Overview
overview
10Static
static
10Moon-Predi...1).zip
windows7-x64
1Moon-Predi...1).zip
windows10-2004-x64
1Moon-Predi....3.dll
windows7-x64
1Moon-Predi....3.dll
windows10-2004-x64
1Moon-Predi...I2.dll
windows7-x64
1Moon-Predi...I2.dll
windows10-2004-x64
1Moon-Predi...1).exe
windows7-x64
7Moon-Predi...1).exe
windows10-2004-x64
7Creal.pyc
windows7-x64
3Creal.pyc
windows10-2004-x64
3Moon-Predi...DME.md
windows7-x64
3Moon-Predi...DME.md
windows10-2004-x64
3Moon-Predi...ns.txt
windows7-x64
1Moon-Predi...ns.txt
windows10-2004-x64
1Moon-Predi...DME.md
windows7-x64
3Moon-Predi...DME.md
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 02:16
Behavioral task
behavioral1
Sample
Moon-Predictor-v2-main (1).zip
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Moon-Predictor-v2-main (1).zip
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Moon-Predictor-v2-main/Moon-Predictor-v2/Bunifu_UI_v1.5.3.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Moon-Predictor-v2-main/Moon-Predictor-v2/Bunifu_UI_v1.5.3.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
Moon-Predictor-v2-main/Moon-Predictor-v2/Guna.UI2.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
Moon-Predictor-v2-main/Moon-Predictor-v2/Guna.UI2.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Moon-Predictor-v2-main/Moon-Predictor-v2/Moon Predictor V2 (1).exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
Moon-Predictor-v2-main/Moon-Predictor-v2/Moon Predictor V2 (1).exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Creal.pyc
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Creal.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Moon-Predictor-v2-main/Moon-Predictor-v2/README.md
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
Moon-Predictor-v2-main/Moon-Predictor-v2/README.md
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
Moon-Predictor-v2-main/Moon-Predictor-v2/keys & pastebins.txt
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
Moon-Predictor-v2-main/Moon-Predictor-v2/keys & pastebins.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Moon-Predictor-v2-main/README.md
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Moon-Predictor-v2-main/README.md
Resource
win10v2004-20240508-en
General
-
Target
Creal.pyc
-
Size
28KB
-
MD5
370838c72bfe99c475b4a67a24d2b989
-
SHA1
3b6373953963700a546dcc5d3d7a0e31c78ddb93
-
SHA256
3e9335ab8087295cf9d53b203d0003970ad18578b8bf57cbdef37840c120ea32
-
SHA512
27c8679b87bb181de9377514f85550e8ea1d0146bc872ec05aeca2dda91241bdbdcf9606be05170467619e568d0c6d93763ff7738ebc01d84952b32f8fa628b3
-
SSDEEP
768:rxbnr6B2MgyUI4AC9Vq71Qmf6AgehmSsLrrFHVFHMHCWn:1brbtvSCAgeR8HMHPn
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2832 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2832 AcroRd32.exe 2832 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2060 wrote to memory of 2536 2060 cmd.exe rundll32.exe PID 2060 wrote to memory of 2536 2060 cmd.exe rundll32.exe PID 2060 wrote to memory of 2536 2060 cmd.exe rundll32.exe PID 2536 wrote to memory of 2832 2536 rundll32.exe AcroRd32.exe PID 2536 wrote to memory of 2832 2536 rundll32.exe AcroRd32.exe PID 2536 wrote to memory of 2832 2536 rundll32.exe AcroRd32.exe PID 2536 wrote to memory of 2832 2536 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Creal.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Creal.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Creal.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e2ff3fee41a8f75851efa85d114a6ec0
SHA1635a8cb129b8888803469e4ba750adec3f2d2e6d
SHA25609ca40d69cb66a3b37b7264e2f61e5e13186e4b8104e112892331ce0b3c632de
SHA512bd5af8b60b2b0ee3989722894575e2b3126175c4ff3739f77ba4ba4423f71f9cbd9ebe4233aa83aeaf58d5e5da101085f26ba7c802ab712ac593809e2255e269