Analysis

  • max time kernel
    122s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-03-2024 21:32

General

  • Target

    $R0/Uninstall Lunar Client.exe

  • Size

    404KB

  • MD5

    227c1f9fe7c7f6fb24a451a5ca84e722

  • SHA1

    9c34be548c0b2affd930d05c1b315a5cbe9bca45

  • SHA256

    bafcf2b563e935de1c9d2d55413d25b9a06a8ee8b4cdab49ba7bfe0bfb5c668a

  • SHA512

    1fde79719e176eaa9f23211f9679d5406c219b2ae074227306001ea88c3c2f10c1ed1e0e52b10bc1e0ca9adc4cdc82d2da474ce7e59defaae816655ddc0fce66

  • SSDEEP

    3072:Wn77v00hEoDEtauTsqBGeQIfxqxAjDsksbfVl1snhl+l2L0Sa9/l7a4vZAzLmDVH:W740IEa+J+Rql1DKs2t0EyL+ya2

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Lunar Client.exe
    "C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Lunar Client.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\$R0\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1740
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c tasklist /FI "USERNAME eq %USERNAME%" /FI "IMAGENAME eq Lunar Client.exe" | %SYSTEMROOT%\System32\find.exe "Lunar Client.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist /FI "USERNAME eq Admin" /FI "IMAGENAME eq Lunar Client.exe"
          4⤵
          • Enumerates processes with tasklist
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2836
        • C:\Windows\SysWOW64\find.exe
          C:\Windows\System32\find.exe "Lunar Client.exe"
          4⤵
            PID:2604
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://lunarclient.com/uninstaller/?installId=unknown
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2648
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1804

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6dad170549d43d1833a37ffe165e86b6

      SHA1

      be8828c4c9ad3b9e89d7327f71000f9521ed1507

      SHA256

      e1453f4dc4a17eb7e92b0fb8aa2fda201701bfd22ee2e69b60dbfc7a23033db6

      SHA512

      c7663c8bc8082cfb4e94d13a4ce9053e4550a7d36159d69be34d0ec57d89731bf932de0f67e149e53c001cb3c0d77d173a0934eb0595b9236790aa71f4162812

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0d5c59aeaf08a08a3c3783f68bda64a2

      SHA1

      779c1be9a072ca7593a9e178c457ef0f9930b9ff

      SHA256

      4f4cf1357e05b781ac152eed53618f9cdea90fbc561586475c5f7ca3e6388e7f

      SHA512

      bd3ed4ac8bb631ba41c477ddf29dde0a1a421993e35543d999c84c1a656c8100d8bd4a8816434639750360628b70f54dc61397b75ea94dbb1a04ed373d866d6e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f3ef41f88e0ae9bd7e3df3650b56cf96

      SHA1

      fe9ce06bfd9807992adec8bf4a02a4b96e69b66d

      SHA256

      af4da898fe23ea52182be3b4ddcc57b03ee4acd097d7d8bad8a8c92f830357eb

      SHA512

      332fafd16e03738708e4aa19e5a6ceaf536361db2a7aaf0c7f3eb0231bd0727d67c06b29aea8956d4606ea05ce7000555b9a9dabe27da209b54713d160551e52

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      484e2687fc5aad298780edf94d4564b7

      SHA1

      0b171fbe37d9a6017e319d174e889447121a7410

      SHA256

      719624eb71060af5cc166f62777e303447ac7308384803ab4c2c65265f9f39be

      SHA512

      45b0951d939b727b5303c0cace1bebc9507926a039519858ed1740fb74862a818b424b9c8d7af061b6d1ca1a66c775bfe12a9e8789e3f0c249a46b32b7251194

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a864fe86e77b4bea41ed2183a6db1a77

      SHA1

      6377c4aa66796c4fa2d0e9efa9a2be3b55779985

      SHA256

      a01e9a61e666711f59aedd21ca2691652471d1b2ad3306b09d425e8453dee412

      SHA512

      4cfc3c77f4edc37326a154560ca0f9a2b7cd5fdcb64332d1941733bc26bfc23f161b61d627cb391fe59801ea296336c563f8aae330c01d799a16c6963ed52246

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      854b0fff39d8c6a3613ba4a13ba2a458

      SHA1

      d4a164386aa09c03479f9d301a9cc1852bd095e5

      SHA256

      c1b9ccd037983d2f0d0d6a991105bc6a97e56796ca0cf5a0e1add4a6d225de0d

      SHA512

      d36a5a1852dd14836529b9e0bb980d3d97b64543dc0f9f150efd3259f6a71d3fcbb9bf6abbcb533e0b04dafd3656f56101be739b8f296a2160961b7a7c454421

