Analysis

  • max time kernel
    145s
  • max time network
    135s
  • platform
    windows10-1703_x64
  • resource
    win10-20240319-en
  • resource tags

    arch:x64arch:x86image:win10-20240319-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11-04-2024 00:50

General

  • Target

    dolphin-x64-5.0.exe

  • Size

    18.4MB

  • MD5

    eca48982effad82616f206f52336fe4b

  • SHA1

    4d88af3572de650b0b7dccd92dc8de5854edfae6

  • SHA256

    e1b3ae8fc890c6588e5656f77ef2747ae7ddfc90b6530b240c0c5b9d0ab3ce8c

  • SHA512

    778755b2d12c703a2954882a4d333b7cb61ee7ed0482b5cb14c1cbc4b90c8b65f308944a2f9369a89fc54d163c613efc65adf70316c08d447183f65637fcb557

  • SSDEEP

    393216:Y1qyjt4rPX8zs3XxdbHNemtqa7JhnurHTl0WcS4ENyQ4p9Jmm+:Y1qyZePX8khdbtecqa7JhnurHirhENys

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 64 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dolphin-x64-5.0.exe
    "C:\Users\Admin\AppData\Local\Temp\dolphin-x64-5.0.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:4364
    • C:\Users\Admin\AppData\Local\Temp\dxredist\DXSETUP.exe
      "C:\Users\Admin\AppData\Local\Temp\dxredist\DXSETUP.exe" /silent
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Windows directory
      PID:1628
    • C:\Users\Admin\AppData\Local\Temp\vcredist\vc_redist.x64.exe
      "C:\Users\Admin\AppData\Local\Temp\vcredist\vc_redist.x64.exe" /install /quiet /norestart
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:5924
      • C:\Users\Admin\AppData\Local\Temp\vcredist\vc_redist.x64.exe
        "C:\Users\Admin\AppData\Local\Temp\vcredist\vc_redist.x64.exe" /install /quiet /norestart -burn.unelevated BurnPipe.{1D251796-142C-4CFA-8E14-6D5BE9ED985D} {D6911AB5-FB5C-4886-BF53-8CEE0CEDF337} 5924
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:5956
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:876
  • C:\Windows\system32\srtasks.exe
    C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1260
  • C:\Program Files\Dolphin\Dolphin.exe
    "C:\Program Files\Dolphin\Dolphin.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1576
  • C:\Windows\System32\GamePanel.exe
    "C:\Windows\System32\GamePanel.exe" 00000000000702A8 /startuptips
    1⤵
      PID:1396
    • C:\Windows\System32\bcastdvr.exe
      "C:\Windows\System32\bcastdvr.exe" -ServerName:Windows.Media.Capture.Internal.BroadcastDVRServer
      1⤵
      • Drops desktop.ini file(s)
      PID:1800

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Dolphin\Dolphin.exe

      Filesize

      14.9MB

      MD5

      9660ec7cddf093a1807cb25fe0946b8e

      SHA1

      5986661c62d689380476db238d7c18fa37d1b616

      SHA256

      19d5c382204d7e40a764e116967aec610f502b9be60b9d3b095073827aa93c66

      SHA512

      5213c828d4f0742c3cde59ceea7b111a1402779602f09fa5e898083b07f2860bb33119f97741bc049fefc0cd745879d22a12dc37ece8e0dd8b308dcc84079755

    • C:\Program Files\Dolphin\Languages\it\dolphin-emu.mo

      Filesize

      121KB

      MD5

      f00a5461ba0b2c95f801923fef70c266

      SHA1

      f7717e3f341e1b56c46407df643d4ac6dcc09885

      SHA256

      19c8af2231c12fe7969e63595f818baf9421542d1e4f3ea64ac2ff79352a6f12

      SHA512

      a9977db27df94510bc75ee961924804c59c0005b9bc9b8961d63b01359c72920a6a6f0f3b014c715f3b0c4208038deb65f114f83dee157422dc035b84a267315

