Overview
overview
7Static
static
3dolphin-x64-5.0.exe
windows7-x64
dolphin-x64-5.0.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3infinst.exe
windows7-x64
4infinst.exe
windows10-2004-x64
4xinput1_3.dll
windows7-x64
1xinput1_3.dll
windows10-2004-x64
1xinput1_3.dll
windows7-x64
1xinput1_3.dll
windows10-2004-x64
1$TEMP/dxre...UP.dll
windows7-x64
4$TEMP/dxre...UP.dll
windows10-2004-x64
4$TEMP/dxre...UP.exe
windows7-x64
4$TEMP/dxre...UP.exe
windows10-2004-x64
4$TEMP/dxre...32.dll
windows7-x64
4$TEMP/dxre...32.dll
windows10-2004-x64
4$TEMP/vcre...64.exe
windows7-x64
7$TEMP/vcre...64.exe
windows10-2004-x64
7Dolphin.exe
windows7-x64
1Dolphin.exe
windows10-2004-x64
1OpenAL32.dll
windows7-x64
1OpenAL32.dll
windows10-2004-x64
1Sys/GameSe...r2.ps1
windows7-x64
1Sys/GameSe...r2.ps1
windows10-2004-x64
1Sys/GameSe...01.ps1
windows7-x64
1Sys/GameSe...01.ps1
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
dolphin-x64-5.0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dolphin-x64-5.0.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
infinst.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
infinst.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
xinput1_3.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
xinput1_3.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
xinput1_3.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
xinput1_3.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$TEMP/dxredist/DSETUP.dll
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
$TEMP/dxredist/DSETUP.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$TEMP/dxredist/DXSETUP.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
$TEMP/dxredist/DXSETUP.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$TEMP/dxredist/dsetup32.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$TEMP/dxredist/dsetup32.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
$TEMP/vcredist/vc_redist.x64.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$TEMP/vcredist/vc_redist.x64.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Dolphin.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Dolphin.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
OpenAL32.dll
Resource
win7-20240215-en
Behavioral task
behavioral26
Sample
OpenAL32.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
Sys/GameSettings/GALE01r2.ps1
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Sys/GameSettings/GALE01r2.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
Sys/GameSettings/GZ2J01.ps1
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
Sys/GameSettings/GZ2J01.ps1
Resource
win10v2004-20240226-en
General
-
Target
$TEMP/dxredist/dsetup32.dll
-
Size
1.5MB
-
MD5
d8fa7bb4fe10251a239ed75055dd6f73
-
SHA1
76c4bd2d8f359f7689415efc15e3743d35673ae8
-
SHA256
fb0e534f9b0926e518f1c2980640dfd29f14217cdfa37cf3a0c13349127ed9a8
-
SHA512
73f633179b1340c1c14d0002b72e44cab1919d0ef174f307e4bfe6de240b0b6ef233e67a8b0a0cd677556865ee7b88c6de152045a580ab9fbf1a50d2db0673b4
-
SSDEEP
24576:CIQ+ddddddddddddddxOOOOOOOOOOOOOO2iWeXiWeXiWeXiWeXiWeXiWeXiWeXi+:CIQsOOOOOOOOOOOOOO2iWeXiWeXiWeXf
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Logs\DXError.log rundll32.exe File opened for modification C:\Windows\Logs\DirectX.log rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeBackupPrivilege 2948 vssvc.exe Token: SeRestorePrivilege 2948 vssvc.exe Token: SeAuditPrivilege 2948 vssvc.exe Token: SeBackupPrivilege 2608 srtasks.exe Token: SeRestorePrivilege 2608 srtasks.exe Token: SeSecurityPrivilege 2608 srtasks.exe Token: SeTakeOwnershipPrivilege 2608 srtasks.exe Token: SeBackupPrivilege 2608 srtasks.exe Token: SeRestorePrivilege 2608 srtasks.exe Token: SeSecurityPrivilege 2608 srtasks.exe Token: SeTakeOwnershipPrivilege 2608 srtasks.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1712 wrote to memory of 4192 1712 rundll32.exe 89 PID 1712 wrote to memory of 4192 1712 rundll32.exe 89 PID 1712 wrote to memory of 4192 1712 rundll32.exe 89 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\dxredist\dsetup32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\dxredist\dsetup32.dll,#12⤵
- Drops file in Windows directory
PID:4192
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
PID:2608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD5de9db7f2ddb1a5aa9e6c1c5f83f0c263
SHA12a6868632d34617fa8644060544ababf87ae4bfd
SHA2568707b2e86da2fd7583f50cd40906a135115bf3e9c6e6f5aed744917ab4504059
SHA51261297b83263095f8bbc812b644ade4f12a17c525e08426639042002c0dc23162a7da608ca532ea69363125af802b8c23b05f3bed6da88b05932a3b9168b4fc12
-
Filesize
517B
MD54eb5204cb38098568d2c38faa9437ac1
SHA146f2154108d6aa226fa431615c3b94ad590cc3f9
SHA256397164a07ea6dcd7d7cfc0e14f26f45de4bf7bb2676a58093eedd51e8a6ccc94
SHA512fe5b34d4e08f40b60c91e4a3e111b4689a6529dac1895d975181919b72af76f8029e337fd8bbe4c17659fcf1c43b2178d8960b4c80f27bb14cf41d692bbe5828