Analysis

  • max time kernel
    121s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 00:49

General

  • Target

    $R0/Uninstall Lunar Client.exe

  • Size

    179KB

  • MD5

    d8467036b71c4b617ba5c2d90a3c8f34

  • SHA1

    af9542cc0c2962ef73190d6f85d43d0202130529

  • SHA256

    970ea7020a05ad79d9d89bc584553452abf2745a7e47be6792578eb3e41fb382

  • SHA512

    693070ec8f10ee7cab7f4ed8758723d8574a847fd8f408e5d0c445567296bbbe437d36be8ac8acd671f40c4d4b0a67b0e6fafcee1f0f6ae0dcf0cd788f0802c6

  • SSDEEP

    3072:Kn77v00hEoDEtau24lkW6Dx/XItjLSTtWIDlXiGzo7Qqt7iv1/aH2tvhOEA1RJC9:K740ImskW6V4tjLSTPpiGzo7Qqtmvpsm

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Lunar Client.exe
    "C:\Users\Admin\AppData\Local\Temp\$R0\Uninstall Lunar Client.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\$R0\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://lunarclient.com/uninstaller/?installId=unknown
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    01b18e10c0e2beee360820cf8bd02dbe

    SHA1

    f01bf091170da22f42141030dd3bf7ed4ab7a7bf

    SHA256

    1dd814392450376c326027f6fd9aa0a0ca617829be7d414f09f58a9cf6ca8a84

    SHA512

    e63c2d723f0143201fd543c13e0cdc04894d82a8c8198c5b235c331307039b996238e341eff1e0d03114513702260a8f08928778a70182963f2156099e69a697

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e5c86233f11bae68e770bae4bb04596

    SHA1

    a8b0b9f839c5867fa14edd48dde29f40abe619dd

    SHA256

    8f098d034ecb408724c3081e703be2c2c1ba4d467bf5163cf4d3f954d37c6fc4

    SHA512

    3e4bfe78d61423b1b3a3ac103cb1aa165a4535c96bd109817874d73eb2946c006be46b72e779524d57537e5085df3758459ff5e5db2730fa6f22df9a1acdb64b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    337e4ef7137915cc9799609bf2accfd0

    SHA1

    0f528ddd3e4400335c93b4738fadeb66590bb2ae

    SHA256

    c69cb93ad7e669667bb5db79cdae24e3985f7ecd4211d3568d1c7f6f5b3f6e2a

    SHA512

    4f3591e95bc931d5ae770743e32784be761cd3bc30e47150fb7d3568956eb669dfa985c5a2564ed1d9f2a518befd5079861c96d902d47e42cc3887792cda042a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f84e203fa813bc8e023afbf8f2f5e27

    SHA1

    c635f2751c19a01218a8475f4436f4e543d4faf4

    SHA256

    a7de1cb5093de5a99dc5b88f759fdee680d2872aca5e8318d51ac72b15fbe93c

    SHA512

    4c8406e58c17fac4617dc71666dc79f541773edff6c68e699047f1c8b3e137c2d7bb8ddaacc6d3bef9176c619bc8f69663e7844f3855398ba072791d3c10dc66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    677a3b5e58992a8bce29d3dc041a355a

    SHA1

    9c52269139bc882fecf0c1766501783b54f7fd4d

    SHA256

    8b8beda1f05466665c2c186fafab1a3ad1f1736d606a469556436f21ebe5b311

    SHA512

    7fd4bcf1c58f1399eea0213efe4cf408af0a853a7e30fe1ca71b28333fc3c3ece379694b364cdea6b465094edcdf6409723c7f7fd8fa52611f1d5bc342a2f169

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec0f408eb19eda86980432abfeb06818

    SHA1

    24560fc105c03d88ce96e2d406c8a0553a1d91ad

    SHA256

    7389c57dfc3a1bb5715f06b8d48a1db05246dd6b97ae7c3ec3c38b012a0e8af6

    SHA512

    1c06a210e4257d5374604ab5a1b56268cef8efbf3fb928213bb966880a66fac4c32b7d486fe7d408ea7bf0ebe7061dd09be83ba91c92f82e2b8f7c7caa6cb375

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f01338e902ceab103521c5c0d1cf46aa

    SHA1

    4033fdc3cc3fb6d55c06392a38027c888a482992

    SHA256

    c0244b2afeb77efbd9657929a04480cf7ff2b73ffa3afcb9045fee2ed1a7bd8c

    SHA512

    0be78893b89b735e0a68a94c2f73419e2111fa48c78e009178b7a4fee0499c4600b065bd8b611364f187a36003f0d3c487589676632f60dc505529065767bb32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    effb092ea1e3f59ebc1085fcd3c73040

