Analysis

  • max time kernel
    120s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    03-03-2024 03:22

General

  • Target

    $R0/Uninstall Lunar Client.exe

  • Size

    404KB

  • MD5

    227c1f9fe7c7f6fb24a451a5ca84e722

  • SHA1

    9c34be548c0b2affd930d05c1b315a5cbe9bca45

  • SHA256

    bafcf2b563e935de1c9d2d55413d25b9a06a8ee8b4cdab49ba7bfe0bfb5c668a

  • SHA512

    1fde79719e176eaa9f23211f9679d5406c219b2ae074227306001ea88c3c2f10c1ed1e0e52b10bc1e0ca9adc4cdc82d2da474ce7e59defaae816655ddc0fce66

  • SSDEEP

    3072:Wn77v00hEoDEtauTsqBGeQIfxqxAjDsksbfVl1snhl+l2L0Sa9/l7a4vZAzLmDVH:W740IEa+J+Rql1DKs2t0EyL+ya2

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Lunar Client.exe
    "C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Lunar Client.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\$R0\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2588
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c tasklist /FI "USERNAME eq %USERNAME%" /FI "IMAGENAME eq Lunar Client.exe" | %SYSTEMROOT%\System32\find.exe "Lunar Client.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist /FI "USERNAME eq Admin" /FI "IMAGENAME eq Lunar Client.exe"
          4⤵
          • Enumerates processes with tasklist
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1028
        • C:\Windows\SysWOW64\find.exe
          C:\Windows\System32\find.exe "Lunar Client.exe"
          4⤵
            PID:2804
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://lunarclient.com/uninstaller/?installId=unknown
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2460
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2656

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0db82e495c0c3d903fee619da675ed24

      SHA1

      ca799d39acda467a8fbebf52414ea751d80a500f

      SHA256

      af0ffe5dd2b71f2ab9eee569425d62413de0a6b8796ac55616e0928e649ac43d

      SHA512

      ea044fc47f8da4e583ff1748a2b10a1c0d5c38bee297f2397f3edd8d749c1cafda1dc799eb5c53eb0e7b43dee55f90b067c290d7944ee900896f8dadc9521f1a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d7b2abda7ee0335e0904d2997b7c8e41

      SHA1

      8f52dae046cb2067cbc758c086cc3a571987b470

      SHA256

      40f875f5b1db50486e4a5f625fcbf21da364a577b70a0278c4079086a14e8c05

      SHA512

      e6e6772365ea7ed005b65ed2592cd6c0361b91ad484af20a0babe21f8953363d1b21d27d5f6d1e7f96936c0cc65cadad96d3dc9edaa52850e82f22631b96023b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ed953e020c058b01d3ceb9fc0dceccd5

      SHA1

      b1b5358e8d192e0854a0f2db0298239c27c65ac0

      SHA256

      258690efe9739c126200ca4bf75908a711dadff3a2d764c80a292f957aebb828

      SHA512

      ea763f5af21000c7fe67ab09f4f442ea149c3fec220d8d5bcecbf66718917edb58d49c641c9a3ded0933258c834b09eb8cf2d1ffd2814bf0636fa0f0cc80caf7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8fbbcec82cb715ca91ed765737c78fde

      SHA1

      4f9771a66a04d815979a3beab35cda81154840ef

      SHA256

      3e1edb875cb08b0d6fe685178e6a3c8733d2dfe97fd96f10665c6009ed1f6a65

      SHA512

      ae03fb0f95a3dc8eb588240e3eb9eac9776cbedd37b4bbd98a003188650fc9648904b6453e51109275d0e57f0ed0fc630381553a43662fd3d08a89e03f7ed227

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d56b0c8dcb3c01c3c7fe7d79cc44de2f

