
-
Filesize
9KB
MD5940e349c4d672436816e31d816ccdfbd
SHA1ac25298f9fe271f59a0bd0cc6ec4640097d5e9ad
SHA256edf47cfe918669f95b3aade7335ef8b33ae9d36eaf2be2f364d0d94637117d10
SHA5125711fc585cc36138891d02c466c09ada345003e910d89a34fa0b54b67432bec4b6fec549ad8d2a9c4a17bf3723f1a60219a424a237bc24a0912c6bec886f14d7
-
Filesize
13.1MB
MD51a15e6606bac9647e7ad3caa543377cf
SHA1bfb74e498c44d3a103ca3aa2831763fb417134d1
SHA256fdd1e1f0dcae2d0aa0720895eff33b927d13076e64464bb7c7e5843b7667cd14
SHA512e8cb67fc8e0312da3cc98364b96dfa1a63150ab9de60069c4af60c1cf77d440b7dffe630b4784ba07ea9bf146bdbf6ad5282a900ffd6ab7d86433456a752b2fd
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
118KB
MD54d20a950a3571d11236482754b4a8e76
SHA1e68bd784ac143e206d52ecaf54a7e3b8d4d75c9c
SHA256a9295ad4e909f979e2b6cb2b2495c3d35c8517e689cd64a918c690e17b49078b
SHA5128b9243d1f9edbcbd6bdaf6874dc69c806bb29e909bd733781fde8ac80ca3fff574d786ca903871d1e856e73fd58403bebb58c9f23083ea7cd749ba3e890af3d2