Overview
overview
7Static
static
3dolphin-x64-5.0.exe
windows7-x64
7dolphin-x64-5.0.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3infinst.exe
windows7-x64
4infinst.exe
windows10-2004-x64
4xinput1_3.dll
windows7-x64
1xinput1_3.dll
windows10-2004-x64
1xinput1_3.dll
windows7-x64
1xinput1_3.dll
windows10-2004-x64
1$TEMP/dxre...UP.dll
windows7-x64
4$TEMP/dxre...UP.dll
windows10-2004-x64
4$TEMP/dxre...UP.exe
windows7-x64
4$TEMP/dxre...UP.exe
windows10-2004-x64
4$TEMP/dxre...32.dll
windows7-x64
4$TEMP/dxre...32.dll
windows10-2004-x64
4dxupdate.dll
windows7-x64
3dxupdate.dll
windows10-2004-x64
3$TEMP/vcre...64.exe
windows7-x64
7$TEMP/vcre...64.exe
windows10-2004-x64
7Dolphin.exe
windows7-x64
1Dolphin.exe
windows10-2004-x64
1OpenAL32.dll
windows7-x64
1OpenAL32.dll
windows10-2004-x64
1Sys/GameSe...r2.ps1
windows7-x64
3Sys/GameSe...r2.ps1
windows10-2004-x64
3Sys/GameSe...01.ps1
windows7-x64
3Sys/GameSe...01.ps1
windows10-2004-x64
3Analysis
-
max time kernel
130s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 14:15
Static task
static1
Behavioral task
behavioral1
Sample
dolphin-x64-5.0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
dolphin-x64-5.0.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
infinst.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
infinst.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
xinput1_3.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
xinput1_3.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
xinput1_3.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
xinput1_3.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
$TEMP/dxredist/DSETUP.dll
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
$TEMP/dxredist/DSETUP.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$TEMP/dxredist/DXSETUP.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$TEMP/dxredist/DXSETUP.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$TEMP/dxredist/dsetup32.dll
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
$TEMP/dxredist/dsetup32.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
dxupdate.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
dxupdate.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
$TEMP/vcredist/vc_redist.x64.exe
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
$TEMP/vcredist/vc_redist.x64.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
Dolphin.exe
Resource
win7-20240419-en
Behavioral task
behavioral26
Sample
Dolphin.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
OpenAL32.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
OpenAL32.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Sys/GameSettings/GALE01r2.ps1
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Sys/GameSettings/GALE01r2.ps1
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
Sys/GameSettings/GZ2J01.ps1
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
Sys/GameSettings/GZ2J01.ps1
Resource
win10v2004-20240508-en
General
-
Target
$TEMP/dxredist/dsetup32.dll
-
Size
1.5MB
-
MD5
d8fa7bb4fe10251a239ed75055dd6f73
-
SHA1
76c4bd2d8f359f7689415efc15e3743d35673ae8
-
SHA256
fb0e534f9b0926e518f1c2980640dfd29f14217cdfa37cf3a0c13349127ed9a8
-
SHA512
73f633179b1340c1c14d0002b72e44cab1919d0ef174f307e4bfe6de240b0b6ef233e67a8b0a0cd677556865ee7b88c6de152045a580ab9fbf1a50d2db0673b4
-
SSDEEP
24576:CIQ+ddddddddddddddxOOOOOOOOOOOOOO2iWeXiWeXiWeXiWeXiWeXiWeXiWeXi+:CIQsOOOOOOOOOOOOOO2iWeXiWeXiWeXf
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Logs\DXError.log rundll32.exe File opened for modification C:\Windows\Logs\DirectX.log rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeBackupPrivilege 4956 vssvc.exe Token: SeRestorePrivilege 4956 vssvc.exe Token: SeAuditPrivilege 4956 vssvc.exe Token: SeBackupPrivilege 1596 srtasks.exe Token: SeRestorePrivilege 1596 srtasks.exe Token: SeSecurityPrivilege 1596 srtasks.exe Token: SeTakeOwnershipPrivilege 1596 srtasks.exe Token: SeBackupPrivilege 1596 srtasks.exe Token: SeRestorePrivilege 1596 srtasks.exe Token: SeSecurityPrivilege 1596 srtasks.exe Token: SeTakeOwnershipPrivilege 1596 srtasks.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4400 wrote to memory of 3992 4400 rundll32.exe 91 PID 4400 wrote to memory of 3992 4400 rundll32.exe 91 PID 4400 wrote to memory of 3992 4400 rundll32.exe 91 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\dxredist\dsetup32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\dxredist\dsetup32.dll,#12⤵
- Drops file in Windows directory
PID:3992
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1344 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵PID:1708
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
PID:1596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960B
MD507d1bda353e620dba91d1a61feb148cc
SHA1d69989889145e3535f720bf16caf7baffb378c77
SHA2566774cba0fcff4d3a280617a637d6301348534f0b8eadd90a8142473f5574308c
SHA5121f30de9f46c79b5edaaad1fadd9cdc61d1948d26472284b75dbb852f6442fa2f20cdecf0803a3fb2e1a2a240488d13e6708a3288542c9b026de53e8c3e0e26b6