Malware Analysis Report

2024-11-15 07:46

Sample ID 240619-nj3j3sterq
Target cracked_lunar.exe
SHA256 524753508a50c33f404a87441625e1d9967d0c1a11b31c534e2d60b838fb1589
Tags
pyinstaller
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

524753508a50c33f404a87441625e1d9967d0c1a11b31c534e2d60b838fb1589

Threat Level: Shows suspicious behavior

The file cracked_lunar.exe was found to be: Shows suspicious behavior.

Malicious Activity Summary

pyinstaller

Loads dropped DLL

Detects Pyinstaller

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-19 11:26

Signatures

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-19 11:26

Reported

2024-06-19 11:56

Platform

win7-20240508-en

Max time kernel

1559s

Max time network

1559s

Command Line

"C:\Users\Admin\AppData\Local\Temp\cracked_lunar.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\cracked_lunar.exe

"C:\Users\Admin\AppData\Local\Temp\cracked_lunar.exe"

C:\Users\Admin\AppData\Local\Temp\cracked_lunar.exe

"C:\Users\Admin\AppData\Local\Temp\cracked_lunar.exe"

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\_MEI24002\python311.dll

MD5 9a24c8c35e4ac4b1597124c1dcbebe0f
SHA1 f59782a4923a30118b97e01a7f8db69b92d8382a
SHA256 a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7
SHA512 9d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-19 11:26

Reported

2024-06-19 11:27

Platform

win10v2004-20240226-en

Max time kernel

26s

Max time network

32s

Command Line

"C:\Users\Admin\AppData\Local\Temp\cracked_lunar.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\cracked_lunar.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cracked_lunar.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 648 wrote to memory of 4816 N/A C:\Users\Admin\AppData\Local\Temp\cracked_lunar.exe C:\Users\Admin\AppData\Local\Temp\cracked_lunar.exe
PID 648 wrote to memory of 4816 N/A C:\Users\Admin\AppData\Local\Temp\cracked_lunar.exe C:\Users\Admin\AppData\Local\Temp\cracked_lunar.exe

Processes

C:\Users\Admin\AppData\Local\Temp\cracked_lunar.exe

"C:\Users\Admin\AppData\Local\Temp\cracked_lunar.exe"

C:\Users\Admin\AppData\Local\Temp\cracked_lunar.exe

"C:\Users\Admin\AppData\Local\Temp\cracked_lunar.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI6482\python311.dll

MD5 9a24c8c35e4ac4b1597124c1dcbebe0f
SHA1 f59782a4923a30118b97e01a7f8db69b92d8382a
SHA256 a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7
SHA512 9d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b

C:\Users\Admin\AppData\Local\Temp\_MEI6482\VCRUNTIME140.dll

MD5 f12681a472b9dd04a812e16096514974
SHA1 6fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256 d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA512 7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

C:\Users\Admin\AppData\Local\Temp\_MEI6482\base_library.zip

MD5 334e5d6e591eccd91d2121194db22815
SHA1 821d70c44dc7f25a784e9938d74e75a3471e1ad0
SHA256 9e830533f6e67b84d9dbc502db38a6f25d3c984f1a6a195a50f838d48d5b3ba5
SHA512 bac4a1283745e5eb4db953227bbf00831c8a0c3c831f5889e0d0630841e59c8ad96c3386ce3ad48300f4754fde188212edc79b78c9c98f76bca21987c1c05866