Analysis

  • max time kernel
    1563s
  • max time network
    1566s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20-04-2024 17:05

General

  • Target

    $R0/Uninstall Lunar Client.exe

  • Size

    404KB

  • MD5

    227c1f9fe7c7f6fb24a451a5ca84e722

  • SHA1

    9c34be548c0b2affd930d05c1b315a5cbe9bca45

  • SHA256

    bafcf2b563e935de1c9d2d55413d25b9a06a8ee8b4cdab49ba7bfe0bfb5c668a

  • SHA512

    1fde79719e176eaa9f23211f9679d5406c219b2ae074227306001ea88c3c2f10c1ed1e0e52b10bc1e0ca9adc4cdc82d2da474ce7e59defaae816655ddc0fce66

  • SSDEEP

    3072:Wn77v00hEoDEtauTsqBGeQIfxqxAjDsksbfVl1snhl+l2L0Sa9/l7a4vZAzLmDVH:W740IEa+J+Rql1DKs2t0EyL+ya2

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Lunar Client.exe
    "C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Lunar Client.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\$R0\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c tasklist /FI "USERNAME eq %USERNAME%" /FI "IMAGENAME eq Lunar Client.exe" | %SYSTEMROOT%\System32\find.exe "Lunar Client.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2420
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist /FI "USERNAME eq Admin" /FI "IMAGENAME eq Lunar Client.exe"
          4⤵
          • Enumerates processes with tasklist
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2732
        • C:\Windows\SysWOW64\find.exe
          C:\Windows\System32\find.exe "Lunar Client.exe"
          4⤵
            PID:2572
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://lunarclient.com/uninstaller/?installId=unknown
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2532
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2788

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      252B

      MD5

      4943ea7c35d9e7204067c874391bb238

      SHA1

      46a27e0cc36e07c643ea6da20ec8f61196abbe59

      SHA256

      d2a54352fb6b31d3a106353fb38ac7583869e493c0b732331144e04e19ad5d40

      SHA512

      6fb051b5b986e2f1880ae9c345c03b631ebf2ddd1c8e45df91c3ff3b7b58c323cb4aa106c77c4d935f227da06688a96a27f491ccccd6b8c2d979cdcd51281f15

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c53a9a78d61cd5da35bcb6ba288a98be

      SHA1

      d4c5cd3074b2a20d6d987c9aa310cb421432f62d

      SHA256

      910522bdf303616da7e7006d70b9dbd586b44ca17c7a7fad2c0699c3e93ca4a1

      SHA512

      7d590dff53b55d5b4251b104a7840aa7f8a8336b86c5b245820356a8647d40a5202b0d7c349302657f262ad1223a413a9892a2e3934750806ff2e49adf3b333d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      37c14450fb490c6d867b395308d9f90e

      SHA1

      d7e019033a6b389a87195a9ff4d550c8a64ebe04

      SHA256

      27ecf4848c303511e5fdf1961685716b75ee6821e660934b0ed1755b8e348d59

      SHA512

      cc65d80bd414d4f2ee9b4f4e27100a42f2be387c3c8db258a0bcec286f09da3cbcfd878262294caec42274becbf3036d887db0fe4326a6b06544a2c48a4bb0b5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      cf898780742482a0b049da03de5ca276

      SHA1

      e10afb900cf95c75d31b40db99aff669656a76e2

      SHA256

      2624a7701e436eea302a51b19d6ef0082eb4e05e0a6ecb6ed6a0a0647a508c3a

      SHA512

      0742ddbfb72496b7cf443dfa60e52217cecc0405dac19a69cba4531d0421b53173d6360bbd88666224a149788c8622b6a077321a604e5fff849f2f0672b65173

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      559754093791d64cbae67bbaa4326143

      SHA1

      02fd60ffcd63cc43309b1faff2a92e443b5bb59a

      SHA256

      e21600b3f71660ccb0368e99eac618787a01d7504ab26c8e4f84a1502fc3f2b2

      SHA512

      78e020f15f0f180408279173ea90c3f2fe87ab9a4551f4de050ac80b09ac13461f9e8f0ebe70660e56143370041f37f9b63fe87f569ace148ff2cdd494ca1716

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a16c2fa17b744c919881fa1af3f91f4c

      SHA1

      4efcee8e99f1fabcb3500d10ec5cbb7672065678

      SHA256

      bc1e51405009e0a564a9c6d82575cdd9eb3232293d4642bca6ddcdf648ecc2d9

      SHA512

      0d5713b29fc0aaa1e493832378ff98dde403c4e32b65bff1bf86ac354b2211124c453fd04a177f9b6ba3b983d05d55e3bcfd5c0b717e02ec1eba5e0c70045c83

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      965b61cb00c76ad451a9c9646302b187

