Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
Super Mario 64 - N viejo/Super Mario 64 - N viejo.exe
Resource
win7-20240704-en
General
-
Target
Super Mario 64 - N viejo/Super Mario 64 - N viejo.exe
-
Size
10.4MB
-
MD5
678f8f3e3318297ad5d10fcd0a28031c
-
SHA1
5bd8c9e24ccdb2b7748a5f30cc0a28579ba9d85b
-
SHA256
96ad2703473931cee48361aa938d27271087b23fd37965989fd7aad629f92cea
-
SHA512
58e94ecf6338c781b45bcbf1fb4beebfa0eeed5e74a10589041f3ede1f287eb79c5d9c6f3a31d1534a43dd8bf738fb6d73a99ef65d07470917fa5739c83984c3
-
SSDEEP
196608:WiSoon4CXXfQd541qhf1LSAMXKHn2thR+2fIbyToI/hf8tDw0SvnaBwMMd1T:Wv34CXPQd541g3qKHSNyyToINE00Ywwr
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x00070000000234f1-58.dat aspack_v212_v242 behavioral2/files/0x00070000000234f2-67.dat aspack_v212_v242 behavioral2/files/0x00070000000234ef-73.dat aspack_v212_v242 behavioral2/files/0x00070000000234f5-71.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation Mario64.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation Mario64.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation Mario64.exe -
Executes dropped EXE 6 IoCs
pid Process 3172 Mario64.exe 2176 Emulador.exe 5008 Mario64.exe 2008 Emulador.exe 4144 Mario64.exe 3084 Emulador.exe -
Loads dropped DLL 21 IoCs
pid Process 2176 Emulador.exe 2176 Emulador.exe 2176 Emulador.exe 2176 Emulador.exe 2176 Emulador.exe 2176 Emulador.exe 2176 Emulador.exe 2008 Emulador.exe 2008 Emulador.exe 2008 Emulador.exe 2008 Emulador.exe 2008 Emulador.exe 2008 Emulador.exe 2008 Emulador.exe 3084 Emulador.exe 3084 Emulador.exe 3084 Emulador.exe 3084 Emulador.exe 3084 Emulador.exe 3084 Emulador.exe 3084 Emulador.exe -
resource yara_rule behavioral2/files/0x00070000000234ec-43.dat upx behavioral2/memory/3172-49-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/3172-82-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/3172-146-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/5008-171-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/5008-208-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/4144-260-0x0000000000400000-0x0000000000452000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 23 IoCs
description ioc Process File created C:\Program Files (x86)\Super Mario 64\Plugin\Jabo_DInput.$$A Super Mario 64 - N viejo.exe File created C:\Program Files (x86)\Super Mario 64\Project64.$$A Super Mario 64 - N viejo.exe File created C:\Program Files (x86)\Super Mario 64\Save\SUPER MARIO 64.$$A Super Mario 64 - N viejo.exe File opened for modification C:\Program Files (x86)\Super Mario 64\Logs\Direct3D8 Error.log Emulador.exe File opened for modification C:\Program Files (x86)\Super Mario 64\Logs\Direct3D8 Error.log Emulador.exe File created C:\Program Files (x86)\Super Mario 64\ico.$$A Super Mario 64 - N viejo.exe File created C:\Program Files (x86)\Super Mario 64\Plugin\Jabo_Dsound.$$A Super Mario 64 - N viejo.exe File created C:\Program Files (x86)\Super Mario 64\Plugin\NRage_DInput8_V2.$$A Super Mario 64 - N viejo.exe File opened for modification C:\Program Files (x86)\Super Mario 64\Desinstalador.exe Super Mario 64 - N viejo.exe File opened for modification C:\Program Files (x86)\Super Mario 64\Save\SUPER MARIO 64.eep Emulador.exe File created C:\Program Files (x86)\Super Mario 64\Plugin\Jabo_Direct3D6.$$A Super Mario 64 - N viejo.exe File created C:\Program Files (x86)\Super Mario 64\Plugin\Jabo_Direct3D8.$$A Super Mario 64 - N viejo.exe File created C:\Program Files (x86)\Super Mario 64\Super Mario 64.$$A Super Mario 64 - N viejo.exe File opened for modification C:\Program Files (x86)\Super Mario 64\Save\SUPER MARIO 64.eep Emulador.exe File opened for modification C:\Program Files (x86)\Super Mario 64\Save\SUPER MARIO 64.eep Emulador.exe File created C:\Program Files (x86)\Super Mario 64\Plugin\RSP.