Analysis

  • max time kernel
    1556s
  • max time network
    1557s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    11-03-2024 14:56

General

  • Target

    $R0/Uninstall Lunar Client.exe

  • Size

    404KB

  • MD5

    227c1f9fe7c7f6fb24a451a5ca84e722

  • SHA1

    9c34be548c0b2affd930d05c1b315a5cbe9bca45

  • SHA256

    bafcf2b563e935de1c9d2d55413d25b9a06a8ee8b4cdab49ba7bfe0bfb5c668a

  • SHA512

    1fde79719e176eaa9f23211f9679d5406c219b2ae074227306001ea88c3c2f10c1ed1e0e52b10bc1e0ca9adc4cdc82d2da474ce7e59defaae816655ddc0fce66

  • SSDEEP

    3072:Wn77v00hEoDEtauTsqBGeQIfxqxAjDsksbfVl1snhl+l2L0Sa9/l7a4vZAzLmDVH:W740IEa+J+Rql1DKs2t0EyL+ya2

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Lunar Client.exe
    "C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Lunar Client.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\$R0\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c tasklist /FI "USERNAME eq %USERNAME%" /FI "IMAGENAME eq Lunar Client.exe" | %SYSTEMROOT%\System32\find.exe "Lunar Client.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2268
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist /FI "USERNAME eq Admin" /FI "IMAGENAME eq Lunar Client.exe"
          4⤵
          • Enumerates processes with tasklist
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2656
        • C:\Windows\SysWOW64\find.exe
          C:\Windows\System32\find.exe "Lunar Client.exe"
          4⤵
            PID:2668
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://lunarclient.com/uninstaller/?installId=unknown
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2788
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3024

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      67KB

      MD5

      753df6889fd7410a2e9fe333da83a429

      SHA1

      3c425f16e8267186061dd48ac1c77c122962456e

      SHA256

      b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

      SHA512

      9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      307439218ec7755a2e5f1300ea40edc7

      SHA1

      d66dacaaa5df345523ab8372d72d58380d063051

      SHA256

      55f0fb20846046092731e6e69a65037c2328a8e31441591379582d1035c813fb

      SHA512

      a3c0c8ec7fa02f791285de447a11ff3ebf88bfa55bc61a3978ac6a8d82bfb177c496c8a88311001823426f7efd8ff922e570c5d8add4f278f177e0447d4e0674

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      76b2aea194bb65a5085a6ab7c3e60c62

      SHA1

      c24ff99991e94b4b58b354c6d06ff3620a95d93a

      SHA256

      579b57116439f6e86cb331ea9b076db9b42a87c6c199f535ad29dbab82681d65

      SHA512

      80c794e4b7c3ce3e22242833f1e53131084d1601cc97b5e1c8fe0c0f7c52ef8d581c86f4e22a4bb1b5ea0a93d3b2047981dba7e0d1e45d1f654855a13a57227b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      22fc623046119ce13417ec3f6ebe4c25

      SHA1

      dc9684b3dbecb639cf3382dba47cf0db6f8e23af

      SHA256

      9080e796fe661e6e6f849ce7f6d00633af0b5679470e23f71690e702cbebe989

      SHA512

      2d805418e00ac3061920d360a23e709b843fed945ab1c50ae2bbc3b235bbcfcc740d615cf7f410586e1faa655adb0cc96a4a2207b798d71b57c18f91c89f3d24

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f2336fb79d4e738dd82315d407d1b75a

      SHA1

      8ce1fc2ce407ac0efa951d958f382d81d7519d30

      SHA256

      13f0e804ad24264b272daa71561c4bb68ca24c1808dbe60d56e58b31af6245fe

      SHA512

      30ded48cb38db6b0e62fb8cd5a408aac74a087be1993d6ffe67244fc5cbcb715e44404c7e75409b74b45566ae902957e6943b27176be57c390234addd325c468

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1970a766590dd7186940d20304db3e11

      SHA1

      10183370246f670522881f1ad0ab87c3cef52e01

      SHA256

      81cb020060ed251d8b1b3c161dfda41b2b8b993da77308a79c24ebf139893ce8

      SHA512

      887eea34a352a40cbfb40d609ee48f1d590a607fcdd4ce98ce50b63d2a6323e85ecf783517e6f6fc8e78915e1c8f95e8582c5d99421460c7d740c39a23fbb83e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      da30c7b7aa2c03606ef140c07d828568

      SHA1

      62d07074e0f283311b99b084729f08edd6560107

      SHA256

      d47ef9a55b547193594bb158ec4b02fb99873f2011ba5be6bd78fb3fc6c532cd

      SHA512

      51a7204bd03b6ca25a47fc2cf3287f69b7b5dbc98e321d0a9b900fad60c8160659f6291c10c97a30e710f31999c2cf7615ff6faff9e4477bdf5179a8715adde2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c67d3b594429924cb531cc55ae677408

