Analysis
-
max time kernel
167s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 05:01
Static task
static1
Behavioral task
behavioral1
Sample
af54403904ac8e687184e57ff1fddf97a7b9ce196895a7da5262b90d47da915c.rtf
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
af54403904ac8e687184e57ff1fddf97a7b9ce196895a7da5262b90d47da915c.rtf
Resource
win10v2004-20220721-en
General
-
Target
af54403904ac8e687184e57ff1fddf97a7b9ce196895a7da5262b90d47da915c.rtf
-
Size
734KB
-
MD5
7969150b6ec8e1ab8a542d50c985e489
-
SHA1
8f8ab77541b644396b50b447384f6a213b71f353
-
SHA256
af54403904ac8e687184e57ff1fddf97a7b9ce196895a7da5262b90d47da915c
-
SHA512
2cfdecde59f68b5ba3f6ce4b19d129853663da850aface5bdea4572a3686f71877c3f83b566818b17e02fa211b5cd3ff674e22b161cea4427cf862708095f30a
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe -
Executes dropped EXE 2 IoCs
Processes:
mondi.exemondi.eXepid process 1648 mondi.exe 1576 mondi.eXe -
Sets file execution options in registry 2 TTPs 4 IoCs
Processes:
mondi.eXeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\17agumo13aocy.exe\DisableExceptionChainValidation mondi.eXe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "ijpevxxm.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\17agumo13aocy.exe mondi.eXe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe -
Loads dropped DLL 4 IoCs
Processes:
cmd.exemondi.exepid process 820 cmd.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 2.0 = "C:\\ProgramData\\Google Updater 2.0\\17agumo13aocy.exe" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 2.0 = "\"C:\\ProgramData\\Google Updater 2.0\\17agumo13aocy.exe\"" explorer.exe -
Processes:
mondi.eXedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mondi.eXe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
mondi.eXeexplorer.exepid process 1576 mondi.eXe 1280 explorer.exe 1280 explorer.exe 1280 explorer.exe 1280 explorer.exe 1280 explorer.exe 1280 explorer.exe 1280 explorer.exe 1280 explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
mondi.exedescription pid process target process PID 1648 set thread context of 1576 1648 mondi.exe mondi.eXe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 8 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\mondi.exe nsis_installer_1 \Users\Admin\AppData\Local\Temp\mondi.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\mondi.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\mondi.exe nsis_installer_2 \Users\Admin\AppData\Local\Temp\mondi.exe nsis_installer_1 \Users\Admin\AppData\Local\Temp\mondi.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\mondi.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\mondi.exe nsis_installer_2 -
Office loads VBA resources, possible macro or embedded object present
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
explorer.exemondi.eXedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mondi.eXe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mondi.eXe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1636 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1064 taskkill.exe -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
-
Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" explorer.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" explorer.exe -
Processes:
WINWORD.EXEexplorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Main explorer.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE -
NTFS ADS 3 IoCs
Processes:
