Overview
overview
10Static
static
7SHADOW-BYP...ib.dll
windows7-x64
5SHADOW-BYP...ib.dll
windows10-2004-x64
5SHADOW-BYP...ed.exe
windows7-x64
10SHADOW-BYP...ed.exe
windows10-2004-x64
10SHADOW-BYP...op.bat
windows7-x64
7SHADOW-BYP...op.bat
windows10-2004-x64
1SHADOW-BYP...it.exe
windows7-x64
9SHADOW-BYP...it.exe
windows10-2004-x64
7SHADOW-BYP...it.exe
windows7-x64
7SHADOW-BYP...it.exe
windows10-2004-x64
8SHADOW-BYP...op.bat
windows7-x64
1SHADOW-BYP...op.bat
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 20:57
Behavioral task
behavioral1
Sample
SHADOW-BYPASS 2.8/BYPASS/Memlib.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SHADOW-BYPASS 2.8/BYPASS/Memlib.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
SHADOW-BYPASS 2.8/BYPASS/Shadow Bypass_protected.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
SHADOW-BYPASS 2.8/BYPASS/Shadow Bypass_protected.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
SHADOW-BYPASS 2.8/SETUP/Clean_Gameloop.bat
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
SHADOW-BYPASS 2.8/SETUP/Clean_Gameloop.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
SHADOW-BYPASS 2.8/SETUP/Gameloop 32 Bit.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
SHADOW-BYPASS 2.8/SETUP/Gameloop 32 Bit.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
SHADOW-BYPASS 2.8/SETUP/Gameloop 64 Bit.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
SHADOW-BYPASS 2.8/SETUP/Gameloop 64 Bit.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
SHADOW-BYPASS 2.8/SETUP/Kill_Gameloop.bat
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
SHADOW-BYPASS 2.8/SETUP/Kill_Gameloop.bat
Resource
win10v2004-20230915-en
General
-
Target
SHADOW-BYPASS 2.8/BYPASS/Memlib.dll
-
Size
12.1MB
-
MD5
412945cb7b854474d9dfe851717dfadd
-
SHA1
c18d958bf878caf2ae1e7f3eede5c176acffa0f5
-
SHA256
5c6b9809b455df8d4abcacf86af34895c656000c21a3f1401195da543a36e8a8
-
SHA512
35a9286a10c7f4eff98801ccb2e4be5a03a3a833a2da725864b6ae4da1a28e8f073d1f460694e3ee5a14dde0a3d5a3585d6587fc242b1c2cb446e3b1c066db64
-
SSDEEP
196608:ASEvUOQHf5DuekvJBuJYlyaGIuJj9L+Cw9RDOIFsd+ELs06UfZyneWRh0TZnMSl1:hlwhLuJiC5VwJsDeCw1Rh0NMS/
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2212 rundll32.exe 2212 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2928 2212 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2212 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2212 2184 rundll32.exe 28 PID 2184 wrote to memory of 2212 2184 rundll32.exe 28 PID 2184 wrote to memory of 2212 2184 rundll32.exe 28 PID 2184 wrote to memory of 2212 2184 rundll32.exe 28 PID 2184 wrote to memory of 2212 2184 rundll32.exe 28 PID 2184 wrote to memory of 2212 2184 rundll32.exe 28 PID 2184 wrote to memory of 2212 2184 rundll32.exe 28 PID 2212 wrote to memory of 2928 2212 rundll32.exe 29 PID 2212 wrote to memory of 2928 2212 rundll32.exe 29 PID 2212 wrote to memory of 2928 2212 rundll32.exe 29 PID 2212 wrote to memory of 2928 2212 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\SHADOW-BYPASS 2.8\BYPASS\Memlib.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\SHADOW-BYPASS 2.8\BYPASS\Memlib.dll",#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 2083⤵
- Program crash
PID:2928
-
-