Analysis
-
max time kernel
30s -
max time network
29s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2023 18:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1159580268630376560/1160276718863515688/hybrisoft.exe?ex=653412e6&is=65219de6&hm=f61a109eba04e2dc195bfbf27109c814a76b849f6185846eaf54daefdbae852e&
Resource
win10v2004-20230915-en
General
-
Target
https://cdn.discordapp.com/attachments/1159580268630376560/1160276718863515688/hybrisoft.exe?ex=653412e6&is=65219de6&hm=f61a109eba04e2dc195bfbf27109c814a76b849f6185846eaf54daefdbae852e&
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1476 hybrisoft.exe 888 hybrisoft.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1476 hybrisoft.exe 888 hybrisoft.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133411756594206148" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4540 chrome.exe 4540 chrome.exe 1476 hybrisoft.exe 1476 hybrisoft.exe 888 hybrisoft.exe 888 hybrisoft.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4540 chrome.exe 4540 chrome.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe Token: SeShutdownPrivilege 4540 chrome.exe Token: SeCreatePagefilePrivilege 4540 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe 4540 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4540 wrote to memory of 4740 4540 chrome.exe 86 PID 4540 wrote to memory of 4740 4540 chrome.exe 86 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 3048 4540 chrome.exe 88 PID 4540 wrote to memory of 2932 4540 chrome.exe 89 PID 4540 wrote to memory of 2932 4540 chrome.exe 89 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90 PID 4540 wrote to memory of 4980 4540 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1159580268630376560/1160276718863515688/hybrisoft.exe?ex=653412e6&is=65219de6&hm=f61a109eba04e2dc195bfbf27109c814a76b849f6185846eaf54daefdbae852e&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a7149758,0x7ff9a7149768,0x7ff9a71497782⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1744,i,3871203123645425480,3595261561640641262,131072 /prefetch:22⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1744,i,3871203123645425480,3595261561640641262,131072 /prefetch:82⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1744,i,3871203123645425480,3595261561640641262,131072 /prefetch:82⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2828 --field-trial-handle=1744,i,3871203123645425480,3595261561640641262,131072 /prefetch:12⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1744,i,3871203123645425480,3595261561640641262,131072 /prefetch:12⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4980 --field-trial-handle=1744,i,3871203123645425480,3595261561640641262,131072 /prefetch:82⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4992 --field-trial-handle=1744,i,3871203123645425480,3595261561640641262,131072 /prefetch:82⤵PID:3316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 --field-trial-handle=1744,i,3871203123645425480,3595261561640641262,131072 /prefetch:82⤵PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 --field-trial-handle=1744,i,3871203123645425480,3595261561640641262,131072 /prefetch:82⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5260 --field-trial-handle=1744,i,3871203123645425480,3595261561640641262,131072 /prefetch:82⤵PID:1408
-
-
C:\Users\Admin\Downloads\hybrisoft.exe"C:\Users\Admin\Downloads\hybrisoft.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5036 --field-trial-handle=1744,i,3871203123645425480,3595261561640641262,131072 /prefetch:82⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5716 --field-trial-handle=1744,i,3871203123645425480,3595261561640641262,131072 /prefetch:82⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1092
-
C:\Users\Admin\Downloads\hybrisoft.exe"C:\Users\Admin\Downloads\hybrisoft.exe"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a23a2c120fb93ae3903754f19c2538be
SHA163f5cfbdf5bc4990b96a30ec736516cb44e0f631
SHA256c6deec937e6372c77c965262d00198e2e5895d2f76b20cd6b9d0b4dae526364a
SHA512468cd078789c9410e44eb9b9c81f34b188e615fa47ac17efd5c5ef96e60dfada20944914a099337597852747d042139ad848a119814c5b1d40b66d25230f36fb
-
Filesize
5KB
MD5c45d286fbd585330e6d0e2a89a8ed123
SHA18ffba29d00829024043eaaa540b38f1ca8499bc5
SHA2562e74b69d98ddf5690ad7c54da8479f5ab994c6c78d7907dd5a9d3e0b567e9659
SHA512fdd8bfc4048079d190756281a1a0581d5d439a7a01c5b9a9306f695a5b7fc7b37939e400d01ce037b8366961fbe03f106f65f80556bedcb63bbe83870603b8bc
-
Filesize
5KB
MD572ab09f577c8ddaf71ccafe322a900a6
SHA112b0b7d2d48e748248761dba186f74da44b62049
SHA256c2f4ec2545cc3a86b47363c45a0bac770375050580af5dee8759dfc8a54b67f0
SHA5124400c81417200eeed6bbf01d5b8c4f2a06544d4ad0c977f9b6c90a9d64ed7487003227eee26f3c9929b6470c0c7c5a796cc734a2bc085eb7f97ff6eec92d7fbb
-
Filesize
101KB
MD58183024baf7ff5dfc420bbfaade18eb4
SHA15c701a39230ba184795af2af99b2861fe1c68641
SHA2566400d5307d807bbbcdce680958913b6c3f8d415cb8d9e74ce592b48cd6a910eb
SHA512bc0b104db8221c2838c4b5103676118efe714afe6dadcce6c9643666b282f4ef920316790f98b1a684519edf6b03f8f08f16208acb4b7cebeb693e02c55a3a1c
-
Filesize
101KB
MD58ad7e2a8a779800d6b817526624916ee
SHA16b8e81dd97a918210d9c6aac7693661a025071b7
SHA256682d5c403c8a8d6912cca962372d9df14588daa910b62b84673cd750c091d418
SHA512693eb0d1c6f95961b59c252f1ae58d7926f96b114affcc9ad6c03a3b768959ce87d6e4378105b185649731d65392e00178e8d73310e9891de75846bc47f03e76
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
5.0MB
MD56576bc87a549299137143bb1329acdef
SHA17f367608f1034f637c2ed1328b4430476ef6a3ce
SHA2568742e50c5df58b912c75ff4388da0afbde6e496a4a16cf53c849151804f65c0b
SHA51256d5feb14f66c71f891896ca45e5796307b67f004a1548b5206d0ab9677c481107e8fa2db180c0a12a440869dd0cd9ccb84118f3a21ac81bec0d0b3c2b900e48
-
Filesize
5.0MB
MD56576bc87a549299137143bb1329acdef
SHA17f367608f1034f637c2ed1328b4430476ef6a3ce
SHA2568742e50c5df58b912c75ff4388da0afbde6e496a4a16cf53c849151804f65c0b
SHA51256d5feb14f66c71f891896ca45e5796307b67f004a1548b5206d0ab9677c481107e8fa2db180c0a12a440869dd0cd9ccb84118f3a21ac81bec0d0b3c2b900e48
-
Filesize
5.0MB
MD56576bc87a549299137143bb1329acdef
SHA17f367608f1034f637c2ed1328b4430476ef6a3ce
SHA2568742e50c5df58b912c75ff4388da0afbde6e496a4a16cf53c849151804f65c0b
SHA51256d5feb14f66c71f891896ca45e5796307b67f004a1548b5206d0ab9677c481107e8fa2db180c0a12a440869dd0cd9ccb84118f3a21ac81bec0d0b3c2b900e48
-
Filesize
5.0MB
MD56576bc87a549299137143bb1329acdef
SHA17f367608f1034f637c2ed1328b4430476ef6a3ce
SHA2568742e50c5df58b912c75ff4388da0afbde6e496a4a16cf53c849151804f65c0b
SHA51256d5feb14f66c71f891896ca45e5796307b67f004a1548b5206d0ab9677c481107e8fa2db180c0a12a440869dd0cd9ccb84118f3a21ac81bec0d0b3c2b900e48