Analysis
-
max time kernel
27s -
max time network
23s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 02:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/DemonsInHouse/Luna-Grabber
Resource
win10v2004-20231215-en
General
-
Target
https://github.com/DemonsInHouse/Luna-Grabber
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 54 raw.githubusercontent.com 55 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 5112 msedge.exe 5112 msedge.exe 5024 identity_helper.exe 5024 identity_helper.exe 672 msedge.exe 672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5112 wrote to memory of 4752 5112 msedge.exe 83 PID 5112 wrote to memory of 4752 5112 msedge.exe 83 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 2876 5112 msedge.exe 84 PID 5112 wrote to memory of 4944 5112 msedge.exe 85 PID 5112 wrote to memory of 4944 5112 msedge.exe 85 PID 5112 wrote to memory of 548 5112 msedge.exe 86 PID 5112 wrote to memory of 548 5112 msedge.exe 86 PID 5112 wrote to memory of 548 5112 msedge.exe 86 PID 5112 wrote to memory of 548 5112 msedge.exe 86 PID 5112 wrote to memory of 548 5112 msedge.exe 86 PID 5112 wrote to memory of 548 5112 msedge.exe 86 PID 5112 wrote to memory of 548 5112 msedge.exe 86 PID 5112 wrote to memory of 548 5112 msedge.exe 86 PID 5112 wrote to memory of 548 5112 msedge.exe 86 PID 5112 wrote to memory of 548 5112 msedge.exe 86 PID 5112 wrote to memory of 548 5112 msedge.exe 86 PID 5112 wrote to memory of 548 5112 msedge.exe 86 PID 5112 wrote to memory of 548 5112 msedge.exe 86 PID 5112 wrote to memory of 548 5112 msedge.exe 86 PID 5112 wrote to memory of 548 5112 msedge.exe 86 PID 5112 wrote to memory of 548 5112 msedge.exe 86 PID 5112 wrote to memory of 548 5112 msedge.exe 86 PID 5112 wrote to memory of 548 5112 msedge.exe 86 PID 5112 wrote to memory of 548 5112 msedge.exe 86 PID 5112 wrote to memory of 548 5112 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/DemonsInHouse/Luna-Grabber1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff983bf46f8,0x7ff983bf4708,0x7ff983bf47182⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,12630262975416453535,17094244771774958653,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,12630262975416453535,17094244771774958653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2516 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,12630262975416453535,17094244771774958653,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12630262975416453535,17094244771774958653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12630262975416453535,17094244771774958653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,12630262975416453535,17094244771774958653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,12630262975416453535,17094244771774958653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12630262975416453535,17094244771774958653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12630262975416453535,17094244771774958653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,12630262975416453535,17094244771774958653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12630262975416453535,17094244771774958653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,12630262975416453535,17094244771774958653,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4656 /prefetch:82⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12630262975416453535,17094244771774958653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12630262975416453535,17094244771774958653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:4892
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1284
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1108
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Temp1_Luna-Grabber.zip\Luna-Grabber-main\setup.bat" "1⤵PID:3248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD538ef973df55a09573edc90928fda4fa2
SHA12a2ec39e157d7ebffb6127fde57c36c1544b80ce
SHA2569d18527272880f5f82d1d9c592e351c45f640cfaf6f0f6d1ae4133d66edfeb13
SHA512a09c359de03507d385db856561a1875ea30dc7d70a215235ba55714f504c83840714e0fc587779bb9e8e4f502e19cdc9c09829ab2c3a24c1818b104e0b5ecfdc
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD50b88311998cdd9222ccbff197e5e0103
SHA1370b9605167c12d4cc5530c8501e18aea0d9973b
SHA25633f527f0a5e906a3cdd9f2ed707452f98bd9bfeac8fd8d81312dfea9cd6e2659
SHA5122a089dbf9a6a96a597c52380dc4c17419c422f6f039131e3f0606a199b652ca65b947644194245fad3fe80a49c8c334787a8d88286b127648a39c9190308bf4b
-
Filesize
5KB
MD53408a8bbf8891edf012e250932ce95d2
SHA16797d4efecba8615cb3e5c19cca073d7607b442d
SHA25650906e0373cabe9962b2153a3698b67e98632866c3e68807991d2deb7ae7f4fb
SHA51238afb27b0549ac2069cc56b8f93b882b2f9aa459b7edb89559569c3e6af1b53c4053d86b2fdf109a444866c3416fd672c26f47687f10661d83461d068f6cdcee
-
Filesize
5KB
MD5a33cf531ec63432e618861bcc31b4764
SHA15d0469e4ba7e9047721c47733a2ae0826c67eb2e
SHA256542a4f4047dbdb4737db3737221522cfcdd6e6db2b5a14395aa4498cc406c742
SHA51260331c4f97b766a1a2434e0a612c612de7dde1e622819222f8167e81dcd5b1868472f8d75c1b17b0a2c4c1bc22b3db36957c1666a215837d75eb0e0735a9667f
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cc50878380d3f993e1076e90933e8f01
SHA12922712196b719aafe170761e55be42f4587d7ef
SHA256ebda6bae0c706755519b36980e5e37bf0ee8cdc4152a9935a9eb67095ad560be
SHA51219f3150d6bbf668129f4052ddabd140afbbb135f410b8b17e2878d4da8f4ceb7ee127d0a928ccca6ba2cf6ca362a6d301f1cdc65ac21582d6ace51b1f54cabfc
-
Filesize
10KB
MD586256ceef40c8687d6f3948d42a5db3b
SHA1b5909b104db2c33e3ac495fef70271e604ef2390
SHA256b7c14c5630f2dd20fb5a188b82741ea375d833d10aacd3fcb25906fce855c49b
SHA51203c2b7e0901e9923f1151d60beddbc654bf802eafa2ec28c2de112ce2a30b85e41537aabc4bb73f6996d443d25bf740b259769b4c00602d2e709d4bf73a47faf
-
Filesize
51KB
MD5718a8942f9bf53c141aa9510e635128d
SHA191f3f325d81b6dc82812288a65b7d11979390001
SHA256b9a7c3c6e4a93465b5800d940825f318c4f1880f956f7ef80e1cb4fe0a380a6b
SHA512d2be3c1df28b9486fdfc5f90d0ac5657337e9b863dd116a7bf0152a930533884ec0d2cdc84efeaf6c586a0786094a0909729d5edd6916df0ee08555ae11ecc0a