cmd.execMd.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\gondi.doc:Zone.Identifier cmd.exe File created C:\Users\Admin\AppData\Local\Temp\hondi.cmd:Zone.Identifier cMd.exe File created C:\Users\Admin\AppData\Local\Temp\mondi.eXe:Zone.Identifier cmd.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 880 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
mondi.exepid process 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe 1648 mondi.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
mondi.eXeexplorer.exepid process 1576 mondi.eXe 1576 mondi.eXe 1280 explorer.exe 1280 explorer.exe 1280 explorer.exe 1280 explorer.exe 1280 explorer.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
taskkill.exemondi.eXeexplorer.exedescription pid process Token: SeDebugPrivilege 1064 taskkill.exe Token: SeDebugPrivilege 1576 mondi.eXe Token: SeRestorePrivilege 1576 mondi.eXe Token: SeBackupPrivilege 1576 mondi.eXe Token: SeLoadDriverPrivilege 1576 mondi.eXe Token: SeCreatePagefilePrivilege 1576 mondi.eXe Token: SeShutdownPrivilege 1576 mondi.eXe Token: SeTakeOwnershipPrivilege 1576 mondi.eXe Token: SeChangeNotifyPrivilege 1576 mondi.eXe Token: SeCreateTokenPrivilege 1576 mondi.eXe Token: SeMachineAccountPrivilege 1576 mondi.eXe Token: SeSecurityPrivilege 1576 mondi.eXe Token: SeAssignPrimaryTokenPrivilege 1576 mondi.eXe Token: SeCreateGlobalPrivilege 1576 mondi.eXe Token: 33 1576 mondi.eXe Token: SeDebugPrivilege 1280 explorer.exe Token: SeRestorePrivilege 1280 explorer.exe Token: SeBackupPrivilege 1280 explorer.exe Token: SeLoadDriverPrivilege 1280 explorer.exe Token: SeCreatePagefilePrivilege 1280 explorer.exe Token: SeShutdownPrivilege 1280 explorer.exe Token: SeTakeOwnershipPrivilege 1280 explorer.exe Token: SeChangeNotifyPrivilege 1280 explorer.exe Token: SeCreateTokenPrivilege 1280 explorer.exe Token: SeMachineAccountPrivilege 1280 explorer.exe Token: SeSecurityPrivilege 1280 explorer.exe Token: SeAssignPrimaryTokenPrivilege 1280 explorer.exe Token: SeCreateGlobalPrivilege 1280 explorer.exe Token: 33 1280 explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
WINWORD.EXEpid process 880 WINWORD.EXE 880 WINWORD.EXE 880 WINWORD.EXE 880 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
EQNEDT32.EXEcMd.execmd.exemondi.execmd.execmd.execmd.exedescription pid process target process PID 944 wrote to memory of 1404 944 EQNEDT32.EXE cMd.exe PID 944 wrote to memory of 1404 944 EQNEDT32.EXE cMd.exe PID 944 wrote to memory of 1404 944 EQNEDT32.EXE cMd.exe PID 944 wrote to memory of 1404 944 EQNEDT32.EXE cMd.exe PID 1404 wrote to memory of 820 1404 cMd.exe cmd.exe PID 1404 wrote to memory of 820 1404 cMd.exe cmd.exe PID 1404 wrote to memory of 820 1404 cMd.exe cmd.exe PID 1404 wrote to memory of 820 1404 cMd.exe cmd.exe PID 820 wrote to memory of 1636 820 cmd.exe timeout.exe PID 820 wrote to memory of 1636 820 cmd.exe timeout.exe PID 820 wrote to memory of 1636 820 cmd.exe timeout.exe PID 820 wrote to memory of 1636 820 cmd.exe timeout.exe PID 820 wrote to memory of 1648 820 cmd.exe mondi.exe PID 820 wrote to memory of 1648 820 cmd.exe mondi.exe PID 820 wrote to memory of 1648 820 cmd.exe mondi.exe PID 820 wrote to memory of 1648 820 cmd.exe mondi.exe PID 820 wrote to memory of 1064 820 cmd.exe taskkill.exe PID 820 wrote to memory of 1064 820 cmd.exe taskkill.exe PID 820 wrote to memory of 1064 820 cmd.exe taskkill.exe PID 820 wrote to memory of 1064 820 cmd.exe taskkill.exe PID 1648 wrote to memory of 1576 1648 mondi.exe mondi.eXe PID 1648 wrote to memory of 1576 1648 mondi.exe mondi.eXe PID 1648 wrote to memory of 1576 1648 mondi.exe mondi.eXe PID 1648 wrote to memory of 1576 1648 mondi.exe mondi.eXe PID 1648 wrote to memory of 1576 1648 mondi.exe