Analysis

  • max time kernel
    133s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2025 19:10

General

  • Target

    data_Info_file/x64/AdonisUI.xml

  • Size

    76KB

  • MD5

    a310f32ce7eb9a28e9b0fa5e87ac71de

  • SHA1

    bb8204232932dfea23d2fa76b44954ac559922aa

  • SHA256

    3dbc7b701f01ca178359a1de543792c919ed49c16dfa06d766c545c8ffa51c50

  • SHA512

    3ca0a763383092c5df00efed0a02a13b2413a17e6b0f966364bfe932a2cf8992450778dad730d9afcdc7b8ee090e3e7c124d3f38e92a213403f38120e87f6805

  • SSDEEP

    1536:sBjMs3uxMVuQHWVhVRVeHELtQyVuHEItQyk3n2q6RD3CKlJvJk3IwniCbgnHCoaf:sg8MA0OhcSc

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\data_Info_file\x64\AdonisUI.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8c7de04f82be304da40aa964dbf00c2

    SHA1

    4d741a28a4d78e5c22c23c0770883011a81bfd07

    SHA256

    d4c8441dd139e3bc564028bc25408c99ace593d3a117f2925732150378fa3bb1

    SHA512

    feb6681f70e58e6aef49a7f519174916f01e499b9a0bdc27ce930ffdd02b61654fe1ed0119b9e0924ef93e7f46c17f2b67ec31e814a26e4b34a4938f93564452

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe8559a5ef9542a046dc07d6e281ede1

    SHA1

    a59fcb2f7f24abbaa2b6ef31d000995ba906a2ad

    SHA256

    29c03b580887b356225d8e543885d4832669bf09c243598a09efab412389527a

    SHA512

    ac6cf521f26eb992c86850fd7194c1b5b84f7c8a05bad0861a0ee53b52bcb6ae9ccb025624cc4d9511ce95b8f9bf9cfb7da20bd045f481fb4f55dc988dd1dda1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7dc9c13f33a48f04fef3c4adcc5112b5

    SHA1

    ab0c2fbc2805a29dc856bbb8ffdac3e7830a1429

    SHA256

    6fba90125866e464efa847e892fa4e8430587681b03e4e6bb50e63d93092b82f

    SHA512

    2fc3e9e9cdb7ae76ddfb6d7fa12a470261cb265262cc0a8c1b2d7783c954ab33364ccaf90b1ed8b6ec38c360c43141afa5ef94f11fbb62d8656a5083570b7cae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7ae927851105e81ed2289535cfc6e78

    SHA1

    05f4e3ff6e0eff4af89773d2ad41ae0ea6dd1c4d

    SHA256

    458c48551c6476ff193f7dfcd792330f00aeb6b43bfd8dfc6035bf0ac98c45e2

    SHA512

    3fd621331e380a0e46d716079101b112c9efb817eb5786158262c02407ae8013e14a4e1d4e356e6ae0b71d953200c0eb16096e18c780339475a63a3f919b35f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1aff259269bacfea22e7ff3a5ea1588

    SHA1

    185d900f976a9eea5a20051e63dd8ca50cd6c434

    SHA256

    82212a2f0b154996854236a70ecde84edf5d383af39a67911c0751326af239ab

    SHA512

    c6d5a0505af43fb9e6c0924eaf880bb6043771b7dd5b56ca1d2b3cdf0acf74d943338ec7b8f22afef4d2845a8c0a36709f962e727ad6d67658812cd393f122c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74eacd49133397bfbc408052e4128822

    SHA1

    fe2d20f569cabdccf37d4c8dcafb0cb01459751e

    SHA256

    4355f73de1882f1203aa587f411b18964a048760f0273795dd8c5b29bc050ae5

    SHA512

    47f9c1e59584426d8e3f122ba52e21a746d2b8dbf504b3b76429e16d79d832ab81d676632671ceef1f73a5ccdd60fe30b90d14f887d312c0c088d99f05ec74a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d93b72232ce3cf5a163b1aebc580635

    SHA1

    a643b3e4a599f0c81cb474cc6eeb298f930db4c2

    SHA256

    5e7d73bd0e6563ea7f799e6070c439eff5946f72b2a31c12b516ad8938fc77b6

    SHA512

    3fa1c5c2613fca26005dff6d720fc8a915014cf6566d95822fdf506404161de73f283a606ed3735ed07bb059cbff3c88769707be72f1ebcc3feafae19ffecddb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f55a149e8141562f9a917ce78b5ad1f7

    SHA1

    0415ab6f02f0c46d89a61681b50332a4a44ea011

    SHA256

    c4983da53464829b3cef2ec6acfd50c0c955536d1e7bd88f8a55b4bcc976d235

    SHA512

    f9e22b572466d521d95340ddc078faa723f6d9ee64cd5b40f801068df75f365e1585aec22608d85f3b3a74574267627414345bd830a9b8f05b299e5511d401d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a22d3b43ca7ebc72896f4401021a63d1

    SHA1

    4d36d6a8bffecd7123f7150d3efb4b553b71acaf

    SHA256

    94dddb3b84d6326e023cb24a5a9167ebc3266a65c951f5669256d12b0b64570f

    SHA512

    814b718194e369fc2073f46c188c1cb794f3043b27c812ee9d58be792fa05380183b52de690cdd725f6d608e2e28662d8fb8e97cf9780be490d9e3dc15f24659

