Analysis

  • max time kernel
    133s
  • max time network
    135s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06-06-2024 10:45

General

  • Target

    mario_level_1.exe

  • Size

    5.8MB

  • MD5

    7c1300a990ad92ab84c8c4983aa9f508

  • SHA1

    a538297c7becf1b5ded79703694af6359a33feb4

  • SHA256

    b9e82fbe8ddb728fda1fcbedd40a4df46d480c0badd66dd8ed7888da161fb3b1

  • SHA512

    cafd1529707f068c60e1d3286565830f31c61cb47ef45790ccc9396fdaecff20f875fac5d0224d4592e906c3187f4443887622d16077edcc35c9da3d7f8808be

  • SSDEEP

    98304:Se/AVv+URlRLH9dM8Se/TjnNYF/9cXq9535RPPl+QLXT1FoK0mwtVXudvz1/gNWG:Sewv+UB5eA3nagajzn1L0dLedK7

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\mario_level_1.exe
    "C:\Users\Admin\AppData\Local\Temp\mario_level_1.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of SetWindowsHookEx
    PID:4904
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x3fc
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4904-46-0x0000000000840000-0x0000000000846000-memory.dmp

    Filesize

    24KB

  • memory/4904-62-0x0000000066240000-0x0000000066260000-memory.dmp

    Filesize

    128KB

  • memory/4904-58-0x0000000002360000-0x0000000002369000-memory.dmp

    Filesize

    36KB

  • memory/4904-55-0x0000000000870000-0x0000000000879000-memory.dmp

    Filesize

    36KB

  • memory/4904-50-0x0000000000860000-0x000000000086B000-memory.dmp

    Filesize

    44KB

  • memory/4904-42-0x0000000002320000-0x0000000002357000-memory.dmp

    Filesize

    220KB

  • memory/4904-38-0x0000000000830000-0x0000000000839000-memory.dmp

    Filesize

    36KB

  • memory/4904-30-0x0000000000810000-0x0000000000819000-memory.dmp

    Filesize

    36KB

  • memory/4904-26-0x0000000000800000-0x0000000000806000-memory.dmp

    Filesize

    24KB

  • memory/4904-22-0x00000000007F0000-0x00000000007F7000-memory.dmp

    Filesize

    28KB

  • memory/4904-18-0x00000000007D0000-0x00000000007DA000-memory.dmp

    Filesize

    40KB

  • memory/4904-14-0x00000000001F0000-0x00000000001F7000-memory.dmp

    Filesize

    28KB

  • memory/4904-10-0x0000000010000000-0x0000000010007000-memory.dmp

    Filesize

    28KB

  • memory/4904-4-0x000000006A740000-0x000000006A7A1000-memory.dmp

    Filesize

    388KB

  • memory/4904-34-0x0000000000820000-0x0000000000828000-memory.dmp

    Filesize

    32KB

  • memory/4904-0-0x000000001E000000-0x000000001E262000-memory.dmp

    Filesize

    2.4MB