Overview
overview
7Static
static
3dolphin-x64-5.0.exe
windows7-x64
7dolphin-x64-5.0.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3infinst.exe
windows7-x64
4infinst.exe
windows10-2004-x64
4xinput1_3.dll
windows7-x64
1xinput1_3.dll
windows10-2004-x64
1xinput1_3.dll
windows7-x64
1xinput1_3.dll
windows10-2004-x64
1$TEMP/dxre...UP.dll
windows7-x64
4$TEMP/dxre...UP.dll
windows10-2004-x64
4$TEMP/dxre...UP.exe
windows7-x64
4$TEMP/dxre...UP.exe
windows10-2004-x64
4$TEMP/dxre...32.dll
windows7-x64
4$TEMP/dxre...32.dll
windows10-2004-x64
4dxupdate.dll
windows7-x64
3dxupdate.dll
windows10-2004-x64
3$TEMP/vcre...64.exe
windows7-x64
7$TEMP/vcre...64.exe
windows10-2004-x64
7Dolphin.exe
windows7-x64
1Dolphin.exe
windows10-2004-x64
6OpenAL32.dll
windows7-x64
1OpenAL32.dll
windows10-2004-x64
1Sys/GameSe...r2.ps1
windows7-x64
3Sys/GameSe...r2.ps1
windows10-2004-x64
3Sys/GameSe...01.ps1
windows7-x64
3Sys/GameSe...01.ps1
windows10-2004-x64
3Analysis
-
max time kernel
592s -
max time network
362s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
dolphin-x64-5.0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dolphin-x64-5.0.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
infinst.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
infinst.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
xinput1_3.dll
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
xinput1_3.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
xinput1_3.dll
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
xinput1_3.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
$TEMP/dxredist/DSETUP.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
$TEMP/dxredist/DSETUP.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$TEMP/dxredist/DXSETUP.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
$TEMP/dxredist/DXSETUP.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$TEMP/dxredist/dsetup32.dll
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
$TEMP/dxredist/dsetup32.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
dxupdate.dll
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
dxupdate.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
$TEMP/vcredist/vc_redist.x64.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
$TEMP/vcredist/vc_redist.x64.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
Dolphin.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
Dolphin.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
OpenAL32.dll
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
OpenAL32.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Sys/GameSettings/GALE01r2.ps1
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
Sys/GameSettings/GALE01r2.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
Sys/GameSettings/GZ2J01.ps1
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Sys/GameSettings/GZ2J01.ps1
Resource
win10v2004-20240508-en
General
-
Target
dolphin-x64-5.0.exe
-
Size
18.4MB
-
MD5
eca48982effad82616f206f52336fe4b
-
SHA1
4d88af3572de650b0b7dccd92dc8de5854edfae6
-
SHA256
e1b3ae8fc890c6588e5656f77ef2747ae7ddfc90b6530b240c0c5b9d0ab3ce8c
-
SHA512
778755b2d12c703a2954882a4d333b7cb61ee7ed0482b5cb14c1cbc4b90c8b65f308944a2f9369a89fc54d163c613efc65adf70316c08d447183f65637fcb557
-
SSDEEP
393216:Y1qyjt4rPX8zs3XxdbHNemtqa7JhnurHTl0WcS4ENyQ4p9Jmm+:Y1qyZePX8khdbtecqa7JhnurHirhENys
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 1396 DXSETUP.exe 3812 infinst.exe 2860 vc_redist.x64.exe 2224 vc_redist.x64.exe 4952 Dolphin.exe -
Loads dropped DLL 64 IoCs