      SHA1

      932e0c3fa15453f9195e5abbde73ae0b908733ae

      SHA256

      69433230aa94883273be3cf28379939572e97953f0295dc555a66964272fc218

      SHA512

      0677efb13030a6333cc5ad2bad0dd45fa75ce30f6e399153639f2a1802a5b0c87865b715cd7204938009fe8231ad788b000b436947e9a4bfc5af7013216a7869

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a6eff0ca2f69dfcb34a96c9f0e4813f9

      SHA1

      8dc0738c2d6d579a5b803f0fd7b0d914a511e830

      SHA256

      320fba34052dd4f3ce8a053cd28086ebdb088c7feb6eea875bad98f307d22390

      SHA512

      02e369d4e6ff0378b893ecf19faf8f8c18c81014cf36ddb1b3eaff4f5de7ce4d25b1e08cbab0e096865af69a698bcad237e1d10029b1c99423f5a32761f74a69

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      34ebc9bb807aef00e31bc8fcefc5737f

      SHA1

      3ee465a117e234a40a02d77568047b70588d9f53

      SHA256

      d3620fa15e682d6e1545bc0049888c7f51a987eb28d8280e73d5bf12a50f8d5f

      SHA512

      b244a97087e28db25d6a0f21ed9a4256cc19009b89a54aa09b3d8c4599e7e73ab3c365a57f29ca0c9a873a8ba03048f93570de147e8fc6fdf4748cf5fed94916

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ecc7fa23357952461e60499253922c75

      SHA1

      3cfa224dc4c35ec766cf12474391cfbf1ae4b9c3

      SHA256

      1904196046f18d7f302c06b3b09aa3a6d6bbce19fb6238dc68f48ffcafa06e98

      SHA512

      b0e1493557b967d7939d2c7173407dd4288ef3b33a7aeef1afb5cebcdaf71c7314f6fb9972df8e4eb4090f258cb71288d783139bd50367675814b95aaaf8bea8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      31af445bdd8e8884c96650850339740c

      SHA1

      dea51094da3f6026aca319df5c63c7afb7d8821a

      SHA256

      1f0c2afd39170055aa79882dd6e4669509dfe845aa8d9b2435ce0b66bf2c59ba

      SHA512

      1d1323e549e1670d95a8ffc90f34b3b1828029ae90b0ea2a4de0a98c3622f56e20e4bff33414c033e6b4c5da55772a55682dc0ae3d4cab162732ba4be01ff70b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3c3353f23b722c5922322a7564739955

      SHA1

      77eeb7fc754f9b7835601859ab12810989fce0ed

      SHA256

      12102aa91909493472848d7930dc6ee23e325752b46f54c7fa864ff6e0da3d62

      SHA512

      968a06cd22fb2f106a0da280f3b85699a2a8d505c50221668d369874c2039073780a60ce15d32f04be3558c75ee57778beb757ecc461dc94bd2d3296b1d2c5b3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1a8797f278f5561de34b1f2165b731c5

      SHA1

      41dd2e932e9be04d59ffd6c71c1fb8dca1841e0c

      SHA256

      a287aa79d6bce8412a6e2fd68156efb2d8dd08f9aead3b87ffd9c5814a058c5f

      SHA512

      44438a92e1ac51b37a76e47d35723f2d56e2688cd2a5faa14488a4ba084cca4680665124e06abf3f6ee20387e8e598cbd8dcf03fcacb1fb9326ed1e3d8850f1a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d2b9ead485492a4383ca97c2d3d2f005

      SHA1

      db172321f6896de6cf69ecbd69f4cb272d5170f3

      SHA256

      90f688d41cc8fab770579a579f509f816b7806bd195d4f29cac5d5d032036d88

      SHA512

      ee11fc9d4d444fa50592fc00203c0af3710738d47bf5cdb2ff11dcf8564bab081c192f3a878907888c3fec93643204edb5b6618a91f1102b65eb1d16c9985507

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      253a22a806a64bedbabfa84a48f0c52d

