Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23/04/2024, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
luna.external.rar
Resource
win7-20240215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
luna.external.rar
Resource
win10v2004-20240412-en
3 signatures
150 seconds
General
-
Target
luna.external.rar
-
Size
126KB
-
MD5
214f9991aa1546fac77eb4341dc333d7
-
SHA1
edc8556e58a8c515417c639157447b257a399cee
-
SHA256
aca23312888372e94a1ae5f52763323b820c4eb6d1d7920f888886a0fc35572e
-
SHA512
0b2975d96f920be12a3e547908550f5531992456efeee249c3cc2e46bd324cefc61ad38c166673ddb64a32259b573d1aa060f871f7d97fb3c745e598dc3ed108
-
SSDEEP
3072:xPyVedLJUq1KgrqvMOG5jWlQJgMGVSrEWqAd:CENZrqvMOqjWKg7qEWN
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2536 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2536 7zFM.exe Token: 35 2536 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2536 7zFM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2536 2008 cmd.exe 29 PID 2008 wrote to memory of 2536 2008 cmd.exe 29 PID 2008 wrote to memory of 2536 2008 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\luna.external.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\luna.external.rar"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2536
-