Analysis

  • max time kernel
    1563s
  • max time network
    1566s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2024 16:16

General

  • Target

    $R0/Uninstall Lunar Client.exe

  • Size

    404KB

  • MD5

    227c1f9fe7c7f6fb24a451a5ca84e722

  • SHA1

    9c34be548c0b2affd930d05c1b315a5cbe9bca45

  • SHA256

    bafcf2b563e935de1c9d2d55413d25b9a06a8ee8b4cdab49ba7bfe0bfb5c668a

  • SHA512

    1fde79719e176eaa9f23211f9679d5406c219b2ae074227306001ea88c3c2f10c1ed1e0e52b10bc1e0ca9adc4cdc82d2da474ce7e59defaae816655ddc0fce66

  • SSDEEP

    3072:Wn77v00hEoDEtauTsqBGeQIfxqxAjDsksbfVl1snhl+l2L0Sa9/l7a4vZAzLmDVH:W740IEa+J+Rql1DKs2t0EyL+ya2

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Lunar Client.exe
    "C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Lunar Client.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\$R0\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c tasklist /FI "USERNAME eq %USERNAME%" /FI "IMAGENAME eq Lunar Client.exe" | %SYSTEMROOT%\System32\find.exe "Lunar Client.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist /FI "USERNAME eq Admin" /FI "IMAGENAME eq Lunar Client.exe"
          4⤵
          • Enumerates processes with tasklist
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2560
        • C:\Windows\SysWOW64\find.exe
          C:\Windows\System32\find.exe "Lunar Client.exe"
          4⤵
            PID:2832
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://lunarclient.com/uninstaller/?installId=unknown
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2432
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2420

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      252B

      MD5

      7bb0480a773b175078f4299a9da88d7a

      SHA1

      50d8fbeffdce095b6939e602a893b283e0e2de82

      SHA256

      77502bad294b915086f9ca0d6ada681f051dacdcefa21f2cb9614a36186661dd

      SHA512

      a121ea8c053d1adc82ce82701bd5eda04ec3e20e8d3fbbe431669e8a2042a64df844fa2faa9355eea0874d15e9f499e3d2403b395ea2fbc0f1d0ace8b7d3f518

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4c3153978e358604eb18884433ab205f

      SHA1

      cef6f12d1217d8ff244db8a4c440359b78ab29fb

      SHA256

      90f47f59e382aa1606604368186020b5f8ee39e47d8e4775ab030ea5ad3ffded

      SHA512

      16203e6b2e2c5dae658e68bc399ed5d7bffb29b417bcd19459abf8111f26761b35610d1c4d57210680f80a0f402b60f5f691a8c8703c08167346243715ddbfa1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      72ef9949dbc9dba7c739cce81d68569f

      SHA1

      75e64357a1df3eb060ad8dad9617b97412603a7b

      SHA256

      415250bd4a408128bffba67a2dada9deb086ae2f2dfcf3419a3b125389203793

      SHA512

      346c1c58a0727d6f7a389f7fbfde52524edccbf8bf560d1af21a864376eaf3f863e11063e482aac1bb724cf0a6c34caf0bf5f85882e97ea878437e85f267b368

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      24694c2e3309d34cd8435a10f61752c0

      SHA1

      ac1ede096dac9f11bef8775388716ac2a0212001

      SHA256

      4bfbf82bec3d806dce75d3b3c6ca055b8eed019298aa8a24a0af65fab2d19b11

      SHA512

      c96652e70e99b61fde87cf817c3a36510fd0911170266407fcd8afc53c3a9a1ef6ab5a103f240094cbd3c7437b54bbe93d27fbcc8e78a928215e16101ec7a9cd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b103de50071e293ad728caed52914568

      SHA1

      abb9bb5a291c63e63fd10fd30c372e9b90481060

      SHA256

      4783dcaacabd37fe25ccba23bb38841ac129aefd1d59686577e1cb6f9e47d2ff

      SHA512

      9e84342c92553fbd6d225c594fd69da6ac1e2c5dcdc9936e05ce3c8618a0996335dddc42c6abbb82f363d448be5d1f4c399510936224e5d9031e4404d5b5b8f8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e5233140c1d50d515cf0f031e298ff4e

      SHA1

      b5c3702ce37ef0c10ac4326303bd64f112f27b70

      SHA256

      3ad7354ce6e2815d34c00f497cbef2a54d54d5a5e53ed59413fd4e71e34cbfef

      SHA512

      f0fa47152674aeaf66a449f315bc4da5bcbfba3ddda74a58c563c3a3daba0525cebf6bab84c7d5c481fa267c16c38325a3dcd3593d7565110c8050aa590570b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f616cfb5b9f7e5d50a25c95e078f65e3