pid Process 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 1224 Process not Found 1224 Process not Found 1224 Process not Found 1224 Process not Found 2940 dolphin-x64-5.0.exe 1396 DXSETUP.exe 1396 DXSETUP.exe 1396 DXSETUP.exe 1396 DXSETUP.exe 1396 DXSETUP.exe 1396 DXSETUP.exe 2940 dolphin-x64-5.0.exe 2860 vc_redist.x64.exe 2224 vc_redist.x64.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe 2940 dolphin-x64-5.0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system32\SET976F.tmp infinst.exe File created C:\Windows\system32\SET976F.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\SET9750.tmp DXSETUP.exe File created C:\Windows\SysWOW64\SET9750.tmp DXSETUP.exe File opened for modification C:\Windows\SysWOW64\xinput1_3.dll DXSETUP.exe File opened for modification C:\Windows\system32\xinput1_3.dll infinst.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Dolphin\Sys\GameSettings\RXX.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\WR5.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\R9I.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GW3.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\Resources\Flag_Australia.png dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\R96.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\R9F.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\WA4.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\G8ME01.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GC5.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GVJ.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\SDB.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\EAO.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GCVEEB.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GZM.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\Resources\[email protected] dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\Resources\[email protected] dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\E56.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\FANE01.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\Resources\[email protected] dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\R92.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\RMHE08.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\Themes\Boomy\README.txt dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\G9T.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GW7.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GEM.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GLU.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GOA.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\G2ME01.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GALP01.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\SOS.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\Themes\Clean Blue\[email protected] dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GHR.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GP8.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\RBK.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\EB4.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\MCY.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\Shaders\posterize2.glsl dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GPVE01.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\SIL.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\RSW.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\WIY.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\Themes\Clean\stop.png dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\Resources\toolbar_debugger_goto_pc.png dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\Themes\Clean Pink\play.png dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GEZ.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\WRX.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GBQ.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GM3.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GKH.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GR2.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\RZDP01.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\RZY.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\WXB.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\E52.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\RMO.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\R3N.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\R4B.