Analysis
-
max time kernel
150s -
max time network
31s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
13-07-2020 06:43
Static task
static1
Behavioral task
behavioral1
Sample
Waybill.doc.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Waybill.doc.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
Waybill.doc.exe
-
Size
244KB
-
MD5
846b1e88956d891648750465642f6222
-
SHA1
349dbdf816fdaf2176c32a48ce354ab86e64210c
-
SHA256
73ce18f3e68ee4af4c74629f5041241b31fd96226aa9d28c641faae949fb0d3b
-
SHA512
f09893abf172e5ca7e61921d34cb8b8afe6b0da5e21985b9fd612ec6282ef59bb447e9013751f8d401f3de33a3484e85b807610792bb4d910266d10dc5d7a7f9
Score
7/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
Waybill.doc.execscript.exepid process 1844 Waybill.doc.exe 1844 Waybill.doc.exe 1844 Waybill.doc.exe 1876 cscript.exe 1876 cscript.exe 1876 cscript.exe 1876 cscript.exe 1876 cscript.exe 1876 cscript.exe 1876 cscript.exe 1876 cscript.exe 1876 cscript.exe 1876 cscript.exe 1876 cscript.exe 1876 cscript.exe 1876 cscript.exe 1876 cscript.exe 1876 cscript.exe 1876 cscript.exe 1876 cscript.exe 1876 cscript.exe 1876 cscript.exe 1876 cscript.exe 1876 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Waybill.doc.execscript.exedescription pid process Token: SeDebugPrivilege 1844 Waybill.doc.exe Token: SeDebugPrivilege 1876 cscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Waybill.doc.execscript.exepid process 1844 Waybill.doc.exe 1844 Waybill.doc.exe 1844 Waybill.doc.exe 1844 Waybill.doc.exe 1876 cscript.exe 1876 cscript.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1884 cmd.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Waybill.doc.exeExplorer.EXEcscript.exedescription pid process target process PID 1032 wrote to memory of 1844 1032 Waybill.doc.exe Waybill.doc.exe PID 1032 wrote to memory of 1844 1032 Waybill.doc.exe Waybill.doc.exe PID 1032 wrote to memory of 1844 1032 Waybill.doc.exe Waybill.doc.exe PID 1032 wrote to memory of 1844 1032 Waybill.doc.exe Waybill.doc.exe PID 1032 wrote to memory of 1844 1032 Waybill.doc.exe Waybill.doc.exe PID 1032 wrote to memory of 1844 1032 Waybill.doc.exe Waybill.doc.exe PID 1032 wrote to memory of 1844 1032 Waybill.doc.exe Waybill.doc.exe PID 1320 wrote to memory of 1876 1320 Explorer.EXE cscript.exe PID 1320 wrote to memory of 1876 1320 Explorer.EXE cscript.exe PID 1320 wrote to memory of 1876 1320 Explorer.EXE cscript.exe PID 1320 wrote to memory of 1876 1320 Explorer.EXE cscript.exe PID 1876 wrote to memory of 1884 1876 cscript.exe cmd.exe PID 1876 wrote to memory of 1884 1876 cscript.exe cmd.exe PID 1876 wrote to memory of 1884 1876 cscript.exe cmd.exe PID 1876 wrote to memory of 1884 1876 cscript.exe cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Waybill.doc.exeWaybill.doc.execscript.exedescription pid process target process PID 1032 set thread context of 1844 1032 Waybill.doc.exe Waybill.doc.exe PID 1844 set thread context of 1320 1844 Waybill.doc.exe Explorer.EXE PID 1844 set thread context of 1320 1844 Waybill.doc.exe Explorer.EXE PID 1876 set thread context of 1320 1876 cscript.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Waybill.doc.exe"C:\Users\Admin\AppData\Local\Temp\Waybill.doc.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\Waybill.doc.exe"{path}"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Waybill.doc.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1032-1-0x0000000000000000-0x0000000000000000-disk.dmp
-
memory/1320-4-0x0000000006490000-0x00000000065B1000-memory.dmpFilesize
1.1MB
-
memory/1844-2-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1844-3-0x000000000041E300-mapping.dmp
-
memory/1876-5-0x0000000000000000-mapping.dmp
-
memory/1876-6-0x0000000000780000-0x00000000007A2000-memory.dmpFilesize
136KB
-
memory/1876-8-0x0000000001ED0000-0x0000000001FCE000-memory.dmpFilesize
1016KB
-
memory/1884-7-0x0000000000000000-mapping.dmp