      SHA1

      5a5a2b917477dd9297d6f3af2d069b0930c59161

      SHA256

      829b8c4ac7792cdd1a9bd0bdbcd98eaf04ac5f98f7a9ec42431875525be6d02e

      SHA512

      7257080d23c57b6874a2df2fea8ef549541a4019e52cb2dadfd93fa152ad6efbd5b53ff0c1694c8f20a9db834747e5887c54d02132948d1b5553089d3bef7e9e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ef8ae5f0869d79ec805a341ce308c7aa

      SHA1

      9fee255159c9d9cd802d7efaf3a2ac3e41f02dd8

      SHA256

      6dcb80699216cccc7ad3d9ea85abca3682bb1071b196359a9188105af43dbe67

      SHA512

      1be21138ed106c9836955451667507692ba02632122e5179e0468c6183e4fd998e1dfe76f0b0181fa83f65bcdca628b77cc94cf94cd691ded949bdf03ca635b1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      dc6eadd7bb4798c1833f7549a4f70c3c

      SHA1

      e14846e698dd6a7c166e0f970df23afb81e3beef

      SHA256

      51677651fd6e0f7788bb09122e21ce21bd3745454e6df88e4dcdf6da98e9ca5e

      SHA512

      b6f25b992a2b549b78008b1d95e2b435ac939c6b7949b04aeaa72e63b63680935d697d9bed5233f4ff24a06d010a3c6254e88e8c7fe5ef9d617ea537d7709c65

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f0d898a7a5ce5758bde985667bf9df85

      SHA1

      9d70add0f52d01bc3549fd0c57316368012bd16f

      SHA256

      816538a6da36fa6f260d153499244ca8378cbb441d66774faca51f08e8be5e06

      SHA512

      6d254b8f13b3a7e9c832e42eb963832e39609c51a5d807f2e515b44c67d51e68d1c5701d60c0b63db6fd94394a6b42aa274aa738fd8de1bc5c08e8bac06e63ed

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ab065949e4bdf6eab32c122638470313

      SHA1

      fea6a3e46aca27e26564f9bac197d655ee1eaa53

      SHA256

      8aa0200ddb5690c5e9404986104315c5d6ae490ad2dad242a9dc777bd9230e56

      SHA512

      1c6c913f6e560dcb60b08975c9fe9e46d1ffdd941786d7514c5b69b09fc6cb2644ff11db0e1ffbda47c092a3d9c6460243d5898d50bbcd5d34b7f29cab68ed03

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3ad1e09f0129d5dbb5dcbe021ac24b0e

      SHA1

      c7727f9a9a43b3769dd9cc62cd0e6e4791bacb14

      SHA256

      4c47fcfdf88d572749b4f3c901b097829dd17e404abc81e7d9e0ee2bfae4ee79

      SHA512

      5b6b216d088a28bbb86447979f1e1f31874caa0190e06338a11b6ddeebe07b26ecc97e3226cfc66674089f0674f366b0e028002eb3c4b7696b893bb203896c11

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e1d36c21ef9773fb22520b2fcaca7fd5

      SHA1

      b26313b13c01f738e808d225be7c60f6f327e258

      SHA256

      1b8804aa76996158593b2b8339f507921ddf576ac2e13ad6fe9b92cd09ccdf1a

      SHA512

      9a0fa5b830b41d1fa69b8a3c49ba4866dc7961b8608c961dd627492546a15158d9b1d3cf5b78c827003a2d902da6eb2c508b252fe8a36b19161246e120eef090

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      439d83227e85fe0fdd20d11a606695d0

      SHA1

      94b430cbbbb48bb0a71ae84b38e0af28309cc8af

      SHA256

      251b12eff0d8628277f5e10decbeaab1310c8c1fb14c11da38bcd6554b5db476

      SHA512

      e5bd9f0c68d09903376607fb8b37f91f70f4f692e376819c55fea796a032d9e8614433147f746f2a8637ead4284f7d326c7382a423a997965edb080d9b978f78

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      69d14eec8a66fe237700b08a7fd04b65

      SHA1

      f95f229dd3115b9812edf2aaf41357d8d5441480

      SHA256

      7c5273fdca3303563d5a5abfa66f693786833e6ab9fdf5fc5688f42e95690d18

      SHA512

      22bccbcd9f18288e970c871ed99fe12484d816945da95389873b4c825545e9f8d81e9600eb1841d3c881068ebacba1cdfbe8ea8ceb0bddc277ffbcde4904e666