      SHA1

      2a73c166b5e29fef574c69f1c2ddae72b49420e9

      SHA256

      2aaeb161b3774872b7fe508c9832d545d47e93eb5898ef4b9bd50acf9322bd35

      SHA512

      c46e06c4bc21d4e971843206185a9ad9254618a5f0a40391a7bb64f55eb72021aa61091886a679945d811e7c000972d4e86b474d6d015f1af76532e6e3d0f5b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      12fff521a47e7a36b9906ea3b4ad1a1c

      SHA1

      095775de01d32e1ce74e2c4d73430f85dbb662c0

      SHA256

      65d1fc90203fe79bd2afc1800f6b8d47f843f775b5fe69efa87923ad9be04d35

      SHA512

      a96fc3375925bc3e84c12839baceb5a6dfa05b395c650325eadd47143f19ced885f64daf1f025431d6ac5fae7071922d95eab783fb94f7a70ac5979fb79af63e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      79318ec67c497f30610064c41a9bf81d

      SHA1

      f13036f68e4e3edb52c239be7e23471f16f70243

      SHA256

      d645994ce8061c15ae4a8ddd542a46117b5ca4766f706f49b9645cdb358b1f06

      SHA512

      56cd9a225bb6f8afaec9907053670f14f2d0ff0346e153d9a754c75de4d091f299209071d1550a50891e605d4fc691cd3cf984e69b93abec8974eaccde3eb4d2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      48b852bf9e3b74fdc9d9747db81cfb4b

      SHA1

      46534105efdd13a75e7af2fba432720360e3891f

      SHA256

      a282808fcf3a069b33d66e2ec2d4b36170ed145dab2b633aeec52e7cd4dbe1e8

      SHA512

      73f966d188d81d64bbab60f8c2a11f811ba5a7c9b01c685e1f508e24ac416785fd3c99bae2b1a57b5aa6edefc2f99d01600f2eebb0bd524ecb7aa0749c7cf238

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9bea1347dbc6e3ee6c3b89c69649eb21

      SHA1

      89f6fcae2762bc18546a4cb5b40726e9650cb530

      SHA256

      60adb6c71c1774bcc87b6f9330b238e0ab289a738f67f36073123b676c003620

      SHA512

      14c90be91ef9329507db1b994e6a8aa782de9c796726a162d1bc07a68f3d7dd333eca776775d2588ba0e2bcc5be192c2929540c67c0a7001009b25ccdc2fd20f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      de8e9aa52ed36df73d33139f5fd8d420

      SHA1

      627201c7db532d04b6f67dc427774e2dbc6e73c3

      SHA256

      af23a4d299c41eba393a47ebdd649c4d87b67c3dc0ef9104e1a345d1dcb7ba08

      SHA512

      f1413382aaa28daad912137d62223815966ff431375f85e4d135d0a6ebea42c66c02c831ff2143ab5c7c79daa205391b8b300871aa134645efac76568a2a472f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      312dfd57279e05c053bd872169a7d225

      SHA1

      48f90884bf0895bb785346870a8572f2884ab50d

      SHA256

      fa2d1ee3062fd4125b5e699d35fd80b2a2774959bccc6096c3aca83014c04e4d

      SHA512

      71e89fd6d753d13dab4591d0f8d25519aa13db47cb117ca81127e7b034cc427f5b4beb802f507181008062725c518c519a403b46e58257956c3e9c70c888a35b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e7f583a6334b64e3fa17df724bd59265

      SHA1

      040d156011276d26375422e0c064f07790b7d6a1

      SHA256

      c19bd998041a963d062db953f4c2883a593aa800c575a9b5eaf58e46ac72c863

      SHA512

      3f6d44b0c8d7dd1264a677c4361cc876ed2663d10e221bf57b9e8bae9c250ff362a9a013d59086435f055592e43dcb4a35a29e5288f60da597f19a92708ab8be

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a373adca4cb5044355b1b96ac9915b9d