$$A Super Mario 64 - N viejo.exe File created C:\Program Files (x86)\Super Mario 64\Plugin\Zilmar_Audio.$$A Super Mario 64 - N viejo.exe File created C:\Program Files (x86)\Super Mario 64\Project64.exe.$$A Super Mario 64 - N viejo.exe File created C:\Program Files (x86)\Super Mario 64\Desinstalador.$$A Super Mario 64 - N viejo.exe File created C:\Program Files (x86)\Super Mario 64\Emulador.$$A Super Mario 64 - N viejo.exe File created C:\Program Files (x86)\Super Mario 64\Mario64.$$A Super Mario 64 - N viejo.exe File created C:\Program Files (x86)\Super Mario 64\Plugin\Adaptoid_v1_0.$$A Super Mario 64 - N viejo.exe File created C:\Program Files (x86)\Super Mario 64\Plugin\No Sound.$$A Super Mario 64 - N viejo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4912 2176 WerFault.exe 100 404 2008 WerFault.exe 112 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3084 Emulador.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1504 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1504 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2176 Emulador.exe 2176 Emulador.exe 2176 Emulador.exe 2008 Emulador.exe 2008 Emulador.exe 2008 Emulador.exe 3084 Emulador.exe 3084 Emulador.exe 3084 Emulador.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3172 wrote to memory of 2780 3172 Mario64.exe 98 PID 3172 wrote to memory of 2780 3172 Mario64.exe 98 PID 3172 wrote to memory of 2780 3172 Mario64.exe 98 PID 2780 wrote to memory of 2176 2780 cmd.exe 100 PID 2780 wrote to memory of 2176 2780 cmd.exe 100 PID 2780 wrote to memory of 2176 2780 cmd.exe 100 PID 5008 wrote to memory of 4596 5008 Mario64.exe 110 PID 5008 wrote to memory of 4596 5008 Mario64.exe 110 PID 5008 wrote to memory of 4596 5008 Mario64.exe 110 PID 4596 wrote to memory of 2008 4596 cmd.exe 112 PID 4596 wrote to memory of 2008 4596 cmd.exe 112 PID 4596 wrote to memory of 2008 4596 cmd.exe 112 PID 4144 wrote to memory of 3996 4144 Mario64.exe 121 PID 4144 wrote to memory of 3996 4144 Mario64.exe 121 PID 4144 wrote to memory of 3996 4144 Mario64.exe 121 PID 3996 wrote to memory of 3084 3996 cmd.exe 123 PID 3996 wrote to memory of 3084 3996 cmd.exe 123 PID 3996 wrote to memory of 3084 3996 cmd.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\Super Mario 64 - N viejo\Super Mario 64 - N viejo.exe"C:\Users\Admin\AppData\Local\Temp\Super Mario 64 - N viejo\Super Mario 64 - N viejo.exe"1⤵
- Drops file in Program Files directory
PID:2112
-
C:\Program Files (x86)\Super Mario 64\Mario64.exe"C:\Program Files (x86)\Super Mario 64\Mario64.exe" C:\Users\Admin\Desktop\UndoExpand.doc1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FD2C.tmp\Mario64.bat" C:\Users\Admin\Desktop\UndoExpand.doc "2⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Super Mario 64\Emulador.exeEmulador.exe Super Mario 64.n643⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 14284⤵
- Program crash
PID:4912
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f8 0x3f01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2176 -ip 21761⤵PID:4976
-
C:\Program Files (x86)\Super Mario 64\Mario64.exe"C:\Program Files (x86)\Super Mario 64\Mario64.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\361E.tmp\Mario64.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Program Files (x86)\Super Mario 64\Emulador.exeEmulador.exe Super Mario 64.n643⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 17004⤵
- Program crash
PID:404
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2008 -ip 20081⤵PID:1676
-