      SHA1

      96d18bbc8ba022d9d188290b26a2f916b81cba09

      SHA256

      7584ae15ea7614bb5d3741ddbf4ac1fa7517be34d2196f39bbe4c38b30a61904

      SHA512

      16bfcbe7ff283ef745082b6ad7c0533d194b0be1bae64f050e2bb9080728b07e668be1eedd5578c6a39989c98679f133c37569ef5011a9847d757d2b7efc1503

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ff7d958ad78c2bef3e06c5b29e3f82c2

      SHA1

      e841f56db7418a6be865130058cf254165a5debc

      SHA256

      65e35f6bcee77119c062b52abc897262cbae93ff41828f48475a11ad9486a5ec

      SHA512

      080dc104e3ea01e047c6ccee0529441471ac0e34b97fb4100a8e36c094425b27978577376c010f4a613e69824165d868831ee13c2af5ad2c3a5525d8cbaac266

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      17d41a51ff739edfb99a53c7fa347555

      SHA1

      c524e9f74bb8b9c019e522b12f370ef1f94702da

      SHA256

      6290b2d7e8d72568fea0d13d9d8bc3d3ecf5d4d9294a2b372de89a85a6bf499b

      SHA512

      e4ae73d40afa2b77fcfb0b9f0b8fd46df052806bf3e498d7537c1255d0df84f2d7c8301cf49c25a056c300b83645fee0900ef985173b94fd3077bd7dcb1ea8aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6ec0d885df4829c96db66bfd22719f7b

      SHA1

      3960fe00ead7b147cbdadad3362a6079f48a13a4

      SHA256

      77fe68f099a500467cc6c97153ef79b29d4b602c49b20d2a3b1938af0d3114f6

      SHA512

      7c0eb0f98bb421148347b06802270554b35f1f134393668440808f2f46497edce3f8d3ada937818b73470e7687d37d7ecc941dbf7362492a680518a5962056b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      96de81cd6a7d9912ad4f87f67dd9e809

      SHA1

      9bb35e859ad8f27ebb176789a4ed1f0d5698a4fd

      SHA256

      2c20c1e74009ed06bc12cf40af0a7b80bd0b1afb4557a76a530aeb7d1d19e2e6

      SHA512

      e5a42ba24b06510fc6e906d37dcf70ac32550f6b29a15c695f4d1fc969dc0ab1aa9eeb6ef8e6d49c17284698f9d394744faef5b84f94d435f94d799d893d92b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      02f5c9eec5f366880a78bb1a74fa3a9a

      SHA1

      b09d6ae0a4679c0617d34f49f6c18e1aec1b8a74

      SHA256

      a4d3e19e3c1d2e820c48638e60dbfedfe04605412018f52131e1aff6940bed07

      SHA512

      c8f91ef90d10bc3aeacb4f22aa59496e6a35d9ce3f91a98a7e2daff733ffc79a866524dd23fb73a8f47955fad6bf12addcac4c44b1c06f64c94aa9ab131b8884

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1af98fe4d5ed4933af57bd78cb0cf1af

      SHA1

      42609ca02df4b6067eaabd132f2851f178324847

      SHA256

      530f95b608b717a918438ecfb0f753a972b1266aee848f99d9d8c4bdca4b50a0

      SHA512

      d02a8543604621efa54ab00b8976a1f167967059cd75aa2c888a4ff231dec385cd63e3157b83a020c1413540064b5ca508ce6fc3c3349d783a9e971de6ba4e2c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2348a93cdb0465b614d79fc2efa21f63

      SHA1

      1914dc84d05a884d16d808c92ca9fe3c924d48d3

      SHA256

      be588aee56f0f272556710f081dbb1c064ca8975811454df66b1a2c5f3ac3d2b

      SHA512

      017f0e2120f15046928af223f3f28cfd68a6423a1e4a9a04e7d4df6d008ade040451246af05568f25498e0c8785f5ba1014329d0e7a111d7672a4529d1c954c0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d7246ea4d5d35d86918ef1cdc4373ea2

      SHA1

      c143b0c15fc310f4878309407e04232e6a423356

      SHA256

      63fe5b8f2fc8c694a4b834d5f728157ec196c786294eb1325a9f644ffa0040d3

      SHA512

      60f6989164056021d00655aa8bbb43cb80c107d7a83ac91c6f4d12737e71fe507b159053a2ca650d6c146e580c2eba36b798b0d91dabad1d60aacae37383c08e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5f297aff10edfe06818ba1f12da9ff7f

      SHA1

      d43da9dff2492b9fde9e9788b3e9b40f7d9a6f8a

      SHA256

      e4b53acadac36d7de30b6c3b39fc4f30a107c16249a5e6fbd09d1c2eb3b0abb3

      SHA512

      b3629096b83531907f07ae43c37295e462422a57d1d9dd13a86926b91527d3572cc71a9a5e21b60c3b0ec20cdf63ecd934ec46d8daaff23823df658ae891b192

