| download: | super-mario-3-mario-forever-5-103-en-win.exe |
| Full analysis: | https://app.any.run/tasks/f52dfd62-8ac5-4aee-af3e-b0af7d808f48 |
| Verdict: | Malicious activity |
| Threats: | Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email. |
| Analysis date: | August 09, 2019, 22:17:10 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 262A2083868A2EB99E96DCECCF6C4DF6 |
| SHA1: | 685F67FF47EE85DFD809C1A6B3B1A6829B172C70 |
| SHA256: | DD838BCDA2F9B9E456D48C1D26C40FC71FB3CA8C9033D7FF895F860AFA7532DA |
| SSDEEP: | 393216:1n73/7Y7Y9Rrr2HZp0qWeazdEMN8wdkdM4hRWsvOYQiU7b:1n7P7CcmjmeazZOw+aGdOYJa |
| .exe | | | InstallShield setup (36.8) |
|---|---|---|
| .exe | | | Win32 Executable MS Visual C++ (generic) (26.6) |
| .exe | | | Win64 Executable (generic) (23.6) |
| .dll | | | Win32 Dynamic Link Library (generic) (5.6) |
| .exe | | | Win32 Executable (generic) (3.8) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2008:10:23 14:16:16+02:00 |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 139264 |
| InitializedDataSize: | 53248 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1b902 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 2.0.0.32 |
| ProductVersionNumber: | 2.0.0.32 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | - |
| FileDescription: | - |
| FileVersion: | 2, 0, 0, 32 |
| InternalName: | - |
| LegalCopyright: | - |
| LegalTrademarks: | - |
| OriginalFileName: | - |
| PrivateBuild: | - |
| ProductName: | Mario Forever 5.08 Direct X Install Program |
| ProductVersion: | 2, 0, 0, 32 |
| SpecialBuild: | - |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 284 | "C:\Program Files\softendo.com\Mario Forever 5.08 Direct X\Mario Forever.exe" | C:\Program Files\softendo.com\Mario Forever 5.08 Direct X\Mario Forever.exe | explorer.exe | ||||||||||||
User: admin Company: Softendo (c) 2010 www.softendo.com Integrity Level: HIGH Description: Softendo (c) 2010 www.softendo.com Exit code: 0 Version: 5.0 Modules
| |||||||||||||||
| 360 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6eb7a9d0,0x6eb7a9e0,0x6eb7a9ec | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| 364 | C:\Users\admin\AppData\Local\Temp\GLB1716.tmp 4736 C:\PROGRA~1\softendo.com\MARIOF~1.08D\Data\MARIOF~1.EXE | C:\Users\admin\AppData\Local\Temp\GLB1716.tmp | Mario Forever.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1052 | "C:\Program Files\Google\Chrome\Application\chrome.exe" | C:\Program Files\Google\Chrome\Application\chrome.exe | explorer.exe | ||||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 3221225547 Version: 75.0.3770.100 Modules
| |||||||||||||||
| 1164 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1004,4392632937122296161,10792439940965694820,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=792132363352378585 --mojo-platform-channel-handle=3360 --ignored=" --type=renderer " /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| 1208 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2152 CREDAT:71937 | C:\Program Files\Internet Explorer\iexplore.exe | — | iexplore.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1928 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1004,4392632937122296161,10792439940965694820,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=14836293410398736590 --mojo-platform-channel-handle=3668 --ignored=" --type=renderer " /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| 2072 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1004,4392632937122296161,10792439940965694820,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=2655818689373798826 --mojo-platform-channel-handle=3712 --ignored=" --type=renderer " /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| 2152 | "C:\Program Files\Internet Explorer\iexplore.exe" | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 1 Version: 8.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2168 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2208 --on-initialized-event-handle=312 --parent-handle=316 /prefetch:6 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| (PID) Process: | (2716) super-mario-3-mario-forever-5-103-en-win.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Mario Forever 5.08 Direct X |
| Operation: | write | Name: | DisplayName |
Value: Mario Forever 5.08 Direct X | |||
| (PID) Process: | (2716) super-mario-3-mario-forever-5-103-en-win.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Mario Forever 5.08 Direct X |
| Operation: | write | Name: | UninstallString |
Value: C:\Program Files\softendo.com\Mario Forever 5.08 Direct X\Uninstal.exe | |||
| (PID) Process: | (364) GLB1716.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GLB1716_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (364) GLB1716.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GLB1716_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (364) GLB1716.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GLB1716_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (364) GLB1716.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GLB1716_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (364) GLB1716.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GLB1716_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (364) GLB1716.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GLB1716_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (364) GLB1716.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GLB1716_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (364) GLB1716.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GLB1716_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2716 | super-mario-3-mario-forever-5-103-en-win.exe | C:\Program Files\softendo.com\Mario Forever 5.08 Direct X\Uninstal.$A | — | |