mondi.eXe PID 1648 wrote to memory of 1576 1648 mondi.exe mondi.eXe PID 1648 wrote to memory of 1576 1648 mondi.exe mondi.eXe PID 1648 wrote to memory of 1576 1648 mondi.exe mondi.eXe PID 1648 wrote to memory of 1576 1648 mondi.exe mondi.eXe PID 1648 wrote to memory of 1576 1648 mondi.exe mondi.eXe PID 1648 wrote to memory of 1576 1648 mondi.exe mondi.eXe PID 820 wrote to memory of 1204 820 cmd.exe reg.exe PID 820 wrote to memory of 1204 820 cmd.exe reg.exe PID 820 wrote to memory of 1204 820 cmd.exe reg.exe PID 820 wrote to memory of 1204 820 cmd.exe reg.exe PID 820 wrote to memory of 1828 820 cmd.exe cmd.exe PID 820 wrote to memory of 1828 820 cmd.exe cmd.exe PID 820 wrote to memory of 1828 820 cmd.exe cmd.exe PID 820 wrote to memory of 1828 820 cmd.exe cmd.exe PID 1828 wrote to memory of 860 1828 cmd.exe reg.exe PID 1828 wrote to memory of 860 1828 cmd.exe reg.exe PID 1828 wrote to memory of 860 1828 cmd.exe reg.exe PID 1828 wrote to memory of 860 1828 cmd.exe reg.exe PID 820 wrote to memory of 1564 820 cmd.exe reg.exe PID 820 wrote to memory of 1564 820 cmd.exe reg.exe PID 820 wrote to memory of 1564 820 cmd.exe reg.exe PID 820 wrote to memory of 1564 820 cmd.exe reg.exe PID 820 wrote to memory of 1308 820 cmd.exe cmd.exe PID 820 wrote to memory of 1308 820 cmd.exe cmd.exe PID 820 wrote to memory of 1308 820 cmd.exe cmd.exe PID 820 wrote to memory of 1308 820 cmd.exe cmd.exe PID 1308 wrote to memory of 976 1308 cmd.exe reg.exe PID 1308 wrote to memory of 976 1308 cmd.exe reg.exe PID 1308 wrote to memory of 976 1308 cmd.exe reg.exe PID 1308 wrote to memory of 976 1308 cmd.exe reg.exe PID 820 wrote to memory of 2012 820 cmd.exe reg.exe PID 820 wrote to memory of 2012 820 cmd.exe reg.exe PID 820 wrote to memory of 2012 820 cmd.exe reg.exe PID 820 wrote to memory of 2012 820 cmd.exe reg.exe PID 820 wrote to memory of 1720 820 cmd.exe cmd.exe PID 820 wrote to memory of 1720 820 cmd.exe cmd.exe PID 820 wrote to memory of 1720 820 cmd.exe cmd.exe PID 820 wrote to memory of 1720 820 cmd.exe cmd.exe PID 1720 wrote to memory of 1388 1720 cmd.exe reg.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\af54403904ac8e687184e57ff1fddf97a7b9ce196895a7da5262b90d47da915c.rtf"2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cMd.execMd /k %tEmP%\dqfm.cmd ? aaaac2⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\Temp\hondi.cmD3⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT 14⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\mondi.exeC:\Users\Admin\AppData\Local\Temp\mondi.eXe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\mondi.eXeC:\Users\Admin\AppData\Local\Temp\mondi.eXe5⤵
- Executes dropped EXE
- Sets file execution options in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe6⤵
- Modifies firewall policy service
- Sets file execution options in registry
- Checks BIOS information in registry
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exeTASkKILL /F /IM winword.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\reg.exereg delete HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\11.0\Word\Resiliency /f4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\11.0\Word\File MRU" /v "Item 1"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\11.0\Word\File MRU" /v "Item 1"5⤵
-
C:\Windows\SysWOW64\reg.exereg delete HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\12.0\Word\Resiliency /f4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\12.0\Word\File MRU" /v "Item 1"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\12.0\Word\File MRU" /v "Item 1"5⤵
-
