Analysis

  • max time kernel
    117s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-03-2024 23:25

General

  • Target

    $R0/Uninstall Lunar Client.exe

  • Size

    404KB

  • MD5

    227c1f9fe7c7f6fb24a451a5ca84e722

  • SHA1

    9c34be548c0b2affd930d05c1b315a5cbe9bca45

  • SHA256

    bafcf2b563e935de1c9d2d55413d25b9a06a8ee8b4cdab49ba7bfe0bfb5c668a

  • SHA512

    1fde79719e176eaa9f23211f9679d5406c219b2ae074227306001ea88c3c2f10c1ed1e0e52b10bc1e0ca9adc4cdc82d2da474ce7e59defaae816655ddc0fce66

  • SSDEEP

    3072:Wn77v00hEoDEtauTsqBGeQIfxqxAjDsksbfVl1snhl+l2L0Sa9/l7a4vZAzLmDVH:W740IEa+J+Rql1DKs2t0EyL+ya2

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Lunar Client.exe
    "C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Lunar Client.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\$R0\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1944
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c tasklist /FI "USERNAME eq %USERNAME%" /FI "IMAGENAME eq Lunar Client.exe" | %SYSTEMROOT%\System32\find.exe "Lunar Client.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist /FI "USERNAME eq Admin" /FI "IMAGENAME eq Lunar Client.exe"
          4⤵
          • Enumerates processes with tasklist
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2536
        • C:\Windows\SysWOW64\find.exe
          C:\Windows\System32\find.exe "Lunar Client.exe"
          4⤵
            PID:2532
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://lunarclient.com/uninstaller/?installId=unknown
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2528
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2772

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      67KB

      MD5

      753df6889fd7410a2e9fe333da83a429

      SHA1

      3c425f16e8267186061dd48ac1c77c122962456e

      SHA256

      b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

      SHA512

      9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      cbd07d7549e852698bab41b328fd5cba

      SHA1

      35c823e7ee20698a22a75c76556c8e9b58ebece7

      SHA256

      d0e59f528df1b70f64281f876583dbd4953e021e477a2acba25f909901220e8c

      SHA512

      9d2dcfd40ad0011c4a33018e7b8c4a1d81584b4b64b7b75ec3444f8408f05ae9c1642a2ad441c8a2911e3ecf08c54e81d75e5a6ab05a8d566f8b34e57f3422f5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9684e63394ef621e9b656e868486b65d

      SHA1

      695170366e27598d704b7e073b6e03f8d15f24f1

      SHA256

      615c0dad31c015a58e9091f0db98e54817eaa5f764c741e7adc9d818081ce0bb

      SHA512

      6be9b39c2058b231fe97f20e37360bdd47c55c392cb81fb141a5bc62ece46c3235395c6e746f5e8b6ee5f5247b05742d68e944ab85d514b84d616a44d9d81913

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      84dc79d43b835117ac654f7a64d5cef1

      SHA1

      3655e896e7efd820228d7a53604a33f43a6b68a8

      SHA256

      35b3ec508a7be8a14925b7c1fe9aa877d9746caabb048063106c23b6b60b5ad9

      SHA512

      3ad17ec78f9f49406a45bdf2f45ec27214c399a956382fba6817bbc7179735a408772866049f4a81411ac8ff122fefadce9c526b8105f5d7641f2d2fc1754866

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d749c106b86459565c6eb776f9c15c01

      SHA1

      208ccf007ee8fc51856a5a7efa795b7436b599da

      SHA256

      53690d5c32352975e68aee1b1edcbde3f19e7fdb07991884d249b7af41f16283

      SHA512

      d0a09c531f2d877691349a82507062cf838409699aac7d624d29a45ee44ed342051086483d5734423d31942318ed587dda45ad385024b8cfea248e6380006fea

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      56b63a7005087ef01abf33d1252b18f7

      SHA1

      9228bade101e0f97bc6d6991d2ef454d6b513dee

      SHA256

      6c7764265d67eaa453f6c64d117a3a1362358b9108164221c115266c151208ec

      SHA512

      dcbe34bf7e155dfa1bf17571c330589db90d23631f0aec7faa967e44b3f331ec05dc34dc0bdbfe1a615c0d6108e99a78237c1f129407ee52adf77cb666b7015e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f7f39af01831b66561951c42f9d39be2

      SHA1

      c67cc80c3b96c61e373950407c95d041c14f95d5

      SHA256

      90b6d26175a120bb345472de0b246e2713c2d38288b58f13a83ca585d7185d6d

      SHA512

      f204605fdaa5d2b06f6ff40c068da55ac26ed3795fffc2cacab4305e3d2b8a4a462576d162681897d07763f440c104dab4a675133b2eb5bae9f629f0a835d147

