Analysis

  • max time kernel
    1565s
  • max time network
    1566s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2024 16:40

General

  • Target

    $R0/Uninstall Lunar Client.exe

  • Size

    404KB

  • MD5

    227c1f9fe7c7f6fb24a451a5ca84e722

  • SHA1

    9c34be548c0b2affd930d05c1b315a5cbe9bca45

  • SHA256

    bafcf2b563e935de1c9d2d55413d25b9a06a8ee8b4cdab49ba7bfe0bfb5c668a

  • SHA512

    1fde79719e176eaa9f23211f9679d5406c219b2ae074227306001ea88c3c2f10c1ed1e0e52b10bc1e0ca9adc4cdc82d2da474ce7e59defaae816655ddc0fce66

  • SSDEEP

    3072:Wn77v00hEoDEtauTsqBGeQIfxqxAjDsksbfVl1snhl+l2L0Sa9/l7a4vZAzLmDVH:W740IEa+J+Rql1DKs2t0EyL+ya2

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Lunar Client.exe
    "C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Lunar Client.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\$R0\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c tasklist /FI "USERNAME eq %USERNAME%" /FI "IMAGENAME eq Lunar Client.exe" | %SYSTEMROOT%\System32\find.exe "Lunar Client.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2920
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist /FI "USERNAME eq Admin" /FI "IMAGENAME eq Lunar Client.exe"
          4⤵
          • Enumerates processes with tasklist
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2564
        • C:\Windows\SysWOW64\find.exe
          C:\Windows\System32\find.exe "Lunar Client.exe"
          4⤵
            PID:2444
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://lunarclient.com/uninstaller/?installId=unknown
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2436
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1692

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      252B

      MD5

      991bcafdce3b78062101152bfff234cd

      SHA1

      b37bd77f4bcb69b4509576fbce14c68bf615ac22

      SHA256

      1a97c22413e112fdb0ebe75a5a2bb0d7f284b1d4993616bbb83ac27487021e9d

      SHA512

      44e57d67bb299ae2dac07977e7a72bcbbd70c7b45af9b944cb3c51d8248f952a5763c30988bc45b4e8ea2ea1d7fb414dd780c110b64c7d345b556902d90d71a2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      81b8a72e797afb346742253f2cceebe6

      SHA1

      0395b52d07658e5872583e41aab837b4446c08ff

      SHA256

      b59272d1f05ffe1359875328711fcc6b3984df3d008583d2f4180b2688ecbc85

      SHA512

      5c3946ae08b0385955878cb0500afeb94f5c5abced0fc8d8f76e0b402ba37aced9b023d7cd17955f68332d9025c8ad4ed59fdb70de1ee1a053e4ad338093217e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      48319d6fea52ff0837d9193a7355201e

      SHA1

      dc20cb8884e5f0bb0dce7f6208f77897d01a735f

      SHA256

      5259662b38aa6794514f2c1a276dff0ffaae2a5b7f9f802fac2f21ce4591102c

      SHA512

      ae9afcb3d020a92bfcb21481021e891a167bb2c1eb4385cf4656f15894dd51593a7bbfb35893488a88fba138ae69628b77be45b41cb252efa0c27c2d37fd5445

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e656f187d5d082e6e760e267d0390988

      SHA1

      e9ae49f83652f2bc5e17158fca0740a6e7111e33

      SHA256

      d76e37b1869a5e4a9b99fc7c458ebe8333c03729bae889258363a38a80df3492

      SHA512

      5c9e4a5d7f8e466af1933b92c925e4b03c048f302e006dd4b70ee5a89cbf7d974862adbc3ddf38206f35f2f76de9f19bc132e923b5f2f4c9dd5e01f6f615e741

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      fbda079d5d9208cddfb5a4dea76040da

      SHA1

      4c7aaf3d3ef27aa9ecedc62a70034076ccdce8f9

      SHA256

      5fc71959af514e019968f0b0b51125c46c9b0543cea0503b5f8542ce91e3b98a

      SHA512

      c6990492f78416bac02a8bb3417823065c730f576929a8f9ce17f7c6edf9dc14b182406beafd2f67ebb5d073e16ec28f2926dbde5c04998dcdfaab014dd042f6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6b05097f5f7e718686ef35a53472eb65

      SHA1

      3c0d30eef2fa64b0f87e7772c98907f49edf2687

      SHA256

      188c6cf239df55f855ea595529ce35911b3dd33fdb6d3b11afde6b7748eddcc8

      SHA512

      2e1888d14204825c9cbc64d9d3e790b21f6845fca3e84c6705b0c917373dbb88c5672b1b39ca45b7fb660e69db1bf64c036249ca0d1f5c227ad396c0b8c9760f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      44762f0f4303c604c91e241650ecc1b9

      SHA1

      44494aa95e9267ac4b436e1476c8c76272c844a6

      SHA256

      006fdb2913de82669771b789ae3532f2cbeabefb8c37e039371c2ab7b433e113

      SHA512

      8d816de2c12ae83a03a09356f81a062415c4c6cd6eeed9a1397138eed0b5919ea5234c6063e0fb67f080183444b457f944aa3fc7da9aedffb6fdae6b16cea391

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      755aaa10baa94018c33236d9b870ef73

      SHA1

      5c9ffbf71156f265df7aa8d28db134f382965a7f

      SHA256

      f29375aa0f9331627ae41ce55b1b5e62e0d2d282825fbc30be5c3d6e5b263751

      SHA512

      0bb0e802612f7b1b13a3cb0ae291c7ba9cc856fe2598c0fb7183c9e25528030647f507ecd56a28bd23ae02812b3c6c2c92b181593883d7465a5c597c5643fac4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c03c79fb0ced5c5419f5bd2fcc52d922

