Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
Lunar_Launcher.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Lunar_Launcher.exe
Resource
win10v2004-20240802-en
General
-
Target
Lunar_Launcher.exe
-
Size
3.2MB
-
MD5
e6810402c4da84354ed06ad83ba5ffa8
-
SHA1
5d34d41750a512ffbbc49613acdea9ed7d3cc2f5
-
SHA256
9984c879995a1ac07533eba9f8ccfb88b82e81c010331ea46a52427395cd7d06
-
SHA512
38e185c2cf8fdf5baa3005f6562742f080260f16b202a2a75b9ed749631853f199543dabc7a96f8488198ad9fdebef1704a891f34ca675ae47179bcfb1ee532d
-
SSDEEP
98304:gwyrkJci8kn0p9zCFm0kR2wum3yMyRGBVMaGjTzJmg:PygJci8kK9zC80DmsuVEjTzIg
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 4 pastebin.com 5 pastebin.com 21 discord.com 22 discord.com 23 discord.com 24 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lunar_Launcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DOMStorage\discord.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00964c8ffae8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B964D471-54ED-11EF-8CEC-EE5017308107} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000f9f9f90e91a478f998b9bc76d9ac647bf4237c470c4e1f9c682cb2cfb21b9249000000000e8000000002000020000000c9aa01de710d41afd727cf569386f8490b8b5534cc10dc4684f7ca8e2418b23220000000eafc6ca486c555a3660c746b6dab5ea3d8363155854f30b3793768208db4d819400000003d3c9c77b3cf3c517bce06fee14c133f612d509cec3c236eb4dc00008dd40ecfa02efc98d324418179fdae7b57564b391a4f94f3fa11f9dcfe30b6af633bd44e iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DOMStorage\discord.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2768 Lunar_Launcher.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2768 Lunar_Launcher.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2548 2768 Lunar_Launcher.exe 30 PID 2768 wrote to memory of 2548 2768 Lunar_Launcher.exe 30 PID 2768 wrote to memory of 2548 2768 Lunar_Launcher.exe 30 PID 2768 wrote to memory of 2548 2768 Lunar_Launcher.exe 30 PID 2548 wrote to memory of 2100 2548 iexplore.exe 31 PID 2548 wrote to memory of 2100 2548 iexplore.exe 31 PID 2548 wrote to memory of 2100 2548 iexplore.exe 31 PID 2548 wrote to memory of 2100 2548 iexplore.exe 31 PID 2548 wrote to memory of 2100 2548 iexplore.exe 31 PID 2548 wrote to memory of 2100 2548 iexplore.exe 31 PID 2548 wrote to memory of 2100 2548 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lunar_Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Lunar_Launcher.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://discord.gg/vUBT29RzZj2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547b7054a668ccee15de407f85a01e1e1
SHA1884be062b15cf0724ad6878e256df88aabb5ef89
SHA256bad5c4b6d76e9bdfb5dcb6477965e5bbb2174f5715a877aa69d5cd550eadebf7
SHA512abd82f18db52b304e045483771f95510e80a1c0f0840dcce40aaa6015df6464d91f4120bcca53791e4bf1d5342d548c076c5b110f152a299f7b237c5e5ebc0ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5671aca6f8e72d40f8cd531aa1e9ee301
SHA13e5b797e60817720924deeafc95024e7a01245ba
SHA25649e0ed0ac764cbfbf008b0b9284b64f2ce4c4f1d210cb567d0f5a4eceb232eea
SHA512862c863c99788281ef45475d690c4249664c80c017c981dcc9e0bbaec00416b6de4a881d0c322a856faeb2dbc43b4e81d76566921f04ff30e9626de601d7910b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd5d2a62280b770df120621911c9290d
SHA1ac4bac0b9fcb1c56cfbed5eca38b7af75a687c3f
SHA256903c0e4b12ca053670a7b33f84dcb2936dbd60e331cf2de78576316296f2bfd0
SHA512d2c9cdc0a158d419652d214c6ad3fd823443368e2f89c46bf47e30d5c9ab2f2628983cea89c7e0c6df4910761ecf9e67033fcc5959b4daebef76342e102b55c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5949193465d7c10f66f799cc950dc1182
SHA129b6e71c4be9bdede9939f059241ecaa04c1a23d
SHA256aeeaa28d7ffba9a45a16baccf1e3f3a4542f456a92185b65fc73612f21307a13