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e12dd4df00ac4365e0e8fc9df63143d

    SHA1

    651209eec4a53b9c1d4c1bd7072f12c56d62d2a8

    SHA256

    e8bac55876ae9094f6574c4e6650ea1d0f9d5ab87584c0c5eaf96cfd7c1f32f7

    SHA512

    e8728842d5a87e18bd0db9b592f067568c94a656877624e57789a120562c50df624e4b8df253b28a7a3525046daa548ab5657ac8d8ee11ead1da3c49661236a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    592d7b1c36156b19512143b5b938d3d4

    SHA1

    5a6480a11ddbd2658b630d9e087bd5c5954f1668

    SHA256

    91bfa3ab4754ffbbec282931b7a586b65c347a6f085d95b20c6c9fe728f28817

    SHA512

    cb02efee1c5113feab7d7e2f0cc8c3a30c8638ee325fea16b047527bf80738e1f1aaa625ee64766d87dc48429a0e3fc6e953cf3d411083c3e191a0da9c5b4de6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0bed94cadd21c677a95e5d6a74406bdb

    SHA1

    aaecaba70f839b8197239f062061c2ee45af9404

    SHA256

    0f40f6b1df84b626282a7a505c292a56bc9c674c97f17343be7cee1d3e6128c3

    SHA512

    0574306c9b3559200b5e2c7d39ec2989181f2b043c00a7429d864d09099ebb8aeac2d8e0d59196b29aabda281ce29a6c29eb5e28840ab4bb2bb149d20a017ca3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a479b9e39218b1f3ebda77ba957d1c23

    SHA1

    d70bb7abed53b871ae3edb077870707b2286aa7c

    SHA256

    247ee315321e59fc56193fec8615e7f0a492af07139964c7e00d4cd3d362b7eb

    SHA512

    539f3f123d92672c375e9eb3fff0f0974f2f42848a1989b53bd2459d46d25d2b35a16477eca3f9dd4420c7f057e6b7347f5b761fd1bbac4e72d107b546d5b6c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d668d7edf43872d46663b3a5738be264

    SHA1

    20144b85bc26a46a5f40b5fe0ee491c22a1b061e

    SHA256

    0c4cbbd440fe7761412299190e14c0d30d091695c313b901682288a03098fc05

    SHA512

    7a1dde1b0aa008849dcf9da518bb3e209a656e8deda49265e1337123732d019417d7b924b906150ecabd4fab99f6829623887799f5946e3f991ee463f354e70e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2206e805174573c4672f536481ced648

    SHA1

    495870791fa15f83aec676f85b523fd5d3739f97

    SHA256

    03c5425dcaf6e27a98c7734231d1ced9874d913f7a2027d934440e45734c447c

    SHA512

    ad107b3ee3a85fb8e4617c9e4b491a4d3198c63a32474d11f85ee0849f500e3408572a39b51e550d3acc8adafdbebbcec89354e56d80522e9f13433f2fb82f33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    37bd7c60e038fec993bc37691b7be390

    SHA1

    b738e0ff7c14338618f40b2405c8ca377124acff

    SHA256

    d966bd7c423e5a45bb65d220fadfce78a295f4d3be2ea7e39588b3724c439f6c

    SHA512

    6ed703ff780902f884b189ce4c25790084f20c293ab9225c536cd9e858530803e2b13607e2861bd04e0d960d83b77e4ef564d7fa0ca919c98d1a570bd6129453

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9fff90b0201937af632dfeed71421b54

    SHA1

    5f4b9758dbdf3842df4849526ab8d8b9d7c82579

    SHA256

    ca28ed5c52843923f5f0bec7540bdf54271b6e633633c8ef1aa1024e32157784

    SHA512

    e24c518dd369da017af3843c2d32400ebf820a6838e733df46b38ffe48928372a9f4ecec308b272072155b2cb4eafa47cede19e36415f7dabcc671825d9866c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c56bdfa22ab45677bec603e600dce0d9

    SHA1

    d54934024ac8f14e1ca4bfb9aada6d094d3ff7c1

    SHA256

    6610d047c4c828038e6ec9b40b29f9527efa0926a12eda8aedc24376d635cead

    SHA512

    ede77684cd7f9611c5c6af9ffd3911c7347d879d1ee5ddc56af92c926c87ad2d7cf7f947cb8a5922d9b0ee1b8de0292414ead9d95ff86f12f266b41b919ff5b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90249ef33866efc210ac0e98cc1cd315

    SHA1

    524b754efa3b882da2e104c0ae6e78d7f99ccebf

    SHA256

    284b271eec6171332c7d0cecd6d22e86703fe1aec9b31c362717eeb5bb83f4ce

    SHA512

    57a2ab923978091bbb45c71c7e6639be5fc2561ab887d71d35479ce5ae67d03ee906f40ba6e6c3d2fd0249dfd7a3d0e0764b1473010ed5a4444f7726675c3e1b

  • C:\Users\Admin\AppData\Local\Temp\CabC1BA.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC27B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b