Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
Lunar Client Qt.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Lunar Client Qt.exe
Resource
win10v2004-20240508-en
General
-
Target
Lunar Client Qt.exe
-
Size
644KB
-
MD5
1a54093fd0baa0a588e317f34ca19d5e
-
SHA1
ce0b13a18bf1908b7b00829ec1ec55f95c6a54b9
-
SHA256
2de6d64af31a5cdc257477c4b22d6640c63e7b173c537bae0fe4a9f29a52284c
-
SHA512
8176d385aa3d3c2f613a1474a07d7ce3cd8862c2e4a3591f28b0269ca460ee5043016fec87371478bc45ecdb209a03492b365bd5148e8997dcfc0df94581bad8
-
SSDEEP
6144:d1fhuvS/BetBSAbxL0CVFOQQ3lIuGHt9OH5jMRHoLJKCfnfLfw0/IIl:Xh2SAdLBHgaRIM20
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2688 chrome.exe 2688 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe Token: SeShutdownPrivilege 2688 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe 2688 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2756 2688 chrome.exe 31 PID 2688 wrote to memory of 2756 2688 chrome.exe 31 PID 2688 wrote to memory of 2756 2688 chrome.exe 31 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1696 2688 chrome.exe 33 PID 2688 wrote to memory of 1236 2688 chrome.exe 34 PID 2688 wrote to memory of 1236 2688 chrome.exe 34 PID 2688 wrote to memory of 1236 2688 chrome.exe 34 PID 2688 wrote to memory of 316 2688 chrome.exe 35 PID 2688 wrote to memory of 316 2688 chrome.exe 35 PID 2688 wrote to memory of 316 2688 chrome.exe 35 PID 2688 wrote to memory of 316 2688 chrome.exe 35 PID 2688 wrote to memory of 316 2688 chrome.exe 35 PID 2688 wrote to memory of 316 2688 chrome.exe 35 PID 2688 wrote to memory of 316 2688 chrome.exe 35 PID 2688 wrote to memory of 316 2688 chrome.exe 35 PID 2688 wrote to memory of 316 2688 chrome.exe 35 PID 2688 wrote to memory of 316 2688 chrome.exe 35 PID 2688 wrote to memory of 316 2688 chrome.exe 35 PID 2688 wrote to memory of 316 2688 chrome.exe 35 PID 2688 wrote to memory of 316 2688 chrome.exe 35 PID 2688 wrote to memory of 316 2688 chrome.exe 35 PID 2688 wrote to memory of 316 2688 chrome.exe 35 PID 2688 wrote to memory of 316 2688 chrome.exe 35 PID 2688 wrote to memory of 316 2688 chrome.exe 35 PID 2688 wrote to memory of 316 2688 chrome.exe 35 PID 2688 wrote to memory of 316 2688 chrome.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lunar Client Qt.exe"C:\Users\Admin\AppData\Local\Temp\Lunar Client Qt.exe"1⤵PID:620
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" shell32.dll,Options_RunDLL 11⤵PID:2868
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5b19758,0x7fef5b19768,0x7fef5b197782⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1216 --field-trial-handle=1336,i,6936155730987186495,6113999111915153496,131072 /prefetch:22⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1468 --field-trial-handle=1336,i,6936155730987186495,6113999111915153496,131072 /prefetch:82⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1568 --field-trial-handle=1336,i,6936155730987186495,6113999111915153496,131072 /prefetch:82⤵PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2136 --field-trial-handle=1336,i,6936155730987186495,6113999111915153496,131072 /prefetch:12⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2144 --field-trial-handle=1336,i,6936155730987186495,6113999111915153496,131072 /prefetch:12⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3260 --field-trial-handle=1336,i,6936155730987186495,6113999111915153496,131072 /prefetch:22⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1884 --field-trial-handle=1336,i,6936155730987186495,6113999111915153496,131072 /prefetch:12⤵PID:576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3460 --field-trial-handle=1336,i,6936155730987186495,6113999111915153496,131072 /prefetch:82⤵PID:1168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3556 --field-trial-handle=1336,i,6936155730987186495,6113999111915153496,131072 /prefetch:82⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3444 --field-trial-handle=1336,i,6936155730987186495,6113999111915153496,131072 /prefetch:12⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1336,i,6936155730987186495,6113999111915153496,131072 /prefetch:82⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD51aca9c8ab59e04077226bd0725f3fcaf
SHA164797498f2ec2270a489aff3ea9de0f461640aa0
SHA256d79727a3a88e8ec88df6c42d9bb621a9c3780639c71b28297957ada492949971
SHA512d63ebb8d19e6cbe9714603688bc29eda4e347e1bf0bb9b0b7816225220263781b84966413a946feb4ae27750371de01e03092dacc4051116073c518d6217fe65
-
Filesize
325KB
MD5beaf5b5b2391b4e32aa230edbb77f9c3
SHA1b2d6ed1f1c743d90f020ac29f7519d6f6e395028
SHA256034a9fae06ad9decd9824683657f3c88a31b3d8add0b4842dfa22b50f34cea42
SHA5125f535aac1e68d046ff25112f41b2fced0cd1dd0e8812f2f5e24a9e3e6bcfe8cba6152ac11d7d8ead6934b4e785cc7d9b6b81c3d20b252eb56cdf2aee75203b34
-
Filesize
140KB
MD53c6f2aae886f3e59cdd4db298c26c61e
SHA16a98091782e4a4853956929820b58b9f158de8c7
SHA256bb714a39e1f30420a885a64eaf582612f376f6b993a56010e797a86ab5fe3570
SHA512eb9767faa388ff8e6021b4f7609efb3164db70541d67799f3c061c884a7643282738ca1c62f321a3a1ff9a97a4e2fa2c2380e84bd1434c9811f7fc6f9253677f
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD551928fc3fdf12bff434e82f4e34f5ad9
SHA1668776d7b37f07e0594c8175bc5546d58ec51abe
SHA256899babb4c54426a7028f96eb6d8161ee5614e7c21bf96db13b18be9a2f72f81a
SHA512d13b800c574d9d08aadb83bb3b880e8a97c045812e78625950f540ec7025fdd0dd4554755d554bff58f4242d13531a367f395efb5296693576ff41cc998d47a2
-
Filesize
6KB
MD54969a62f84fa6c41976bbfd825acbada
SHA161ec586efb5e9abfeaaae4e9bc0b1982f07ffcc3
SHA2563e4c002979ceb8153982c4755b9829d6a557e47cf4e5b04638fda174f9a77729
SHA512c2ca84bad26f117390aa2629a4bfa3a735604c361b7ceb0fa39a393b9c271ee6deb4b3c96b846e16601301da72e3c9f8fd4fece5703f6d30f4c41287575054a0
-
Filesize
6KB
MD5c147e2428d65abff58a1f71de5783996
SHA1065d0699c4f2495b78ad8d1b9618115bd7c5c9f9
SHA256e23599f5e580b8c6026a44a26327d4e2e8d3453a826bd16441d526736ece7315
SHA512fa835eb6d75242079ea26451910acad1f2167346b3d626c5947385ff00aaf3fea5ea01e500980397b7ab74f48c89d900aafd57818acc259355d4c80963795cae
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
279KB
MD53781494f137790ac9e42a2f41ceba78d
SHA1155c83e7a7ae91ce954be5ec13c4ea1d26313e16
SHA25681d0020b5165dff8c98664c4ceaeedfd3947aac896f5c8c29468ae52eb953f78
SHA512df6a7e335b361953f307a9d2652cbe7cfd62a801074af61014c723be8dc4104ea29edb8d719397ca7e4994dc16d13eab365facc73cbb2fba274d1f6624a38131
-
Filesize
279KB
MD53c40cd21ac8d0d9539696af79a260dd5
SHA12e5d04596d630b29acedfb55cf34af414baaa8fe
SHA256da00efaafdad1b5b3f63e6c9e5003154d148b46f1ba185119b9df57bf6770ddf
SHA5120c9ec783e8f5eafe7b7009277f03b12279cd46852f945b5ca8a1075de20ef4532d3921a575e8c4fd8ea6bef97324938289f2891c0856142a7348e8dcc21d6666