MD5:— | SHA256:— | |||
| 2716 | super-mario-3-mario-forever-5-103-en-win.exe | C:\Program Files\softendo.com\Mario Forever 5.08 Direct X\Data\Classic.$A | — | |
MD5:— | SHA256:— | |||
| 2716 | super-mario-3-mario-forever-5-103-en-win.exe | C:\Program Files\softendo.com\Mario Forever 5.08 Direct X\Data\Girls Games.$A | — | |
MD5:— | SHA256:— | |||
| 2716 | super-mario-3-mario-forever-5-103-en-win.exe | C:\Program Files\softendo.com\Mario Forever 5.08 Direct X\Data\Legend of Zelda Games.$A | — | |
MD5:— | SHA256:— | |||
| 2716 | super-mario-3-mario-forever-5-103-en-win.exe | C:\Program Files\softendo.com\Mario Forever 5.08 Direct X\Data\Link Games.$A | — | |
MD5:— | SHA256:— | |||
| 2716 | super-mario-3-mario-forever-5-103-en-win.exe | C:\Program Files\softendo.com\Mario Forever 5.08 Direct X\Data\Mario Forever.$A | — | |
MD5:— | SHA256:— | |||
| 2716 | super-mario-3-mario-forever-5-103-en-win.exe | C:\Program Files\softendo.com\Mario Forever 5.08 Direct X\Data\Megaman.$A | — | |
MD5:— | SHA256:— | |||
| 2716 | super-mario-3-mario-forever-5-103-en-win.exe | C:\Program Files\softendo.com\Mario Forever 5.08 Direct X\Data\Metal Gear Solid Games.$A | — | |
MD5:— | SHA256:— | |||
| 2716 | super-mario-3-mario-forever-5-103-en-win.exe | C:\Program Files\softendo.com\Mario Forever 5.08 Direct X\Data\Metal Slug.$A | — | |
MD5:— | SHA256:— | |||
| 2716 | super-mario-3-mario-forever-5-103-en-win.exe | C:\Program Files\softendo.com\Mario Forever 5.08 Direct X\Data\Naruto.$A | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
364 | GLB1716.tmp | GET | 200 | 172.217.22.4:80 | http://www.google.com/ | US | html | 12.0 Kb | malicious |
2760 | chrome.exe | GET | 302 | 172.217.18.14:80 | http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx | US | html | 515 b | whitelisted |
2760 | chrome.exe | GET | 200 | 74.125.110.167:80 | http://r2---sn-5go7yner.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx?cms_redirect=yes&mip=82.103.130.125&mm=28&mn=sn-5go7yner&ms=nvh&mt=1565389040&mv=m&mvi=1&pl=26&shardbypass=yes | US | crx | 862 Kb | whitelisted |
364 | GLB1716.tmp | GET | 404 | 199.101.114.141:80 | http://199.101.114.141:80/ps/conduitinstaller/ConduitInstaller.exe | US | html | 1.60 Kb | suspicious |
364 | GLB1716.tmp | GET | 404 | 199.101.114.141:80 | http://storage.conduit.com/ps/conduitinstaller/ConduitInstaller.exe | US | html | 1.60 Kb | suspicious |
2776 | stdrt.exe | GET | 200 | 91.199.212.52:80 | http://crt.comodoca.com/COMODORSAAddTrustCA.crt | GB | der | 1.37 Kb | whitelisted |
2776 | stdrt.exe | GET | 301 | 213.186.33.5:80 | http://www.marionews2.buziol.pl/ | FR | html | 178 b | malicious |
2152 | iexplore.exe | GET | 200 | 204.79.197.200:80 | http://www.bing.com/favicon.ico | US | image | 237 b | whitelisted |
2776 | stdrt.exe | GET | 200 | 91.199.212.52:80 | http://crt.comodoca.com/COMODORSAAddTrustCA.crt | GB | der | 1.37 Kb | whitelisted |
364 | GLB1716.tmp | GET | 301 | 172.217.23.174:80 | http://google.com/ | US | html | 219 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
364 | GLB1716.tmp | 172.217.23.174:80 | google.com | Google Inc. | US | whitelisted |
364 | GLB1716.tmp | 172.217.22.4:80 | www.google.com | Google Inc. | US | whitelisted |
364 | GLB1716.tmp | 199.101.114.141:80 | storage.conduit.com | Conduit Connect B.V | US | suspicious |
— | — | 199.101.114.141:80 | storage.conduit.com | Conduit Connect B.V | US | suspicious |
2776 | stdrt.exe | 66.235.200.4:443 | www.softendo.com | — | US | malicious |
2776 | stdrt.exe | 213.186.33.5:80 | www.marionews2.buziol.pl | OVH SAS | FR | malicious |
2776 | stdrt.exe | 172.217.22.48:443 | storage.googleapis.com | Google Inc. | US | whitelisted |
2776 | stdrt.exe | 35.190.14.35:443 | components.mywebsitebuilder.com | Google Inc. | US | unknown |
2776 | stdrt.exe | 68.232.34.200:443 | 149b4.wpc.azureedge.net | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
2776 | stdrt.exe | 172.217.22.46:443 | www.google-analytics.com | Google Inc. | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| malicious |
www.google.com |
| malicious |
storage.conduit.com |
| suspicious |
www.marionews2.buziol.pl |
| malicious |
www.softendo.com |
| malicious |
149b4.wpc.azureedge.net |
| whitelisted |
components.mywebsitebuilder.com |
| suspicious |
storage.googleapis.com |
| whitelisted |
www.google-analytics.com |
| whitelisted |
crt.comodoca.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
364 | GLB1716.tmp | A Network Trojan was detected | ET POLICY Software Install Reporting via HTTP - Wise User Agent (Wise) Sometimes Malware Related |
364 | GLB1716.tmp | A Network Trojan was detected | ET POLICY Software Install Reporting via HTTP - Wise User Agent (Wise) Sometimes Malware Related |
364 | GLB1716.tmp | A Network Trojan was detected | ET TROJAN Win32/Vflooder.C Connectivity Check |
364 | GLB1716.tmp | A Network Trojan was detected | ET POLICY Software Install Reporting via HTTP - Wise User Agent (Wise) Sometimes Malware Related |
2776 | stdrt.exe | Misc activity | SUSPICIOUS [PTsecurity] Cmd.Powershell.Download HTTP UserAgent (Win7) |