Overview
overview
7Static
static
3dolphin-x64-5.0.exe
windows10-1703-x64
7$PLUGINSDI...ns.dll
windows10-1703-x64
3$PLUGINSDI...LL.dll
windows10-1703-x64
3$PLUGINSDI...em.dll
windows10-1703-x64
3infinst.exe
windows10-1703-x64
4xinput1_3.dll
windows10-1703-x64
1xinput1_3.dll
windows10-1703-x64
1$TEMP/dxre...UP.dll
windows10-1703-x64
4$TEMP/dxre...UP.exe
windows10-1703-x64
4$TEMP/dxre...32.dll
windows10-1703-x64
4dxupdate.dll
windows10-1703-x64
3$TEMP/vcre...64.exe
windows10-1703-x64
7Dolphin.exe
windows10-1703-x64
6OpenAL32.dll
windows10-1703-x64
1Sys/GameSe...r2.ps1
windows10-1703-x64
1Sys/GameSe...01.ps1
windows10-1703-x64
1Analysis
-
max time kernel
1792s -
max time network
1608s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
12/04/2024, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
dolphin-x64-5.0.exe
Resource
win10-20240319-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
infinst.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
xinput1_3.dll
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
xinput1_3.dll
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
$TEMP/dxredist/DSETUP.dll
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
$TEMP/dxredist/DXSETUP.exe
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
$TEMP/dxredist/dsetup32.dll
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
dxupdate.dll
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
$TEMP/vcredist/vc_redist.x64.exe
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
Dolphin.exe
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
OpenAL32.dll
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
Sys/GameSettings/GALE01r2.ps1
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
Sys/GameSettings/GZ2J01.ps1
Resource
win10-20240404-en
General
-
Target
Dolphin.exe
-
Size
14.9MB
-
MD5
9660ec7cddf093a1807cb25fe0946b8e
-
SHA1
5986661c62d689380476db238d7c18fa37d1b616
-
SHA256
19d5c382204d7e40a764e116967aec610f502b9be60b9d3b095073827aa93c66
-
SHA512
5213c828d4f0742c3cde59ceea7b111a1402779602f09fa5e898083b07f2860bb33119f97741bc049fefc0cd745879d22a12dc37ece8e0dd8b308dcc84079755
-
SSDEEP
196608:HgfH5UoUTKklTNrDatogipuoBvfU2+YOcfyOGXutM8/:A/5UomlTNMogipuoBvfU2bOevGeP/
Malware Config
Signatures
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini bcastdvr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 bcastdvr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString bcastdvr.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1988 Dolphin.exe 1988 Dolphin.exe 1988 Dolphin.exe 1988 Dolphin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dolphin.exe"C:\Users\Admin\AppData\Local\Temp\Dolphin.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:1988
-
C:\Windows\System32\GamePanel.exe"C:\Windows\System32\GamePanel.exe" 0000000000050218 /startuptips1⤵PID:808
-
C:\Windows\System32\bcastdvr.exe"C:\Windows\System32\bcastdvr.exe" -ServerName:Windows.Media.Capture.Internal.BroadcastDVRServer1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
PID:4500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD50d57e4acb0103b89b4b32c699875b72a
SHA13c291537ebaa57822d4c1e090cc53981e539c3b3
SHA25639d03bfd01d631dd44f7e5413e4e61d26334b0699be05c84b24dec04ec0fec41
SHA5126c40640207fca53113fbd5c678c7f1b250866273c9d2421d892a4891d0cb9e81d44ec51326f7f9d9f3a28268180ab7fadd28459cf57f836362873714c3423f23
-
Filesize
2KB
MD5a7f7f7cf37a01ad773541d83563e7654
SHA10cefcfc95a6d699f75551e00ae18a20e4ec0a233
SHA2560b8bc890b8b0b2e41a2a00b778aae551163327dff112611d19b714bc3c0fa87e
SHA512e724f9fc08ec34721aca31df521abe441cdd1fec88cc83884c7fe622df35b51a54e7574dc943220681b4e437c8e1932a45330896210c70b43ca7273dd60cf911
-
Filesize
16KB
MD59473c879a5e51040e7a202b4538773a7
SHA13256c026284a24fb99d2ec1558d95db3b5dcc2e9
SHA256a8ec1ec377ee3a3c93a27f74dadf9edf95112ce167fc23d1abdbeb4fa15eb179
SHA512139dbb6648a1c8b7e5224e52ca8f8093f069b7d5f83e2b84099688b927eb77cb8445bc46f9da98ce56d3b883bfe8e38905b5e252c87a5295a334fc8b6890bff3
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c