      SHA1

      2e44cb0779f032d2a64f90d6f97d7e0e9feaea23

      SHA256

      2ff50e89ff2cae530d8352d54271b910df50b096fd01bcfd8fb6e9f59d538b1d

      SHA512

      50a936096ad860cc3808c5f60fe1cfe13945f5679bc67df6a4f024766ff5cae2e761a5de9c4cb8a8195429dc0101724ac4bcdd14bc33d32b1c1dbdc76d67efff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1b8b87b5120647af38d5bb6eacd4b9de

      SHA1

      63e2a2391a4c69342d5a73dc4d7d58f113584eb6

      SHA256

      96b8c1e2ed8e58c31fc8d435bdd2bdf0e1cb0ba3f37a65ed5d06ade6ea670bf8

      SHA512

      d7961b8a74b88deed36254b9b1fc55dbb38ab2e90f4641b6e238dfed8ce34af54ac341948fe008a623f66ca970b1631973084bba97599a88dc1de26718f9465c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      065a6a28f352182b0ab9826d62a807af

      SHA1

      0c86839709e4a72b602e323101d0ca5e0f2a7fd9

      SHA256

      7cfcc051a4a7a0cd60dbfe8885910ac2e611106d3f8c6d20e34db1d1db9261cd

      SHA512

      cef0ccf8c926a1d8cd8ba73e8fd6c090ca7f9613072402faf8abbe6540c8446c59266d227130bbecfb4ceb8350649a82889dbbd9e3068471ee3343847cce581f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2695416f1c815fff31dcf78a699027b7

      SHA1

      e96472336b27e98f10f05930bae8e0a4349b6725

      SHA256

      978a32e5dac2e7647e569f3e2040239ceaa331153edc52c5f9b074ed8f735d47

      SHA512

      88165b0c261a002ee8561c1c648feeff2fc3dc8c3c681d1f25dee7822f92229457f758491089ece8ed204d6d8504288a3bbfa8b0b399ffa0dbf0d913da775a04

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0cebe341d271d4929e80c36f9e56bf80

      SHA1

      aee642e7e2a1de8e8833e38eee3306fab2575864

      SHA256

      20ae8ca2a7e5f1414945465a61ce4250a0995b48d2ab316a850d273318a1d5d0

      SHA512

      a248171d0ef669ba315ed56f836a911c34182b5c6747295f04d0940bdba56d33f776ee9ae721c0530c147d8137f5e32c81200b8b41895b01f5b2c0bf188f9e68

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      76d21c9b71fa8b9245482921b5c795dd

      SHA1

      a805516423f5974421727c431f90de63dc17b8bd

      SHA256

      faa2460864f24e229f4631836cb29994a0e9823ef6805ce8f20d5261a47f89cf

      SHA512

      da0a4890a19ca98f81e583b1d5a57e11146ad463557bed57fe9f466bd66822194e3bb35597f00e357d70d7aa63b4ef110d64923771bb5ee1aa4a546459627c84

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      88bb3b405793c26d03eef8fa47893e28

      SHA1

      8d0702e623a7a0d3f2c0ec58630117c83f125a31

      SHA256

      e3ef03c3a31114bcdb9493fa05784d87f2234430f74c24e7aa62427918fd6421

      SHA512

      cb6721adb774defd31df7104d603baa02c15e1c23c28d04f1d75dc170d8a43bc864fd426f772e094103b7d13de6d28f8948bb624a96a475207e1b8b5ed0d33fe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8e41d1a7f73ffd92f0e73227516dbbc8

      SHA1

      1b66c5c77b9d4a419671271b9d2f46ca9505eb12

      SHA256

      65e1a0cd63319ad9c5101654c019dfab053421bb325f0b022265f5c6627a1867

      SHA512

      d0f3ed7263f61a1312d34cd38df5aa0bc5c9177dba28bad9a4949a8c070568a5ffbad20466575f4df5c1f0da5d1f89e68a866a66bd6bd3d8d207f0f8be72e8fd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9b3605b3e4a5cc331baab732a8b42a5e

      SHA1

      a6e64978801991f804fe0ed87ec6b4ef4927947e

      SHA256

      0f098947382b2a8ad010cc97f177c19d7480cefd8ade8c9db88dd1db2410ed68

      SHA512

      c9a704e1d62f9a2ca927d6ae1105ef254024bb5485a6b957783e9dbad01cfab5a3f03c08d66f8afc14793a8ae7cc08ebf02e79e942a906732d8a65c68da7fa9d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f5c517aca991834c4d5986ff49b2ce05