C:\Program Files (x86)\Super Mario 64\Mario64.exe"C:\Program Files (x86)\Super Mario 64\Mario64.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\68F6.tmp\Mario64.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Program Files (x86)\Super Mario 64\Emulador.exeEmulador.exe Super Mario 64.n643⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3084
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189KB
MD5be5961ce4de0b363069910edb897498b
SHA1ffed3dd42551d0e560eb2596defdd16547d8d5fa
SHA2568d7d373d024206f7513721b320ef3359b885aa6ea73dc2c14b3a42f0c099be2b
SHA512a4c73543926b68922c86000ed3b966acba53fb25521cf473d3f5f98b4bb416dc9ba50224406764d3bf890c9fbd9394cb1a5c9d4eb88d7fbff3869c73f7b2013d
-
Filesize
155KB
MD55925382327d825d10a9b169490bd9a64
SHA13c3d4bfb6190da8b94a25126c24e91601d1a8d24
SHA256449b360739a7c667ddfb44f9a7b9a77967765b4a915c7b64a09d077acd0768e0
SHA5126ffab3fbc57330072c46d8f3c0c7a108575e61bb3333bbac3cbb3950e165a58fabc39782337068faeb755c7660d8d379d1a18ba29fd9f9fa07379ae9dd376d76
-
Filesize
67KB
MD5d5f798c360aaac128b0fc4a211688ccd
SHA14b55d92fda42f108bd0e22503afd905754e95caf
SHA2560468fc03d5bfd4e47fb0c5f69c657cab62e4bbb2c8948949b4a1d106648ab99e
SHA512517bce1e5fd1ce06d9d8986e936a0029bf05fd8b6518ea56df7257eb540a2fa722bb799ac2c36a2223f973f074cee29c648720fe01c7b25a77578e828bb1b5d5
-
Filesize
232KB
MD5ff57f60c58ede6364b980edcb311873b
SHA15ec6e231f780d9eafa6ee855e0f4968a7f8c347d
SHA25605536c82c764f24038bd6f22d47a5427318ce3118bbe1bb798c8309d40f00fcf
SHA5121e3b5d1bd93cf36dcd862869374d7931eedb1578ceec635c1972f302bd1abaa2d9a63721a2ca9ab4fe1fda8f268f352c70e8a35c8bae91253cb2b4eb1bc7234d
-
Filesize
53KB
MD5d5f1a6d72a4eb2e7adf1f5b803e97419
SHA1d8a93e436e488279d40e0e79a4a04f4ff175f36a
SHA2569955b91ace2f7e87ec5034274228906e43dac4961abbd296aedfb378b7b3ccf6
SHA512238b8fd0115f6a820498445d6a2c1cd21e46138272edcb7355cce28ae8aad070e10065c99c95e5d4b03238b8d3b66d2652ad6162e1bb687a99ee6d900ce17ec7
-
Filesize
107KB
MD523706412ee7a8e7c2c2aa218f9258dd8
SHA167fab0e559f4068298b4ca8a682dd2e63be4ac07
SHA256cdf1a04e877aa9ed57f9446b34a2bdf12cf263542bd461f6a4354d458721abf9
SHA512b77e1ff74269c7c031bec751162e92305038192952d282e8853d37766f71db62b0dfb99ffcd1139fe866f7b1290a41804c279d7e06fc4718bb7c1c3e2c6404a8
-
Filesize
1.1MB
MD52d914cf0cab53125d6a9635447fff97c
SHA1a6f3c1303d5d83d6f82c4b57dfdc9ed81d136ea0
SHA256b5ae7e009019739e2f783a26acdfd18a850f3f995d4347091833e83eca2a7932
SHA512498beae574b3a0219164c7e41807d2dcedc1c31a08e8f82e69a6c3c347b6479782e2633cc5df61f7a4f2b01c799e8818c8f0b33c57498a4515f4da3455f333de
-
Filesize
340KB
MD5e66224fd74128603f88caf84a2be7b5c
SHA155d8a2cb7e075dc5d940182435e94cfcb27d0570
SHA25614852edd261c00f392f331862b2313bf04ac0b5f0a67d22b0f87049d3240de63
SHA5128d4ab2db73640382981c14751d1483976e96fe5faf65540ea919c87fa37ca263c22e2ef5734c81ea2f544e067cd351deb8f0e4c2271b5f5bfe094941c3f5f0b4
-
Filesize
512B
MD50b91c7a69a89d34bd6d63948b06a1497
SHA1671a5c9782a3307091a98c8fec0782ebe6eed7f8
SHA256ed22a78d4e77ded30cd61898a7aa03a355a1db16d15b5a19d24a4538aac9020a
SHA51289448889ac07190ffedddc2026e100a64663aa8933ed89c9018d36ff03ce4e23fce4115e2a6845b8524cfc7540991b6284469b3b6e83b67671d16ed1b7e82a91
-
Filesize
24.0MB
MD5e51a6ff9b2dbbd216158cacff35eb215
SHA17b156eae442097ab16bea77115f0619e236deaef
SHA25685a1a81329940888384bc7660e69d735e3dc73d7fb6ad3cea65e4ea86b9a8920
SHA512a32448f678525323bfa7f750c0b2a5db3ed9ec08901c6a956dd8f76a8fa0546e9bb9110ad31598ed349f8b627396c3174dea0b976097cba92ed8923044c1b74d
-
Filesize
31B
MD587d6025ae92be37a310adc5ba90d105e
SHA1ba032dbc50129b1513fa630a69c3dc6e89575c3e
SHA25628be29da2836e6de8890bb709fb57058dc40cee6c7ebf3e98ec559ef11ef4b35
SHA5120a131368444ce396883001556c127a61350de3faa16db87e12372d5ff03b65f25f7ab8611a48d0d05d01d9144d9a244433f0e6852ece8474455be10c3d2724d1