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\MCZ.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\RJ2.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\WGS.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GSW.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\GCOPDV.ini dolphin-x64-5.0.exe File created C:\Program Files\Dolphin\Sys\GameSettings\EBU.ini dolphin-x64-5.0.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.app.log DXSETUP.exe File opened for modification C:\Windows\DirectX.log infinst.exe File opened for modification C:\Windows\INF\setupapi.app.log infinst.exe File opened for modification C:\Windows\Logs\DirectX.log DXSETUP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{29FB0AE1-34D4-11EF-B5E8-DE62917EBCA6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2516 chrome.exe 2516 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe Token: SeShutdownPrivilege 2516 chrome.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 2580 iexplore.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 4952 Dolphin.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe 2516 chrome.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2580 iexplore.exe 2580 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 4952 Dolphin.exe 4952 Dolphin.exe 4952 Dolphin.exe 4952 Dolphin.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2580 wrote to memory of 2724 2580 iexplore.exe 30 PID 2580 wrote to memory of 2724 2580 iexplore.exe 30 PID 2580 wrote to memory of 2724 2580 iexplore.exe 30 PID 2580 wrote to memory of 2724 2580 iexplore.exe 30 PID 2516 wrote to memory of 2244 2516 chrome.exe 32 PID 2516 wrote to memory of 2244 2516 chrome.exe 32 PID 2516 wrote to memory of 2244 2516 chrome.exe 32 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 2392 2516 chrome.exe 34 PID 2516 wrote to memory of 320 2516 chrome.exe 35 PID 2516 wrote to memory of 320 2516 chrome.exe 35 PID 2516 wrote to memory of 320 2516 chrome.exe 35 PID 2516 wrote to memory of 2040 2516 chrome.exe 36 PID 2516 wrote to memory of 2040 2516 chrome.exe 36 PID 2516 wrote to memory of 2040 2516 chrome.exe 36 PID 2516 wrote to memory of 2040 2516 chrome.exe 36 PID 2516 wrote to memory of 2040 2516 chrome.exe 36 PID 2516 wrote to memory of 2040 2516 chrome.exe 36 PID 2516 wrote to memory of 2040 2516 chrome.exe 36 PID 2516 wrote to memory of 2040 2516 chrome.exe 36 PID 2516 wrote to memory of 2040 2516 chrome.exe 36 PID 2516 wrote to memory of 2040 2516 chrome.exe 36 PID 2516 wrote to memory of 2040 2516 chrome.exe 36 PID 2516 wrote to memory of 2040 2516 chrome.exe 36 PID 2516 wrote to memory of 2040 2516 chrome.exe 36 PID 2516 wrote to memory of 2040 2516 chrome.exe 36 PID 2516 wrote to memory of 2040 2516 chrome.exe 36 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dolphin-x64-5.0.exe"C:\Users\Admin\AppData\Local\Temp\dolphin-x64-5.0.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\dxredist\DXSETUP.exe"C:\Users\Admin\AppData\Local\Temp\dxredist\DXSETUP.exe" /silent2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\DX9627.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX9627.tmp\infinst.exe xinput1_3_x64.inf, Install_Driver3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:3812
-
-
-
C:\Users\Admin\AppData\Local\Temp\vcredist\vc_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\vcredist\vc_redist.x64.exe" /install /quiet /norestart2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\vcredist\vc_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\vcredist\vc_redist.x64.exe" /install /quiet /norestart -burn.unelevated BurnPipe.{C2EC057D-EC0F-4EC6-87DD-796E41A03766} {7EEC1E67-722E-4ECB-9C90-D4BE1018BA2D} 28603⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2224