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      035912aa3a3221ee60ac6900e1f8c672

      SHA1

      a9cfd4f93ffd6f6857bbde1c9511d43abf170d62

      SHA256

      544b28a021daf15265d3bda7bde9f39c623c4244c9b6b867a8236f2470ba4289

      SHA512

      f7726720a672d314740b6528c21918fcc6abe8de52594787a2587a242b1b7c01b551f7d69fdaeefd19e09823b0652d66d384455e6b9858fa69e9276ce89b3e7e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5ecae51e3e0e2b38c631e5fa2f9ffa53

      SHA1

      59b291cc38e3c6a0814548ed8c3e9a8282852285

      SHA256

      825e5d315ad7c10e8a0067edbad90ee7147560b4c86b48cce8f7a82795d73d8d

      SHA512

      40040528595f51147515aa28a535996a3d462a6f73ef305cb02f8cec9d43324483c1ac78ce3d0cddf0db6a96caed667b04f8705d311c2f61b0b32d2f552f8cd0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7f7ca72bef3ec2cccaada2a4e2e1ddfe

      SHA1

      e3d2e69081d1678188613162857fb6b5e0aabf1a

      SHA256

      a183a3943e8fb50ab1feef9894ed87e58681dd532a5c48ebd6a0b2d331ecd9e2

      SHA512

      9a59d1123aa6f1b338dc3ae8e77fadf4e087fa5fce4df2863800af8937e90de99794977e06e416a60a6d454828bdb5aae3cb6e971f14626fde9d43adc0d7673e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a9aa9f68487bbedef71a6587fed93f4f

      SHA1

      44305702b4ed778a8205a355853621d4c6c79c1c

      SHA256

      c894d20e0c79520c17a2898b1524454b6d02ec6aa996a46cf19745d9345cb211

      SHA512

      28ca643426419df38198a5ea57b1ea8698a37716781f5b76bc650a8077bd26b1aa7ab75dd3177f243d7e3fd0a4626fe7dffaef83ae92fd91ce9b73ec88d8b67a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      770449731586fd6a81924d6de30e21ce

      SHA1

      42a80a4149ddd3bba7c5eb9f266428b2bd1dc4a0

      SHA256

      0339d37ba4d629bcbe553593a2ad2964a961130a9b98eb893937b4cf79430d14

      SHA512

      2460944b82e2389c04cc43c7c50b55e8aaef387a1d2c452687fe22c0f1f90bc14ff9479435ab92220ca0a11247389b15b9fd71bd9ba79a7e14cb5011a7163ed3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6b3254b95b7e6d6f789fb6e29bc69211

      SHA1

      eab183d38e45e61ec39f046aea6d11c97dcaa8b0

      SHA256

      4f546c754c8038ec85d41fd8b680506b5af95654a8e42e81e0c74be0b0a158fc

      SHA512

      22c9708ddba611d8596483be5ab2e8dc94f7a62a03c98fdee06ce7a5c86f5e93d80124dad40efd935d0e8221ba2ed051131eec88e2fc34cef37ba261261cc226

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9be4ae6e8f5e9415d955e89ac16714e2

      SHA1

      0c7dd8f2acd559ca4ed6dd0a4118670059320600

      SHA256

      8033e9e2c858a0f029ee5450b711f94fe63a05b0d84dd153cf71f9b0fb6c9501

      SHA512

      b67f1f42307c84bb92ddc8a499f329269f9ec325c6a72ea180e291d0ebfb4e36b38336c09bdea410dc492421ae26b8bc747fc39612100961b71e6b6b75852244

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      801c7a33a7df41762328718286642c4f

      SHA1

      06efa6bb8441d42b3b3bab9c2614d447ca07545a

      SHA256

      e3847c9954182dc1db8e963dc09b3c5ff8be67819c394e049fd266b01994206e

      SHA512

      f73a550b05223fbd3c2708af3391cde200257427b51e2e1d383ea6aef50612d7f10f0fceb299354d828b348d9d5f6567a78958ef7733051fb3e1d613bd0b682c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c28f461f0168cae8e92f7673a5122aef

      SHA1

      01eb46755d9b0e45d2fa4f3646805cf4221d5e64

      SHA256

      9f4fb3421fc8ef872b4dadd027cdaff6ef747262f53e329403a876452474c2f6

      SHA512

      8f7b989a81fc43803a3c113eb4fc08df565d5a4189bf753b7e4312180bbd2d1ce8fed5798124cd9bae25a7e787fc9ee6a6cc818151bf355c5c55ff75e7db38b9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      190dba5d692df059010e049ce5177c7c

