Analysis

  • max time kernel
    133s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2025 19:10

General

  • Target

    data_Info_file/x64/AdonisUI.ClassicTheme.xml

  • Size

    146B

  • MD5

    68a996036a022036a7260c21aca60d8d

  • SHA1

    f7ccc93b98ede087327b9a2ee33b49084adaaa7f

  • SHA256

    e97828272a7a30780a4b92c791ae94b3adc4268463c53f81df0a27a372c77348

  • SHA512

    0106caeecb55ff8599bc6f666e19306354e53bf2638c6298c8148a1e956ef7fdd04d79575abebd25e4df9d7e21f5996b49b293e0f2b03b53d81ebe95a1759997

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\data_Info_file\x64\AdonisUI.ClassicTheme.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f537e59b4dcdb50016de241d2d9de869

    SHA1

    ee4c14f29121bd2950bb44575b22a36d43577aff

    SHA256

    b4648bda9f4948062734fd0ed426971236505423f5c875ff2d026faddfbb57bb

    SHA512

    373ad2b20ad83420870b557fdfe537a645792e7394029b24e4d9dd6b453418f95b0555298042e49e8431a7b144e59fd4d6d771383c719793e62a8387c1242662

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    118997fa0f859c3b2227c6b1348a4e47

    SHA1

    41b97a3b56ef6ffcd0f6fa3195cac5118a13f3cb

    SHA256

    baf048d1af4f1f928e060c05d7c48a4ba9d71f868b2dcb4031d08bd050d2fc58

    SHA512

    a897d2680cf462007648f66de2a48e3451fe9bd8fee2a0fb9578d41e2b7a7fbeb8bd19060c077352cf5c83450ea72f4c9a1727d548dccf75fa8aed1d7b3cc9c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75a961b7c564f550912773386ba91bc5

    SHA1

    e3c423c2c100b79b1f5232f9d810a8dbea7ab5ef

    SHA256

    bd41bf6df19208d1087b62c947825a16fcb2e4667c2a96d2ab8430d9a921a974

    SHA512

    4c3979f084a1334b3d317d7849112cb980dd76b737d79de9a489987d6747573953633a2ee82b8a2dc78113be1433d3131010060a1fdeab12f38aef123344fdad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6b239cfa8c459947783f0f24b48fd31d

    SHA1

    7c6de7d9de7a761e738b13e5205bd070ca18f561

    SHA256

    0a51760db73cdd472b75f742074828a6811a184ee4477e5040f843a3bdb7ca08

    SHA512

    df332dfce4b73d17dfd8d4f86d00aafef6a592cabb6d14c0ec9e866a4a7262d4cde3a1939d477d74c968c760980971cf2916535e2b3fdbcfeda6b9f397160f01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21768d70503387380edf2806a396e16f

    SHA1

    0a9b5253679019c11c2f4747e20f49c54d9ccf3b

    SHA256

    6b2be341d8b9668ba4a358d135eb4db68afa879350dda7817248e948522ca79b

    SHA512

    fe2278d9e692bffe859da2c32b6fcfb701021db61f94a25c309c579920f8519982d0ec89231aea4a6dbc0712d21e181319aec73ba6b0bfd551e7e27b44908586

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8282cf03816511c48200f49ed540edf

    SHA1

    ba88c0b6c0fc10216b296fd3981acd9458c2e95d

    SHA256

    547a9807ff1cdeef091a23ae8abcb701b477497462338deaad6ec3d7c7af85e2

    SHA512

    3dd3a55deb071ed3cf7a78270f2e53d27740748139694ef65cfa8dfb22cf9666060d34a10149156255149681685c775487c603197f6648a1b13d46a01287c4c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d2062e765c9d6751d45d30aa60048f2

    SHA1

    ac60460cc2a7b5aef7fdd1e91962a4767b6eec44

    SHA256

    db88b065b033f998825c5bdb2277fb8080e7145e0f026653232f259cd890f5d9

    SHA512

    acee75550f2d5cbc9ec0d70b311f2b1f6dd590de31352f871248405de82f66a2c636e32b32b3b6afa3e91da21a9857c3a0ecf582c0ed1bd62a04f9d72a7e867f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc0d61cabee7aced9bd7ea170be5e2d4

    SHA1

    2855c6f30e78086dd6c5fd7bab957b75c0901898

    SHA256

    91857d3a817b8c4a92f86c528295e54d7ef7dfc1bd1c6a327eabfff41243f9a6

    SHA512

    4bedd2a9429b09c6785bd68b03b6aa582f82270ba899b1d7796e7687d751be0ce62c53611cba2aa5ba81c9a4205e2c5477564462092cf26f80b24f4559b7e22f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b308442b383b0441b71c07de5f23c49a

    SHA1

    44336972f998dc818b0fcf0d023e6ed8490e06c8

    SHA256

    044ae75dc83844da8e5306f36dc4da4467b22580132626c451b19160bb9820ff

    SHA512

    118c583e69e8594953082e8745bd1dee08ab6105c26fe27a58b7374cf4586166c5924f3c899492ce129f13eb108aa9b08421f6a73e283047caac072aebc809e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    227056fc3f601d2ad8734f4a56043b19