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2580 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef71b9758,0x7fef71b9768,0x7fef71b97782⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:22⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:82⤵PID:320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1588 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:82⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2260 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:12⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2272 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:12⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1016 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:22⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3200 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:12⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3476 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:82⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3588 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:82⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3604 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:82⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3760 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:12⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2628 --field-trial-handle=1196,i,17042896216940621619,11765756832132023913,131072 /prefetch:82⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2116
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:308
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000490" "00000000000002FC"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2144
-
C:\Program Files\Dolphin\Dolphin.exe"C:\Program Files\Dolphin\Dolphin.exe"1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD5f00a5461ba0b2c95f801923fef70c266
SHA1f7717e3f341e1b56c46407df643d4ac6dcc09885
SHA25619c8af2231c12fe7969e63595f818baf9421542d1e4f3ea64ac2ff79352a6f12
SHA512a9977db27df94510bc75ee961924804c59c0005b9bc9b8961d63b01359c72920a6a6f0f3b014c715f3b0c4208038deb65f114f83dee157422dc035b84a267315
-
Filesize
988B
MD5926a446e9de7d51c34ae548673386417
SHA15a0a2666b270eca354f1632de8f98fc966864d08
SHA25685f27cf7d073c5931530c102d4c39ff731a3eb30c67d506c6626b0ad72f26539
SHA512d5117a0a76c22b06aa91f7586f866387ad74b4962e569cab64d6abeb83d701c8b66331dc6193478f36faef616a95f404cb15a7a0b0b86f863c93ab09f908ea53
-
Filesize
283KB
MD5cf900343f194cafbac25ef1d3cd47cd7
SHA182fb88ca9ad51fc4e2ad6f7ccdbe6544be585d39
SHA25657db544036344fc6bf39f4ffae263224b60efd87ba4225d06ace035b03409e2e
SHA512063e96d50dd78052f4f1d4988d61ebe0fe49f545c34263137645ac5e9e62b2f058f954c2e979b26835903fe4a60e94875d836e34da02fc466affee17c179bd32
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
6KB
MD5b7fe8536bf44bb906743e82a6a6aa73e
SHA14f2e170547b08d6c03244465399b35a67febd77a
SHA2569234714be11f5b4f2f4846d953f6c10dc0c41b9f2e322223e580536e871da8f8
SHA5123d0602cd5103443653fb207bd6dbd9ede4e97a4026e2601bcf52a32b3e0a8b1fe4ab27f9e45c2c42dc62fc3a37651b6ceb0c3f4fa1a9ff2f8e46ce129887cffa
-
Filesize
6KB
MD5c6f42a02b8454805af5beed0d506342b
SHA19baa3b30b89df023a5a7785bc1678aa55dc57e4f
SHA256cb9e2bc35aeb1f2d4bc4539af88ef9c9b718294f67f5b986ec07a2acea9b7539
SHA512bf492a659d4fd0e55b81c4101a15926ef8968c825c87cd136d4f26fea2aa419209993daea9c3d8a9938b5e82fb10fa18bc1772f921dac86584a5cbe28a7bdf60
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
283KB
MD5694c2b7ecc52eec9e194aa26cdae40fd
SHA1f328750491faea28e626204eb9fee23577d171b4
SHA256d526b7a932da5ee4338ef5869afec9930721243b0ab9cf4a5ebaf43666a0b4fb
SHA51246ae93684ad791cf8ed151fce5da841307be050d3f44f3f977d684cc4c49115f1a193bb7ad084343e94f0b9aa7eca0895f4ca58818b7a0389eaeca24e5fb3623
-
Filesize
860B
MD594563a3b9affb41d2bfd41a94b81e08d
SHA117cad981ef428e132aa1d571e0c77091e750e0dd
SHA2560d6e1c0e961d878b319ac30d3439056883448dcf26774003b73920f3377ecac8
SHA51253cac179d7e11c74772e7b9bd7dd94ffbc810cfc25e28326e4d0844f3f59fd10d9089b44a88358ac6dbd09fb8b456a0937778f78ecc442645764f693ccd620b8
-
Filesize
1KB
MD5e188f534500688cec2e894d3533997b4
SHA1f073f8515b94cb23b703ab5cdb3a5cfcc10b3333
SHA2561c798cb80e9e46ce03356ea7316e1eff5d3a88ccdd7cbfbfcdce73cded23b4e5
SHA512332ccb25c5ed92ae48c5805a330534d985d6b41f9220af0844d407b2019396fcefea7076b409439f5ab8a9ca6819b65c07ada7bd3aa1222429966dc5a440d4f7