      SHA1

      6752381a449cabd8ca59cfab3c8a326f9fa116a5

      SHA256

      323a6d202007c67470fc5a69cb5a0d7f7657f7a33a392ae4ceefa474476d8d09

      SHA512

      9a1a4bb194de5ea4c936fbbb5caf8f580fed495772d4586710eabe70870266097ffe60e10ebde380010eb1240704973ec28da5f9f7e75967b6b0a10b91d7775d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c12a4781005cd1c67df5c9d938c8fcb4

      SHA1

      aec8a2036deea95c83622c684386561c368ea336

      SHA256

      40919e7d9b5260d26900794a1911fc8343bee4c2b93397e453a302505ab5b362

      SHA512

      3bdd81255370600cd7016018c74de8bf638f6d103e5a176743f4dcb7aa2470a4fd57a9e420bad9ad0d0d967efbee80fdc521744aa076a16dd94d12db98f522ec

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6ed8c77f33ff025cb915e4a67ba4a546

      SHA1

      3b2c5fe5ccea2175a407f82e751520e2ef250f1d

      SHA256

      b05d1c50db39e07eb580a69912f01c92a5276a9b30596290344604b2946a7e43

      SHA512

      bb38cdf701f8e135d6d79b5df1856a6772ccb970ab7804d5e3904e820378f78a8a6fad6ad7599720299188eb45c3f06af80af52307cdaaba69ed0a098814c56a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      dba2da94d5d23ca8874aab12a3188c7c

      SHA1

      db7f0071349ff620264931b122bf4e0d842eb08b

      SHA256

      0eb6171089493a2eab4f74576d6042e0702ffc9eb4909549cb93d20917eb056f

      SHA512

      edea1312991e82edf9bdd2864273378e33a7dc74145d660df4398492d8c832a5836696670283f0289296096e323419870eee9568ec0e93d7c87be7f04a8c0b0d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f544f085a57f7148ba7fcad1f0624fa9

      SHA1

      b03e49fea18850fd4d29abbd53ddae53c1591166

      SHA256

      7cce0444160148f243deec7868fc3b863a79ee3f84e56e4b9bbc8b53c3892afc

      SHA512

      b3ace34c7e22622a8f41e97abe254680df3d896b0a6470d8d6282201d04fe0e84fa077e4ba53f0b3f836304e427dff0bb6c7781a25833fddd58dcfdec6a1fecc

    • C:\Users\Admin\AppData\Local\Temp\Cab6D84.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar6DB6.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\Temp\Tar6F54.tmp

      Filesize

      175KB

      MD5

      dd73cead4b93366cf3465c8cd32e2796

      SHA1

      74546226dfe9ceb8184651e920d1dbfb432b314e

      SHA256

      a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

      SHA512

      ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe

      Filesize

      404KB

      MD5

      227c1f9fe7c7f6fb24a451a5ca84e722

      SHA1

      9c34be548c0b2affd930d05c1b315a5cbe9bca45

      SHA256

      bafcf2b563e935de1c9d2d55413d25b9a06a8ee8b4cdab49ba7bfe0bfb5c668a

      SHA512

      1fde79719e176eaa9f23211f9679d5406c219b2ae074227306001ea88c3c2f10c1ed1e0e52b10bc1e0ca9adc4cdc82d2da474ce7e59defaae816655ddc0fce66

    • \Users\Admin\AppData\Local\Temp\nsy4BFF.tmp\StdUtils.dll

      Filesize

      100KB

      MD5

      c6a6e03f77c313b267498515488c5740

      SHA1

      3d49fc2784b9450962ed6b82b46e9c3c957d7c15

      SHA256

      b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

      SHA512

      9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

    • \Users\Admin\AppData\Local\Temp\nsy4BFF.tmp\System.dll

      Filesize

      12KB

      MD5

      0d7ad4f45dc6f5aa87f606d0331c6901

      SHA1

      48df0911f0484cbe2a8cdd5362140b63c41ee457

      SHA256

      3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

      SHA512

      c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

    • \Users\Admin\AppData\Local\Temp\nsy4BFF.tmp\WinShell.dll

      Filesize

      3KB

      MD5

      1cc7c37b7e0c8cd8bf04b6cc283e1e56

      SHA1

      0b9519763be6625bd5abce175dcc59c96d100d4c

      SHA256

      9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

      SHA512

      7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

    • \Users\Admin\AppData\Local\Temp\nsy4BFF.tmp\nsExec.dll

      Filesize

      6KB

      MD5

      ec0504e6b8a11d5aad43b296beeb84b2

      SHA1

      91b5ce085130c8c7194d66b2439ec9e1c206497c

      SHA256

      5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962

      SHA512

      3f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57