Analysis

  • max time kernel
    142s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2024 19:54

General

  • Target

    Dolphin.exe

  • Size

    14.9MB

  • MD5

    9660ec7cddf093a1807cb25fe0946b8e

  • SHA1

    5986661c62d689380476db238d7c18fa37d1b616

  • SHA256

    19d5c382204d7e40a764e116967aec610f502b9be60b9d3b095073827aa93c66

  • SHA512

    5213c828d4f0742c3cde59ceea7b111a1402779602f09fa5e898083b07f2860bb33119f97741bc049fefc0cd745879d22a12dc37ece8e0dd8b308dcc84079755

  • SSDEEP

    196608:HgfH5UoUTKklTNrDatogipuoBvfU2+YOcfyOGXutM8/:A/5UomlTNMogipuoBvfU2bOevGeP/

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dolphin.exe
    "C:\Users\Admin\AppData\Local\Temp\Dolphin.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2024

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\Dolphin Emulator\Config\Dolphin.ini

    Filesize

    2KB

    MD5

    7fd7e1ae2f074060286a81e537673a24

    SHA1

    18717b5c8447a11c0e2aa6724aff74f2b9b09433

    SHA256

    7fde434ff06d259de09abc7dd796c6a6df734564925c28b83d133bfac661f466

    SHA512

    105ec0ae2bb15437dc7304612ec095e9ddec6cb6d2b8da3fc5a39ede53087a7e29c4f71cc3d92f7fdc473c49a5f85351087865cbf96f4ae48eb6cb3014e308b3

  • C:\Users\Admin\Documents\Dolphin Emulator\Wii\shared2\sys\SYSCONF

    Filesize

    16KB

    MD5

    9473c879a5e51040e7a202b4538773a7

    SHA1

    3256c026284a24fb99d2ec1558d95db3b5dcc2e9

    SHA256

    a8ec1ec377ee3a3c93a27f74dadf9edf95112ce167fc23d1abdbeb4fa15eb179

    SHA512

    139dbb6648a1c8b7e5224e52ca8f8093f069b7d5f83e2b84099688b927eb77cb8445bc46f9da98ce56d3b883bfe8e38905b5e252c87a5295a334fc8b6890bff3

  • memory/2024-31-0x000000006B600000-0x000000006B69F000-memory.dmp

    Filesize

    636KB