    SHA1

    4a5731d6fcfa5670884143925aaad56d16317481

    SHA256

    7b74d3b66b46732133c6ebdc9d090352c4a3efb93da961dbb55fe7f5c5a81b1c

    SHA512

    c1de2cb0b639e3f2f01e4b173b96b6a2b6277b752a3cd54e097ef51c5a3473be9d54b1cfacd0696c6a83b312074fa0d39cfd8f75fbaa05fba178be082c56d659

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ddd1ea4def39016c54618518055f5c7b

    SHA1

    60a2c5db924f1fc265d3f63f21aca41f04e21990

    SHA256

    c15e7d9227fbc6ab73be11ba35cedc2e204e4681acf38c0707e9f02305ea003f

    SHA512

    1087177f1bf896154bf530e4a73c40953b22a5bd4b105403ff14774f1f737464f0101b46a4ae62e05bc28a35bfea8843fe65dd2702fa80338bbd76712a0b1ac7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69c1140b112b892f03ca4e6b821e95f6

    SHA1

    caa5030d165bfee690c39477407120ae85c9baff

    SHA256

    9f9ad55baa34ee0c07606cefce92b249acfa9e8f3e33363ee54906fc48e4d946

    SHA512

    260714a545b85ac18af9406629bbdcaf393dae7e388c748343360cdcd35bfa105c4f2aff107016255fd9640dad5407f1eb9ed9423bfc2478e3bd1dc7e80cd5cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dcac11a643767c78e4426610d0cffa07

    SHA1

    7f1015f527b1f3d6d4dde7d1942ba441131ba7b9

    SHA256

    9147eed2a16d0eb475ae3770e7ec51e6afbb3c8738bab492cc6de2364296c93e

    SHA512

    55f7bbda4cfc4db9bc1110af4e0b02382ef25cbc4d6638f26b528f941b59e636e143d5bbf39666451752e13a4b49fab018a711acee941f35e50dd808bcb79096

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e4dfa07257d95f2752741b6d703e638

    SHA1

    2c63ec60a651d56c017a66e91bd3cd2c9e0d856b

    SHA256

    43b65d85b0dd2f8bed7a0890a83f5dcec67ab97ad2d0150f5f9eb9154369ecb6

    SHA512

    9b37daef3a1a425f0bdd359e366cd176642f8eef03c6f4c253c77b3bf4e00db393a8a2dc547638726e8f172ffb4f136b1c6a5c3be6e22c4c911b581334a551f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aea3dbee6576916597450cc4fb8c6bd5

    SHA1

    a2b05b812d30c2d6ecbf1ec6410606fcfd9083f5

    SHA256

    7996b3d342295d1aa90b016925d692c6da6dd6235fcb159a233e7f7a3e0b5409

    SHA512

    8eb880393ccb440aeb9b7833dc66da64dac537b4e51477c1d07885967b91d458d31b9a797adb1103508d5a032c1886029fd9209d503f1a55c320eb8431f0145c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3789e5616104e45b83573657e0e382c

    SHA1

    76f9e4a9a39a8256e1183b4897f84bd63e1f6792

    SHA256

    9ab26618b2f781b0397f88ff2889a2a7f98360b9ad1b08b576c53b4da88ca9e0

    SHA512

    0102912f499691eda8b9d64f9b7c2853c9dfa063383343b5d58ae615bed6af36e1cd437dac4a1d562ca39834da4dde178cc5781750fb326328da2683fe0f0168

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    005bf08c02d8842b8d0b29fd51c8fbed

    SHA1

    76126ada5941e5d6e20df56d23cf59e10cca18d8

    SHA256

    81c04ef7460ce47ad35ff4398c0f1355b23fed61c3cb41dcba85438f1272f75a

    SHA512

    7d2befae245258c5e4f18df8568142c40c6451767f37fdde674a4a36faa68879f548eed8625b41b4af096a1b2003daf2849666740cdbb38affd2f0308b68b7e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ce01e43ee4266993d48cb493c56ef4b

    SHA1

    a150af3c2fab3776309b3f96e376541cf15c353b

    SHA256

    289d76f9dba7494f367c93ef5c3d27e681f6cad13b9620542fceb295b1a9dc38

    SHA512

    267b59dea13e9a1a0ed89d523bc17cca3863cb8ed6b4d1c41c77dd869490a46f144fcf3b22252d79d2a795928d1f6ccdf5286f46e02f780feb3018a229a92c39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d2857b7a43951dfa414715c10a3f0d9