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9d9a948b2dae688ac80c98c2b12e4a10

      SHA1

      10fe439bfa3b22daf034490ec4ac1d11bb873c47

      SHA256

      3a4068e069f56ec01bcd82f90d038dbe7db79b7efac44b8b80199304dec56944

      SHA512

      ab3cd0ceba9a6b3ea4fd7975ec808dff3def54c14a148b03d1dd112fa7684198b6aeee751b8f70a48758f9ddf55487e5899a7a8485256425c97300465bae3614

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c6425f046affec6c577aff743cc08965

      SHA1

      1010d16dcc751c409ecda6e1b4041ea0122abaf4

      SHA256

      992adb2eb750173e3b72102c36cb5cd5c682d3659ee55dc162ca2a23d4513877

      SHA512

      ef2a9f283d7cfad59fc3ad21648ad539a37d50d3f8b78c0e426d04d354dbf5610fc8e537e0bf6f83e294386a57448e7fdff902ccc49a1411683b118a659d0e57

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      726c40dd442d729e10420f8a13635af4

      SHA1

      6ba3a27139d1543ae1fc2a9abf3dc6c6e9856516

      SHA256

      6d87afcedb70b0da33573a5beaff42448a369544ae117a06969fc061e1ff1614

      SHA512

      233f41842c9cb8c35663cf12d3dda6d87f1f46c9dfc027f527adcf487accfefb195286b6511382f92ecd25782c3d7fcde8eb7c2f9622d5cdd05c9f489b2ce2cc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ad664b016a9f235ce0cc5e876e80e42b

      SHA1

      b24ea6a5eb11ad5085aea4666de9d254f4326bf8

      SHA256

      455a641205a956331e92e9f732190d5e2716c9f65f1a6b06ab79d674e684a1f3

      SHA512

      4c82c945ceb7ce6e67c9f2bfa583aebd95c28cbe688d5d74051138941ab8faf161c07e5c9592022060f734bee699a473a1f2e2563732ffbaf6226e9141f084cd

    • C:\Users\Admin\AppData\Local\Temp\Cab5DEA.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Cab5FD2.tmp

      Filesize

      67KB

      MD5

      753df6889fd7410a2e9fe333da83a429

      SHA1

      3c425f16e8267186061dd48ac1c77c122962456e

      SHA256

      b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

      SHA512

      9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

    • C:\Users\Admin\AppData\Local\Temp\Tar6052.tmp

      Filesize

      175KB

      MD5

      dd73cead4b93366cf3465c8cd32e2796

      SHA1

      74546226dfe9ceb8184651e920d1dbfb432b314e

      SHA256

      a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

      SHA512

      ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

    • \Users\Admin\AppData\Local\Temp\nst3AD0.tmp\StdUtils.dll

      Filesize

      100KB

      MD5

      c6a6e03f77c313b267498515488c5740

      SHA1

      3d49fc2784b9450962ed6b82b46e9c3c957d7c15

      SHA256

      b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

      SHA512

      9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

    • \Users\Admin\AppData\Local\Temp\nst3AD0.tmp\System.dll

      Filesize

      12KB

      MD5

      0d7ad4f45dc6f5aa87f606d0331c6901

      SHA1

      48df0911f0484cbe2a8cdd5362140b63c41ee457

      SHA256

      3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

      SHA512

      c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

    • \Users\Admin\AppData\Local\Temp\nst3AD0.tmp\WinShell.dll

      Filesize

      3KB

      MD5

      1cc7c37b7e0c8cd8bf04b6cc283e1e56

      SHA1

      0b9519763be6625bd5abce175dcc59c96d100d4c

      SHA256

      9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

      SHA512

      7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

    • \Users\Admin\AppData\Local\Temp\nst3AD0.tmp\nsExec.dll

      Filesize

      6KB

      MD5

      ec0504e6b8a11d5aad43b296beeb84b2

      SHA1

      91b5ce085130c8c7194d66b2439ec9e1c206497c

      SHA256

      5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962

      SHA512

      3f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57

    • \Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe

      Filesize

      404KB

      MD5

      227c1f9fe7c7f6fb24a451a5ca84e722

      SHA1

      9c34be548c0b2affd930d05c1b315a5cbe9bca45

      SHA256

      bafcf2b563e935de1c9d2d55413d25b9a06a8ee8b4cdab49ba7bfe0bfb5c668a

      SHA512

      1fde79719e176eaa9f23211f9679d5406c219b2ae074227306001ea88c3c2f10c1ed1e0e52b10bc1e0ca9adc4cdc82d2da474ce7e59defaae816655ddc0fce66