      SHA1

      53da5b78f01de18399d17ca15c1cb88f524d33bf

      SHA256

      2869e9004178a88b58069d55038a4797dd16781ef7677f323c6e5ae26b2eec5a

      SHA512

      05a1206575a14846c2bebda2be022afe56e01ece29c0fd1d92a7f8f0218f6a6d243f37b8b994a246a37c719bcd54fd6b4cc77f8e1b27c558d4a6ee953cecf2a1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a999a687d4465d7a228916d213f3e9de

      SHA1

      673aec53f2b2e53d29ae9dfbb3c27b278c9eab6f

      SHA256

      9c6cbf58462af6da332ea70c0b8e54a24349dd94e20c6c159893d96d2af9440e

      SHA512

      ac77614c9ac3666be383c614124fadb440ff7de2205f47a7597ca0a9b449454ad8a036a1e47f31a7699a2742b9d817dd5dab862f076690f8339efdb6538f28a8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d638f7fe0eb2fca6cb00e45c1f823ff5

      SHA1

      f09af8f769b5b960832026eebb79ff8814f8aec3

      SHA256

      10d4be4687042b603fc3ec1ac253171d3a4f3bba8cd1bd653e7db86278222bbb

      SHA512

      717f3a912169b10a3cc349707a3e6be350f9141b61b9982d46181198b3945ec775de6f15b4880b71dfcc2a00b90ad8e30945b9e761032d3d053ebb706dadb7b3

    • C:\Users\Admin\AppData\Local\Temp\Cab32D5.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Cab33E0.tmp

      Filesize

      67KB

      MD5

      753df6889fd7410a2e9fe333da83a429

      SHA1

      3c425f16e8267186061dd48ac1c77c122962456e

      SHA256

      b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

      SHA512

      9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

    • C:\Users\Admin\AppData\Local\Temp\Tar3407.tmp

      Filesize

      175KB

      MD5

      dd73cead4b93366cf3465c8cd32e2796

      SHA1

      74546226dfe9ceb8184651e920d1dbfb432b314e

      SHA256

      a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

      SHA512

      ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

    • \Users\Admin\AppData\Local\Temp\nsd1372.tmp\StdUtils.dll

      Filesize

      100KB

      MD5

      c6a6e03f77c313b267498515488c5740

      SHA1

      3d49fc2784b9450962ed6b82b46e9c3c957d7c15

      SHA256

      b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

      SHA512

      9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

    • \Users\Admin\AppData\Local\Temp\nsd1372.tmp\System.dll

      Filesize

      12KB

      MD5

      0d7ad4f45dc6f5aa87f606d0331c6901

      SHA1

      48df0911f0484cbe2a8cdd5362140b63c41ee457

      SHA256

      3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

      SHA512

      c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

    • \Users\Admin\AppData\Local\Temp\nsd1372.tmp\WinShell.dll

      Filesize

      3KB

      MD5

      1cc7c37b7e0c8cd8bf04b6cc283e1e56

      SHA1

      0b9519763be6625bd5abce175dcc59c96d100d4c

      SHA256

      9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

      SHA512

      7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

    • \Users\Admin\AppData\Local\Temp\nsd1372.tmp\nsExec.dll

      Filesize

      6KB

      MD5

      ec0504e6b8a11d5aad43b296beeb84b2

      SHA1

      91b5ce085130c8c7194d66b2439ec9e1c206497c

      SHA256

      5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962

      SHA512

      3f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57

    • \Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe

      Filesize

      404KB

      MD5

      227c1f9fe7c7f6fb24a451a5ca84e722

      SHA1

      9c34be548c0b2affd930d05c1b315a5cbe9bca45

      SHA256

      bafcf2b563e935de1c9d2d55413d25b9a06a8ee8b4cdab49ba7bfe0bfb5c668a

      SHA512

      1fde79719e176eaa9f23211f9679d5406c219b2ae074227306001ea88c3c2f10c1ed1e0e52b10bc1e0ca9adc4cdc82d2da474ce7e59defaae816655ddc0fce66