Overview
overview
3Static
static
3coop.map
windows11-21h2-x64
3discord_game_sdk.dll
windows11-21h2-x64
1dynos/pack...eo.bin
windows11-21h2-x64
3mods/arena/main.js
windows11-21h2-x64
3mods/chara...hud.js
windows11-21h2-x64
3mods/cheats.js
windows11-21h2-x64
3mods/day-n...ain.js
windows11-21h2-x64
3mods/hide-and-seek.js
windows11-21h2-x64
3mods/perso...-ex.js
windows11-21h2-x64
3mods/sm74/...ry.ps1
windows11-21h2-x64
3mods/star-...pes.js
windows11-21h2-x64
3mods/star-...ers.js
windows11-21h2-x64
3sm64coopdx.exe
windows11-21h2-x64
1Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/09/2024, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
coop.map
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
discord_game_sdk.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
dynos/packs/Coop Cafe Pipe/warp_pipe_geo.bin
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
mods/arena/main.js
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
mods/character-select-coop/n-hud.js
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
mods/cheats.js
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
mods/day-night-cycle/main.js
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
mods/hide-and-seek.js
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
mods/personal-starcount-ex.js
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
mods/sm74/levels/level_totwc_entry.ps1
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
mods/star-road/bhv_dupes.js
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
mods/star-road/helpers.js
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
sm64coopdx.exe
Resource
win11-20240802-en
General
-
Target
mods/sm74/levels/level_totwc_entry.ps1
-
Size
56KB
-
MD5
21c9190e69672731a5c38aab5692e83a
-
SHA1
9d721d25393d3f15277361ee9241a97fefff0e37
-
SHA256
640109ff54aea107bed87433dff0827588ff165713cd6d7db5d70c00f074f972
-
SHA512
837f92bf6f2af5ea50ee09969278b7b51cae87a1723a9205e14ac359372e28231028c0884490170ef8af65a5dce9767b837645fcfe9a228da2823ba151cbd8cd
-
SSDEEP
1536:c22xgTfk8iL6J4Bn/5NBnHM/q1diYmS9JBfoERR:c2JT/iL6J4B/Bs69z9JWoR
Malware Config
Signatures
-
pid Process 3312 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3312 powershell.exe 3312 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3312 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\mods\sm74\levels\level_totwc_entry.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82