Analysis
-
max time kernel
14s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/01/2023, 22:57
Behavioral task
behavioral1
Sample
Moon_Loader.exe
Resource
win7-20220812-en
8 signatures
150 seconds
General
-
Target
Moon_Loader.exe
-
Size
3.8MB
-
MD5
9e940f877a6735dc198f7544593501ce
-
SHA1
572e13a873f6d309ea1933df8025ca19ba9ec4fc
-
SHA256
e20e764738d081f3f9b134dd6224aab6265a15055e45895d5c666f694bbc11e8
-
SHA512
199e70532831177a00ca56ac7ac7823abe73890005c3a8aa03894128116c12fe04701c92df5cd57bb46d944ba50e327a5d07342b62fe3363db5f7315e89e9f63
-
SSDEEP
98304:QAFEqpT0W2hCCM5zkXfxST8BmI03r8yY0eGXnekCOzAs:QmpT0W2hCd5QXJSTuNSQyfegekDzJ
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Moon_Loader.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Moon_Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Moon_Loader.exe -
resource yara_rule behavioral1/memory/536-54-0x000000013F1D0000-0x000000013FBF2000-memory.dmp themida behavioral1/memory/536-55-0x000000013F1D0000-0x000000013FBF2000-memory.dmp themida behavioral1/memory/536-56-0x000000013F1D0000-0x000000013FBF2000-memory.dmp themida behavioral1/memory/536-57-0x000000013F1D0000-0x000000013FBF2000-memory.dmp themida behavioral1/memory/536-59-0x000000013F1D0000-0x000000013FBF2000-memory.dmp themida behavioral1/memory/536-62-0x000000013F1D0000-0x000000013FBF2000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Moon_Loader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 536 Moon_Loader.exe 536 Moon_Loader.exe -
Kills process with taskkill 1 IoCs
pid Process 1572 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1572 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 536 wrote to memory of 1456 536 Moon_Loader.exe 28 PID 536 wrote to memory of 1456 536 Moon_Loader.exe 28 PID 536 wrote to memory of 1456 536 Moon_Loader.exe 28 PID 1456 wrote to memory of 1572 1456 cmd.exe 30 PID 1456 wrote to memory of 1572 1456 cmd.exe 30 PID 1456 wrote to memory of 1572 1456 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Moon_Loader.exe"C:\Users\Admin\AppData\Local\Temp\Moon_Loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im svchost.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\system32\taskkill.exetaskkill /f /im svchost.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-