Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-08-2024 02:57

General

  • Target

    Mario/sm64coopdx v1.0 Windows DirectX/sm64coopdx.exe

  • Size

    71.3MB

  • MD5

    9adebc3817d669b1268117a80cd88a72

  • SHA1

    dea680b37047dd0e8fa3729c2e293f31db2165b5

  • SHA256

    aead33796441df32de2d5ced94eec024321e5f5da006576be784b8030401d06e

  • SHA512

    2d0b73d0ec22d3d40e523bd469c4524d6c3d92997d43afeca05044af2e41d2b8e12b083f9683a14b31c804f6cc93768fb585d5ecef9e801d8a978ef00dfcb89c

  • SSDEEP

    393216:a9QKEtRiBVYaM0HMxwkhTb9NWkRLToXtoedWhm77kb3RHlNIpN6uMd/Xo/Vkam4K:a9QKEtRiMWsxDTb9NW6uMd/mm7

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Mario\sm64coopdx v1.0 Windows DirectX\sm64coopdx.exe
    "C:\Users\Admin\AppData\Local\Temp\Mario\sm64coopdx v1.0 Windows DirectX\sm64coopdx.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of SetWindowsHookEx
    PID:872
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x3f8 0x300
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/872-13-0x0000000140000000-0x0000000141000000-memory.dmp
    Filesize

    16.0MB

  • memory/872-14-0x0000000140000000-0x0000000141000000-memory.dmp
    Filesize

    16.0MB

  • memory/872-15-0x0000000140000000-0x0000000141000000-memory.dmp
    Filesize

    16.0MB

  • memory/872-16-0x0000000140000000-0x0000000141000000-memory.dmp
    Filesize

    16.0MB

  • memory/872-17-0x0000000140000000-0x0000000141000000-memory.dmp
    Filesize

    16.0MB

  • memory/872-18-0x0000000140000000-0x0000000141000000-memory.dmp
    Filesize

    16.0MB

  • memory/872-19-0x0000000140000000-0x0000000141000000-memory.dmp
    Filesize

    16.0MB

  • memory/872-20-0x0000000140000000-0x0000000141000000-memory.dmp
    Filesize

    16.0MB

  • memory/872-21-0x0000000140000000-0x0000000141000000-memory.dmp
    Filesize

    16.0MB

  • memory/872-22-0x0000000140000000-0x0000000141000000-memory.dmp
    Filesize

    16.0MB

  • memory/872-23-0x0000000140000000-0x0000000141000000-memory.dmp
    Filesize

    16.0MB

  • memory/872-24-0x0000000140000000-0x0000000141000000-memory.dmp
    Filesize

    16.0MB

  • memory/872-25-0x0000000140000000-0x0000000141000000-memory.dmp
    Filesize

    16.0MB

  • memory/872-26-0x0000000140000000-0x0000000141000000-memory.dmp
    Filesize

    16.0MB

  • memory/872-27-0x0000000140000000-0x0000000141000000-memory.dmp
    Filesize

    16.0MB