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d2e9ddbcbf9fba37df85d7a015a000a8

      SHA1

      9f59e3814a408d2dd210d78bc44276f46e2e41b2

      SHA256

      8ff2b0cb8005ba9dc43b57d89c7cbe372183182098889b4a42436b0be6fe6ce3

      SHA512

      eff4b6cd943a783fbd066628de128f6414e605c98b5e31a4657259f15a2e4b8fe887d71f9dce3a1b5295fe65c82ec1dfdadf232e301089362dfae87e65852a1c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7c7911eef62e7707cd655c56aa518bcf

      SHA1

      3b215712e4ff46fb4217725eb0bfc7ca9a7c556f

      SHA256

      24f89b348a121f75ea994941f287fb728aa383e4adbe50596ac1267a3ad2bdef

      SHA512

      a87a7281ff7d210ddb4afdc9e29201199147e9cc6a894b6adfc1866de487a107d0bf53ebf8ce0e0faf6e95d9d5b3026d3b45f4896fbec63a2735cb021262c378

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d8d3dc438a989f8076a51905745d597b

      SHA1

      74d92ce87b202aa1248960be50e5c1e20fa91846

      SHA256

      0cbebe94ad1266963ec794f54cbe6724f022ac56399a0da2019aa2a448657a99

      SHA512

      89b34491278af01552e59136ee87604193feb61d0cba6a96268291cf9ab09c5b70d1d23fa71a69a121350f24039111f0870a16ce0e54fedb9a6a8954710178fa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ade2cdc98c81332fb1d3755f5c3b1cb3

      SHA1

      38a3b6fe872df769774e3300e99cb9b3ab4b58f1

      SHA256

      876cf75f90d11d28d3244ee95ddecfc29310793ff9c4d97471b32bd49d315ea7

      SHA512

      eba1f7b6a158f4dd95dc7fb8f4e469de53615ac1c6f45bef09903deac9b766b2dbd37caf992f72e34b2bd0175ab1545e95e4b585ada193831c89cf37d0740b27

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      10e50c86a6faef3c9ac38bbb46c46472

      SHA1

      460b38001c4757b97b5b501eb05f9a9a30910cec

      SHA256

      b10191d02b904f618a9dbcd3da5a7fc4341121f68a583b9064901531cbc2f29f

      SHA512

      60ab501a67a6af9b2c69912263a7f39d0c5ec3316e489b2580607848a90b836f12abd811bd29c63523585a3663a902eba1051a204efd992db10897c0bfb07453

    • C:\Users\Admin\AppData\Local\Temp\Cab31F9.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar33E5.tmp

      Filesize

      175KB

      MD5

      dd73cead4b93366cf3465c8cd32e2796

      SHA1

      74546226dfe9ceb8184651e920d1dbfb432b314e

      SHA256

      a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

      SHA512

      ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

    • \Users\Admin\AppData\Local\Temp\nst1298.tmp\StdUtils.dll

      Filesize

      100KB

      MD5

      c6a6e03f77c313b267498515488c5740

      SHA1

      3d49fc2784b9450962ed6b82b46e9c3c957d7c15

      SHA256

      b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

      SHA512

      9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

    • \Users\Admin\AppData\Local\Temp\nst1298.tmp\System.dll

      Filesize

      12KB

      MD5

      0d7ad4f45dc6f5aa87f606d0331c6901

      SHA1

      48df0911f0484cbe2a8cdd5362140b63c41ee457

      SHA256

      3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

      SHA512

      c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

    • \Users\Admin\AppData\Local\Temp\nst1298.tmp\WinShell.dll

      Filesize

      3KB

      MD5

      1cc7c37b7e0c8cd8bf04b6cc283e1e56

      SHA1

      0b9519763be6625bd5abce175dcc59c96d100d4c

      SHA256

      9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

      SHA512

      7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

    • \Users\Admin\AppData\Local\Temp\nst1298.tmp\nsExec.dll

      Filesize

      6KB

      MD5

      ec0504e6b8a11d5aad43b296beeb84b2

      SHA1

      91b5ce085130c8c7194d66b2439ec9e1c206497c

      SHA256

      5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962

      SHA512

      3f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57

    • \Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe

      Filesize

      404KB

      MD5

      227c1f9fe7c7f6fb24a451a5ca84e722

      SHA1

      9c34be548c0b2affd930d05c1b315a5cbe9bca45

      SHA256

      bafcf2b563e935de1c9d2d55413d25b9a06a8ee8b4cdab49ba7bfe0bfb5c668a

      SHA512

      1fde79719e176eaa9f23211f9679d5406c219b2ae074227306001ea88c3c2f10c1ed1e0e52b10bc1e0ca9adc4cdc82d2da474ce7e59defaae816655ddc0fce66