Overview
overview
10Static
static
10Lunar-crac...ck.rar
windows7-x64
1Lunar-crac...ck.rar
windows10-2004-x64
1Lunar-crac...ed.exe
windows7-x64
7Lunar-crac...ed.exe
windows10-2004-x64
8i:+��.pyc
windows7-x64
i:+��.pyc
windows10-2004-x64
Lunar-crac...er.sys
windows10-2004-x64
1Lunar-crac...k.1337
windows7-x64
3Lunar-crac...k.1337
windows10-2004-x64
3Lunar-crac...on.dat
windows7-x64
3Lunar-crac...on.dat
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 15:19
Behavioral task
behavioral1
Sample
Lunar-cracked-by-wxcrack.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Lunar-cracked-by-wxcrack.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Lunar-cracked-by-wxcrack/Lunarcracked.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Lunar-cracked-by-wxcrack/Lunarcracked.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
i:+��.pyc
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
i:+��.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Lunar-cracked-by-wxcrack/driver.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
Lunar-cracked-by-wxcrack/k.1337
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
Lunar-cracked-by-wxcrack/k.1337
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
Lunar-cracked-by-wxcrack/version.dat
Resource
win7-20241010-en
Behavioral task
behavioral11
Sample
Lunar-cracked-by-wxcrack/version.dat
Resource
win10v2004-20241007-en
General
-
Target
Lunar-cracked-by-wxcrack/k.1337
-
Size
61B
-
MD5
d8a831e13d3fcd558d8b5003e093a168
-
SHA1
b09aef4e78a87faa7879d7edf2d95287704f6950
-
SHA256
d7a4e8d955aafff55f3b603b9c1838829e1ef88dff455ef3d804c0c25f1ae4f2
-
SHA512
186e4e2361cdc44f17f0d5d2dd3a3ff362aaffe07fd7ca289e48e38ce8c164007cb3b36b1438fcb55994267c3842a90baf0f7e67e6a65d9157ff6f0bee511e23
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid Process 3768 OpenWith.exe