Resubmissions

04/10/2024, 18:21

241004-wzbqasyfkp 6

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 18:21

General

  • Target

    lunar-client-qt-2.0.0/buildconfig.cpp.in

  • Size

    305B

  • MD5

    e54c0d07ac31ad7d1053da3bc8b7d9f3

  • SHA1

    a1a19c1adc60910e477d12e733e581dac4b2a5e5

  • SHA256

    f09f3a7decd2dc6c05f58554fd91da09adf5c6e931469265a69eeb4b5a3581ec

  • SHA512

    a37f33f1977e839516cfe6af9a035e1e4a4e296bafe63886befa0854df9e2ad1e74988ed231cb29f1d46f4033f329c7c24eb17cc8c6f83b64b7476a02a905e2b

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\lunar-client-qt-2.0.0\buildconfig.cpp.in
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\lunar-client-qt-2.0.0\buildconfig.cpp.in
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\lunar-client-qt-2.0.0\buildconfig.cpp.in"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2880

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          859da216d215e97c6f8009b922800670

          SHA1

          bb508d84031dca93fffa344a9ce5c73e8e6e2919

          SHA256

          6b314c229c0e013213ed146ba0211c183ab8e6059b8e304d1858c47d401a8c5d

          SHA512

          dbfdd2e7b01ba0a4f5f447b2c181fb0cc814402fc268b51ea8d9d85106af341b1fd842260cac82f8f8fee0a0432a3728a77cd91ee3c78f085864571485e00cf1