Analysis
-
max time kernel
112s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2023, 19:39
Static task
static1
Behavioral task
behavioral1
Sample
Uninstall Lunar Client.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Uninstall Lunar Client.exe
Resource
win10v2004-20221111-en
General
-
Target
Uninstall Lunar Client.exe
-
Size
234KB
-
MD5
94cd5e8c004aecfae197f0ebd97276e1
-
SHA1
f0c289d8dd74bc33c273b397a4eb01c4cacfca78
-
SHA256
84d12ea1b0b2818c8b6d41244b189fdc86d37e8d4771bfcae87b241d4d18d12a
-
SHA512
07441a6475d4a7100dc45c152733346a0976d7f25c64b004f6e0fe0db16810cb83625f28e37cc799dd21a00878feadef3476cb709c3d62dfd25274c0aca44c0e
-
SSDEEP
6144:T740IQeeeeeeeeeeeeeeee7eeeeeeeeeeeeeezeeeeeeeeeeeeeeeeee7eeeeeeD:/xeeeeeeeeeeeeeeee7eeeeeeeeeeeeT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4840 Un_A.exe -
Loads dropped DLL 1 IoCs
pid Process 4840 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4872 wrote to memory of 4840 4872 Uninstall Lunar Client.exe 80 PID 4872 wrote to memory of 4840 4872 Uninstall Lunar Client.exe 80 PID 4872 wrote to memory of 4840 4872 Uninstall Lunar Client.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall Lunar Client.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall Lunar Client.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4840
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
Filesize
234KB
MD594cd5e8c004aecfae197f0ebd97276e1
SHA1f0c289d8dd74bc33c273b397a4eb01c4cacfca78
SHA25684d12ea1b0b2818c8b6d41244b189fdc86d37e8d4771bfcae87b241d4d18d12a
SHA51207441a6475d4a7100dc45c152733346a0976d7f25c64b004f6e0fe0db16810cb83625f28e37cc799dd21a00878feadef3476cb709c3d62dfd25274c0aca44c0e
-
Filesize
234KB
MD594cd5e8c004aecfae197f0ebd97276e1
SHA1f0c289d8dd74bc33c273b397a4eb01c4cacfca78
SHA25684d12ea1b0b2818c8b6d41244b189fdc86d37e8d4771bfcae87b241d4d18d12a
SHA51207441a6475d4a7100dc45c152733346a0976d7f25c64b004f6e0fe0db16810cb83625f28e37cc799dd21a00878feadef3476cb709c3d62dfd25274c0aca44c0e