    • C:\Program Files\Dolphin\Sys\Resources\toolbar_debugger_step_over.png

      Filesize

      988B

      MD5

      926a446e9de7d51c34ae548673386417

      SHA1

      5a0a2666b270eca354f1632de8f98fc966864d08

      SHA256

      85f27cf7d073c5931530c102d4c39ff731a3eb30c67d506c6626b0ad72f26539

      SHA512

      d5117a0a76c22b06aa91f7586f866387ad74b4962e569cab64d6abeb83d701c8b66331dc6193478f36faef616a95f404cb15a7a0b0b86f863c93ab09f908ea53

    • C:\Users\Admin\AppData\Local\Temp\DXA5EF.tmp\apr2007_xinput_x64.inf

      Filesize

      860B

      MD5

      94563a3b9affb41d2bfd41a94b81e08d

      SHA1

      17cad981ef428e132aa1d571e0c77091e750e0dd

      SHA256

      0d6e1c0e961d878b319ac30d3439056883448dcf26774003b73920f3377ecac8

      SHA512

      53cac179d7e11c74772e7b9bd7dd94ffbc810cfc25e28326e4d0844f3f59fd10d9089b44a88358ac6dbd09fb8b456a0937778f78ecc442645764f693ccd620b8

    • C:\Users\Admin\AppData\Local\Temp\DXA5EF.tmp\apr2007_xinput_x86.inf

      Filesize

      1KB

      MD5

      e188f534500688cec2e894d3533997b4

      SHA1

      f073f8515b94cb23b703ab5cdb3a5cfcc10b3333

      SHA256

      1c798cb80e9e46ce03356ea7316e1eff5d3a88ccdd7cbfbfcdce73cded23b4e5

      SHA512

      332ccb25c5ed92ae48c5805a330534d985d6b41f9220af0844d407b2019396fcefea7076b409439f5ab8a9ca6819b65c07ada7bd3aa1222429966dc5a440d4f7

    • C:\Users\Admin\AppData\Local\Temp\DXA5EF.tmp\dxupdate.dll

      Filesize

      173KB

      MD5

      7ed554b08e5b69578f9de012822c39c9

      SHA1

      036d04513e134786b4758def5aff83d19bf50c6e

      SHA256

      fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2

      SHA512

      7af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9

    • C:\Users\Admin\AppData\Local\Temp\DXA5EF.tmp\dxupdate.inf

      Filesize

      12KB

      MD5

      e6a74342f328afa559d5b0544e113571

      SHA1

      a08b053dfd061391942d359c70f9dd406a968b7d

      SHA256

      93f5589499ee4ee2812d73c0d8feacbbcfe8c47b6d98572486bc0eff3c5906ca

      SHA512

      1e35e5bdff1d551da6c1220a1a228c657a56a70dedf5be2d9273fc540f9c9f0bb73469595309ea1ff561be7480ee92d16f7acbbd597136f4fc5f9b8b65ecdfad

    • C:\Users\Admin\AppData\Local\Temp\DXA5EF.tmp\xinput1_3.dll

      Filesize

      79KB

      MD5

      77f595dee5ffacea72b135b1fce1312e

      SHA1

      d2a710b332de3ef7a576e0aed27b0ae66892b7e9

      SHA256

      8d540d484ea41e374fd0107d55d253f87ded4ce780d515d8fd59bbe8c98970a7

      SHA512

      a8683050d7758c248052c11ac6a46c9a0b3b3773902cca478c1961b6d9d2d57c75a8c925ba5af4499989c0f44b34eaf57abafafa26506c31e5e4769fb3439746

    • C:\Users\Admin\AppData\Local\Temp\dxredist\Apr2007_xinput_x64.cab

      Filesize

      94KB

      MD5

      743b333c2db3d4cf190fb39c29f3c346

      SHA1

      26b3616d7321978bd45656391a75ee231196a4a2

      SHA256

      e7a09f8235cc587cc63f583e39fbc75008d9677c8bb4dcc11cb8d0178a5153ac

      SHA512

      77fbdb86c79d7228bca2982a3285a417a365af980488a5ac2d470b532fa59fcc15e0e8dbee6eb1a3a5256fc29e0e3391529cd2ac13e0f72987ee0da136000957