-
Filesize
12KB
MD5e6a74342f328afa559d5b0544e113571
SHA1a08b053dfd061391942d359c70f9dd406a968b7d
SHA25693f5589499ee4ee2812d73c0d8feacbbcfe8c47b6d98572486bc0eff3c5906ca
SHA5121e35e5bdff1d551da6c1220a1a228c657a56a70dedf5be2d9273fc540f9c9f0bb73469595309ea1ff561be7480ee92d16f7acbbd597136f4fc5f9b8b65ecdfad
-
Filesize
79KB
MD577f595dee5ffacea72b135b1fce1312e
SHA1d2a710b332de3ef7a576e0aed27b0ae66892b7e9
SHA2568d540d484ea41e374fd0107d55d253f87ded4ce780d515d8fd59bbe8c98970a7
SHA512a8683050d7758c248052c11ac6a46c9a0b3b3773902cca478c1961b6d9d2d57c75a8c925ba5af4499989c0f44b34eaf57abafafa26506c31e5e4769fb3439746
-
Filesize
104KB
MD5bfb3091b167550ec6e6454813d3db244
SHA187e86a7c783f607697a4880e7e063ab87bf63034
SHA256756cad002e1553cfa1a91ebe8c1b9380ffabe0b4b1916c4a4db802396ddfbef8
SHA512ce2ead2480a3942081af4df4baee32de18862b5f0288169b9e8135cc710eb128f9a2b8a36bda87212c53fd4317359349c94d38b5da082638230dcb5669efede9
-
Filesize
669B
MD5c9635b7617d68d95f9113282472218c9
SHA1e3da3f2600a0f5cd0e28722ee313e04fc29dfc60
SHA2560d411d9424128f19fed2daa95a2983b4b29197f022a754f59d0c7740ad654cca
SHA5120481e008619d3b3a45d0a90825b576e4c03f27668b0792762cb9165b15955645667392f23eac5e5c4eb8a7fe6fa47cae4c319323b02225289af0cffaf1ca8c83
-
Filesize
94KB
MD5743b333c2db3d4cf190fb39c29f3c346
SHA126b3616d7321978bd45656391a75ee231196a4a2
SHA256e7a09f8235cc587cc63f583e39fbc75008d9677c8bb4dcc11cb8d0178a5153ac
SHA51277fbdb86c79d7228bca2982a3285a417a365af980488a5ac2d470b532fa59fcc15e0e8dbee6eb1a3a5256fc29e0e3391529cd2ac13e0f72987ee0da136000957
-
Filesize
52KB
MD5c234df417c9b12e2d31c7fd1e17e4786
SHA192f32e74944e5166db72d3bfe8e6401d9f7521dd
SHA2562acea6c8b9f6f7f89ec51365a1e49fbd0d8c42c53418bd0783dbf3f74a744e6d
SHA5126cbae19794533ad9401f92b10bd9549638ba20ce38375de4f9d0e20af20d78819e46856151cc6818325af9ac774b8128e18fbebd2da5da4efbd417fc2af51dab
-
Filesize
94KB
MD5d495680aba28caafc4c071a6d0fe55ac
SHA15885ece90970eb10b6b95d6c52d934674835929e
SHA256e18a5404b612e88fa8b403c9b33f064c0a89528db7ef9a79aa116908d0e6afed
SHA512a25c647678661473b99462d7433c1d05af54823d404476e35315c11c93b3f5ece92c912560af0d9efe8f07e36ae68594362d73abf5d5de409a3f0a146fe31a10
-
Filesize
14KB
MD5d753362649aecd60ff434adf171a4e7f
SHA13b752ad064e06e21822c8958ae22e9a6bb8cf3d0
SHA2568f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586
SHA51241bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d
-
Filesize
504B
MD5cc80660a4a689229bf0547a52c06f065
SHA16423de0a4ecd6747b7b1459cbd08d12638772097
SHA256f3156d226a7dc22e96554f03edac2b90456ea2bf7823932b0edaab355f8ef12a
SHA5127f11c3be925d4a063d2d0660cc3154b89a06ce31b99862f254294b2606f8d736635bd0cf5d65ca3c3fcb3a8949eb01f31980389bb78f9da7d6ce09493f58c993
-
Filesize
543B
MD5bdfbc05af8bb60162b5f612474a43dd0
SHA1203e100b6728ea58e3f3afa7215463124580355d
SHA256853bca36798812e07d8777fb58ca474a75a712e76960dee9e2d55d9d662d5b57
SHA51283934a5322b97bb0c0db0157b315f12b3d9e7c659ee8915e22083479d2a9823a0b0344a92e74c4d13b8cac19036016f394692bc0408e345859e293ef1246d8d0
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
2KB
MD558d74b5740dd8a12e35ec33996984285
SHA1f29f20572bcb1b14c36e08c7c1ee7f04858aa71b
SHA256b10326bfe25c647c858676b0a3b3d69c190a68cb2567d23afebe5f917f925f6e
SHA51209725f5431e410798ccbbecdb39b55335372098676c73649ff61a23b87aa05795e665d55e0d18f9959a3179867854c9c60723789310ab0d00c7a16502e5f9cfe
-
Filesize
32B
MD570bc8f4b72a86921468bf8e8441dce51
SHA1de8a847bff8c343d69b853a215e6ee775ef2ef96
SHA25666687aadf862bd776c8fc18b8e9f8e20089714856ee233b3902a591d0d5f2925
SHA5125046adc1dba838867b2bbbfdd0c3423e58b57970b5267a90f57960924a87f1960a6a85eaa642dac835424b5d7c8d637c00408c7a73da672b7f498521420b6dd3
-
Filesize
16KB
MD59473c879a5e51040e7a202b4538773a7
SHA13256c026284a24fb99d2ec1558d95db3b5dcc2e9
SHA256a8ec1ec377ee3a3c93a27f74dadf9edf95112ce167fc23d1abdbeb4fa15eb179
SHA512139dbb6648a1c8b7e5224e52ca8f8093f069b7d5f83e2b84099688b927eb77cb8445bc46f9da98ce56d3b883bfe8e38905b5e252c87a5295a334fc8b6890bff3
-
Filesize
1024B
MD50c425c24e91335f18a3246b1d611a8ca
