Analysis
-
max time kernel
133s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
06-06-2024 10:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
mario_level_1.exe
Resource
win10-20240404-en
windows10-1703-x64
3 signatures
150 seconds
General
-
Target
mario_level_1.exe
-
Size
5.8MB
-
MD5
7c1300a990ad92ab84c8c4983aa9f508
-
SHA1
a538297c7becf1b5ded79703694af6359a33feb4
-
SHA256
b9e82fbe8ddb728fda1fcbedd40a4df46d480c0badd66dd8ed7888da161fb3b1
-
SHA512
cafd1529707f068c60e1d3286565830f31c61cb47ef45790ccc9396fdaecff20f875fac5d0224d4592e906c3187f4443887622d16077edcc35c9da3d7f8808be
-
SSDEEP
98304:Se/AVv+URlRLH9dM8Se/TjnNYF/9cXq9535RPPl+QLXT1FoK0mwtVXudvz1/gNWG:Sewv+UB5eA3nagajzn1L0dLedK7
Score
6/10
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: mario_level_1.exe File opened (read-only) \??\B: mario_level_1.exe File opened (read-only) \??\E: mario_level_1.exe File opened (read-only) \??\H: mario_level_1.exe File opened (read-only) \??\I: mario_level_1.exe File opened (read-only) \??\K: mario_level_1.exe File opened (read-only) \??\L: mario_level_1.exe File opened (read-only) \??\O: mario_level_1.exe File opened (read-only) \??\R: mario_level_1.exe File opened (read-only) \??\J: mario_level_1.exe File opened (read-only) \??\N: mario_level_1.exe File opened (read-only) \??\P: mario_level_1.exe File opened (read-only) \??\S: mario_level_1.exe File opened (read-only) \??\T: mario_level_1.exe File opened (read-only) \??\A: mario_level_1.exe File opened (read-only) \??\U: mario_level_1.exe File opened (read-only) \??\V: mario_level_1.exe File opened (read-only) \??\W: mario_level_1.exe File opened (read-only) \??\X: mario_level_1.exe File opened (read-only) \??\Z: mario_level_1.exe File opened (read-only) \??\G: mario_level_1.exe File opened (read-only) \??\M: mario_level_1.exe File opened (read-only) \??\Y: mario_level_1.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1512 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1512 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4904 mario_level_1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\mario_level_1.exe"C:\Users\Admin\AppData\Local\Temp\mario_level_1.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
PID:4904
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1512