Analysis
-
max time kernel
141s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 03:24
Static task
static1
Behavioral task
behavioral1
Sample
WaybillDoc_9910812295.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
WaybillDoc_9910812295.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
WaybillDoc_9910812295.exe
-
Size
383KB
-
MD5
7694cacbd4702388c664661eeff13bd4
-
SHA1
c462561babf3f27d9afb5ebd1b07629f64baa4d3
-
SHA256
47230c3bcf570bb50440eee83fb83bebe937489895a2b3fee9805ad675fb239f
-
SHA512
d55d299f0eaf6d60b769f8c6b06175b80d2e6163aaad96806aacf9b0b4de32aa968905cf7cab3a2557575cdc76d6b5af615866c814a9233d93b758566b487625
Score
10/10
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\G2G228Q5-P8H1-G1U7-U4L6-D1K007E3Y0Y8 = "C:\\Users\\Admin\\AppData\\Roaming\\G2G228Q5-P8H1-G1U7-U4L6-D1K007E3Y0Y8\\G2G228Q5-P8H1-G1U7-U4L6-D1K007E3Y0Y8.exe" iexplore.exe -
Processes:
WaybillDoc_9910812295.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" WaybillDoc_9910812295.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\G2G228Q5-P8H1-G1U7-U4L6-D1K007E3Y0Y8 = "C:\\Users\\Admin\\AppData\\Roaming\\G2G228Q5-P8H1-G1U7-U4L6-D1K007E3Y0Y8\\G2G228Q5-P8H1-G1U7-U4L6-D1K007E3Y0Y8.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\G2G228Q5-P8H1-G1U7-U4L6-D1K007E3Y0Y8 = "C:\\Users\\Admin\\AppData\\Roaming\\G2G228Q5-P8H1-G1U7-U4L6-D1K007E3Y0Y8\\G2G228Q5-P8H1-G1U7-U4L6-D1K007E3Y0Y8.exe" iexplore.exe -
Processes:
WaybillDoc_9910812295.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WaybillDoc_9910812295.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
WaybillDoc_9910812295.exeWaybillDoc_9910812295.exedescription pid process target process PID 824 set thread context of 932 824 WaybillDoc_9910812295.exe WaybillDoc_9910812295.exe PID 932 set thread context of 940 932 WaybillDoc_9910812295.exe iexplore.exe PID 932 set thread context of 1608 932 WaybillDoc_9910812295.exe iexplore.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
WaybillDoc_9910812295.exeWaybillDoc_9910812295.exepid process 824 WaybillDoc_9910812295.exe 824 WaybillDoc_9910812295.exe 932 WaybillDoc_9910812295.exe 932 WaybillDoc_9910812295.exe 932 WaybillDoc_9910812295.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
WaybillDoc_9910812295.exeiexplore.exedescription pid process Token: SeDebugPrivilege 824 WaybillDoc_9910812295.exe Token: SeDebugPrivilege 1608 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WaybillDoc_9910812295.exeiexplore.exepid process 932 WaybillDoc_9910812295.exe 1608 iexplore.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
WaybillDoc_9910812295.exeWaybillDoc_9910812295.exedescription pid process target process PID 824 wrote to memory of 932 824 WaybillDoc_9910812295.exe WaybillDoc_9910812295.exe PID 824 wrote to memory of 932 824 WaybillDoc_9910812295.exe WaybillDoc_9910812295.exe PID 824 wrote to memory of 932 824 WaybillDoc_9910812295.exe WaybillDoc_9910812295.exe PID 824 wrote to memory of 932 824 WaybillDoc_9910812295.exe WaybillDoc_9910812295.exe PID 824 wrote to memory of 932 824 WaybillDoc_9910812295.exe WaybillDoc_9910812295.exe PID 824 wrote to memory of 932 824 WaybillDoc_9910812295.exe WaybillDoc_9910812295.exe PID 824 wrote to memory of 932 824 WaybillDoc_9910812295.exe WaybillDoc_9910812295.exe PID 824 wrote to memory of 932 824 WaybillDoc_9910812295.exe WaybillDoc_9910812295.exe PID 932 wrote to memory of 940 932 WaybillDoc_9910812295.exe iexplore.exe PID 932 wrote to memory of 940 932 WaybillDoc_9910812295.exe iexplore.exe PID 932 wrote to memory of 940 932 WaybillDoc_9910812295.exe iexplore.exe PID 932 wrote to memory of 940 932 WaybillDoc_9910812295.exe iexplore.exe PID 932 wrote to memory of 940 932 WaybillDoc_9910812295.exe iexplore.exe PID 932 wrote to memory of 940 932 WaybillDoc_9910812295.exe iexplore.exe PID 932 wrote to memory of 940 932 WaybillDoc_9910812295.exe iexplore.exe PID 932 wrote to memory of 940 932 WaybillDoc_9910812295.exe iexplore.exe PID 932 wrote to memory of 940 932 WaybillDoc_9910812295.exe iexplore.exe PID 932 wrote to memory of 1608 932 WaybillDoc_9910812295.exe iexplore.exe PID 932 wrote to memory of 1608 932 WaybillDoc_9910812295.exe iexplore.exe PID 932 wrote to memory of 1608 932 WaybillDoc_9910812295.exe iexplore.exe PID 932 wrote to memory of 1608 932 WaybillDoc_9910812295.exe iexplore.exe PID 932 wrote to memory of 1608 932 WaybillDoc_9910812295.exe iexplore.exe PID 932 wrote to memory of 1608 932 WaybillDoc_9910812295.exe iexplore.exe PID 932 wrote to memory of 1608 932 WaybillDoc_9910812295.exe iexplore.exe PID 932 wrote to memory of 1608 932 WaybillDoc_9910812295.exe iexplore.exe PID 932 wrote to memory of 1608 932 WaybillDoc_9910812295.exe iexplore.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
WaybillDoc_9910812295.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WaybillDoc_9910812295.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WaybillDoc_9910812295.exe"C:\Users\Admin\AppData\Local\Temp\WaybillDoc_9910812295.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\WaybillDoc_9910812295.exe"{path}"2⤵
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\WaybillDoc_9910812295.exe3⤵
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\WaybillDoc_9910812295.exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/824-54-0x0000000000C50000-0x0000000000CB6000-memory.dmpFilesize
408KB
-
memory/824-55-0x0000000075741000-0x0000000075743000-memory.dmpFilesize
8KB
-
memory/824-56-0x00000000004B0000-0x00000000004B8000-memory.dmpFilesize
32KB
-
memory/824-57-0x0000000004C00000-0x0000000004C64000-memory.dmpFilesize
400KB
-
memory/824-58-0x0000000000640000-0x000000000067C000-memory.dmpFilesize
240KB
-
memory/932-59-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/932-60-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/932-62-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/932-64-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/932-65-0x00000000004010B8-mapping.dmp
-
memory/932-70-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB