Overview
overview
10Static
static
1dolphSol-M....0.zip
windows7-x64
10dolphSol-M...ibutes
windows7-x64
3dolphSol-M...NG.yml
windows7-x64
3dolphSol-M...ignore
windows7-x64
3dolphSol-M...s.json
windows7-x64
3dolphSol-M...ICENSE
windows7-x64
1dolphSol-M...in.ahk
windows7-x64
3dolphSol-M...DME.md
windows7-x64
3dolphSol-M...yn.ico
windows7-x64
3dolphSol-M...on.png
windows7-x64
3dolphSol-M...st.png
windows7-x64
3dolphSol-M...st.png
windows7-x64
3dolphSol-M...fp.jpg
windows7-x64
3dolphSol-M...ay.png
windows7-x64
3dolphSol-M...st.png
windows7-x64
3dolphSol-M...t2.png
windows7-x64
3dolphSol-M...ng.png
windows7-x64
3dolphSol-M...ll.ahk
windows7-x64
3dolphSol-M...ch.ahk
windows7-x64
3dolphSol-M...ad.ahk
windows7-x64
3dolphSol-M...on.ahk
windows7-x64
3dolphSol-M...cr.ahk
windows7-x64
3dolphSol-M...ce.ahk
windows7-x64
3dolphSol-M...ne.ahk
windows7-x64
3dolphSol-M...ta.ini
windows7-x64
1dolphSol-M...a.json
windows7-x64
3dolphSol-M...us.ahk
windows7-x64
3dolphSol-M...by.ahk
windows7-x64
3dolphSol-M...nt.ahk
windows7-x64
3dolphSol-M...ms.ahk
windows7-x64
3dolphSol-M...ig.ini
windows7-x64
1Analysis
-
max time kernel
837s -
max time network
838s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/03/2025, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
dolphSol-Macro-1.4.0.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dolphSol-Macro-1.4.0/.gitattributes
Resource
win7-20250207-en
Behavioral task
behavioral3
Sample
dolphSol-Macro-1.4.0/.github/FUNDING.yml
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
dolphSol-Macro-1.4.0/.gitignore
Resource
win7-20250207-en
Behavioral task
behavioral5
Sample
dolphSol-Macro-1.4.0/.vscode/settings.json
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
dolphSol-Macro-1.4.0/LICENSE
Resource
win7-20241023-en
Behavioral task
behavioral7
Sample
dolphSol-Macro-1.4.0/Main.ahk
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
dolphSol-Macro-1.4.0/README.md
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
dolphSol-Macro-1.4.0/images/auryn.ico
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
dolphSol-Macro-1.4.0/images/discordIcon.png
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
dolphSol-Macro-1.4.0/images/glitchTest.png
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
dolphSol-Macro-1.4.0/images/nullTest.png
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
dolphSol-Macro-1.4.0/images/pfp.jpg
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
dolphSol-Macro-1.4.0/images/play.png
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
dolphSol-Macro-1.4.0/images/starfallTest.png
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
dolphSol-Macro-1.4.0/images/starfallTest2.png
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
dolphSol-Macro-1.4.0/images/testing.png
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
dolphSol-Macro-1.4.0/lib/Gdip_All.ahk
Resource
win7-20241010-en
Behavioral task
behavioral19
Sample
dolphSol-Macro-1.4.0/lib/Gdip_ImageSearch.ahk
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
dolphSol-Macro-1.4.0/lib/colorRead.ahk
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
dolphSol-Macro-1.4.0/lib/jxon.ahk
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
dolphSol-Macro-1.4.0/lib/ocr.ahk
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
dolphSol-Macro-1.4.0/lib/pathReference.ahk
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
dolphSol-Macro-1.4.0/lib/releaseClone.ahk
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
dolphSol-Macro-1.4.0/lib/staticData.ini
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
dolphSol-Macro-1.4.0/lib/staticData.json
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
dolphSol-Macro-1.4.0/lib/status.ahk
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
dolphSol-Macro-1.4.0/paths/doObby.ahk
Resource
win7-20241023-en
Behavioral task
behavioral29
Sample
dolphSol-Macro-1.4.0/paths/initialAlignment.ahk
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
dolphSol-Macro-1.4.0/paths/searchForItems.ahk
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
dolphSol-Macro-1.4.0/settings/config.ini
Resource
win7-20240903-en
General
-
Target
dolphSol-Macro-1.4.0/lib/colorRead.ahk
-
Size
2KB
-
MD5
5be8f3d1c27b1347b323aca256011ed4
-
SHA1
fd9871ee5744086c864b73d398e88b456cef53cf
-
SHA256
4dc92ed33d90591a621f573425e3b81ecb35e3987d8f94e1612bfbbb7a63fd95
-
SHA512
73d739108affb42c8f5757144a34109acf15d3eea53fd9aa56406e0deda9e71fe99e14f210b2e08d72caa44c74601708ff4cbba053aa31e5275f2bc4c48c8611
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2608 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2608 AcroRd32.exe 2608 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2580 2808 cmd.exe 32 PID 2808 wrote to memory of 2580 2808 cmd.exe 32 PID 2808 wrote to memory of 2580 2808 cmd.exe 32 PID 2580 wrote to memory of 2608 2580 rundll32.exe 33 PID 2580 wrote to memory of 2608 2580 rundll32.exe 33 PID 2580 wrote to memory of 2608 2580 rundll32.exe 33 PID 2580 wrote to memory of 2608 2580 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\dolphSol-Macro-1.4.0\lib\colorRead.ahk1⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\dolphSol-Macro-1.4.0\lib\colorRead.ahk2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\dolphSol-Macro-1.4.0\lib\colorRead.ahk"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55a5bdd44122c0c854fb34ec4f5aea2e9
SHA15f602f2712ada7a0e33084c93488b8b839fc1d73
SHA256cc09520af1d5e7a39747e05ce9d5e810e3e017fd9cb359d127ba86f973232bf2
SHA5129e49936d2bad9f3f1aed5ac2c8c178744d59c95039f993aab53ed8c5eeec06fbf7f0e493e1e566b4eaf0301052eb8fb92500d25826b30c2f931cd37fe0edf751