SHA5122b287423f48e9d8d143bb1e9c1ea9a82d637664cd5f10751746cece8ae5f23f282a7d9dfc7aa47886b6b5f53567644d33f7e35fed2eedd19db2d685a34f29027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588accfaab9295668c52d9599e6dd0163
SHA156a3c2e62f3cfbafed23e7435e8b7aabaeb967cc
SHA2562523792f90837dd710a8e6c599550ae5317e98bdd812d100fcdc3b104643079e
SHA512322d7ba972f2ea5e9510ce16c51415c4d5250a8d43b512e5f6d6539ac041d4850bbe9b5009b89dd6412f7f0e136337d321b923b6a7d7e5c2e61ddc12b7d55c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bcbcbe7f18e46b75dc0db7e0d28d9ef
SHA1893c0739fd5b16f401d7830e82c3a216c0d51324
SHA256473e964810a9ab26061183b32edba083b46f9ff62153373e0eac8a5c528d293a
SHA5126585596d857158b330160f7f9bcb2b8ef7ba402483881ba399b47a6d57095e4070b645d33b8b8ed4f8958a6d6903f08725c9f60d0248cd848d6fbe4a227d61c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f08f6b4de933e9edae0995006b9a59b
SHA17f630fa8509bd949d853993bf79cda10e203bd0e
SHA25659e5a1bc811fbb67787ce50843fbfc2683d504ad2bc57cb47a2f2cad4e8662c6
SHA512f380b7e1898e2f0b4b4208fad14c1f50fa7b7d88a171d66ff2bbe1243688ee7b22e23404ac42d4c038e86676f51c88d790fa1398ab1c1fe7f7bffc4774a8ecb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0ed4f2bb6d0cfd26b504720a7f2597b
SHA178656209b20d05dbfa1f8c5f35897d5a6354043b
SHA256b53c2aa84f4788d8d66eb7613ff6164265d857f98668414dcda1acca8d92a0f9
SHA5128b908425b95552bbc58d1f22178e9ea95afb9bea23f60eba12564f7f055e9f6fe53016bcf056313f136d82f89ed529c0b47da988e304494e8980cf5d4f926591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554dcf05942869288a36aa1983ffc8f99
SHA1bb3e20891d0c09763d34499fc63a0bb330162114
SHA25626bd1aada622ee7fc333ab68d7d01aceb6faf13eabd5fa2a83eb31dbb842ef08
SHA5128a15597b2371968c3d89a06f131b912bbce96b0ccbf4964b4b85e6541019a46f8ef4380c4d61df0cf3428b6ee8c291c2e8da58224c000663bfe8247236d8e689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55582265b8496cfde2d8e4c3264bc28d2
SHA1ea993867690736da71496cc880330d2996056940
SHA256bcb4b05aa2b12aa1b0f46f050a5d94f01a9b79da9200665ffe9dee526d44a39e
SHA51253e54d8cb5ca7b868dde8771f1a77d2771ec4a40d3bbcb699e7ffab944a677d1f98dd10beebc4695ba4312f572a9e0cc2b956b0fcf675193daf2607eb127347d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d49b4d7b42d868625457b63e8b9aaa9
SHA1b19395b00693abf110817d7adc6e0b4cbb2387e6
SHA2566ad37ad6c38291bdf7e584ece677abbd1db5386d6991649955a5469e89a246a9
SHA512b66f7418010f03dbefc83a4e48f09550c27b16bff63481c88de5ea43027480b2e6029d6c8512f842bdcc8bc9ea62bad1ffd09ef8274d0acd21ad32b78922ca16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8312923ed03e9ab454c3212309711b2
SHA1e03c9bd5d0e9cabe6e912fd6de52376eebdc29c4
SHA2561ca29509c7211b6e70385a8929a21019d4a525c802aa945dfc9b9725e6227a38
SHA512ff304d5b6d4b10f9ab5bb817584fc6759cd70f6da5ebddcf337c5bf19ce75caf16fb79d820d30df927014101901cb724cd96436df59e40f170a8f992ea965fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb8538606386dad97dd4fffadf9f3bb7
SHA1c9de551a6b878a5db9c3443248f44611614e01fa
SHA256f817c2c437ef644c1e76e82a6139eaae43cd7afbef92bc390a2698d42a8974d7
SHA5122cbb2e28631e4eb63f5c05509a715404adbc3d431c165806c706df0c6ebe4b69dc5d12ae74965f9feb31d8fd92c8f40e40547ed2b95e7f3d3201eade4f03f9e4
-
Filesize
24KB
MD5650c95a5595e109445c7356ab20c227e
SHA106fe2968d37f13402501d0c599fb27fa24daf944
SHA25663377dd8babaedf7043bba2c69f4a800ed0ebc3be3b5e3fb7a3b46911842694c
SHA512fa764571676a0856e884286471aa9fbb5c30ae2da513c91493e59672101b1076ce89734b2b26bbd15a90f0ac463ca8df04d51ac6b8b0da0fc76dd29df9be681a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M7GT0RRO\favicon[1].ico
Filesize23KB
MD5ec2c34cadd4b5f4594415127380a85e6
SHA1e7e129270da0153510ef04a148d08702b980b679
SHA256128e20b3b15c65dd470cb9d0dc8fe10e2ff9f72fac99ee621b01a391ef6b81c7
SHA512c1997779ff5d0f74a7fbb359606dab83439c143fbdb52025495bdc3a7cb87188085eaf12cc434cbf63b3f8da5417c8a03f2e64f751c0a63508e4412ea4e7425c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b