    SHA1

    7ba7bb66d427b8960361c2f29a73544299ffa7b9

    SHA256

    f79eec60a3e3874516c7b92f6bfed1c3136b926049d38443f2d7de813def26c9

    SHA512

    1b3478d56e512914d063f10acf3af0b104bf2aa45013fdbbb7a50e2a4b7435a0efdace35f455fd9ae37a3341b822c6b517b6865e2e7df44368d38aa4c32702af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23c320115365dd950bb2de5086c7d9ee

    SHA1

    d876c924e121ad36068608e3df742af7a50930d6

    SHA256

    2debf6c6be7b543ab865ba7bfc74e8227de71bc74fb0c7163cc553e3499b4ba5

    SHA512

    e7bb6f1e705d50dbf9709287e9f9552a123f510d85b71349736f5289c22298c45dd36a36579819ac8845f9b4872943b88d138f06f242a834e116373bd098bf66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3afaea22aa70c40ac12fd74fa463eb24

    SHA1

    04686a93d4dfba797ebfbb62076d8391c56e5218

    SHA256

    a8e4409fcca1991d658c3f8239f53ab2bc2109d76681226668ca3c16d7bb07d9

    SHA512

    20c1d4863e5b295090e01f5d376427c10833a58d1b94db57343cee7feb077abc418850bc2f2feea278d1c5bf11b7468b0018813a2a9fe81c97a1bfc4bdce11db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d511b56191ac2b49192fb356bdc00475

    SHA1

    7093fa06fe857f81b06304145886263e5e2b094e

    SHA256

    16038ad6127784477ec02f58ff9b95e11fde68de324e141f4914ea67dda6339a

    SHA512

    a872e913c3fe6eb042f83ce97003b7547915056ec318b1b3ab219f79cdcadda247c8f05b050d2db47885391fa8bf7c1a8b57aacb920f54f37ae0de80854e78db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f6855fa7c510a09a8cb065a9d5c53e4

    SHA1

    be9b04ac5306ac2b3ca9c55bd35db84625abdbdc

    SHA256

    843b3d3e83750e5921112388d97f433055d7ef78f2b0fc2692ac4f3cca3a2060

    SHA512

    7d0c71b22f6b859d0cf966b1f3837fb7a125eca4bfa942b79cdbbf6de3d76bfa7f824fb0e22dea1407784f5dc36bda83fa5ae8d850f4a678be90b563edb2a809

  • C:\Users\Admin\AppData\Local\Temp\CabD9FC.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDA0F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nsjAF92.tmp\StdUtils.dll

    Filesize

    100KB

    MD5

    c6a6e03f77c313b267498515488c5740

    SHA1

    3d49fc2784b9450962ed6b82b46e9c3c957d7c15

    SHA256

    b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

    SHA512

    9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

  • \Users\Admin\AppData\Local\Temp\nsjAF92.tmp\System.dll

    Filesize

    12KB

    MD5

    0d7ad4f45dc6f5aa87f606d0331c6901

    SHA1

    48df0911f0484cbe2a8cdd5362140b63c41ee457

    SHA256

    3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

    SHA512

    c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

  • \Users\Admin\AppData\Local\Temp\nsjAF92.tmp\WinShell.dll

    Filesize

    3KB

    MD5

    1cc7c37b7e0c8cd8bf04b6cc283e1e56

    SHA1

    0b9519763be6625bd5abce175dcc59c96d100d4c

    SHA256

    9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

    SHA512

    7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

  • \Users\Admin\AppData\Local\Temp\nsjAF92.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    ec0504e6b8a11d5aad43b296beeb84b2

    SHA1

    91b5ce085130c8c7194d66b2439ec9e1c206497c

    SHA256

    5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962

    SHA512

    3f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57

  • \Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe

    Filesize

    179KB

    MD5

    d8467036b71c4b617ba5c2d90a3c8f34

    SHA1

    af9542cc0c2962ef73190d6f85d43d0202130529

    SHA256

    970ea7020a05ad79d9d89bc584553452abf2745a7e47be6792578eb3e41fb382

    SHA512

    693070ec8f10ee7cab7f4ed8758723d8574a847fd8f408e5d0c445567296bbbe437d36be8ac8acd671f40c4d4b0a67b0e6fafcee1f0f6ae0dcf0cd788f0802c6