Analysis
-
max time kernel
1733s -
max time network
1574s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23-02-2024 09:57
Static task
static1
Behavioral task
behavioral1
Sample
Lunar Client v3.2.3.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral2
Sample
Lunar Client v3.2.3.exe
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
Lunar Client v3.2.3.exe
Resource
macos-20240214-en
General
-
Target
Lunar Client v3.2.3.exe
-
Size
1.0MB
-
MD5
0814a485d44ded97e275e8e80f6c17ca
-
SHA1
69862f6fb82651f3a097fe7554440537ea0f1a90
-
SHA256
560b03c4ba18e5a443f74a69727db0eabac6f455bb836757d620cc51615a92ea
-
SHA512
bd9abe5bd35d21bb57be9e757a6e7293f9e71738045fff6b53788e36bd442d1b8af21ea38a528ea0910434cc32ac610fbaf4200a6faf615828f47d8b74987dbd
-
SSDEEP
24576:s2Oawk0MDhozjDu173pG1szLSvJwnHNiTWQC:MkPDhEjK73pfqvCHH
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
Lunar Client v3.2.3.exepid process 1728 Lunar Client v3.2.3.exe 1728 Lunar Client v3.2.3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 1356 vlc.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
taskmgr.exepid process 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 1356 vlc.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 796 taskmgr.exe Token: SeSystemProfilePrivilege 796 taskmgr.exe Token: SeCreateGlobalPrivilege 796 taskmgr.exe Token: 33 796 taskmgr.exe Token: SeIncBasePriorityPrivilege 796 taskmgr.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
Processes:
taskmgr.exevlc.exepid process 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe -
Suspicious use of SendNotifyMessage 40 IoCs
Processes:
taskmgr.exevlc.exepid process 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 796 taskmgr.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 1356 vlc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lunar Client v3.2.3.exe"C:\Users\Admin\AppData\Local\Temp\Lunar Client v3.2.3.exe"1⤵
- Loads dropped DLL
PID:1728
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:796
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5c6a6e03f77c313b267498515488c5740
SHA13d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA5129870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9