Analysis

  • max time kernel
    144s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 19:14

General

  • Target

    Lunar Engine/lunarengine-i386.exe

  • Size

    11.1MB

  • MD5

    ab36097ea29667fdeffe1f844d7143fc

  • SHA1

    8b2a00b2a70802918afc8e3c84295d0fc24bd7ab

  • SHA256

    0b812e7d68077a48b8f008860936024d7bd4a7a2c321632eefaf418c4612dee5

  • SHA512

    8c916e269d975d3dc17de579543bb5b966f325212eaa501fa7529b2161adac1dc88b4be3e1f1ff999e8de57bbd8cae7e35dea1ffdaa25047d0b1be8ff4077237

  • SSDEEP

    196608:ylmIExvIWIuhQrJH1FmC0Was4xal/zPCGyp45tuYCHmuOZD:qmIExvHIuYPmWas4wCHpIQBmuOZD

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 53 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Lunar Engine\lunarengine-i386.exe
    "C:\Users\Admin\AppData\Local\Temp\Lunar Engine\lunarengine-i386.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\Lunar Engine\Tutorial-i386.exe
      "C:\Users\Admin\AppData\Local\Temp\Lunar Engine\Tutorial-i386.exe"
      2⤵
        PID:2188

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3056-0-0x0000000008330000-0x0000000008331000-memory.dmp

      Filesize

      4KB

    • memory/3056-12-0x0000000061C00000-0x0000000061C91000-memory.dmp

      Filesize

      580KB

    • memory/3056-14-0x0000000008330000-0x0000000008331000-memory.dmp

      Filesize

      4KB