      SHA1

      b986ac0709de6acc8e436ff4653fa6f7c36a726d

      SHA256

      7600f7feb8b82b7c5cce68a7cab6c33c9b0b2f16f4413c36ade2458aeec97031

      SHA512

      9d1012a6e16a309e18152bdd501fd8599fe45ad2233a6a0b6d6f075186a89b5ca7c348e506934a873e1fc416cf6c8fb3700c8b52b4cb696cae8ba552ef95a079

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0978c6992a1d96a552f121fa732ad7ac

      SHA1

      cdc027ae53376392639b6cd9342b2cdb68054eb8

      SHA256

      c9539aedaff60356b7e75673a292ceca329b76c58e152a5b43d6fba0c1ec0098

      SHA512

      7402d3e08b39db0195834301312dd65f7c1e70ce36faa7d8a7dec02fb37ebfd2e0131cd5b48feecb35eb12a9adf11b57e299acde08fd5a77663e5d72ef7a28fe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8bb3acffb1efedec75a0781f4c6d1de3

      SHA1

      c4e2b2c861f267a62ba2f54f3b8d61aae503a33d

      SHA256

      ef5d0c1d48275ae0132d75c4b0d4253ebb36e9175f09905dea051048c1a9cb0a

      SHA512

      424c63e7dbc9ca73e8a4501a935028864a8979f7fbedf237671caa5a24dc6c5fd502ac83bf78914a24a62680d920a27aa4733f943c9e711e22819537df5a9c12

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1f96ebc8b57cbda5b288143c1f93effe

      SHA1

      a33b773b6e714ff5e92de60f9074e8fc91ae6f2a

      SHA256

      a97915408edd16aa16c59d51c038d7b3b806292f7acf732d8c9d84890db13d2d

      SHA512

      7247101d0ea34c2423fdcf498247cd7b58e32f15bb9a92d74f49bae575f4dc8d87bd048ec92e40f2853960e2af8d8472b7da36df4a12d403e038b7565af41b0c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      63e8b97a3ab7f7fc83732daaa9fbc615

      SHA1

      d4788c1d542ced086715de3907866fae37261bb4

      SHA256

      d9e270674ff47df929499eeecf03255c423e8f8a0e3aba9f8a751aa045f2a568

      SHA512

      a22e85233365362a6dc6353bcbb632ac0fff3888fa4a61335431ecc94afbf7e3c5dca96ec19fe20e079742fc42f0efcf22a572cf3dae558af8c1e79d6c4b7461

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      8ba6e06173d099183c1c943380aaf165

      SHA1

      37d9fcbafb7f18367b4dc057c76b20e884be12d9

      SHA256

      f5564c57c8b44fb059711c50861db77cfe1c6d990750a9c1b1d6350f793de3ca

      SHA512

      f58e1774a6471a4a5a1d0a762240147e0e7167c3292f284a16d54f9c6153487a5b1cf091bf8e8de0b497ec089c38f3589a7e99ceb2ae02a294dc9777b8b24f21

    • C:\Users\Admin\AppData\Local\Temp\Tar4207.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\nst15A4.tmp\StdUtils.dll

      Filesize

      100KB

      MD5

      c6a6e03f77c313b267498515488c5740

      SHA1

      3d49fc2784b9450962ed6b82b46e9c3c957d7c15

      SHA256

      b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

      SHA512

      9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

    • \Users\Admin\AppData\Local\Temp\nst15A4.tmp\System.dll

      Filesize

      12KB

      MD5

      0d7ad4f45dc6f5aa87f606d0331c6901

      SHA1

      48df0911f0484cbe2a8cdd5362140b63c41ee457

      SHA256

      3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

      SHA512

      c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

    • \Users\Admin\AppData\Local\Temp\nst15A4.tmp\WinShell.dll

      Filesize

      3KB

      MD5

      1cc7c37b7e0c8cd8bf04b6cc283e1e56

      SHA1

      0b9519763be6625bd5abce175dcc59c96d100d4c

      SHA256

      9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

      SHA512

      7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

    • \Users\Admin\AppData\Local\Temp\nst15A4.tmp\nsExec.dll

      Filesize

      6KB

      MD5

      ec0504e6b8a11d5aad43b296beeb84b2

      SHA1

      91b5ce085130c8c7194d66b2439ec9e1c206497c

      SHA256

      5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962

      SHA512

      3f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57

    • \Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe

      Filesize

      404KB

      MD5

      227c1f9fe7c7f6fb24a451a5ca84e722

      SHA1

      9c34be548c0b2affd930d05c1b315a5cbe9bca45

      SHA256

      bafcf2b563e935de1c9d2d55413d25b9a06a8ee8b4cdab49ba7bfe0bfb5c668a

      SHA512

      1fde79719e176eaa9f23211f9679d5406c219b2ae074227306001ea88c3c2f10c1ed1e0e52b10bc1e0ca9adc4cdc82d2da474ce7e59defaae816655ddc0fce66