C:\Windows\SysWOW64\reg.exereg delete HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\13.0\Word\Resiliency /f4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\13.0\Word\File MRU" /v "Item 1"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\13.0\Word\File MRU" /v "Item 1"5⤵
-
C:\Windows\SysWOW64\reg.exereg delete HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\14.0\Word\Resiliency /f4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\14.0\Word\File MRU" /v "Item 1"4⤵
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\14.0\Word\File MRU" /v "Item 1"5⤵
-
C:\Windows\SysWOW64\reg.exereg delete HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Word\Resiliency /f4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Word\File MRU" /v "Item 1"4⤵
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Word\File MRU" /v "Item 1"5⤵
-
C:\Windows\SysWOW64\reg.exereg delete HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\Resiliency /f4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\File MRU" /v "Item 1"4⤵
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\File MRU" /v "Item 1"5⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1732263797-6638808458929582021652744417-173354088279944325-1244931433-753085934"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dqfm.cmdFilesize
186B
MD529324996d120283c617a7a142b5ba980
SHA143aa940b29713a6e75f30a6b614352c3bba24d6c
SHA2562ab6f8f8b4f358a0f821de0710c3227dcbd1a3fa31172fda39ab44052a6cf021
SHA51221c4d36887c72d01f9d2913c61e9d443169351a1c97b81a503712f0a224d50484100493dc971121ab71343b372440c0633fb062bb4930d1e6f53d455c9352b48
-
C:\Users\Admin\AppData\Local\Temp\gondi.doc:Zone.IdentifierMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\hondi.cmd:Zone.IdentifierMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\mondi.eXe:Zone.IdentifierMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\mondi.exeFilesize
328KB
MD5b7cd27ba473567e1427a2ec3636eb6f4
SHA1843a1f646dd66e959897d3bdd15bd5259a38ecb3
SHA256dd1c349f15f51a9e2d77fcfaa223a1e34833903747884d74b0cbe1a8fdd88ea6
SHA51262e8cc91ed63f8fca4dea3bf2d24a3aa41e68065d48f122c15677fdfb98dcd51a0524a6a7453348ac82531db80d057e5e78904827297618b2669f09009dc3332
-
C:\Users\Admin\AppData\Local\Temp\mondi.exeFilesize
328KB
MD5b7cd27ba473567e1427a2ec3636eb6f4
SHA1843a1f646dd66e959897d3bdd15bd5259a38ecb3
SHA256dd1c349f15f51a9e2d77fcfaa223a1e34833903747884d74b0cbe1a8fdd88ea6
SHA51262e8cc91ed63f8fca4dea3bf2d24a3aa41e68065d48f122c15677fdfb98dcd51a0524a6a7453348ac82531db80d057e5e78904827297618b2669f09009dc3332
-
\Users\Admin\AppData\Local\Temp\aisles.dllFilesize
12KB
MD52bca48f9681de2a01180e3e3a4170238
SHA1e097d8f8c9c51c777e7e1f720624ca9a0961b821
SHA2565f2d209fb93640bf6c81cbddaa00d1c2e120228e7fa34161ad2786e3f0f8b1cb
SHA5125860b0d09cb0393efb8ea11d34de4a78a24adcb779c516ff7657cf44e5c54fbaeb343c9d005275d5915733ac149981cdc2af2f7d3f5db5d51cbd953cae073165
-
\Users\Admin\AppData\Local\Temp\mondi.exeFilesize
328KB
MD5b7cd27ba473567e1427a2ec3636eb6f4
SHA1843a1f646dd66e959897d3bdd15bd5259a38ecb3
SHA256dd1c349f15f51a9e2d77fcfaa223a1e34833903747884d74b0cbe1a8fdd88ea6
SHA51262e8cc91ed63f8fca4dea3bf2d24a3aa41e68065d48f122c15677fdfb98dcd51a0524a6a7453348ac82531db80d057e5e78904827297618b2669f09009dc3332
-
\Users\Admin\AppData\Local\Temp\mondi.exeFilesize
328KB
MD5b7cd27ba473567e1427a2ec3636eb6f4
SHA1843a1f646dd66e959897d3bdd15bd5259a38ecb3
SHA256dd1c349f15f51a9e2d77fcfaa223a1e34833903747884d74b0cbe1a8fdd88ea6
SHA51262e8cc91ed63f8fca4dea3bf2d24a3aa41e68065d48f122c15677fdfb98dcd51a0524a6a7453348ac82531db80d057e5e78904827297618b2669f09009dc3332
-
