Analysis

  • max time kernel
    145s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 09:31

General

  • Target

    Lunar Client Qt.exe

  • Size

    644KB

  • MD5

    1a54093fd0baa0a588e317f34ca19d5e

  • SHA1

    ce0b13a18bf1908b7b00829ec1ec55f95c6a54b9

  • SHA256

    2de6d64af31a5cdc257477c4b22d6640c63e7b173c537bae0fe4a9f29a52284c

  • SHA512

    8176d385aa3d3c2f613a1474a07d7ce3cd8862c2e4a3591f28b0269ca460ee5043016fec87371478bc45ecdb209a03492b365bd5148e8997dcfc0df94581bad8

  • SSDEEP

    6144:d1fhuvS/BetBSAbxL0CVFOQQ3lIuGHt9OH5jMRHoLJKCfnfLfw0/IIl:Xh2SAdLBHgaRIM20

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 57 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Lunar Client Qt.exe
    "C:\Users\Admin\AppData\Local\Temp\Lunar Client Qt.exe"
    1⤵
      PID:4612
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /7
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1668
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:876
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0x100,0x128,0x7ff8153bab58,0x7ff8153bab68,0x7ff8153bab78
        2⤵
          PID:228
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1908,i,14493352641918678586,14136712588785396777,131072 /prefetch:2
          2⤵
            PID:4764
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1908,i,14493352641918678586,14136712588785396777,131072 /prefetch:8
            2⤵
              PID:4796
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2168 --field-trial-handle=1908,i,14493352641918678586,14136712588785396777,131072 /prefetch:8
              2⤵
                PID:4452
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1908,i,14493352641918678586,14136712588785396777,131072 /prefetch:1
                2⤵
                  PID:376
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1908,i,14493352641918678586,14136712588785396777,131072 /prefetch:1
                  2⤵
                    PID:2132
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4412 --field-trial-handle=1908,i,14493352641918678586,14136712588785396777,131072 /prefetch:1
                    2⤵
                      PID:4064
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4516 --field-trial-handle=1908,i,14493352641918678586,14136712588785396777,131072 /prefetch:8
                      2⤵
                        PID:4800
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4488 --field-trial-handle=1908,i,14493352641918678586,14136712588785396777,131072 /prefetch:8
                        2⤵
                          PID:324
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4536 --field-trial-handle=1908,i,14493352641918678586,14136712588785396777,131072 /prefetch:8
                          2⤵
                            PID:5060
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4824 --field-trial-handle=1908,i,14493352641918678586,14136712588785396777,131072 /prefetch:8
                            2⤵
                              PID:536
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 --field-trial-handle=1908,i,14493352641918678586,14136712588785396777,131072 /prefetch:8
                              2⤵
                                PID:4520
                            • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                              1⤵
                                PID:2748

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                Filesize

                                2B

                                MD5

                                d751713988987e9331980363e24189ce

                                SHA1

                                97d170e1550eee4afc0af065b78cda302a97674c

                                SHA256

                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                SHA512

                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                356B

                                MD5

                                f19913279c838144a22715bf62196c24

                                SHA1

                                307ff028d1903fbbad588e6559a0c107857cd6f8

                                SHA256

                                963fc432d73d62462f0ae2ec674133c71f0004ebda32ad68f6c239e56e533614

                                SHA512

                                01230dd8dff7831f9cfa6c3c5a1c393c927a862a088648c1abeb3a60dc6e3ac6789661f23cd4df75818fe1e04d975bb9584a551fb74ffdeb24e1733600ade7af

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                0c02bd7ca920821668f3f71fd03ffe13

                                SHA1

                                8b8be2573d5d2beb6eafcce52015318dbf8629bd

                                SHA256

                                4f4b71519392d51aca52fe13d93af7519ff748b2efa92c33fca9be6ea449dd77

                                SHA512

                                57875c1b208004935a50c076fb85463ec6520e20d36376e00c980d052cf4e9b57a45f1b3f8ccf0fd14f6da1eca6458b98d04574349e2f9a7b60f5a1d0b2af67b

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                Filesize

                                16KB

                                MD5

                                938a468c0cdfe142d2baba246316317e

                                SHA1

                                d09cec82ca627641dbbf6b6c2120f721bda3fa76

                                SHA256

                                24d723aed37d9c04039cc34a421ce11963f765bfc715d7814065be655d833686

                                SHA512

                                7955aa0b6f5183a08289a62d34551360fee4b9414f6c5d7e82039ce3b90ba21541e6b85bcbceb1b9526c18e8b5d64040586ed753be19ee77b9743b0e39da2e02

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                257KB

                                MD5

                                1c3cb22cdded5de4c3987405fcfd3620

                                SHA1

                                2f920667aa82c7414e77d42605b1ef325a670dc3

                                SHA256

                                e9d17c964120a0d87eda4fefe770b93c16d9ced01cea057b3f723d13965c6b5c

                                SHA512

                                1986c10e5a499b7989a49a21f729341f85ae34cdfe3a191e8a8a7763867e6fba5191974721d35a9ead988373abaef40ca750889ca91e2988968a464bc81fabb8

                              • memory/1668-12-0x00000223E4EF0000-0x00000223E4EF1000-memory.dmp

                                Filesize

                                4KB

                              • memory/1668-9-0x00000223E4EF0000-0x00000223E4EF1000-memory.dmp

                                Filesize

                                4KB

                              • memory/1668-6-0x00000223E4EF0000-0x00000223E4EF1000-memory.dmp

                                Filesize

                                4KB

                              • memory/1668-7-0x00000223E4EF0000-0x00000223E4EF1000-memory.dmp

                                Filesize

                                4KB

                              • memory/1668-10-0x00000223E4EF0000-0x00000223E4EF1000-memory.dmp

                                Filesize

                                4KB

                              • memory/1668-11-0x00000223E4EF0000-0x00000223E4EF1000-memory.dmp

                                Filesize

                                4KB

                              • memory/1668-0-0x00000223E4EF0000-0x00000223E4EF1000-memory.dmp

                                Filesize

                                4KB

                              • memory/1668-8-0x00000223E4EF0000-0x00000223E4EF1000-memory.dmp

                                Filesize

                                4KB

                              • memory/1668-2-0x00000223E4EF0000-0x00000223E4EF1000-memory.dmp

                                Filesize

                                4KB

                              • memory/1668-1-0x00000223E4EF0000-0x00000223E4EF1000-memory.dmp

                                Filesize

                                4KB