Overview
overview
7Static
static
3dolphin-x64-5.0.exe
windows7-x64
dolphin-x64-5.0.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3infinst.exe
windows7-x64
4infinst.exe
windows10-2004-x64
4xinput1_3.dll
windows7-x64
1xinput1_3.dll
windows10-2004-x64
1xinput1_3.dll
windows7-x64
1xinput1_3.dll
windows10-2004-x64
1$TEMP/dxre...UP.dll
windows7-x64
4$TEMP/dxre...UP.dll
windows10-2004-x64
4$TEMP/dxre...UP.exe
windows7-x64
4$TEMP/dxre...UP.exe
windows10-2004-x64
4$TEMP/dxre...32.dll
windows7-x64
4$TEMP/dxre...32.dll
windows10-2004-x64
4$TEMP/vcre...64.exe
windows7-x64
7$TEMP/vcre...64.exe
windows10-2004-x64
7Dolphin.exe
windows7-x64
1Dolphin.exe
windows10-2004-x64
1OpenAL32.dll
windows7-x64
1OpenAL32.dll
windows10-2004-x64
1Sys/GameSe...r2.ps1
windows7-x64
1Sys/GameSe...r2.ps1
windows10-2004-x64
1Sys/GameSe...01.ps1
windows7-x64
1Sys/GameSe...01.ps1
windows10-2004-x64
1Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 19:45
Static task
static1
Behavioral task
behavioral1
Sample
dolphin-x64-5.0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dolphin-x64-5.0.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
infinst.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
infinst.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
xinput1_3.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
xinput1_3.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
xinput1_3.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
xinput1_3.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$TEMP/dxredist/DSETUP.dll
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
$TEMP/dxredist/DSETUP.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$TEMP/dxredist/DXSETUP.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
$TEMP/dxredist/DXSETUP.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$TEMP/dxredist/dsetup32.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$TEMP/dxredist/dsetup32.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
$TEMP/vcredist/vc_redist.x64.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$TEMP/vcredist/vc_redist.x64.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Dolphin.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Dolphin.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
OpenAL32.dll
Resource
win7-20240215-en
Behavioral task
behavioral26
Sample
OpenAL32.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
Sys/GameSettings/GALE01r2.ps1
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Sys/GameSettings/GALE01r2.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
Sys/GameSettings/GZ2J01.ps1
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
Sys/GameSettings/GZ2J01.ps1
Resource
win10v2004-20240226-en
General
-
Target
$PLUGINSDIR/InstallOptions.dll
-
Size
14KB
-
MD5
d753362649aecd60ff434adf171a4e7f
-
SHA1
3b752ad064e06e21822c8958ae22e9a6bb8cf3d0
-
SHA256
8f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586
-
SHA512
41bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d
-
SSDEEP
192:3Gs+dH4+oQOTgDbzuNfrigyULWsXXZF/01JJijnK72dwF7dBEnbok:3GvdH4qMebzPY2Vijn+BEnbo
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 228 956 WerFault.exe 82 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 828 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 828 taskmgr.exe Token: SeSystemProfilePrivilege 828 taskmgr.exe Token: SeCreateGlobalPrivilege 828 taskmgr.exe Token: 33 828 taskmgr.exe Token: SeIncBasePriorityPrivilege 828 taskmgr.exe -
Suspicious use of FindShellTrayWindow 45 IoCs
pid Process 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe -
Suspicious use of SendNotifyMessage 44 IoCs
pid Process 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe 828 taskmgr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2204 wrote to memory of 956 2204 rundll32.exe 82 PID 2204 wrote to memory of 956 2204 rundll32.exe 82 PID 2204 wrote to memory of 956 2204 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#12⤵PID:956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 6403⤵
- Program crash
PID:228
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 956 -ip 9561⤵PID:1568
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:828