    • C:\Users\Admin\AppData\Local\Temp\dxredist\Apr2007_xinput_x86.cab

      Filesize

      52KB

      MD5

      c234df417c9b12e2d31c7fd1e17e4786

      SHA1

      92f32e74944e5166db72d3bfe8e6401d9f7521dd

      SHA256

      2acea6c8b9f6f7f89ec51365a1e49fbd0d8c42c53418bd0783dbf3f74a744e6d

      SHA512

      6cbae19794533ad9401f92b10bd9549638ba20ce38375de4f9d0e20af20d78819e46856151cc6818325af9ac774b8128e18fbebd2da5da4efbd417fc2af51dab

    • C:\Users\Admin\AppData\Local\Temp\dxredist\DSETUP32.DLL

      Filesize

      1.5MB

      MD5

      d8fa7bb4fe10251a239ed75055dd6f73

      SHA1

      76c4bd2d8f359f7689415efc15e3743d35673ae8

      SHA256

      fb0e534f9b0926e518f1c2980640dfd29f14217cdfa37cf3a0c13349127ed9a8

      SHA512

      73f633179b1340c1c14d0002b72e44cab1919d0ef174f307e4bfe6de240b0b6ef233e67a8b0a0cd677556865ee7b88c6de152045a580ab9fbf1a50d2db0673b4

    • C:\Users\Admin\AppData\Local\Temp\dxredist\DXSETUP.exe

      Filesize

      505KB

      MD5

      bf3f290275c21bdd3951955c9c3cf32c

      SHA1

      9fd00f3bb8a870112dae464f555fcd5e7f9200c0

      SHA256

      8f47d7121ef6532ad9ad9901e44e237f5c30448b752028c58a9d19521414e40d

      SHA512

      d2c354ee8b6977d01f23c6d2bb4977812bf653eae25e7a75a7d0a36b588c89fcdbdc2a8087c24d6ff687afebd086d4b7d0c92203ce39691b21dab71eafd1d249

    • C:\Users\Admin\AppData\Local\Temp\dxredist\dsetup.dll

      Filesize

      93KB

      MD5

      eb701def7d0809e8da765a752ab42be5

      SHA1

      7897418f0fae737a3ebe4f7954118d71c6c8b426

      SHA256

      2a61679eeedabf7d0d0ac14e5447486575622d6b7cfa56f136c1576ff96da21f

      SHA512

      6ff8433c0dadc0e87d18f04289ab6f48624c908acbda506708f5e0f3c9522e9316e587e71f568938067ba9f37f96640b793fdfaa580caedc3bf9873dc221271f

    • C:\Users\Admin\AppData\Local\Temp\dxredist\dxupdate.cab

      Filesize

      94KB

      MD5

      d495680aba28caafc4c071a6d0fe55ac

      SHA1

      5885ece90970eb10b6b95d6c52d934674835929e

      SHA256

      e18a5404b612e88fa8b403c9b33f064c0a89528db7ef9a79aa116908d0e6afed

      SHA512

      a25c647678661473b99462d7433c1d05af54823d404476e35315c11c93b3f5ece92c912560af0d9efe8f07e36ae68594362d73abf5d5de409a3f0a146fe31a10

    • C:\Users\Admin\AppData\Local\Temp\nseA9EE.tmp\InstallOptions.dll

      Filesize

      14KB

      MD5

      d753362649aecd60ff434adf171a4e7f

      SHA1

      3b752ad064e06e21822c8958ae22e9a6bb8cf3d0

      SHA256

      8f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586

      SHA512

      41bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d

    • C:\Users\Admin\AppData\Local\Temp\nseA9EE.tmp\System.dll

      Filesize

      10KB

      MD5

      56a321bd011112ec5d8a32b2f6fd3231

      SHA1

      df20e3a35a1636de64df5290ae5e4e7572447f78

      SHA256

      bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

      SHA512

      5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

    • C:\Users\Admin\AppData\Local\Temp\nseA9EE.tmp\ioSpecial.ini

      Filesize

      480B

      MD5

      db47a62a2f17dbed9345d7c9add8d791

      SHA1

      b55be99cd54c195a5a3cd83604bbbc0a4c10284d

      SHA256

      38315c48aec752c32e323772756649b79a498be6df41b78068a6d8b048395cb9

      SHA512

      93ae1a8eb173b826fa34b6f6ddd7a152cc9dc3b8f250e07d13e445a53d92876a6e5ee7602eaf80a91f2b41bd4a1f34132d761a5751bc81270ef928d9a420add5

