Analysis

  • max time kernel
    591s
  • max time network
    453s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-06-2024 22:24

General

  • Target

    Dolphin.exe

  • Size

    14.9MB

  • MD5

    9660ec7cddf093a1807cb25fe0946b8e

  • SHA1

    5986661c62d689380476db238d7c18fa37d1b616

  • SHA256

    19d5c382204d7e40a764e116967aec610f502b9be60b9d3b095073827aa93c66

  • SHA512

    5213c828d4f0742c3cde59ceea7b111a1402779602f09fa5e898083b07f2860bb33119f97741bc049fefc0cd745879d22a12dc37ece8e0dd8b308dcc84079755

  • SSDEEP

    196608:HgfH5UoUTKklTNrDatogipuoBvfU2+YOcfyOGXutM8/:A/5UomlTNMogipuoBvfU2bOevGeP/

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dolphin.exe
    "C:\Users\Admin\AppData\Local\Temp\Dolphin.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1048
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:372
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
    1⤵
    • Drops desktop.ini file(s)
    • Checks processor information in registry
    • Modifies registry class
    PID:4596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\Dolphin Emulator\Config\Dolphin.ini

    Filesize

    2KB

    MD5

    bcd8bad190d13b92c719623a3cfd6895

    SHA1

    80f355d9b076a83c28c27a6ad72b0283c5418359

    SHA256

    32a2838fd42f5905c7ac6ef02eea2658b95045985f2974db8d962fd97df4e1da

    SHA512

    3b8ba3d118cbed3df4d67efdb85491439f622c461006658352f059d6ac1ef53c03a93811ce6c3d67781d77911966a449ed9dd432d7461502c4bedbf805e4930a

  • C:\Users\Admin\Documents\Dolphin Emulator\Config\Dolphin.ini.xxx

    Filesize

    2KB

    MD5

    4d2e33a88a1ef788dffa895399d671d0

    SHA1

    a269c7d2813c2cf2cba5f102e367b76ce9ab6911

    SHA256

    a35b4986501ab7ed8bae2c0510a3da610b539ba8c7e6a9df3ae9b533bd0a19ca

    SHA512

    68411de59a305368fbb5e2a34d8c8e203f4d3ee5d7bf86392f85b9c187c3dfcadef845d3cab22451a9a28314221a6292f540824b1a78bcae9d1e63f9b5098018

  • C:\Users\Admin\Documents\Dolphin Emulator\Wii\shared2\sys\SYSCONF

    Filesize

    16KB

    MD5

    9473c879a5e51040e7a202b4538773a7

    SHA1

    3256c026284a24fb99d2ec1558d95db3b5dcc2e9

    SHA256

    a8ec1ec377ee3a3c93a27f74dadf9edf95112ce167fc23d1abdbeb4fa15eb179

    SHA512

    139dbb6648a1c8b7e5224e52ca8f8093f069b7d5f83e2b84099688b927eb77cb8445bc46f9da98ce56d3b883bfe8e38905b5e252c87a5295a334fc8b6890bff3

  • C:\Users\Admin\Videos\Captures\desktop.ini

    Filesize

    190B

    MD5

    b0d27eaec71f1cd73b015f5ceeb15f9d

    SHA1

    62264f8b5c2f5034a1e4143df6e8c787165fbc2f

    SHA256

    86d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2

    SHA512

    7b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c

  • memory/1048-36-0x000000006B600000-0x000000006B69F000-memory.dmp

    Filesize

    636KB