\Users\Admin\AppData\Local\Temp\nsjC380.tmp\System.dllFilesize
11KB
MD5b0c77267f13b2f87c084fd86ef51ccfc
SHA1f7543f9e9b4f04386dfbf33c38cbed1bf205afb3
SHA256a0cac4cf4852895619bc7743ebeb89f9e4927ccdb9e66b1bcd92a4136d0f9c77
SHA512f2b57a2eea00f52a3c7080f4b5f2bb85a7a9b9f16d12da8f8ff673824556c62a0f742b72be0fd82a2612a4b6dbd7e0fdc27065212da703c2f7e28d199696f66e
-
memory/820-63-0x0000000000000000-mapping.dmp
-
memory/860-96-0x0000000000000000-mapping.dmp
-
memory/880-55-0x000000006FE81000-0x000000006FE83000-memory.dmpFilesize
8KB
-
memory/880-56-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/880-54-0x0000000072401000-0x0000000072404000-memory.dmpFilesize
12KB
-
memory/880-57-0x0000000075831000-0x0000000075833000-memory.dmpFilesize
8KB
-
memory/880-58-0x0000000070E6D000-0x0000000070E78000-memory.dmpFilesize
44KB
-
memory/880-93-0x0000000070E6D000-0x0000000070E78000-memory.dmpFilesize
44KB
-
memory/944-111-0x0000000000000000-mapping.dmp
-
memory/976-99-0x0000000000000000-mapping.dmp
-
memory/1064-71-0x0000000000000000-mapping.dmp
-
memory/1148-106-0x0000000000000000-mapping.dmp
-
memory/1204-94-0x0000000000000000-mapping.dmp
-
memory/1212-124-0x00000000029E0000-0x00000000029E6000-memory.dmpFilesize
24KB
-
memory/1260-107-0x0000000000000000-mapping.dmp
-
memory/1280-117-0x0000000077270000-0x00000000773F0000-memory.dmpFilesize
1.5MB
-
memory/1280-114-0x0000000000000000-mapping.dmp
-
memory/1280-123-0x0000000000090000-0x000000000014C000-memory.dmpFilesize
752KB
-
memory/1280-122-0x0000000077270000-0x00000000773F0000-memory.dmpFilesize
1.5MB
-
memory/1280-119-0x0000000000410000-0x000000000041C000-memory.dmpFilesize
48KB
-
memory/1280-118-0x0000000000090000-0x000000000014C000-memory.dmpFilesize
752KB
-
memory/1280-116-0x0000000074961000-0x0000000074963000-memory.dmpFilesize
8KB
-
memory/1308-98-0x0000000000000000-mapping.dmp
-
memory/1332-109-0x0000000000000000-mapping.dmp
-
memory/1364-103-0x0000000000000000-mapping.dmp
-
memory/1388-102-0x0000000000000000-mapping.dmp
-
memory/1404-60-0x0000000000000000-mapping.dmp
-
memory/1560-104-0x0000000000000000-mapping.dmp
-
memory/1564-97-0x0000000000000000-mapping.dmp
-
memory/1576-113-0x0000000001FA0000-0x0000000001FAC000-memory.dmpFilesize
48KB
-
memory/1576-91-0x0000000000440000-0x00000000004A6000-memory.dmpFilesize
408KB
-
memory/1576-82-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/1576-77-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/1576-75-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/1576-83-0x00000000004015C6-mapping.dmp
-
memory/1576-76-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/1576-86-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/1576-121-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/1576-120-0x0000000000440000-0x00000000004A6000-memory.dmpFilesize
408KB
-
memory/1576-87-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/1576-90-0x0000000000440000-0x00000000004A6000-memory.dmpFilesize
408KB
-
memory/1576-112-0x0000000000250000-0x000000000025D000-memory.dmpFilesize
52KB
-
memory/1576-81-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/1576-79-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/1576-80-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/1588-105-0x0000000000000000-mapping.dmp
-
memory/1636-64-0x0000000000000000-mapping.dmp
-
memory/1648-68-0x0000000000000000-mapping.dmp
-
memory/1720-101-0x0000000000000000-mapping.dmp
-
memory/1828-95-0x0000000000000000-mapping.dmp
-
memory/1940-110-0x0000000000000000-mapping.dmp
-
memory/1944-108-0x0000000000000000-mapping.dmp
-
memory/2012-100-0x0000000000000000-mapping.dmp