    SHA1

    a981e7246289e8650fd5bf107be8f6979a63b121

    SHA256

    0e985b789228417d564b3f1d283b3a255032b1afeace7ab5e26c0ad8895a23b1

    SHA512

    7c57a11c1b59c26952296757007cefea1f16d0c77c00e5905a775206b62eb8d881c826770e67d54cd680f408ea0d8e0ea8b439d88ed79c957afca5c5c53e87da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e5f0fce09e7b677bcffcc6091338898

    SHA1

    4f1d412d7a61511c3a542fd45fef04e1d638f6d5

    SHA256

    45c15a2db91b8278a9957d691664aee354dce605b702c1f3ffc9d7a2d22f164f

    SHA512

    3cf241524a9acbb795c724f34afa714bd15e8c01ef744e0a10c087555bc522dc158cc2b61e74c9066b260dd66a10e04caa607bb540949506b4575247625f8ad4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3ca6ae9e25e984c6702bc0ba088d87ba

    SHA1

    249f89895b1392ffcacbd4a7c141ab2e1871ea00

    SHA256

    09a6423d5d2e511e9b5fe76aa1d92ab1c4dc872c2a948971ca909630fcf8ec7c

    SHA512

    66a09ac447b2ac27695915d6aae7414c9b847af4a73beff9c3613cf56a08df2597fde8d44049a968fff97b74f2cb402b41c2734982e37af99eb7d0a85e2e5cf7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bce9cddd18959c8acc92a4494635e145

    SHA1

    cab98ea92ff59d6a25b0a830becf1c712ba96527

    SHA256

    12b9a1bda1c383ac42b1519117abf181588c4c59c8ec60b97b89ba3e3f100529

    SHA512

    59506244708e204264d503af9be4a75a4eff3fdaf329ca48327e18f2bdb89f34c1ae0dde813a69d1e4322a8f2545effcb1c2d4a9d748db05033e9ad5c24db5fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb22c0359f6417ea1865f643df297d2a

    SHA1

    65eb661f6fda31ec6f2bb92d06c4c20d9796a971

    SHA256

    991b3a9c99933eb991369e1efca3d31549323189d3cf30744c08148258d0b96d

    SHA512

    6abd5bdd3fbf14bc5ce57b2a430073f2765124b92fdb6cb13cfe87909d79c06c81f1191c338b1e8ff80dfed85fc5dab447b53b48e20da849e23d8aef9bebdc0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d701c7b4edc40407649a41339fbb1a3

    SHA1

    e651e7c7bd4b459a94c356946b58a424d1d9e35e

    SHA256

    51bf486cd9caefaf2d02068009419751a81d64a9062a916fdc13a39b4d57ca93

    SHA512

    3a00a6e803aeb3803f9e901a16c2267d6396fd04169f93e775b557df567769f0388038ff39b6de77bfe957ad9234db988963c7a13af2227b0f089eb7d21f0e09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1446bca7f9a33ecd98e5baed01b7333

    SHA1

    62dab949b82efec0658c7dfc468330d818fe263f

    SHA256

    5ed4c7fbf0a01d810aa7510b9b506b89b87792f28577ac1e1addc6c5ce292d39

    SHA512

    5cbd8544ec808273503e3dd13aeaee0b985f3e24eb14427297ab731917192cf4ddeb5a21415f30a88ac91163a0fc51693ddd04c00859d01ef906d226eadd4e53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62c700bf2424175c1c5abea7d30577b3

    SHA1

    f60b06159c27498d15acc9bab066bc7ffdbcc3e1

    SHA256

    2ade5a4c5a6e84c84123e3f86bcda58f68bf3f995a5ab2e5573db174dcb03053

    SHA512

    3e3a8cfe93ec391ed96dfec39474be6f6dff706fd8757b80a96983c6fcbebdb7c66232fefeb19b7c01c9cb534e78bf3236fee0c5e5ad42027656138ee7ac95a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59d5743785b3cc2ffd2fa17c94a680a9

    SHA1

    e3b5f1cbfe447a21d2b134aa10737cf6d0fc8885

    SHA256

    899a4beb8a8124dd334860eb63a01fb0ef13c9b7cfd18b9ba73bb688dcb5c8dd

    SHA512

    79dcc3dfae0f0526235b61a23a2d0f5ad115caaf183dd50229774d965818a7bde4af014619c5deebbca2183c57195607b92b7406589461d332ca97726e221bbd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7faed2a4e5e1815bc8651720892c74c1

    SHA1

    7c25f7b2181d9d113ed698a3a3517bcc80301a11

    SHA256

    1437a6aba6273245c43023bc38ca1ca432296a8a1153ff80a88b3c95a29d62e1

    SHA512

    d69d4f5bb12475118202bfa5ad49d1b5d1067c0a965068646bdef9bb1d9af13bf122acc8994c0120e2b5173b81997cc2b3367603e92c0f6a9006b3976cad456d

  • C:\Users\Admin\AppData\Local\Temp\CabFBEF.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFC9D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b