Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2022, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
shdybron2.1.exe
Resource
win7-20220812-en
General
-
Target
shdybron2.1.exe
-
Size
275KB
-
MD5
27f98194ef5c1923e2cf716ef07f8ff4
-
SHA1
e0ad7c09afe99a1bb9bcef7f4c59b078a836fa9d
-
SHA256
c292ddac09c57630068c0ed4b57ea874549ec12627cfcaf0a25277b26d042b46
-
SHA512
00142e5291844df5052e0a613e826d9b83745f46e341672e84af99734f4dd406dcea8d6a491c16e6bf9da02ad0b5c512f332844a9a9f904adb72aac5e59768ba
-
SSDEEP
6144:HNeZmUFKKJn1RLblwHHvbgutRnKK+IRI+3BMaOI:HNlHY+HvbnRnKP+3B7
Malware Config
Extracted
formbook
4.1
sk29
invycons.com
txirla.com
skygrade.site
mydubai.website
giftr.online
fotothink.com
receitaspanelacaseira.online
theroost.dev
hy-allure.com
homefilmcompany.online
qest-mall.net
palochkiotrollov.online
aibset-terms.com
clecrffp.work
entel04.online
conveyancercentralcoast.com
evaij.info
meitue.shop
rothchild.top
detecter-un-logiciel-espion.com
pondokvaksin.net
ethelh.club
ky5653.com
harriscountywageclaim.com
ky9239.com
medicierge.com
hhro.us
uuapple.tokyo
lakeshoreguesthouse.com
meiguoguo.top
bennyrivera.photography
mysittarausa.com
suytrin.online
sandstormcase.us
amzn-2135.click
galaxycrime.shop
cabinetis.com
rapidsketch.live
nickhouston.com
kinksandlocs.africa
perinatolog.xyz
soluofcr.com
ethpow.domains
cardinalchats.cloud
macaront.info
createorcollect.com
csjkmcwl.work
foxrightnow.site
teazyy.com
assafoetida-rife.biz
surprisee.fun
merkur-privatbanks-de.net
wikipediathrive.com
vijaysriniketan.tech
nxaey.com
shiershi.shop
rthesieure.com
deloxexchange.ltd
dropmarketsystem.com
49715.biz
veganmetavers.xyz
hty268.vip
bfuiaccw.online
beachsyndicate.info
nordenergogrup.store
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/4800-144-0x0000000000730000-0x000000000075F000-memory.dmp formbook behavioral2/memory/4800-149-0x0000000000730000-0x000000000075F000-memory.dmp formbook -
Executes dropped EXE 1 IoCs
pid Process 1668 nhifjvitar.exe -
Loads dropped DLL 1 IoCs
pid Process 3376 nhifjvitar.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1668 set thread context of 3376 1668 nhifjvitar.exe 83 PID 3376 set thread context of 2576 3376 nhifjvitar.exe 18 PID 4800 set thread context of 2576 4800 cmd.exe 18 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4848 1668 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 3376 nhifjvitar.exe 3376 nhifjvitar.exe 3376 nhifjvitar.exe 3376 nhifjvitar.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe 4800 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2576 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3376 nhifjvitar.exe 3376 nhifjvitar.exe 3376 nhifjvitar.exe 4800 cmd.exe 4800 cmd.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3376 nhifjvitar.exe Token: SeShutdownPrivilege 2576 Explorer.EXE Token: SeCreatePagefilePrivilege 2576 Explorer.EXE Token: SeDebugPrivilege 4800 cmd.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1528 wrote to memory of 1668 1528 shdybron2.1.exe 82 PID 1528 wrote to memory of 1668 1528 shdybron2.1.exe 82 PID 1528 wrote to memory of 1668 1528 shdybron2.1.exe 82 PID 1668 wrote to memory of 3376 1668 nhifjvitar.exe 83 PID 1668 wrote to memory of 3376 1668 nhifjvitar.exe 83 PID 1668 wrote to memory of 3376 1668 nhifjvitar.exe 83 PID 1668 wrote to memory of 3376 1668 nhifjvitar.exe 83 PID 2576 wrote to memory of 4800 2576 Explorer.EXE 87 PID 2576 wrote to memory of 4800 2576 Explorer.EXE 87 PID 2576 wrote to memory of 4800 2576 Explorer.EXE 87 PID 4800 wrote to memory of 3468 4800 cmd.exe 91 PID 4800 wrote to memory of 3468 4800 cmd.exe 91 PID 4800 wrote to memory of 3468 4800 cmd.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\shdybron2.1.exe"C:\Users\Admin\AppData\Local\Temp\shdybron2.1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\nhifjvitar.exe"C:\Users\Admin\AppData\Local\Temp\nhifjvitar.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\nhifjvitar.exe"C:\Users\Admin\AppData\Local\Temp\nhifjvitar.exe"4⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 4004⤵
- Program crash
PID:4848
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\nhifjvitar.exe"3⤵PID:3468
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1668 -ip 16681⤵PID:4280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD51222ecde9c2f111e61638da9bb79c9f7
SHA1194989e976b273b4e21f45491871fe67bb9e4720
SHA2561b0e3017d539b5bcd3942acee9c45853ebccdd0848be21c21e04b676912e2240
SHA512a47fa4086174608ac30bbc15ff0d3bdcd6dbd11bc7efa49f11ed3c50871a4dc726a6b2d8f17e864063e1dde03f940696cb8652b5c6202bea2664881e7e5dec05
-
Filesize
123KB
MD51222ecde9c2f111e61638da9bb79c9f7
SHA1194989e976b273b4e21f45491871fe67bb9e4720
SHA2561b0e3017d539b5bcd3942acee9c45853ebccdd0848be21c21e04b676912e2240
SHA512a47fa4086174608ac30bbc15ff0d3bdcd6dbd11bc7efa49f11ed3c50871a4dc726a6b2d8f17e864063e1dde03f940696cb8652b5c6202bea2664881e7e5dec05
-
Filesize
123KB
MD51222ecde9c2f111e61638da9bb79c9f7
SHA1194989e976b273b4e21f45491871fe67bb9e4720
SHA2561b0e3017d539b5bcd3942acee9c45853ebccdd0848be21c21e04b676912e2240
SHA512a47fa4086174608ac30bbc15ff0d3bdcd6dbd11bc7efa49f11ed3c50871a4dc726a6b2d8f17e864063e1dde03f940696cb8652b5c6202bea2664881e7e5dec05
-
Filesize
185KB
MD59c64cc197145edb8151838e997b12e33
SHA1d2669867a4363153f1d8c70862cfc8ca8c5baa16
SHA2565f50368260449b547cb6799e8fe63fb0ba6a0a32d102fa16922951f8aa008fce
SHA5124bc66e58afc186f3db9b1321eeb3ccde1ce2e493e58db550a3ecb5bb36578ec70692dc84b67374fecf3cf04c4bbf44ca73e716e11dcd8b98588a87bae6ce6802
-
Filesize
4KB
MD5b626c32fd36f4c55053b126a3511ee61
SHA11f8a39bbbea3b297eeb1231caeaaf55c8155e3b3
SHA2567285e0500dd734505edfa9242321db0adfe428f9ad45d5edc9dcdc598dd12627
SHA51223dcfef7079e45587638a04eda8f9dd9ba866649fae54a59a1cafff535bd0845eab701c5d3150263eaf2a07d818adb8a341e331e926caf3a095c7722faeb459a