Overview
overview
7Static
static
3dolphin-x64-5.0.exe
windows7-x64
7dolphin-x64-5.0.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3infinst.exe
windows7-x64
4infinst.exe
windows10-2004-x64
4xinput1_3.dll
windows7-x64
1xinput1_3.dll
windows10-2004-x64
1xinput1_3.dll
windows7-x64
1xinput1_3.dll
windows10-2004-x64
1$TEMP/dxre...UP.dll
windows7-x64
4$TEMP/dxre...UP.dll
windows10-2004-x64
4$TEMP/dxre...UP.exe
windows7-x64
4$TEMP/dxre...UP.exe
windows10-2004-x64
4$TEMP/dxre...32.dll
windows7-x64
4$TEMP/dxre...32.dll
windows10-2004-x64
4dxupdate.dll
windows7-x64
3dxupdate.dll
windows10-2004-x64
3$TEMP/vcre...64.exe
windows7-x64
7$TEMP/vcre...64.exe
windows10-2004-x64
7Dolphin.exe
windows7-x64
1Dolphin.exe
windows10-2004-x64
6OpenAL32.dll
windows7-x64
1OpenAL32.dll
windows10-2004-x64
1Sys/GameSe...r2.ps1
windows7-x64
3Sys/GameSe...r2.ps1
windows10-2004-x64
3Sys/GameSe...01.ps1
windows7-x64
3Sys/GameSe...01.ps1
windows10-2004-x64
3Analysis
-
max time kernel
554s -
max time network
567s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 22:24
Static task
static1
Behavioral task
behavioral1
Sample
dolphin-x64-5.0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dolphin-x64-5.0.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
infinst.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
infinst.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
xinput1_3.dll
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
xinput1_3.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
xinput1_3.dll
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
xinput1_3.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
$TEMP/dxredist/DSETUP.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
$TEMP/dxredist/DSETUP.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$TEMP/dxredist/DXSETUP.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
$TEMP/dxredist/DXSETUP.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$TEMP/dxredist/dsetup32.dll
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
$TEMP/dxredist/dsetup32.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
dxupdate.dll
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
dxupdate.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
$TEMP/vcredist/vc_redist.x64.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
$TEMP/vcredist/vc_redist.x64.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
Dolphin.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
Dolphin.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
OpenAL32.dll
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
OpenAL32.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Sys/GameSettings/GALE01r2.ps1
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
Sys/GameSettings/GALE01r2.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
Sys/GameSettings/GZ2J01.ps1
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Sys/GameSettings/GZ2J01.ps1
Resource
win10v2004-20240508-en
General
-
Target
$TEMP/dxredist/dsetup32.dll
-
Size
1.5MB
-
MD5
d8fa7bb4fe10251a239ed75055dd6f73
-
SHA1
76c4bd2d8f359f7689415efc15e3743d35673ae8
-
SHA256
fb0e534f9b0926e518f1c2980640dfd29f14217cdfa37cf3a0c13349127ed9a8
-
SHA512
73f633179b1340c1c14d0002b72e44cab1919d0ef174f307e4bfe6de240b0b6ef233e67a8b0a0cd677556865ee7b88c6de152045a580ab9fbf1a50d2db0673b4
-
SSDEEP
24576:CIQ+ddddddddddddddxOOOOOOOOOOOOOO2iWeXiWeXiWeXiWeXiWeXiWeXiWeXi+:CIQsOOOOOOOOOOOOOO2iWeXiWeXiWeXf
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Logs\DXError.log rundll32.exe File opened for modification C:\Windows\Logs\DirectX.log rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeBackupPrivilege 3560 vssvc.exe Token: SeRestorePrivilege 3560 vssvc.exe Token: SeAuditPrivilege 3560 vssvc.exe Token: SeBackupPrivilege 408 srtasks.exe Token: SeRestorePrivilege 408 srtasks.exe Token: SeSecurityPrivilege 408 srtasks.exe Token: SeTakeOwnershipPrivilege 408 srtasks.exe Token: SeBackupPrivilege 408 srtasks.exe Token: SeRestorePrivilege 408 srtasks.exe Token: SeSecurityPrivilege 408 srtasks.exe Token: SeTakeOwnershipPrivilege 408 srtasks.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3448 wrote to memory of 4080 3448 rundll32.exe 82 PID 3448 wrote to memory of 4080 3448 rundll32.exe 82 PID 3448 wrote to memory of 4080 3448 rundll32.exe 82 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\dxredist\dsetup32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$TEMP\dxredist\dsetup32.dll,#12⤵
- Drops file in Windows directory
PID:4080
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
PID:408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238B
MD579d98c5d22049fedc50a0e430c4363f8
SHA1be547420fa1c622e678a9dfae6708729c601bb8c
SHA25694044c4df729132c201d993e8aaf6466c378a97f657483f51419a050b855fe22
SHA51279113a5d9f42e748c4a9227575de0ab052b8100cfcc735887db751a14c3c2c3facc39651def747156b4d5051db1422be9f05f2f9f71604eeadbf117e1f199229
-
Filesize
517B
MD5559fc56326a73713c29096329f9092ff
SHA182ea138cb4eb2282f894b401ccc1a2df485e4fa9
SHA2565e039aac3d70d514cc50d01726fbbf3318b48943ec55b7a318c64054b63cbd88
SHA5122b24780cae8275f9088b31e40be548131519f6392c3f86ee2b32e27d9b959978fb354bb3091836ed90d541f0fb8afe8b9f54732f1cc2951a09a0889b59b22d41