Overview
overview
7Static
static
3dolphin-x64-5.0.exe
windows7-x64
7dolphin-x64-5.0.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3infinst.exe
windows7-x64
4infinst.exe
windows10-2004-x64
4xinput1_3.dll
windows7-x64
1xinput1_3.dll
windows10-2004-x64
1xinput1_3.dll
windows7-x64
1xinput1_3.dll
windows10-2004-x64
1$TEMP/dxre...UP.dll
windows7-x64
4$TEMP/dxre...UP.dll
windows10-2004-x64
4$TEMP/dxre...UP.exe
windows7-x64
4$TEMP/dxre...UP.exe
windows10-2004-x64
4$TEMP/dxre...32.dll
windows7-x64
4$TEMP/dxre...32.dll
windows10-2004-x64
4dxupdate.dll
windows7-x64
3dxupdate.dll
windows10-2004-x64
3$TEMP/vcre...64.exe
windows7-x64
7$TEMP/vcre...64.exe
windows10-2004-x64
7Dolphin.exe
windows7-x64
1Dolphin.exe
windows10-2004-x64
6OpenAL32.dll
windows7-x64
1OpenAL32.dll
windows10-2004-x64
1Sys/GameSe...r2.ps1
windows7-x64
3Sys/GameSe...r2.ps1
windows10-2004-x64
3Sys/GameSe...01.ps1
windows7-x64
3Sys/GameSe...01.ps1
windows10-2004-x64
3Analysis
-
max time kernel
357s -
max time network
359s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 22:24
Static task
static1
Behavioral task
behavioral1
Sample
dolphin-x64-5.0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dolphin-x64-5.0.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
infinst.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
infinst.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
xinput1_3.dll
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
xinput1_3.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
xinput1_3.dll
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
xinput1_3.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
$TEMP/dxredist/DSETUP.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
$TEMP/dxredist/DSETUP.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$TEMP/dxredist/DXSETUP.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
$TEMP/dxredist/DXSETUP.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$TEMP/dxredist/dsetup32.dll
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
$TEMP/dxredist/dsetup32.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
dxupdate.dll
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
dxupdate.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
$TEMP/vcredist/vc_redist.x64.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
$TEMP/vcredist/vc_redist.x64.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
Dolphin.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
Dolphin.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
OpenAL32.dll
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
OpenAL32.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Sys/GameSettings/GALE01r2.ps1
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
Sys/GameSettings/GALE01r2.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
Sys/GameSettings/GZ2J01.ps1
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Sys/GameSettings/GZ2J01.ps1
Resource
win10v2004-20240508-en
General
-
Target
$TEMP/dxredist/dsetup32.dll
-
Size
1.5MB
-
MD5
d8fa7bb4fe10251a239ed75055dd6f73
-
SHA1
76c4bd2d8f359f7689415efc15e3743d35673ae8
-
SHA256
fb0e534f9b0926e518f1c2980640dfd29f14217cdfa37cf3a0c13349127ed9a8
-
SHA512
73f633179b1340c1c14d0002b72e44cab1919d0ef174f307e4bfe6de240b0b6ef233e67a8b0a0cd677556865ee7b88c6de152045a580ab9fbf1a50d2db0673b4
-
SSDEEP
24576:CIQ+ddddddddddddddxOOOOOOOOOOOOOO2iWeXiWeXiWeXiWeXiWeXiWeXiWeXi+:CIQsOOOOOOOOOOOOOO2iWeXiWeXiWeXf
Malware Config
Signatures
-
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Logs\DXError.log rundll32.exe File opened for modification C:\Windows\Logs\DirectX.log rundll32.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeBackupPrivilege 2780 vssvc.exe Token: SeRestorePrivilege 2780 vssvc.exe Token: SeAuditPrivilege 2780 vssvc.exe Token: SeRestorePrivilege 2848 DrvInst.exe Token: SeRestorePrivilege 2848 DrvInst.exe Token: SeRestorePrivilege 2848 DrvInst.exe Token: SeRestorePrivilege 2848 DrvInst.exe Token: SeRestorePrivilege 2848 DrvInst.exe Token: SeRestorePrivilege 2848 DrvInst.exe Token: SeRestorePrivilege 2848 DrvInst.exe Token: SeLoadDriverPrivilege 2848 DrvInst.exe Token: SeLoadDriverPrivilege 2848 DrvInst.exe Token: SeLoadDriverPrivilege 2848 DrvInst.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1084 1672 rundll32.exe 28 PID 1672 wrote to memory of 1084 1672 rundll32.exe 28 PID 1672 wrote to memory of 1084 1672 rundll32.exe 28 PID 1672 wrote to memory of 1084 1672 rundll32.exe 28 PID 1672 wrote to memory of 1084 1672 rundll32.exe 28 PID 1672 wrote to memory of 1084 1672 rundll32.exe 28 PID 1672 wrote to memory of 1084 1672 rundll32.exe 28 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\dxredist\dsetup32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\dxredist\dsetup32.dll,#12⤵
- Drops file in Windows directory
PID:1084
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot18" "" "" "6792c44eb" "0000000000000000" "0000000000000594" "00000000000005B4"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
515B
MD53738ba47e21def37e3f049eae3e41856
SHA170e2cd1cb718ae6d994496da6d3894a7d0237af8
SHA256d76fe0ac650fdfd7cc6b5254861289c73e5da7aaae15a4e5720bb6d556a6c91d
SHA51245547a184613a8dee23e99b1bd51dfa3b6828b937564c05bacf0f34dfba508fe8151e1261c9190311e77e1ba7bba432cc5473b0e81fe4cbef91da4d237e39e9c
-
Filesize
958B
MD51ae2c573d873188bba86f3053cf28948
SHA1616371512c526cb1e5ee07e78e6ed5167ac52951
SHA25620bfdfbba18fa8a3b34df31d2bfa6502edce52230d8bdedfbf28b97d455b2a25
SHA5126dd1a564dbeb5f7b962db8a6e83b8cd59e9941ac777798757bdaa3141b9779fd53cd9dbab1c4a0c84139ef741ddfef1fa2d3543f12cdd3de44185e39b6126c74