SHA1caf8a96a36573d7e67f086f73fec675a5d1c4245
SHA2567afebf33eeb0035397cc74e15e892e700cd2903641d26562f5d46cfbb6171109
SHA512001e0d8dd5e5b2e2d8b8357bba7d8c20ac33dca3a6b7897f11a1f01f391118da4f457d5a5c6531eedabebd6883dcde0bb3526b97ed7b3357a7e6d768d9c322af
-
Filesize
474B
MD5476c6a2d1769a13dac1be89205cb6253
SHA1e66beb80001e3053034003de2f16fe3a7b488606
SHA256dc1e6eb0e656daa0dfc71db8761d73fe42b51d355943b09dea08decdd1662a1c
SHA512cc05ddbd6e08ebe5d6a4abb8d3b387c06e05ba6273697c3d8ae972a39183920f4ec272d1339b3380bc3ea0bf7c43f30b8e43cf503ec70df22c9e97128af793e0
-
Filesize
2KB
MD5abde69e162b67ec7385ed0257dd41f21
SHA1dc722ac72cc0a8dbc782522b50b9b3163fa38524
SHA256269f49caa26d441673d32a86c75b9cb9ee2a558184268ff81ac08e05e3f90a50
SHA512fbde00df7e258a224daa50590baa9352d53a79147726f8748cd13fd8cfad79b56d889f1257f0f1bd5180b623ad4fe67b57f8c09fd1a5e56b8bb6eef0249bdaef
-
Filesize
4KB
MD5324b01605da85e7562a663a7837dddce
SHA1655b949d3996f5325a43fad23e40c28a53d6d4e9
SHA2563cc6f52e2fa6263ef5f324db6badd985a918a24315817ab96231b64d2970f480
SHA512a0bc71334af4b6932f7e4ac65b54afd88aa21b82c55e6574af020cc0c27067252de107952f481372f593f7cff6f4f89b2997703ce15d1186807c46efc6b1e552
-
Filesize
14.9MB
MD59660ec7cddf093a1807cb25fe0946b8e
SHA15986661c62d689380476db238d7c18fa37d1b616
SHA25619d5c382204d7e40a764e116967aec610f502b9be60b9d3b095073827aa93c66
SHA5125213c828d4f0742c3cde59ceea7b111a1402779602f09fa5e898083b07f2860bb33119f97741bc049fefc0cd745879d22a12dc37ece8e0dd8b308dcc84079755
-
Filesize
173KB
MD57ed554b08e5b69578f9de012822c39c9
SHA1036d04513e134786b4758def5aff83d19bf50c6e
SHA256fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2
SHA5127af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9
-
Filesize
68KB
MD545d4dac07aa361bcd77aa815d1724a16
SHA13bbdf7da5d51211ae269572961b5ebf508ada28d
SHA25634ab99536ea59ad60ba6efda3ea6d18291ef096a0bab3664248d6045805da0ec
SHA512d940002a8e0112a3b56a909008403b447e9cbb80e38b9bbd508f40aa68224f7e5d9681e1039e747ae939e0829a25be2319b9f9d0862cebb042e4c525ccbc20be
-
Filesize
93KB
MD5eb701def7d0809e8da765a752ab42be5
SHA17897418f0fae737a3ebe4f7954118d71c6c8b426
SHA2562a61679eeedabf7d0d0ac14e5447486575622d6b7cfa56f136c1576ff96da21f
SHA5126ff8433c0dadc0e87d18f04289ab6f48624c908acbda506708f5e0f3c9522e9316e587e71f568938067ba9f37f96640b793fdfaa580caedc3bf9873dc221271f
-
Filesize
505KB
MD5bf3f290275c21bdd3951955c9c3cf32c
SHA19fd00f3bb8a870112dae464f555fcd5e7f9200c0
SHA2568f47d7121ef6532ad9ad9901e44e237f5c30448b752028c58a9d19521414e40d
SHA512d2c354ee8b6977d01f23c6d2bb4977812bf653eae25e7a75a7d0a36b588c89fcdbdc2a8087c24d6ff687afebd086d4b7d0c92203ce39691b21dab71eafd1d249
-
Filesize
1.5MB
MD5d8fa7bb4fe10251a239ed75055dd6f73
SHA176c4bd2d8f359f7689415efc15e3743d35673ae8
SHA256fb0e534f9b0926e518f1c2980640dfd29f14217cdfa37cf3a0c13349127ed9a8
SHA51273f633179b1340c1c14d0002b72e44cab1919d0ef174f307e4bfe6de240b0b6ef233e67a8b0a0cd677556865ee7b88c6de152045a580ab9fbf1a50d2db0673b4
-
Filesize
5KB
MD5e447e49175c0db1f27888aede301084f
SHA1f5946c743265cd8e81f3e7b6376dada57f99877f
SHA256fd26ef21d72797fedecd3d15f2001cea793383aceb3cee19a5ae2a3d30e197b6
SHA512e6543bf81bedce94a58f48cd6f9daaec891775e01ff76b771c22d459a778490f9bba0bebbf111b1ca3091b3ca69bca806a9b5e68ce12df03abbaa6ce5c4b7cec
-
Filesize
10KB
MD556a321bd011112ec5d8a32b2f6fd3231
SHA1df20e3a35a1636de64df5290ae5e4e7572447f78
SHA256bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1
SHA5125354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3
-
Filesize
14.1MB
MD5883c499d04c145a69622f7658e353265
SHA1bb64084762abd4a06b2fddd16f0092860bc3043f
SHA256df58f4aa566a10776c864c1007e0ac0987835fa1e9f7445bed8ba21a9101d414
SHA512ce840c9420e928c9da6c30c3cd97eeb047d34ee7046b8cfcd20b512fbddfe885329ab4db3ca53f7094bf1caeb600c834cb2db10797ceade859c21786144206c9
-
Filesize
118KB
MD54d20a950a3571d11236482754b4a8e76
SHA1e68bd784ac143e206d52ecaf54a7e3b8d4d75c9c
SHA256a9295ad4e909f979e2b6cb2b2495c3d35c8517e689cd64a918c690e17b49078b
SHA5128b9243d1f9edbcbd6bdaf6874dc69c806bb29e909bd733781fde8ac80ca3fff574d786ca903871d1e856e73fd58403bebb58c9f23083ea7cd749ba3e890af3d2