Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-11-2024 15:19

General

  • Target

    Lunar-cracked-by-wxcrack/k.1337

  • Size

    61B

  • MD5

    d8a831e13d3fcd558d8b5003e093a168

  • SHA1

    b09aef4e78a87faa7879d7edf2d95287704f6950

  • SHA256

    d7a4e8d955aafff55f3b603b9c1838829e1ef88dff455ef3d804c0c25f1ae4f2

  • SHA512

    186e4e2361cdc44f17f0d5d2dd3a3ff362aaffe07fd7ca289e48e38ce8c164007cb3b36b1438fcb55994267c3842a90baf0f7e67e6a65d9157ff6f0bee511e23

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Lunar-cracked-by-wxcrack\k.1337
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Lunar-cracked-by-wxcrack\k.1337
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:372
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Lunar-cracked-by-wxcrack\k.1337"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    94dbb15a3880f2caa578d7d466b6ca3b

    SHA1

    7a1e1102a4572265832e5dc28d08eb7350ea02d2

    SHA256

    f62b9a2ea5bce8e22e577104094a2bfc31559fd05e6d4da91d602a9cf7d16d6d

    SHA512

    ec68a81b0ab4e5417de7b048e2d5f2bdd056003d3b78699bdc16d5a1200763ce466c2a0a96d7d7f88139bba31bfa4559b4fe92d14921a7abfb186fe72ce1d98a