      SHA1

      a9c737d4cb9b4f97e11c36104caf56cb3b700e81

      SHA256

      137cc7261e6869658669254c7f45a567b623c7aa40601b61cc4628a6d45080c6

      SHA512

      7d92ba088569d641c02b182c0fb2325861c0e82863e6dfbf0c22b227ade2720d031db1364e6aed66a4233d61c0711ab09b3ea4172cd229a43f07c973c3dcf844

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      07191ab2d9d56c843c38c670ff52d3fe

      SHA1

      67ac339d46c2da1e509aee8ab99ed501df3f5f5a

      SHA256

      3bd50a6834002d752dc8317fc352d083ef3dc91db0547c27fdd454c8dcf57a2f

      SHA512

      2498167233ab21bd9e9f16a88517462ce167aa2a6aa26548aaf46490d501c87d31a7e368494ff60451b3ac510d8bdc1d13b52e21f031bc38d5fab9ac760c1c9b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c756e22cacab80fe085aa134b3f9900d

      SHA1

      781fd525ec454a665dca5f183ca9c7270b563efe

      SHA256

      128dfe71197bf19fe11a6709f185cc9a7a1580081fb1acb6f88401bd679f58b3

      SHA512

      0ee9b22188452f6bbd2869f8d61af30def1e9017c1b484651fbfd83592e65a8c56cf057b6e56f49eb5b55a7107960ffa00a9e957d585f8bc19cfbcab2d6cafd4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2753a8555d8028b6a05eb2be58761fe5

      SHA1

      7955aff175b28d89a4e3821b4a95abd0338615ee

      SHA256

      ad5eeaec5a98cf2f9c5a9a7e6842f6357930523a91b4243a1302a7f7ef6ba656

      SHA512

      b1725f5f5435628c3cd0a8df2506c0c00f7ebdf7a83540ad1227e5f66df2f80fa2590b7570baeb01683254fb4940433c65762e56105b381bc66c898d081ee30d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      40db0b50be4d310d4c25c530cd3c514d

      SHA1

      327fdc452bd87b7c6618462ef95f48a11a613611

      SHA256

      a654b0a263edf5e15321650f268260a58f857a92b0499c51bd1ebd34a585e155

      SHA512

      55dea8edb0203a3b4c3e7352144991d1160f497c506e395f0670109c4137d38899e30c7fdc919d0bfe69a346b7a79e0ee05c678218ad22d5882fd34fccf5b17f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f72777298b8d83e3b80f8f82cd64dfd6

      SHA1

      f38652cf11372c51dd8a810510c43dcfb89640f8

      SHA256

      9e7b0afd1f122b6423f830129f6afac406cb4a7575be2e95e337ee133415797a

      SHA512

      c7ddc42092c2802b586302583605ee5191c4c6d9f6af29824204bba018466f5df7e741b9f2c01453184032d4a9077bf8e669f8b95db72cbc1a9ede3dc577b19f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      5e4359db4036fa4005a09698d9d03f17

      SHA1

      c70f5df3164e0d745aedf65e8adfe80be179d179

      SHA256

      18152bbee86db96b6e28ad48d7a228e33a765e3a6396b1d42e3e82a6685519a3

      SHA512

      8d7c2b0feda726997c0844e9adbb5ebba5af6e1ebe4b0285eaffa04bc1c0174cd7478381aec2a95c3184c98d7513a8d38e298c7333a39c9424f8edd6ed7933f0

    • C:\Users\Admin\AppData\Local\Temp\Cab2FB9.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar2FDC.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\Temp\Tar310C.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\nsy1095.tmp\StdUtils.dll

      Filesize

      100KB

      MD5

      c6a6e03f77c313b267498515488c5740

      SHA1

      3d49fc2784b9450962ed6b82b46e9c3c957d7c15

      SHA256

      b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

      SHA512

      9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

    • \Users\Admin\AppData\Local\Temp\nsy1095.tmp\System.dll

      Filesize

      12KB

      MD5

      0d7ad4f45dc6f5aa87f606d0331c6901

      SHA1

      48df0911f0484cbe2a8cdd5362140b63c41ee457

      SHA256

      3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

      SHA512

      c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

    • \Users\Admin\AppData\Local\Temp\nsy1095.tmp\WinShell.dll

      Filesize

      3KB

      MD5

      1cc7c37b7e0c8cd8bf04b6cc283e1e56

      SHA1

      0b9519763be6625bd5abce175dcc59c96d100d4c

      SHA256

      9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

      SHA512

      7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

    • \Users\Admin\AppData\Local\Temp\nsy1095.tmp\nsExec.dll

      Filesize

      6KB

      MD5

      ec0504e6b8a11d5aad43b296beeb84b2

      SHA1

      91b5ce085130c8c7194d66b2439ec9e1c206497c

      SHA256

      5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962

      SHA512

      3f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57

    • \Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe

      Filesize

      404KB

      MD5

      227c1f9fe7c7f6fb24a451a5ca84e722

      SHA1

      9c34be548c0b2affd930d05c1b315a5cbe9bca45

      SHA256

      bafcf2b563e935de1c9d2d55413d25b9a06a8ee8b4cdab49ba7bfe0bfb5c668a

      SHA512

      1fde79719e176eaa9f23211f9679d5406c219b2ae074227306001ea88c3c2f10c1ed1e0e52b10bc1e0ca9adc4cdc82d2da474ce7e59defaae816655ddc0fce66