    • C:\Users\Admin\AppData\Local\Temp\vcredist\vc_redist.x64.exe

      Filesize

      14.1MB

      MD5

      883c499d04c145a69622f7658e353265

      SHA1

      bb64084762abd4a06b2fddd16f0092860bc3043f

      SHA256

      df58f4aa566a10776c864c1007e0ac0987835fa1e9f7445bed8ba21a9101d414

      SHA512

      ce840c9420e928c9da6c30c3cd97eeb047d34ee7046b8cfcd20b512fbddfe885329ab4db3ca53f7094bf1caeb600c834cb2db10797ceade859c21786144206c9

    • C:\Users\Admin\AppData\Local\Temp\{dab68466-3a7d-41a8-a5cf-415e3ff8ef71}\.ba1\logo.png

      Filesize

      1KB

      MD5

      d6bd210f227442b3362493d046cea233

      SHA1

      ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

      SHA256

      335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

      SHA512

      464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

    • C:\Users\Admin\Documents\Dolphin Emulator\Config\Dolphin.ini

      Filesize

      2KB

      MD5

      ec569b8a7a0ddd92c700797b7880f27a

      SHA1

      f2f05765c8241777fd452d2c99c454f7a6dd8749

      SHA256

      51a6c7d1ed47f4ec55767a2aa6e8b5a7b595b0a81485b824ef5d9a6a2e719041

      SHA512

      4936603e7fb501df6412f2b2a71f30c38c5be98dc6eed2c547115a170a86a18fcca01e0ca6c556c65f8baf5a9ef2209bb6e191ae47eaaa63e0fbe382b3b25e5a

    • C:\Users\Admin\Documents\Dolphin Emulator\Config\Dolphin.ini

      Filesize

      2KB

      MD5

      25d2a69ac8651a7eb3cc453668200f91

      SHA1

      47ee98066c16ae28032291a43475aaa910eb702e

      SHA256

      15f55483fd25f7233a1d297a4d2207186f0782bebc677389cbb0f0bb6c2049d0

      SHA512

      9e6750dfff7997520b7d4e728858acc8b1cd6d6d850048752e7c0565696c5fa15b2839ca5b0c959e853be061598256c8ed5f394071be92fc067b640ebcb2a4d7

    • C:\Users\Admin\Documents\Dolphin Emulator\Wii\shared2\ec\shopsetu.log

      Filesize

      32B

      MD5

      70bc8f4b72a86921468bf8e8441dce51

      SHA1

      de8a847bff8c343d69b853a215e6ee775ef2ef96

      SHA256

      66687aadf862bd776c8fc18b8e9f8e20089714856ee233b3902a591d0d5f2925

      SHA512

      5046adc1dba838867b2bbbfdd0c3423e58b57970b5267a90f57960924a87f1960a6a85eaa642dac835424b5d7c8d637c00408c7a73da672b7f498521420b6dd3

    • C:\Users\Admin\Documents\Dolphin Emulator\Wii\shared2\sys\SYSCONF

      Filesize

      16KB

      MD5

      9473c879a5e51040e7a202b4538773a7

      SHA1

      3256c026284a24fb99d2ec1558d95db3b5dcc2e9

      SHA256

      a8ec1ec377ee3a3c93a27f74dadf9edf95112ce167fc23d1abdbeb4fa15eb179

      SHA512

      139dbb6648a1c8b7e5224e52ca8f8093f069b7d5f83e2b84099688b927eb77cb8445bc46f9da98ce56d3b883bfe8e38905b5e252c87a5295a334fc8b6890bff3