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e0f10fb74830c3bc35922f9920e750ea

      SHA1

      a6c088b82b8238e3405bb19a786f9def17fd3da9

      SHA256

      830032aa1f1b3da52cecab214d9197608185b06cfe8dcfb2ed02902dd7999511

      SHA512

      27d867d3b8fd0559a203d625eb6b51224c6d14b0fabe4869a581d72d8db03e826bfedae03dae3efe8eb0b286101099d8d1bbe7825bde862a0ee1b0c0de081fc0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b23ac9668c1b4cafe4408adcb71f16ed

      SHA1

      480ebd4b871f7b4515f0ab7750eb630bc8b4eb98

      SHA256

      3ff813aa087f00b6408d0d40eb2fd58f81b9ad1310054f83ee301bb5bde166e6

      SHA512

      754c524ecee372b531f781ed2d6189f1a4832be3144d8ca73dfab8fdda8758bb510ee3ffd37f51ba9511ad01851cd528a3a258bbc4c8b327bf54aa3f04d41552

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      137aea0f3ce966729fd0f2161aabcb25

      SHA1

      6b0aff59e2d685ceadc998c692f98fdf4f43773d

      SHA256

      98213dc4ae46edba94054bf99a527f1032d80743f22b120b1e8fa57c71d7610c

      SHA512

      f284a5113b238c355b94f19acd533c880e51b2d33b178526c7e067f44b7913e3710f9269f361306219d428cc5c19b794d56f2b2390d1f1559edb650384aab2d4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      6af1b51ad422df0abe58a861f641ec52

      SHA1

      108dde25ab8225ef0498eb66b07742645c8d913f

      SHA256

      52ffd5ff2c27e5eebd25c5713466526e0ed054f1dc88a27c7b9cd3eab14ba26f

      SHA512

      444c5aa1d34373781bc3a5a2ea1bfab376d45309fc541e413fdebe01a2aa17bd533bd47493c30a083e07051b9c192416c49d7aa8abe9b7307cecd7e939fa7380

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      8a8a1eccdc6e9b73684655e072a8cee5

      SHA1

      2ce86d31821506096d1c7cc40c2bab78dd6ff825

      SHA256

      4f7fcfd34ece7ba64049e219af8f75c4b2cef5b37cbc2a07923cdcac36cc7ee2

      SHA512

      8c06d4024d4f074aa2fbf56522e9b39b276fd164da19f662e08e1feccb94ba988b114e6477d6b4a7e970573aed47db931dd13fac8e61219974a6429242f7cc4c

    • C:\Users\Admin\AppData\Local\Temp\Cab5755.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Cab5890.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar58B4.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\nso2BC3.tmp\StdUtils.dll

      Filesize

      100KB

      MD5

      c6a6e03f77c313b267498515488c5740

      SHA1

      3d49fc2784b9450962ed6b82b46e9c3c957d7c15

      SHA256

      b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

      SHA512

      9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

    • \Users\Admin\AppData\Local\Temp\nso2BC3.tmp\System.dll

      Filesize

      12KB

      MD5

      0d7ad4f45dc6f5aa87f606d0331c6901

      SHA1

      48df0911f0484cbe2a8cdd5362140b63c41ee457

      SHA256

      3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

      SHA512

      c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

    • \Users\Admin\AppData\Local\Temp\nso2BC3.tmp\WinShell.dll

      Filesize

      3KB

      MD5

      1cc7c37b7e0c8cd8bf04b6cc283e1e56

      SHA1

      0b9519763be6625bd5abce175dcc59c96d100d4c

      SHA256

      9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

      SHA512

      7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

    • \Users\Admin\AppData\Local\Temp\nso2BC3.tmp\nsExec.dll

      Filesize

      6KB

      MD5

      ec0504e6b8a11d5aad43b296beeb84b2

      SHA1

      91b5ce085130c8c7194d66b2439ec9e1c206497c

      SHA256

      5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962

      SHA512

      3f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57

    • \Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe

      Filesize

      404KB

      MD5

      227c1f9fe7c7f6fb24a451a5ca84e722

      SHA1

      9c34be548c0b2affd930d05c1b315a5cbe9bca45

      SHA256

      bafcf2b563e935de1c9d2d55413d25b9a06a8ee8b4cdab49ba7bfe0bfb5c668a

      SHA512

      1fde79719e176eaa9f23211f9679d5406c219b2ae074227306001ea88c3c2f10c1ed1e0e52b10bc1e0ca9adc4cdc82d2da474ce7e59defaae816655ddc0fce66