    • C:\Users\Admin\Documents\Dolphin Emulator\Wii\shared2\wc24\nwc24msg.cbk

      Filesize

      1024B

      MD5

      0c425c24e91335f18a3246b1d611a8ca

      SHA1

      caf8a96a36573d7e67f086f73fec675a5d1c4245

      SHA256

      7afebf33eeb0035397cc74e15e892e700cd2903641d26562f5d46cfbb6171109

      SHA512

      001e0d8dd5e5b2e2d8b8357bba7d8c20ac33dca3a6b7897f11a1f01f391118da4f457d5a5c6531eedabebd6883dcde0bb3526b97ed7b3357a7e6d768d9c322af

    • C:\Users\Admin\Videos\Captures\desktop.ini

      Filesize

      190B

      MD5

      b0d27eaec71f1cd73b015f5ceeb15f9d

      SHA1

      62264f8b5c2f5034a1e4143df6e8c787165fbc2f

      SHA256

      86d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2

      SHA512

      7b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c

    • C:\Windows\Logs\DXError.log

      Filesize

      705B

      MD5

      009fc18a6a62699cc518c2acaf7d6e1b

      SHA1

      612d1f3e0c91bdd6b9031ecd861e227cd77f32ec

      SHA256

      61806ccaa223ace943e87d6f6d7d304229d014457b47bc5fef9a309efc564eb5

      SHA512

      4227e64416b63adc485193b037608e41b47eca8ce7daa4feb48306fffde9f6323eb674de11676b3cc2fdd492f501bf75bdd7c5cad28464ac99e52f5d85670776

    • C:\Windows\Logs\DirectX.log

      Filesize

      474B

      MD5

      b1808bc1bf3046be8c3cf26c314930bc

      SHA1

      ca34f3dac951ff02e97f8f58c746345d2d97a58d

      SHA256

      9a3d8e3ed2b9f80e0711d580aa4c6210926e6038e2e509760d5c1862dca318f9

      SHA512

      7c1992f7d5496d6df0b2f672a546412906a3f3e8ea2341acc150b9f5d729828a3022d28dbc57d20f52f6c8d598c3668b4f7958cc8430d927007bda0e5deedd3f

    • C:\Windows\Logs\DirectX.log

      Filesize

      43KB

      MD5

      cb6942117dfc7961b42bb4349597b45f

      SHA1

      89c9dedd61d883ad0bb9a9a139138a396e2302d6

      SHA256

      a0b13c76f58d290091a18c939ee30aa505e716a828a4043c3fc08a3cef1d3d94

      SHA512

      d7056aef5ce70378027a5ae4ef78a0dcd63de362e4db8aa2f8d194947a0986a72b31987f4748c64d80ff87f30fe34282898717c344f91f477a55c541960881ef

    • \Users\Admin\AppData\Local\Temp\nseA9EE.tmp\LangDLL.dll

      Filesize

      5KB

      MD5

      e447e49175c0db1f27888aede301084f

      SHA1

      f5946c743265cd8e81f3e7b6376dada57f99877f

      SHA256

      fd26ef21d72797fedecd3d15f2001cea793383aceb3cee19a5ae2a3d30e197b6

      SHA512

      e6543bf81bedce94a58f48cd6f9daaec891775e01ff76b771c22d459a778490f9bba0bebbf111b1ca3091b3ca69bca806a9b5e68ce12df03abbaa6ce5c4b7cec

    • \Users\Admin\AppData\Local\Temp\{dab68466-3a7d-41a8-a5cf-415e3ff8ef71}\.ba1\wixstdba.dll

      Filesize

      118KB

      MD5

      4d20a950a3571d11236482754b4a8e76

      SHA1

      e68bd784ac143e206d52ecaf54a7e3b8d4d75c9c

      SHA256

      a9295ad4e909f979e2b6cb2b2495c3d35c8517e689cd64a918c690e17b49078b

      SHA512

      8b9243d1f9edbcbd6bdaf6874dc69c806bb29e909bd733781fde8ac80ca3fff574d786ca903871d1e856e73fd58403bebb58c9f23083ea7cd749ba3e890af3d2

    • memory/1576-9147-0x000000006B600000-0x000000006B69F000-memory.dmp

      Filesize

      636KB